Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
Catalyst 3032
Cisco Catalyst 3032 Manuals
Manuals and User Guides for Cisco Catalyst 3032. We have
2
Cisco Catalyst 3032 manuals available for free PDF download: Software Configuration Manual, Getting Started Manual
Cisco Catalyst 3032 Software Configuration Manual (1354 pages)
Brand:
Cisco
| Category:
Switch
| Size: 16.58 MB
Table of Contents
Table of Contents
3
Related Publications
50
Obtaining Documentation and Submitting a Service Request
51
Features
53
Deployment Features
54
Chapter 1 Overview
55
Performance Features
56
Management Options
57
Manageability Features
58
Availability and Redundancy Features
60
VLAN Features
61
Security Features
62
Qos and Cos Features
65
Layer 3 Features
66
Monitoring Features
68
Default Settings after Initial Switch Configuration
69
Network Configuration Examples
72
Small to Medium-Sized Network
75
Where to Go Next
76
Using the Command-Line Interface
77
Understanding Command Modes
77
CHAPTER 2 C H a P T E R 2 Using the Command-Line Interface
78
Understanding the Help System
79
Understanding Abbreviated Commands
79
Understanding no and Default Forms of Commands
80
Understanding CLI Error Messages
80
Using Configuration Logging
81
Using Command History
81
Using Editing Features
82
Recalling Commands
82
Editing Commands through Keystrokes
83
Editing Command Lines that Wrap
84
Searching and Filtering Output of Show and more Commands
85
Accessing the CLI
85
Accessing the CLI through a Console Connection or through Telnet
86
CHAPTER 3 Assigning the Switch IP Address and Default Gateway
87
Understanding the Boot Process
87
C H a P T E R 3 Assigning the Switch IP Address and Default Gateway
88
Default Switch Information
89
DHCP Client Request Process
90
Understanding DHCP-Based Autoconfiguration and Image Update
91
Limitations and Restrictions
92
DHCP Server Configuration Guidelines
93
Configuring the DNS
94
Obtaining Configuration Files
95
Example Configuration
96
Configuring the DHCP Auto Configuration and Image Update Features
97
Configuring DHCP Auto-Image Update (Configuration File and Image)
98
Configuring the Client
100
Manually Assigning IP Information
101
Checking and Saving the Running Configuration
102
Modifying the Startup Configuration
103
Specifying the Filename to Read and Write the System Configuration
104
Booting a Specific Software Image
105
Controlling Environment Variables
106
Scheduling a Reload of the Software Image
108
Displaying Scheduled Reload Information
109
CHAPTER 4 Configuring Cisco IOS Configuration Engine
111
Understanding Cisco Configuration Engine Software
111
C H a P T E R 4 Configuring Cisco IOS Configuration Engine
112
Event Service
113
Deviceid
114
Understanding Cisco IOS Agents
115
Incremental (Partial) Configuration
116
Enabling Automated CNS Configuration
117
Enabling the CNS Event Agent
118
Enabling the Cisco IOS CNS Agent
119
Enabling a Partial Configuration
123
Displaying CNS Configuration
124
Understanding Switch Stacks
125
Managing Switch Stack
126
Chapter 5 Managing Switch Stack
126
Switch Stack Membership
127
Stack Master Election and Re-Election
130
Stack Member Numbers
132
Switch Stack Bridge ID and Router MAC Address
132
Stack Member Priority Values
133
Switch Stack Offline Configuration
133
Effects of Adding a Provisioned Switch to a Switch Stack
134
Effects of Replacing a Provisioned Switch in a Switch Stack
135
Hardware Compatibility and SDM Mismatch Mode in Switch Stacks
136
Major Version Number Incompatibility Among Switches
136
Stack Protocol Version Compatibility
136
Switch Stack Software Compatibility Recommendations
136
Minor Version Number Incompatibility Among Switches
137
Auto-Upgrade and Auto-Advise Example Messages
138
Incompatible Software and Stack Member Image Upgrades
140
Additional Considerations for System-Wide Configuration on Switch Stacks
141
Switch Stack Management Connectivity
142
Connectivity to the Switch Stack through Console Ports or Ethernet Management Ports
143
Configuring the Switch Stack
145
Enabling Persistent MAC Address
146
Assigning Stack Member Information
148
Setting the Stack Member Priority Value
149
Accessing the CLI of a Specific Stack Member
150
Displaying Switch Stack Information
151
Manually Disabling a Stack Port
152
Understanding the Show Switch Stack-Ports Summary Output
153
Identifying Loopback Problems
154
Software Loopback Example: no Connected Stack Cable
155
Hardware Loopback
156
Hardware Loop Example: LINK NOT OK Event
157
Fixing a Bad Connection between Stack Ports
158
Managing the System Time and Date
159
Chapter 6 Administering the Switch
160
Configuring NTP
161
Default NTP Configuration
162
Configuring NTP Associations
163
Configuring NTP Broadcast Service
164
Configuring NTP Access Restrictions
166
Configuring the Source IP Address for NTP Packets
168
Displaying the NTP Configuration
169
Displaying the Time and Date Configuration
170
Configuring Summer Time (Daylight Saving Time)
171
Configuring a System Name and Prompt
172
Default System Name and Prompt Configuration
173
Default DNS Configuration
174
Displaying the DNS Configuration
175
Configuring a Message-Of-The-Day Login Banner
176
Managing the MAC Address Table
177
Building the Address Table
178
MAC Addresses and Switch Stacks
179
Configuring MAC Address Change Notification Traps
