Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7811380=
Text Part Number: 78-11380-05
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS M ANUAL ARE SUBJECT TO CHA NGE WITHOUT NO TICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSI BILITY FOR THEIR APPLICA TION OF ANY PRODUCT S.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORT H IN THE INFORMATION PACKET T HAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THE SE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAI M ALL WARRANTIE S, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NO NINFRINGEM ENT OR ARISING FROM A COURS E OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING ,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE S.
CCIP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, Internet Quotient, iQ
Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice LAN are trademarks
of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are
service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS,
the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel,
EtherSwitch, Fast Step, GigaStack, IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX,
Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other
countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0206R)
Management Interf ace Options1-6
Advantage s of Us in g CMS and Cluster ing Switches1-6
Network Configuration Examples1-7
Design Concepts for Using the Switch1-7
Small to Medium-Sized Network Configuration1-10
Collapsed Backbone and Switch Cluster Configuration1-12
Large Campus Configuration1-13
Multidwelling Network Using Catalyst 2950 Switches1-14
Long-Distance, High-Bandwidth Transport Configuration1-16
IOS Command Modes2-1
Getting Help2-3
Abbreviating Commands2-3
Using no and default Forms of Commands2-4
Understanding CLI Messages2-4
Using Command History2-5
Changing the Command Hi story Buffer Size2-5
Recalling Commands2-5
Disabling the Command History Feature2-6
Using Editing Features2-6
Enabling and Disa bling Editing Features2-6
Editing Commands through Keystrokes2-7
Editing Command Lines that Wrap2-8
Searching and Filtering Output of show and more Commands2-9
Accessing the CLI2-9
Accessing the CLI from a Browser2-10
CHAPTER
3Getting Started with CMS3-1
Features3-2
Front Panel View3-4
Cluster Tree3-5
Front-Panel Ima ges3-5
Redundant Power System LED3-6
Port Modes and LEDs3-7
VLAN Membership Modes3-8
Topology View3-9
Topology Icons3-11
Device and Link Labe ls3-12
Colors in the Topol ogy View3-12
Topology Display Options3-13
Menus and Toolbar3-14
Error Checkin g3-30
Saving Your Configuration3-30
Restoring Your Configuration3-31
CMS Preferences3-31
Using Different Versions of CMS3-31
Where to Go Next3-32
4Assigning the Switch IP Address and Default Gateway4-1
Understanding the Boot Process4-1
Assigning Switch Information4-2
Default Switch Information4-3
Understanding DHCP-Based Autoconfiguration4-3
DHCP Client Request Process4-4
Configuring the DHCP Server4-5
Configuring the TFTP Server4-5
Configuring the DNS4-6
Configuring the Relay Device4-6
Obtaining Configuration Files4-7
Example Con fi guration4-8
Understanding IE2100 Series Configuration Registrar Software5-1
CNS Configuration Service5-2
CNS Event Service5-3
NameSpace M a pper5-3
What You Should Know About ConfigID, DeviceID, and Host Name5-3
ConfigID5-3
DeviceID5-4
Host Name and DeviceID5-4
Using Host Name, DeviceID, and ConfigID5-4
Understanding CNS Embedded Agents5-5
Initial Configuration5-5
Incremental (P ar tial) Configurat ion5-6
Synchronized Configuration5-6
Configuring CNS Embe dded Agents5-6
Enabling Automate d CNS Configuration5-6