180
Removing Dynamic Address Entries
180
Configuring MAC Address Move Notification Traps
182
Configuring MAC Threshold Notification Traps
183
Adding and Removing Static Address Entries
184
Configuring Unicast MAC Address Filtering
185
Disabling MAC Address Learning on a VLAN
186
Displaying Address Table Entries
188
Managing the ARP Table
188
CHAPTER 7 Configuring Switch-Based Authentication
189
Preventing Unauthorized Access to Your Switch
189
C H a P T E R 7 Configuring Switch-Based Authentication
190
Default Password and Privilege Level Configuration
190
Protecting Enable and Enable Secret Passwords with Encryption
191
Setting or Changing a Static Enable Password
191
Disabling Password Recovery
193
Configuring Username and Password Pairs
194
Setting a Telnet Password for a Terminal Line
194
Configuring Multiple Privilege Levels
195
Setting the Privilege Level for a Command
196
Changing the Default Privilege Level for Lines
197
Logging into and Exiting a Privilege Level
197
Controlling Switch Access with TACACS
198
Understanding TACACS
198
Configuring TACACS
200
TACACS+ Operation
200
Default TACACS+ Configuration
201
Identifying the TACACS+ Server Host and Setting the Authentication Key
201
Configuring TACACS+ Login Authentication
202
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
204
Displaying the TACACS+ Configuration
205
Starting TACACS+ Accounting
205
Controlling Switch Access with RADIUS
205
Understanding RADIUS
206
RADIUS Operation
207
Change-Of-Authorization Requests
208
RADIUS Change of Authorization
208
Coa Request Commands
209
Coa Request Response Code
209
Stacking Guidelines for Session Termination
213
Configuring RADIUS
214
Default RADIUS Configuration
215
Configuring RADIUS Login Authentication
217
Defining AAA Server Groups
219
Configuring RADIUS Authorization for User Privileged Access and Network Services
221
Starting RADIUS Accounting
222
Configuring Settings for All RADIUS Servers
223
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
225
Configuring Coa on the Switch
226
Monitoring and Troubleshooting Coa Functionality
227
Understanding Kerberos
228
Kerberos Operation
230
Obtaining a TGT from a KDC
231
Configuring the Switch for Local Authentication and Authorization
232
Configuring the Switch for Secure Shell
233
Understanding SSH
234
Limitations
235
Setting up the Switch to Run SSH
236
Configuring the SSH Server
237
Displaying the SSH Configuration and Status
238
Certificate Authority Trustpoints
239
Ciphersuites
240
Configuring Secure HTTP Servers and Clients
241
Configuring the Secure HTTP Server
242
Configuring the Secure HTTP Client
244
Configuring the Switch for Secure Copy Protocol
245
Understanding the SDM Templates
247
Chapter 8 Configuring SDM Template
248
SDM Templates and Switch Stacks
249
Configuring the Switch SDM Template
250
Setting the SDM Template
251
Displaying the SDM Templates
252
Configuring Ieee 802.1X Port-Based Authentication
255
CHAPTER 9 Configuring IEEE 802.1X Port-Based Authentication
255
Understanding IEEE 802.1X Port-Based Authentication
255
C H a P T E R 9 Configuring IEEE 802.1X Port-Based Authentication
256
802.1X Device Roles
257
Authentication Process
258
Authentication Initiation and Message Exchange
260
Authentication Manager
262
Port-Based Authentication Methods
263
Per-User Acls and Filter-Ids
264
Ports in Authorized and Unauthorized States
265
802.1X Authentication and Switch Stacks
266
X Host Mode
267
MAC Move
268
X Accounting Attribute-Value Pairs
269
X Readiness Check
270
X Authentication with Per-User Acls
271
X Authentication with Downloadable Acls and Redirect Urls
272
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL
273
VLAN ID-Based MAC Authentication
274
X Authentication with Restricted VLAN
275
X Authentication with Inaccessible Authentication Bypass
276
Authentication Results
277
X Authentication with Voice VLAN Ports
278
X Authentication with Wake-On-LAN
279
X User Distribution
280
Network Admission Control Layer 2 802.1X Validation
282
Multidomain Authentication
283
Voice Aware 802.1X Security
284
Configuring 802.1X Authentication
285
Guidelines
285
Default 802.1X Authentication Configuration
286
802.1X Authentication Configuration Guidelines
288
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
289
MAC Authentication Bypass
290
Configuring 802.1X Authentication
291
Configuring 802.1X Readiness Check
293
Configuring Voice Aware 802.1X Security
294
Configuring the Switch-To-RADIUS-Server Communication
295
Configuring the Host Mode
296
Configuring Periodic Re-Authentication
297
Manually Re-Authenticating a Client Connected to a Port
298
Changing the Quiet Period
299
Changing the Switch-To-Client Retransmission Time
299
Setting the Switch-To-Client Frame-Retransmission Number
300
Setting the Re-Authentication Number
301
Configuring 802.1X Accounting
302
Configuring a Guest VLAN
303
Configuring a Restricted VLAN
304
Configuring the Inaccessible Authentication Bypass Feature
306
Configuring 802.1X User Distribution
309
Configuring 802.1X Authentication with Wol
310
Configuring MAC Authentication Bypass
310
Configuring NAC Layer 2 802.1X Validation
311
Configuring an Authenticator and a Supplicant Switch with NEAT
312
Configuring 802.1X Authentication with Downloadable Acls and Redirect Urls
314
Configuring NEAT with ASP
314
Configuring a Downloadable Policy
315
Configuring VLAN ID-Based MAC Authentication
316
Configuring Open1X
317
Disabling 802.1X Authentication on the Port
318
Displaying 802.1X Statistics and Status
319
CHAPTER 10 Configuring Web-Based Authentication
321
Understanding Web-Based Authentication
321
C H a P T E R 10 Configuring Web-Based Authentication
322
Host Detection
323
Local Web Authentication Banner
324
Web Authentication Customizable Web Pages
326
Web-Based Authentication Interactions with Other Features
327
Gateway IP
328
Configuring Web-Based Authentication
329
Web-Based Authentication Configuration Task List
330
Configuring AAA Authentication
331
Configuring the HTTP Server
333
Specifying a Redirection URL for Successful Login
335
Configuring the Web-Based Authentication Parameters
336
Configuring a Web Authentication Local Banner
337
Displaying Web-Based Authentication Status
338
CHAPTER 11 Configuring Interface Characteristics
339
Understanding Interface Types
339
C H a P T E R 11 Configuring Interface Characteristics
340
Access Ports
341
Tunnel Ports
342
Switch Virtual Interfaces
343
Etherchannel Port Groups
344
Connecting Interfaces
345
Using Interface Configuration Mode
346
Procedures for Configuring Interfaces
347
Configuring a Range of Interfaces
348
Configuring and Using Interface Range Macros
349
Using the Internal Ethernet Management Port
351
Supported Features on the Ethernet Management Port
353
Layer 3 Routing Configuration Guidelines
354
TFTP and the Ethernet Management Port
355
Configuring Interface Speed and Duplex Mode
357
Setting the Interface Speed and Duplex Parameters
358
Configuring IEEE 802.3X Flow Control
359
Configuring Auto-MDIX on an Interface
360
Adding a Description for an Interface
361
Configuring Layer 3 Interfaces
362
Configuring SVI Autostate Exclude
363
Configuring the System MTU
364
Monitoring and Maintaining the Interfaces
366
Clearing and Resetting Interfaces and Counters
367
CHAPTER 12 Configuring Smartports Macros 12-1
369
Understanding Smartports Macros
369
C H a P T E R 12 Configuring Smartports Macros
370
Creating Smartports Macros
372
Applying Smartports Macros
373
Applying Cisco-Default Smartports Macros
374
Displaying Smartports Macros
376
Understanding Vlans
377
Supported Vlans
378
Chapter 13 Configuring VLAN
379
Configuring Normal-Range Vlans
380
Token Ring Vlans
382
Configuring Normal-Range Vlans
383
Creating or Modifying an Ethernet VLAN
384
Deleting a VLAN
385
Assigning Static-Access Ports to a VLAN
386
Configuring Extended-Range Vlans
387
Creating an Extended-Range VLAN
388
Creating an Extended-Range VLAN with an Internal VLAN ID
389
Displaying Vlans
390
Configuring VLAN Trunks
391
Encapsulation Types
393
IEEE 802.1Q Configuration Considerations
394
Interaction with Other Features
395
Defining the Allowed Vlans on a Trunk
396
Changing the Pruning-Eligible List
398
Configuring Trunk Ports for Load Sharing
399
Load Sharing Using STP Path Cost
401
Configuring VMPS
403
Dynamic-Access Port VLAN Membership
404
Configuring the VMPS Client
405
Configuring Dynamic-Access Ports on VMPS Clients
406
Changing the Retry Count
407
Troubleshooting Dynamic-Access Port VLAN Membership
408
Understanding VTP
411
Chapter 14 Configuring VTP
412
VTP Modes
413
VTP Advertisements
414
VTP Version 3
415
VTP Pruning
416
VTP and Switch Stacks
418
VTP Configuration Guidelines
419
Passwords
420
Configuration Requirements
421
Configuring a VTP Version 3 Password
423
Configuring a VTP Version 3 Primary Server
424
Enabling the VTP Version
425
Enabling VTP Pruning
426
Adding a VTP Client Switch to a VTP Domain
427
Monitoring VTP
428
Understanding Voice VLAN
429
Chapter 15 Configuring Voice VLAN
430
Configuring Voice VLAN
431
Configuring a Port Connected to a Cisco 7960 IP Phone
432
Configuring Cisco IP Phone Voice Traffic
433
Configuring the Priority of Incoming Data Frames
434
Displaying Voice VLAN
435
Understanding Private Vlans
437
Chapter 16 Configuring Private VLAN
438
IP Addressing Scheme with Private Vlans
439
Private Vlans Across Multiple Switches
440
Private Vlans and Unicast, Broadcast, and Multicast Traffic
441
Configuring Private Vlans
442
Private-VLAN Configuration Guidelines
443
Private-VLAN Port Configuration
444
Limitations with Other Features
445
Configuring and Associating Vlans in a Private VLAN
446
Configuring a Layer 2 Interface as a Private-VLAN Host Port
447
Configuration File
448
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port
449
Mapping Secondary Vlans to a Primary VLAN Layer 3 VLAN Interface
450
Monitoring Private Vlans
451
CHAPTER 17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling
453
Understanding IEEE 802.1Q Tunneling
453
C H a P T E R 17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling
454
Configuring IEEE 802.1Q Tunneling
456
System MTU
457
IEEE 802.1Q Tunneling and Other Features
458
Understanding Layer 2 Protocol Tunneling
459
Configuring Layer 2 Protocol Tunneling
462
Default Layer 2 Protocol Tunneling Configuration
463
Layer 2 Protocol Tunneling Configuration Guidelines
464
Configuring Layer 2 Protocol Tunneling
465
Configuring Layer 2 Tunneling for Etherchannels
466
Configuring the Customer Switch
468
Monitoring and Maintaining Tunneling Status
470
Understanding Spanning-Tree Features
471
Chapter 18 Configuring STP
472