Enabling the CNS Event Agent5-8
Enabling the CNS Configuration Agent5-9
Enabling an Initial Configuration5-9
Enabling a Partial Configuration5-12
CHAPTER
vi
Displaying CNS Configuration5-12
6Clustering Switches6-1
Understanding Switch Clusters6-2
Command Switch Characteristics6-3
Standby Command Switch Characteristics6-3
Candidate Switch and Member Switch Characteristics6-4
Planning a Switch Cluster6-5
Automatic Discovery of Cluster Candidates and Members6-5
Discovery th ro ug h CD P H op s6-6
Discovery through Non-CDP-Capable and Noncluster-Capable Devices6-8
Discovery through the Same Management VLAN6-9
Discovery through Di fferent Management VLANs6-10
Discovery of Newly Installed Switches6-11
Virtual IP Addres s es6-14
Other Considerations for Cluster Standby Groups6-14
Automatic Recovery of Cluster Configuration6-16
IP Addresses6-16
Host Names6-17
Passwords6-17
SNMP Community Strings6-17
TACACS+ and RADIUS6-18
Access Modes in CMS6-18
Management VLAN6-19
LRE Profiles 6-19
Availability of Switch-Specific Features in Switch Clusters6-20
Creating a Switch Cluster6-20
Enabling a Command Switch6-20
Adding Member Switches6-21
Creating a Cluster Standby Group6-23
Verifying a Switch Cl uster6-25
Contents
CHAPTER
Using the CLI to Manage Switch Clusters6-26
Catalyst1900 and Catalyst2820 CLI Considerations6-26
Using SNMP to Manage Sw itch Clusters6-27
7Administering the Switch7-1
Preventing Unauthorized Access to Your Switch7-1
Protecting Access to Privileged EXEC Commands7-2
Default Password and Privilege Level Configuration7-2
Setting or Changing a Static Enable Password7-3
Protecting Enable and Enable Secret Passwords with Encryption7-4
Setting a Telnet Password for a Terminal Line7-5
Configuring User name and Password Pairs7-6
Configuring Multiple Privilege Lev e ls7-7
Default RADIUS Configu ration7-19
Identifying the RADIUS Server Host 7-19
Configuring RADI US Login Authentication7-22
Defining AAA Server Groups7-24
Configuring RADIUS Authorization for User Privileged Access and Network Services7-26
Starting RADIUS Accounting7-27
Configuring Set tings for All RADIUS Servers7-28
Configuring the Switch to Use Vendor-Specific RADIUS Attributes7-28
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication7-29
Displaying the RADIUS Configuration7-30
Configuring the Switch for Local Authenticat ion and Authorization7-31
Managing the System Time and Date7-32
Understanding the System Clock 7-32
Understanding Network Time Protocol7-32
Configuring NTP7-34
Default NTP Config uration7-35
Configuring NTP Authentication7-35
Configuring NTP Associations7-36
Configuring NTP Broadcast Service7-37
Configuring NTP Ac cess Restrictions7-38
Configuring the Source IP Address for NTP Packets7-40
Displaying the NTP C onfiguration7-41
Configuring Ti me and Date Manually7-41
Setting the System Clock7-42
Displaying the Time and Date Configuration7-42
Configuring the Time Zone 7-43
Configuring Summer Time (Daylight Saving Time)7-44
Default System Name and Prompt Configuration7-46
Configuring a System Name7-46
Configuring a System Prompt7-47
Understanding DNS7-47
Default DNS Configuration7-48
Setting Up DNS7-48
Displaying the DNS Configuration7-49
Creating a Banner7-49
Default Banner Con figuration7-49
Configuring a Message-of-the-Day Login Banner7-50
Configuring a Login Banner7-51
Managing the MAC Address Table7-52
Building the Address Table7-52
MAC Addresses and VLANs7-53
Default MAC Address Tab le Configuration7-53
Changing the Addres s Aging Time7-53
Removing Dynamic Address Entries7-54
Configuring MAC Address Notification Traps7-54
Adding and Removing Static Address Entries7-56