Spanning-Tree Topology and Bpdus
473
Bridge ID, Switch Priority, and Extended System ID
474
Spanning-Tree Interface States
475
Blocking State
476
Listening State
477
How a Switch or Port Becomes the Root Switch or Root Port
478
Spanning-Tree Address Management
479
Spanning-Tree Modes and Protocols
480
Spanning-Tree Interoperability and Backward Compatibility
481
Spanning Tree and Switch Stacks
482
Default Spanning-Tree Configuration
483
Changing the Spanning-Tree Mode
485
Disabling Spanning Tree
486
Configuring a Secondary Root Switch
488
Configuring Path Cost
490
Configuring the Switch Priority of a VLAN
491
Configuring Spanning-Tree Timers
492
Configuring the Forwarding-Delay Time for a VLAN
493
Configuring the Transmit Hold-Count
494
Configuring Mstp
495
Chapter 19 Configuring MSTP
496
Operations Within an MST Region
497
IEEE 802.1S Terminology
499
Boundary Ports
500
Interoperation between Legacy and Standard Switches
501
MSTP and Switch Stacks
502
Understanding RSTP
503
Rapid Convergence
504
Synchronization of Port Roles
505
Bridge Protocol Data Unit Format and Processing
506
Processing Superior BPDU Information
507
Configuring MSTP Features
508
MSTP Configuration Guidelines
509
Specifying the MST Region Configuration and Enabling MSTP
510
Configuring the Root Switch
511
Configuring a Secondary Root Switch
513
Configuring Path Cost
515
Configuring the Hello Time
516
Configuring the Forwarding-Delay Time
517
Configuring the Maximum-Hop Count
518
Designating the Neighbor Type
519
Displaying the MST Configuration and Status
520
CHAPTER 20 Configuring Optional Spanning-Tree Features
521
Understanding Optional Spanning-Tree Features
521
C H a P T E R 20 Configuring Optional Spanning-Tree Features
522
Understanding BPDU Filtering
523
Understanding Cross-Stack Uplinkfast
525
How CSUF Works
526
Events that Cause Fast Convergence
527
Understanding Etherchannel Guard
530
Understanding Loop Guard
531
Default Optional Spanning-Tree Configuration
532
Enabling BPDU Guard
533
Enabling BPDU Filtering
534
Enabling Uplinkfast for Use with Redundant Links
535
Enabling Cross-Stack Uplinkfast
536
Enabling Etherchannel Guard
537
Enabling Root Guard
538
Displaying the Spanning-Tree Status
539
Understanding Flex Links and the MAC Address-Table Move Update
541
VLAN Flex Link Load Balancing and Support
542
Configuring Flex Links and MAC Address-Table Move Update
547
Configuration Guidelines
548
CHAPTER 21 C H a P T E R 21 Configuring Flex Links and the MAC Address-Table Move Update Feature
543
Leaking IGMP Reports
544
MAC Address-Table Move Update
546
Configuring Flex Links
549
Configuring VLAN Load Balancing on Flex Links
551
Configuring the MAC Address-Table Move Update Feature
552
Monitoring Flex Links and the MAC Address-Table Move Update Information
554
Understanding DHCP Features
555
CHAPTER 22 C H a P T E R 22 Configuring DHCP Features and IP Source Guard
556
Option-82 Data Insertion
557
Cisco IOS DHCP Server Database
560
DHCP Snooping and Switch Stacks
561
Configuring DHCP Features
562
DHCP Snooping Configuration Guidelines
563
Configuring the DHCP Server
564
Configuring the DHCP Relay Agent
565
Enabling DHCP Snooping and Option 82
566
Enabling DHCP Snooping on Private Vlans
568
Enabling the DHCP Snooping Binding Database Agent
569
Displaying DHCP Snooping Information
570
Source IP Address Filtering
571
Configuring IP Source Guard
572
Enabling IP Source Guard
573
Configuring IP Source Guard for Static Hosts
574
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port
578
Displaying IP Source Guard Information
579
Understanding DHCP Server Port-Based Address Allocation
580
Enabling DHCP Server Port-Based Address Allocation
581
Displaying DHCP Server Port-Based Address Allocation
583
CHAPTER 23 Configuring Dynamic ARP Inspection 23-1
585
Understanding Dynamic ARP Inspection
585
C H a P T E R 23 Configuring Dynamic ARP Inspection
586
Interface Trust States and Network Security
587
Rate Limiting of ARP Packets
588
Logging of Dropped Packets
589
Dynamic ARP Inspection Configuration Guidelines
590
Configuring Dynamic ARP Inspection in DHCP Environments
591
Configuring ARP Acls for Non-DHCP Environments
592
Limiting the Rate of Incoming ARP Packets
594
Performing Validation Checks
595
Configuring the Log Buffer
596
Displaying Dynamic ARP Inspection Information
598
Chapter 24 Configuring IGMP Snooping and MVR
602
IGMP Versions
603
Leaving a Multicast Group
605
Immediate Leave
606
IGMP Snooping and Switch Stacks
607
Enabling or Disabling IGMP Snooping
608
Setting the Snooping Method
609
Configuring a Multicast Router Port
610
Enabling IGMP Immediate Leave
611
Configuring the IGMP Leave Timer
612
Controlling the Multicast Flooding Time after a TCN Event
613
Disabling Multicast Flooding During a TCN Event
614
Disabling IGMP Report Suppression
616
Understanding Multicast VLAN Registration
618
Configuring MVR
620
Configuring MVR Global Parameters
621
Configuring MVR Interfaces
622
Displaying MVR Information
624
Default IGMP Filtering and Throttling Configuration
625
Applying IGMP Profiles
627
Configuring the IGMP Throttling Action
628
Displaying IGMP Filtering and Throttling Configuration
629
Understanding MLD Snooping
631
Chapter 25 Configuring Ipv6 MLD Snooping
632
MLD Queries
633
MLD Reports
634
Topology Change Notification Processing
635
MLD Snooping Configuration Guidelines
636
Enabling or Disabling MLD Snooping
637
Configuring a Static Multicast Group
638
Enabling MLD Immediate Leave
639
Configuring MLD Snooping Queries
640
Disabling MLD Listener Message Suppression
641
CHAPTER 26 Configuring Port-Based Traffic Control
643
Configuring Storm Control
643
C H a P T E R 26 Configuring Port-Based Traffic Control
645
Configuring Small-Frame Arrival Rate
647
Configuring Protected Ports
648
Protected Port Configuration Guidelines
649
Default Port Blocking Configuration
650
Understanding Port Security
651
Security Violations
652
Default Port Security Configuration
653
Enabling and Configuring Port Security
655
Enabling and Configuring Port Security Aging
659
Port Security and Switch Stacks
660
Displaying Port-Based Traffic Control Settings
661
Understanding CDP
663
CDP and Switch Stacks
664
Chapter 27 Configuring CDP
665
Disabling and Enabling CDP on an Interface
666
Monitoring and Maintaining CDP
667
Understanding UDLD
669
Chapter 28 Configuring UDLD
670
Configuring UDLD
671
Default UDLD Configuration
672
Enabling UDLD Globally
673
Enabling UDLD on an Interface
674
Displaying UDLD Status
675
C H a P T E R 29 Configuring LLDP, LLDP-MED, and Wired Location Service
678
Lldp-Med
679
Wired Location Service
680
CHAPTER 29 Configuring LLDP, LLDP-MED, and Wired Location Service
681
Configuring Location Tlv and Wired Location Service
685
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service
687
Understanding SPAN and RSPAN
689
Chapter 30 Configuring SPAN and RSPAN
690
Remote SPAN
691
SPAN and RSPAN Concepts and Terminology
692
Monitored Traffic
693
Source Ports
694
Source Vlans
695
Destination Port
696
Rspan Vlan
697
SPAN and RSPAN and Switch Stacks
698
Configuring SPAN and RSPAN
699
Configuration Guidelines
700
Creating a Local SPAN Session
701
Creating a Local SPAN Session and Configuring Incoming Traffic
703
Specifying Vlans to Filter
704
Configuring RSPAN
705
Configuring a VLAN as an RSPAN VLAN
706
Creating an RSPAN Source Session
707
Specifying Vlans to Filter
708
Creating an RSPAN Destination Session
709
Creating an RSPAN Destination Session and Configuring Incoming Traffic
710
Configuring FSPAN and FRSPAN
712
Configuring an FSPAN Session
713
Configuring an FRSPAN Session
714
Displaying SPAN and RSPAN Status
716
Understanding RMON
717
Chapter 31 Configuring RMON
718
Default RMON Configuration
719
Collecting Group History Statistics on an Interface
721
Displaying RMON Status
722
Understanding System Message Logging
723
CHAPTER 32 Configuring System Message Logging
724
C H a P T E R 32 Configuring System Message Logging
725
Default System Message Logging Configuration
726
Setting the Message Display Destination Device
727
Synchronizing Log Messages
728
Enabling and Disabling Time Stamps on Log Messages
730
Defining the Message Severity Level
731
Limiting Syslog Messages Sent to the History Table and to SNMP
732
Enabling the Configuration-Change Logger
733
Configuring UNIX Syslog Servers
734
Logging Messages to a UNIX Syslog Daemon
735
Displaying the Logging Configuration
736
Understanding SNMP
737
Chapter 33 Configuring SNMP
738
SNMP Manager Functions
739
SNMP Agent Functions
740
SNMP Notifications
741
Configuring SNMP
742
Disabling the SNMP Agent
743
Configuring Community Strings
744
Configuring SNMP Groups and Users
745
Configuring SNMP Notifications
747
Setting the CPU Threshold Notification Types and Values
751
Setting the Agent Contact and Location Information
752
SNMP Examples
753
Displaying SNMP Status
754
Configuring Embedded Event Manager
755
Understanding Embedded Event Manager
755
Event Detectors
756
C H a P T E R 33 Configuring Embedded Event Manager
757
Embedded Event Manager Actions
758
Embedded Event Manager Environment Variables
758
Embedded Event Manager Policies
758
Event Detectors
759
Registering and Defining an Embedded Event Manager Tcl Script
760
Displaying Embedded Event Manager Information
761
CHAPTER 34 Configuring Network Security with Acls
763
Understanding Acls
763
C H a P T E R 34 Configuring Network Security with Acls
764
Port Acls
765
Router Acls
766
VLAN Maps
767
Acls and Switch Stacks
768
Configuring Ipv4 Acls
769
Creating Standard and Extended Ipv4 Acls
770
ACL Logging
771
Creating a Numbered Standard ACL
772
Creating a Numbered Extended ACL
773
Resequencing Aces in an ACL
777
Using Time Ranges with Acls
779
Including Comments in Acls
781
Applying an Ipv4 ACL to an Interface
782
Hardware and Software Treatment of IP Acls
784
Ipv4 ACL Configuration Examples
785
Numbered Acls
787
Named Acls
788
Commented IP ACL Entries
789
Creating Named MAC Extended Acls
790
Applying a MAC ACL to a Layer 2 Interface
791
Configuring VLAN Maps
792
VLAN Map Configuration Guidelines
793
Creating a VLAN Map
794
Examples of Acls and VLAN Maps
795
Applying a VLAN Map to a VLAN
797
Using VLAN Maps with Router Acls
798
Examples of Router Acls and VLAN Maps Applied to Vlans
799
Acls and Bridged Packets
800
Acls and Routed Packets
801
Displaying Ipv4 ACL Configuration
802
Understanding Ipv6 Acls
805
Chapter 35 Configuring Ipv6 ACL
806
Ipv6 Acls and Switch Stacks
807
Default Ipv6 ACL Configuration
808
Applying an Ipv6 ACL to an Interface
812
Displaying Ipv6 Acls
813
Configuring Qos
815
Understanding Qos
816
Chapter 36 Configuring Qo
817
Basic Qos Model
818
Classification