Adding and Removing Secure Addresses7-57
Displaying Addre ss Table Entries7-58
Setting the Interface Speed and Duplex Parameters9-11
Configuring IEEE 802.3X Flow Control on Gigabit Ethernet Ports9-12
Adding a Descripti on for an Interface9-13
CHAPTER
x
Monitoring and Maintaining the Interfaces9-14
Monitoring Interface and Controller Status9-14
Clearing and Reset ting Interfaces and Counte rs9-16
Shutting Down and Restarting the Interface9-17
10Configuring STP10-1
Understanding Spanning-Tree Features10-1
STP Overview10-2
Supported Spanning-Tree Instances10-2
Bridge Protocol Data Units10-2
Election of the Root Switch10-3
Bridge ID, Switch Priority, and Extended System ID10-4
Spanning-Tree Timers10-4
Creating the Spanning-Tree Topology10-5
Disabled State10-8
Spanning-Tree Add ress Management10-8
STP and IEEE 802.1Q Tr unks10-8
Spanning Tree and Redundant Connectivity10-8
Accelerated Aging to Retain Connectivity10-9
Configuring Spanning-Tree Features10-9
Default STP Confi guration10-10
STP Configuration Guidelines10-10
Disabling STP10-12
Configuring the Root Switch10-12
Configuring a Secondary Root Switch10-14
Configuring the Port Priority10-15
Configuring the Path Cost10-16
Configuring the Switch Priority of a VLAN10-18
Configuring the Hello Time10-19
Configuring the Forwarding-Delay Time for a VLAN10-19
Configuring th e Maximum-Aging Time for a VLAN10-20
Configuring STP for Use in a Cascaded Stack10-20
Contents
CHAPTER
78-11380-05
Displaying the Spanning-Tree Status10-21
11Configuring RSTP and MSTP11-1
Understanding RSTP11-2
Port Roles and the Active Topology11-2
Rapid Convergence11-3
Synchronization of Port Roles11-4
Bridge Protocol Data Unit Format and Processing11-5
Enabling Uplink Fast for Use with Redundant Links12-17
Enabling Cross-Stack UplinkFast12-18
Enabling BackboneFast12-19
Enabling Root Guard12-19
Enabling Loop Guard12-20
Displaying the Spanning-Tree Status12-21
Contents
CHAPTER
13Configuring VLANs13-1
Understanding VLANs13-1
Supported VLANs13-2
VLAN Port Membership Modes13-3
VLAN Configuration in VLAN Configuration Mode13-6
Saving VLAN Configuration13-7
Default Ethernet VLAN Configuration13-8
Creating or Modifying an Ethernet VLAN13-8
Deleting a VLAN13-10
Assigning Static-Access Ports to a VLAN13-11
802.1Q Configura tion Considerations13-16
Default Layer 2 Ethernet Inte rfa c e VL A N Co nf ig ur ation13-17
Configuring an Ethernet Interface as a Trunk Po rt13-17
Interaction with Other Features13-17
Configuring a Trunk Port13-18
Defining the Allo w e d V LA N s on a Tr un k13-19
Changing the Pruning-Eligible List13-20
Configuring the Native VLAN for Untagged Traffic13-20
Disabling VTP (VTP Transparent Mode)14-12
Enabling VTP Version 214-13
Enabling VTP Pruning14-14
Adding a VTP Client Switch to a VTP Domain14-15
Monitoring VTP14-16
Contents
CHAPTER
CHAPTER
15Configuring Voice VLAN15-1
Understanding Voice VLAN15-1
Configuring Voi ce VLAN15-2
Default Voice VLAN Configuration15-2
Voice VLAN Configuration Guidelines15-3
Configuring a Port to Connect to a Cisco7960 IP Phone15-3
Configuring Ports to Carry Voice Traffic in 802.1Q Frames15-4
Configuring Ports to Carry Voice Traffic in 802.1P Priority Tagged Frames15-4
Overriding the CoS Priority of Incoming Data Frames15-5
Configuring the IP Phone to Trust the CoS Priority of Incoming Data Frames15-6
Displaying Voic e VLAN15-6
16Configuring IGMP Snooping and MVR16-1
Understanding IGMP Snooping16-1
Joining a Multicast Group16-2
Leaving a Multicast Group16-4
Immediate-Leave Processing16-4
Configuring IGMP Snooping16-5
Default IGMP Snoo ping Configuration16-5
Enabling or Disabling IGMP Snooping16-5
Setting the Snoopi ng Method16-6
Configuring a Multicast Router Port16-7
Configuring a Host Statically to Join a Group16-8
Enabling IGMP Immedi ate-Leave Processing16-9
Configuring Protected Ports17-3
Configuring Port Security17-4
Understanding Po rt Security17-4
Secure MAC Addresses17-5
Security Viol at ions17-6
Default Port Security Configuration17-6
Port Security Configuration Guidelines17-7
Enabling and Configuring Port Security17-7
Enabling and Confi guring Port Security Aging17-10
Displaying Port -Based Traffic Control Settings17-12
18Configuring UDLD18-1
xvi
Understanding UDLD18-1
Configuring UDLD18-3
Default UDLD Configuration18-3
Enabling UDLD Globally18-4
Enabling UDLD on an Inter face18-4
Resetting an Interf ace Shut Down by UDLD18-5
SPAN Traffic20-5
SPAN and RSPAN Interaction with Other Features20-5
SPAN and RSPAN Session Limit s20-6
Default SPAN and RSPAN Configuration20-6
Configuring SPAN20-7
SPAN Configuration Guidelines20-7
Creating a SPAN Session and Specifying Ports to Monitor20-7
Removing Ports from a SPAN Se ss io n20-9
Configuring RSPAN20-10
RSPAN Configuration Guidelines20-10
Creating an RSPAN Session20-11
Creating an RSPAN Destination Session20-12
Removing Ports from an RSPAN Se s sion20-13
Default RMON Configuration21-3
Configuring RMON Alarms and Events21-3
Configuring RMON Col lection on an Interface21-5
Displaying RMON Status21-6
22Configuring System Message Logging22-1
Understanding System Message Logging22-1
Configuring System Message Logging22-2
System Log Message Format22-2
Default System Message Logging Configuration22-3
Disabling and Enabling Message Logging22-4
Setting the Message D isplay Destination Device22-4
Synchronizing Log Messages22-6
Enabling and Disabling Timestamps on Log Messages22-7
Enabling and Disabling Sequence Numbers in Log Messages22-8
Defining the Message Severity Level22-8
Limiting Syslog Messages Sent to the History Table and to SNMP22-10
Configuring UNIX Syslog Servers22-10
Logging Messages to a UNIX Syslog Daemon22-11
Configuring the UNIX System Logging Facility22-11
CHAPTER
xviii
Displaying the Lo gging Configuration22-12
23Configuring SNMP23-1
Understanding SNMP23-1
SNMP Versions23-2
SNMP Manager Functions23-3
SNMP Agent Fu nc ti on s23-3
SNMP Community Strings23-4
Using SNMP to Access MIB Variables 23-4
SNMP Notifications23-5
Configuring SNMP Groups and Users23-8
Configuring SNMP Notifications23-10
Setting the Agent Contact and Location Informat ion23-13
Limiting TFTP Servers Used Through SNMP23-13
SNMP Exampl es23-14
Displaying SNMP Status23-15
Contents
CHAPTER
24Configuring Network Security with ACLs24-1
Understanding ACLs24-2
Handling Fragmented and Unfragmented Traffic24-3
Understanding Access Control Parameters24-4
Guidelines for Applying ACLs to Physical Interfaces24-6
Configuring ACLs24-6
Unsupported Features24-7
Creating Standard and Extended IP ACLs24-7
ACL Numbers24-8
Creating a Numbered Standard ACL24-9
Creating a Numbered Extended ACL24-10
Creating Named Standard and Extended ACLs24-13
Applying Time Ranges to ACLs24-15
Including Comments About Entries in ACLs24-17
Creating Named MAC Extended ACLs24-18
Creating MAC Access Groups24-19
Applying ACLs to Ter m inal Lines or Physical Interfaces24-20
Applying AC Ls to a Te rm i nal Line24-20
Applying ACLs to a Physical Interface24-21
The Catalyst 2 950 Desktop Switch Software Configuration G uide i s for t he n etwor k mana ger
responsible for configuring the Catalyst 2950 switches, hereafter referred to as the switches. Before
using this guide, you should be familiar with the concepts and terminology of Ethernet and local area
networking.