819
Classification Based on Qos Acls
822
Policing and Marking
823
Policing on Physical Ports
824
Policing on Svis
825
Mapping Tables
827
Queueing and Scheduling Overview
828
SRR Shaping and Sharing
829
Queueing and Scheduling on Ingress Queues
830
Queueing and Scheduling on Egress Queues
832
Packet Modification
834
Configuring Auto-Qos
835
Generated Auto-Qos Configuration
836
Effects of Auto-Qos on the Configuration
840
Enabling Auto-Qos for Voip
841
Auto-Qos Configuration Example
842
Displaying Auto-Qos Information
844
Default Standard Qos Configuration
845
Default Egress Queue Configuration
846
Default Mapping Table Configuration
847
Configuring Ipv6 Qos on Switch Stacks
848
Policing Guidelines
849
Enabling Qos Globally
850
Configuring Classification Using Port Trust States
851
Configuring the Cos Value for an Interface
852
Configuring a Trusted Boundary to Ensure Port Security
853
Enabling DSCP Transparency Mode
854
Configuring the DSCP Trust State on a Port Bordering Another Qos Domain
855
Configuring a Qos Policy
857
Classifying Traffic by Using Acls
858
Classifying Traffic by Using Class Maps
863
Classifying Traffic by Using Class Maps and Filtering Ipv6 Traffic
866
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
868
Classifying, Policing, and Marking Traffic on Svis by Using Hierarchical Policy Maps
872
Classifying, Policing, and Marking Traffic by Using Aggregate Policers
879
Configuring DSCP Maps
881
Configuring the Cos-To-DSCP Map
882
Configuring the IP-Precedence-To-DSCP Map
883
Configuring the Policed-DSCP Map
884
Configuring the DSCP-To-Cos Map
885
Configuring the DSCP-To-DSCP-Mutation Map
886
Configuring Ingress Queue Characteristics
887
Mapping DSCP or Cos Values to an Ingress Queue and Setting WTD Thresholds
888
Allocating Buffer Space between the Ingress Queues
889
Configuring the Ingress Priority Queue
890
Configuring Egress Queue Characteristics
891
Configuration Guidelines
892
Mapping DSCP or Cos Values to an Egress Queue and to a Threshold ID
894
Configuring SRR Shaped Weights on Egress Queues
896
Configuring SRR Shared Weights on Egress Queues
897
Limiting the Bandwidth on an Egress Interface
898
Displaying Standard Qos Information
899
Understanding Etherchannels
901
CHAPTER 37 C H a P T E R 37 Configuring Etherchannels and Link-State Tracking
902
Port-Channel Interfaces
904
Port Aggregation Protocol
905
Pagp Interaction with Virtual Switches and Dual-Active Detection
906
LACP Modes
907
Load-Balancing and Forwarding Methods
908
Etherchannel and Switch Stacks
909
Configuring Etherchannels
910
Etherchannel Configuration Guidelines
911
Configuring Layer 2 Etherchannels
912
Configuring Layer 3 Etherchannels
914
Configuring the Physical Interfaces
915
Configuring Etherchannel Load-Balancing
917
Configuring the Pagp Learn Method and Priority
918
Configuring LACP Hot-Standby Ports
919
Configuring the LACP System Priority
920
Configuring the LACP Port Priority
921
Displaying Etherchannel, Pagp, and LACP Status
922
Configuring Link-State Tracking
924
Configuring Link-State Tracking
925
Displaying Link-State Tracking Status
926
Configuring Ip Unicast Routing
927
Understanding IP Routing
928
Chapter 38 Configuring IP Unicast Routing
929
Steps for Configuring Routing
931
Default Addressing Configuration
932
Assigning IP Addresses to Network Interfaces
933
Classless Routing
934
Configuring Address Resolution Methods
935
Define a Static ARP Cache
936
Set ARP Encapsulation
937
Enable Proxy ARP
938
ICMP Router Discovery Protocol (IRDP)
939
Configuring Broadcast Packet Handling
940
Enabling Directed Broadcast-To-Physical Broadcast Translation
941
Forwarding UDP Broadcast Packets and Protocols
942
Flooding IP Broadcasts
943
Monitoring and Maintaining IP Addressing
944
Enabling IP Unicast Routing
945
Configuring RIP
946
Default RIP Configuration
947
Configuring RIP Authentication
950
Configuring Split Horizon
952
Default OSPF Configuration
954
OSPF Nonstop Forwarding
955
Configuring Basic OSPF Parameters
956
Configuring OSPF Interfaces
957
Configuring OSPF Area Parameters
958
Configuring Other OSPF Parameters
959
Changing LSA Group Pacing
961
Monitoring OSPF
962
Configuring EIGRP
963
Default EIGRP Configuration
964
EIGRP Nonstop Forwarding
966
Configuring Basic EIGRP Parameters
967
Configuring EIGRP Interfaces
968
EIGRP Stub Routing
969
Monitoring and Maintaining EIGRP
970
Configuring BGP
972
Default BGP Configuration
974
Nonstop Forwarding Awareness
976
Managing Routing Policy Changes
979
Configuring BGP Decision Attributes
980
Configuring BGP Filtering with Route Maps
982
Configuring BGP Filtering by Neighbor
983
Configuring Prefix Lists for BGP Filtering
984
Configuring BGP Community Filtering
985
Configuring BGP Neighbors and Peer Groups
987
Configuring Aggregate Addresses
989
Configuring BGP Route Reflectors
990
Configuring Route Dampening
991
Monitoring and Maintaining BGP
992
Configuring ISO CLNS Routing
993
Configuring IS-IS Dynamic Routing
994
Default IS-IS Configuration
995
Enabling IS-IS Routing
996
Configuring IS-IS Global Parameters
997
Configuring IS-IS Interface Parameters
1000
Monitoring and Maintaining ISO IGRP and IS-IS
1002
Configuring Multi-VRF CE
1003
Understanding Multi-VRF CE
1004
Default Multi-VRF CE Configuration
1006
Configuring Vrfs
1007
Configuring VRF-Aware Services
1008