Purpose
This guide provides inf orma tio n abo ut con figuring and trou bl eshoo ting a sw it ch o r switc h cluste rs. I t
includes descript ion s o f th e ma nage ment in terfa ce opt ions a nd th e fea ture s su ppo rte d by t he s wit ch
software. The switch is supported by either the standard software image (SI) or the enhanced software image
(EI). The EI provides a richer set of features, including access control lists (ACLs), enhanced quality of
service (QoS) features, extended-range VLANs, and Remote Switch Port Analy zer (RSPAN).
The EI supports these switches:
• Catalyst 2950C-24
• Catalyst 2950G-12-EI
• Catalyst 2950G-24-EI
• Catalyst 2950G-24-EI-DC
• Catalyst 2950G-48-EI
• Catalyst 2950T-24
The SI supports these switches:
• Catalyst 2950-12
• Catalyst 2950-24
• Catalyst 2950SX-24
Use this guide with other documents for information about these topics:
78-11380-05
• Requirements—This guide assumes that you have met the hardware and software requirements and
cluster compatibility requirements described in the release notes.
• Start-up information—This guide assumes that you have assigned switch IP info rmati on and
passwords by using the setup program descri bed in the rele ase notes .
• Cluster Management Sui te (CMS) i nformat ion—This guide provides an overview of the CMS
web-based, switch mana geme nt int erface. For inf orm ation a bout CMS r e quireme nts an d the
procedures for browser and plug-in configuration and accessing CMS, refer to the release notes. For
CMS field-level window descriptions and procedures, re fer to the CM S online hel p.
• Cluster configuration—This guide provides inform ation a bout planni ng for, creating, and
maintaining switch clusters. Because configuring switch clusters is most easily performed through
CMS, this guide does not provide the command-line interface (CLI) procedures. For the cluster
commands, refer to the comm and re ferenc e for th is releas e.
• CLI command information—This guide provides an overview for using the CLI. For complete
syntax and usage inform ation about the commands t hat have been specifically cr eate d or chang ed
for the switches, re fer to th e comm and ref erence for this re lease .
This guide does not descri be system message s you might enc ounter or how to install your switch. For
more inform ation, refer to the Catalyst 2950 Desktop Switch System Message Guide for this release and
to the Catalyst 2950 Desktop Sw itch Ha rdware Installation Guide .
NoteThis guide does not repe at the conc epts and CLI proce dures provided in the st andar d Cisco IOS
Release 12.1 docume ntation . For informa tion ab out the stan dard IO S Releas e 12.1 co mmands, re fer to
the IOS documen tation se t available fro m t he Ci sco.c om ho me p ag e at Service and Support > T echni cal Documents. On t he Cisco Produ ct Documentation hom e page, select Release 12.1 from the Ci sco
IOS Software drop-down list.
Organization
This guide is organized into these chapters:
Chapter 1, “Ove rv i ew,” lists the software features of this release and provides examples of how the
switch can be deployed in a network.
Chapter 2, “Using the Command-Line Interface,” describes how to access the command modes, use the
CLI, and describes CLI messa ges that you migh t receive. It also describes how to get help, abbr eviate
commands, use no and default forms of commands, use command history and editing features, and how
to search and filter the output of show and more commands.
Chapter 3, “Getting Started with CMS,” describes the CMS web-based , switch ma nagement interface.
For information about configuring your web browser and accessing CMS, refer to the release notes. For
field-level descriptions of all CMS wi ndows and pr oc edure s f or usi ng t h e CM S wi ndows, refer to the
online help.
Chapter 4, “Assigning the Switch IP Address and Default Gateway,” describes how to create the initial
switch configuration (for example, assign the switch IP address and default gateway information) by
using a variety of automatic and manua l metho ds.
Chapter 5, “Configuring IE2100 CNS Agents,” describes how to conf igure Cisco I ntelligence Engine 2 100
(IE2100) Series Cisco Networking Services (CNS) embedded agents on your switch. By using the
IE2100 Series Configuration Registrar network management application, you can automate initial
configurations and conf iguration upd ates by generatin g switch-specific con figuration changes, sending t hem
to the switch, executing the configuration change, and logging the results.