User Interface for SNMP
1009
User Interface for Syslog
1010
User Interface for FTP and TFTP
1011
Configuring a VPN Routing Session
1012
Configuring BGP PE to CE Routing Sessions
1013
Displaying Multi-VRF CE Status
1017
Configuring Unicast Reverse Path Forwarding
1018
Configuring the Number of Equal-Cost Routing Paths
1020
Configuring Static Unicast Routes
1021
Specifying Default Routes and Networks
1022
Configuring Policy-Based Routing
1026
PBR Configuration Guidelines
1027
Enabling PBR
1028
Filtering Routing Information
1030
Controlling Advertising and Processing in Routing Updates
1031
Filtering Sources of Routing Information
1032
Monitoring and Maintaining the IP Network
1034
Understanding Ipv6
1035
C H a P T E R 39 Configuring Ipv6 Unicast Routing
1036
Bit Wide Unicast Addresses
1038
Default Router Preference
1039
DHCP for Ipv6 Address Assignment
1040
RIP for Ipv6
1041
HTTP(S) over Ipv6
1042
Limitations
1043
CHAPTER 39 Configuring Ipv6
1045
Configuring Ipv6 Addressing and Enabling Ipv6 Host Functions or Routing
1046
Configuring Default Router Preference
1048
Configuring Ipv4 and Ipv6 Protocol Stacks
1049
Configuring DHCP for Ipv6 Address Assignment
1050
Enabling Dhcpv6 Server Function
1051
Enabling Dhcpv6 Client Function
1053
Configuring CEF and Dcef for Ipv6
1054
Configuring RIP for Ipv6
1056
Configuring OSPF for Ipv6
1057
Configuring EIGRP for Ipv6
1059
Enabling HSRP Version 2
1060
Displaying Ipv6
1061
Understanding HSRP
1067
Chapter 40 Configuring HSRP
1068
HSRP Versions
1069
Multiple HSRP
1070
HSRP and Switch Stacks
1071
Default HSRP Configuration
1072
Enabling HSRP
1073
Configuring HSRP Priority
1074
Configuring MHSRP
1076
Configuring HSRP Authentication and Timers
1077
Enabling HSRP Support for ICMP Redirect Messages
1078
CHAPTER 41 Configuring Cisco IOS IP Slas Operations
1081
Understanding Cisco IOS IP Slas
1081
Using Cisco IOS IP Slas to Measure Network Performance
1082
C H a P T E R 41 Configuring Cisco IOS IP Slas Operations
1083
Response Time Computation for IP Slas
1084
IP Slas Operation Scheduling
1085
Configuring IP Slas Operations
1086
Configuring the IP Slas Responder
1087
Analyzing IP Service Levels by Using the UDP Jitter Operation
1088
Analyzing IP Service Levels by Using the ICMP Echo Operation
1090
Monitoring IP Slas Operations
1093
CHAPTER 42 Configuring Enhanced Object Tracking
1095
Understanding Enhanced Object Tracking
1095
C H a P T E R 42 Configuring Enhanced Object Tracking
1096
Configuring a Tracked List
1097
Configuring a Tracked List with a Weight Threshold
1098
Configuring a Tracked List with a Percentage Threshold
1099
Configuring HSRP Object Tracking
1101
Configuring Other Tracking Characteristics
1102
Configuring IP Slas Object Tracking
1103
Monitoring Enhanced Object Tracking
1104
C H a P T E R 43 Configuring Web Cache Services by Using WCCP
1106
CHAPTER 43 Configuring Web Cache Services by Using WCCP
1107
WCCP Message Exchange
1107
MD5 Security
1108
WCCP and Switch Stacks
1109
Default WCCP Configuration
1110
Monitoring and Maintaining WCCP
1114
CHAPTER 44 Configuring IP Multicast Routing 44-1
1115
Understanding Cisco's Implementation of IP Multicast Routing
1115
C H a P T E R 44 Configuring IP Multicast Routing
1116
IGMP Version 1
1117
PIM Versions
1118
PIM Stub Routing
1119
IGMP Helper
1120
Bootstrap Router
1121
Understanding DVMRP
1122
Understanding CGMP
1123
Configuring IP Multicast Routing
1124
Multicast Routing Configuration Guidelines
1125
Auto-RP and BSR Configuration Guidelines
1126
Configuring Source-Specific Multicast
1128
SSM IP Address Range
1129
Igmpv3 Host Signalling
1130
Configuring SSM
1131
Configuring Source Specific Multicast Mapping
1132
Configuring SSM Mapping
1134
Monitoring SSM Mapping
1137
Configuring a Rendezvous Point
1138
Manually Assigning an RP to Multicast Groups
1139
Configuring Auto-RP
1140
Configuring Pimv2 BSR
1144
Using Auto-RP and a BSR
1148
Monitoring the RP Mapping Information
1149
Delaying the Use of PIM Shortest-Path Tree
1151
Modifying the PIM Router-Query Message Interval
1152
Default IGMP Configuration
1153
Controlling Access to IP Multicast Groups
1154
Changing the IGMP Version
1155
Changing the IGMP Query Timeout for Igmpv2
1156
Changing the Maximum Query Response Time for Igmpv2
1157
Configuring Optional Multicast Routing Features
1158
Configuring Sdr Listener Support
1159
Enabling Sdr Listener Support
1160
Configuring Basic DVMRP Interoperability Features
1162
Configuring DVMRP Interoperability
1163
Configuring a DVMRP Tunnel
1165
Advertising Network 0.0.0.0 to DVMRP Neighbors
1166
Responding to Mrinfo Requests
1167
Enabling DVMRP Unicast Routing
1168
Rejecting a DVMRP Nonpruning Neighbor
1169
Controlling Route Exchanges
1170
Limiting the Number of DVMRP Routes Advertised
1171
Configuring a DVMRP Summary Address
1172
Disabling DVMRP Autosummarization
1174
Monitoring and Maintaining IP Multicast Routing
1175
Displaying System and Network Statistics
1176
Monitoring IP Multicast Routing
1177
Understanding MSDP
1179
Chapter 45 Configuring MSDP
1180
MSDP Benefits
1181
Default MSDP Configuration
1182
Caching Source-Active State
1184
Requesting Source Information from an MSDP Peer
1186
Redistributing Sources
1187
Filtering Source-Active Request Messages
1188
Controlling Source Information that Your Switch Forwards
1189
Using a Filter
1190