Chapter 6, “Clust ering Switches,” describes switch c luster s and the cons ider ation s for creat ing and
maintaining them. The online help provides the CMS procedures for configuring switch clusters.
Configuring switch cl usters is mo st e asily pe rfo rmed t hroug h C MS; th eref or e, CL I pr ocedu re s are not
provided. Cluster comman ds are de scribed in the Ca tal yst 295 0 De skto p S witch Comm an d Re ference.
Chapter 7, “Administering the Switch,” describes how to perform one-time operations to administer your
switch. It describes how to prevent unauthorized access to your switch th rough the use of pa sswords,
privilege levels, the Terminal Access Controller Access Control System Plus (TACACS+), and the
Remote Authenticati on Dial-In U ser Serv ice (RADIUS) . It als o describ es ho w to set the sy stem date and
time, set system name and pro mpt, crea te a login banne r, and how to manage the MAC address and
Address Resolution Protocol (ARP) tables.
Chapter 8, “Configuring 802.1X Port-Based Authentication,” d escri bes how to configu re 80 2.1X
port-based authenti ca tion to prevent unauthorized devices (clients) from gaining access to the network.
As LANs extend t o hote ls, air por ts , and c or por ate lob bi es , in sec ure environme nts cou l d b e cr ea te d.
Chapter 9, “Configuring Interface Characteristics,” defines the types of interfaces on the switch. It
describes the interface global configuration command and provides procedures for configuring physical
interfaces.
Chapter 10, “Configuring STP,” describes how to configure the Spanning Tree Protocol (STP) on your
switch.
Chapter 11, “Configuring RSTP and MSTP,” describes how to configure the Cisco implementation o f
the IEEE 802.1W Rapid STP (RSTP) and the IEEE 802.1S Multiple STP (MSTP) on your switch. RSTP
provides rapid convergence, and M STP en ab les VLA Ns t o be g rou pe d in to a sp an ning- tre e i nstan ce .
Chapter 12, “Configuring Optional Spanning-Tree Features,” describes how to configure optional
spanning-tree featur es that can be used when you r switc h is running the per-VLAN spann ing-tr ee
(PVST) or the MS TP.
Chapter 13, “Configuring VLANs,” describes how to create and maintain VLANs. It includes
information about t he V LAN data base , VLAN c onfiguration m ode s, ext ende d-r ange VLA Ns , V LAN
trunks, and the VLAN Membership Policy Server (VMPS).
Chapter 14, “Configuring VTP,” describes how to use the VLA N Trunking Pro toco l (VT P) VLA N
database for managin g V LANs. I t inc ludes V T P cha racteri stic s and c onfiguration .
Chapter 15, “Configuring Voice VLAN,” describes how to configure voice VLANs on the switch for a
connection to an IP phone.
Chapter 16, “Configuring IGMP Snooping and MV R,” describes how to configure Intern et Group
Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR), a local
IGMP snooping feature av ailable on the switch, and how to use IGMP fi ltering to control multicast group
membership.
Chapter 17, “Configuring Port-Based Traffic Control,” describes how to reduce traffic storms by setting
broadcast, multicast, and unicast storm-control threshold levels; how to protect ports from receiving
traffic from other ports on a switch; how to configure port security by using secure MAC addresses; and
how to set the aging time for all secure addresses.
Chapter 19, “Configuring CDP,” describes how to con figure C isco Di scovery Prot ocol (CD P) on you r
switch.
Chapter 20, “Configuring SPAN and RSPAN,” describes how to configure Switched Port Analyzer
(SPAN) and Remot e SPAN (RSPAN), which sel ect n e twork t r affic for analy si s by a ne twor k ana lyz er
such as a SwitchProbe device or other Remote Monitoring (RMON) probe.
Chapter 21, “Configuring RMON,” describes how to configure remote monitoring (RMON). The
RMON feature, which is used with the Simple Network Management Protocol (SNMP) agent in the
switch, means that you can monitor all the traffic flowing among switches on all connected LAN
segments.
Chapter 22, “Configuring System Message Logging,” describes how to configure syst em messa ge
logging. It describes the message format and how to change the message display destination device, limit
the type of message s sent , c onfigure t he U NIX ser ver sy slog daem on, and define t he U NIX syste m
logging facility and timestamp messages.
Chapter 23, “Configuring SNMP,” describes how to configure the Simp le Networ k Ma nage ment
Protocol (SNMP). It describes how to configure community strings, enable trap managers and traps, set
the agent contact and location information, and how to limit TFTP servers used through SNMP.
Chapter 24, “Configuring Network Security with ACLs,” describes how to configure network security
by using access control list s ( ACLs).
Chapter 25, “Configuring QoS,” describes how to configure quality of service (QoS) on your switch.
With this feature, you can provide pre ferent ial tre atmen t to certa in types t raffic.
Chapter 26, “Configur ing Ether Chann els,” describes how to bundle a set of individual ports into a single
logical link on the interfaces.
Chapter 27, “Troubleshooting,” describes how to identify and resolve software problems related to the
IOS software.
Appendix A, “Supported MIBs,” lists the supported MIBs for this release and how to use FTP to access
the MIB files.
Conventions
This guide uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Interactive examples use these conventions:
Notes, cautions, and tips use these conventions and symbols:
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
You can order printed copies of documents with a D OC-xxxxxx= number from the Cisco.com sites and
from the telephone numbers listed in the “Obtaining Docu me nta tio n” se ction on p age x xvii.
• Release Notes for the Catalyst 2950 Switch (not orderable but is available on Cisco.com)
NoteSwitch requirements and procedures for initial configurations and software upgrades tend to change and
therefore appear only in the release note s . Before installing, configuring, or upgrading the switch, refer
to the release notes on Cisco.com for the latest information.
Related Publications
• Catalyst 2950 D esktop Sw itch Softw are Configuration Guide (ord er nu mbe r D OC -7811 380= )
• Catalyst 2950 D esktop Sw itch Comm and Refe rence (or der n um ber D OC -781 1381 =)
• Catalyst 2950 Desktop Switch System Message Guide (order num ber DOC-781 4233= )
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM
package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may
be more current than printed documentation. The CD-ROM package is available as a single unitor
through an annual subscription.
Ordering Documentation
You can order Cisco documen tation in th ese ways:
• Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from
the Networking Produ cts Market Pla ce:
http://www.cisco.com/cgi-bin/order/order_root.pl
• Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription
Store:
http://www.cisco.com/go/subscription
Preface
• Nonregistered Cisco.co m u ser s can o rd er docum en tati on th rou gh a l oc al ac count r epre sen tative by
calling Cisco Systems Corpo rate Headqu arter s (Califo rnia, U.S.A. ) at 408 526-7208 or, elsewhere
in North America, by calli ng 800 55 3-NE TS (6387).
Documentation Feedback
If you are reading Cisco product documentation on the World Wide W eb, you can send us your comments
by completing the online sur vey. When you display the docume nt listing for this pla tform, click Giv e Us
Your Feedback. After you display the survey, select the manual that you wish to comment on. Click
Submit to send your comments to the Cisc o document ation gro up.
You can e-mail your comm ents t o bug-doc@c isco.co m.
To submit you r co mme nts by ma il, u se th e r esponse ca rd behi nd the fro nt c over of your d oc um ent, o r
write to the following address:
Cisco Systems
Attn: Document Resour ce Connec tion
170 West Tasman Drive
San Jose, CA 95134- 988 3
We apprec iate yo ur comm en ts.
Obtaining Technical Assistanc e
xxviii
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can
obtain online documentation, troubleshooting tips, and sample configurations from online tools by using
the Cisco T ech nical Assistance Center (TA C) W eb Site. Cisco.com r egistered u sers hav e complete ac cess
to the technical support resources on the Cisco TAC Web Site.
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open
access to Cisco information,networking solutions, service s, pr ogram s, a nd resour ce s at any time , from
anywhere in the wor ld.
Cisco.com is a highly int egrated In ternet a pplicat ion and a powerful , easy- to-use t ool that provi des a
broad range of f eat ures an d s er vices to hel p you w it h th ese tasks:