Using TTL to Limit the Multicast Data Sent in SA Messages
1191
Configuring an MSDP Mesh Group
1193
Including a Bordering PIM Dense-Mode Region in MSDP
1194
Configuring an Originating Address Other than the RP Address
1195
Monitoring and Maintaining MSDP
1196
CHAPTER 46 Configuring Fallback Bridging 46-1
1197
Understanding Fallback Bridging
1197
C H a P T E R 46 Configuring Fallback Bridging
1199
Default Fallback Bridging Configuration
1200
Adjusting Spanning-Tree Parameters
1202
Changing the Interface Priority
1203
Adjusting BPDU Intervals
1204
Disabling the Spanning Tree on an Interface
1206
Monitoring and Maintaining Fallback Bridging
1207
Troubleshooting
1209
Chapter 47 Troubleshooting
1210
Recovering from a Lost or Forgotten Password
1211
Procedure with Password Recovery Enabled
1213
Procedure with Password Recovery Disabled
1215
Preventing Switch Stack Problems
1216
Preventing Autonegotiation Mismatches
1217
Monitoring SFP Module Status
1218
Understanding Ping
1219
Using Layer 2 Traceroute
1220
Usage Guidelines
1221
Displaying the Physical Path
1222
Executing IP Traceroute
1223
Using TDR
1224
Using Debug Commands
1225
Enabling All-System Diagnostics
1226
Using the Crashinfo Files
1229
Using On-Board Failure Logging
1230
Displaying OBFL Information
1231
Troubleshooting CPU Utilization
1232
CHAPTER 48 Configuring Online Diagnostics 48-1
1235
Understanding Online Diagnostics
1235
C H a P T E R 48 Configuring Online Diagnostics
1236
Configuring Health-Monitoring Diagnostics
1237
Running Online Diagnostic Tests
1239
Displaying Online Diagnostic Tests and Test Results
1240
Supported Mibs
1241
Mib List
1241
Appendix A Supported MIB
1242
Using FTP to Access the MIB Files
1244
APPENDIX B Working with the Cisco IOS File System, Configuration Files, and Software Images
1245
Working with the Flash File System
1245
Displaying Available File Systems
1246
A P P E N D I X B Working with the Cisco IOS File System, Configuration Files, and Software Images
1247
Changing Directories and Displaying the Working Directory
1248
Creating and Removing Directories
1249
Deleting Files
1250
Working with Configuration Files
1253
Guidelines for Creating and Using Configuration Files
1254
Creating a Configuration File by Using a Text Editor
1255
Downloading the Configuration File by Using TFTP
1256
Copying Configuration Files by Using FTP
1257
Preparing to Download or Upload a Configuration File by Using FTP
1258
Uploading a Configuration File by Using FTP
1259
Copying Configuration Files by Using RCP
1260
Preparing to Download or Upload a Configuration File by Using RCP
1261
Downloading a Configuration File by Using RCP
1262
Uploading a Configuration File by Using RCP
1263
Clearing the Startup Configuration File
1264
Configuration Guidelines
1265
Configuring the Configuration Archive
1266
Performing a Configuration Replacement or Rollback Operation
1267
Image Location on the Switch
1269
Copying Image Files by Using TFTP
1270
Downloading an Image File by Using TFTP
1271
Uploading an Image File by Using TFTP
1273
Preparing to Download or Upload an Image File by Using FTP
1274
Downloading an Image File by Using FTP
1275
Uploading an Image File by Using FTP
1277
Copying Image Files by Using RCP
1278
Preparing to Download or Upload an Image File by Using RCP
1279
Downloading an Image File by Using RCP
1280
Uploading an Image File by Using RCP
1282
Copying an Image File from One Stack Member to Another
1283
Access Control Lists
1285
A P P E N D I X C Unsupported Commands in Cisco IOS Release 12.2(52)SE
1286
APPENDIX C Unsupported Commands in Cisco IOS Release 12.2(52)SE
1285
Debug Commands
1287
Unsupported Global Configuration Commands
1288
Hsrp
1289
IGMP Snooping Commands
1290
Unsupported Global Configuration Commands
1291
Unsupported Global Configuration Commands
1292
Unsupported BGP Router Configuration Commands
1293
MAC Address Commands
1294
Unsupported Global Configuration Commands
1295
Network Address Translation (NAT) Commands
1296
Snmp
1297
Unsupported VLAN Database Commands
1298
Embedded Event Manager Environment Variables
1312
Advertisement
Cisco Catalyst 3032 Getting Started Manual (34 pages)
Cisco Systems Catalyst Blade Switch Getting Started Guide
Brand:
Cisco
| Category:
Switch
| Size: 0.89 MB
Table of Contents
Getting Started Guide
1
Table of Contents
2
Taking out What You Need
3
Switch Description
3
Dell Modular Server Chassis Architecture
6
Installation Warning Statements
7
Installing the Switch in the Server Chassis
8
Configuring the Switch
12
Waiting for Post to Complete
15
Completing the Initial Configuration
16
Managing the Switch
20
Other Management Options
22
Planning and Creating a Switch Stack (Only 3130G-S and 3130X-S Switches)
22
Connecting to the Switch Ports
26
In Case of Difficulty
28
Resetting the Switch Configuration
29
For more Information
30
Obtaining Documentation, Obtaining Support, and Security Guidelines
30
Hardware Warranty Terms
31
Advertisement
Related Products
Cisco Small Business 300
Cisco Catalyst 3030
Cisco Catalyst 3040
Cisco 3020 - Cisco Catalyst Blade Switch
Cisco 300 Series
Cisco Catalyst 3012
Cisco Small Business 300 1.1 Series
Cisco SG 300- 28P
Cisco Nexus 3048TP
Cisco Catalyst 3650-48PD-S
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Network Hardware
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL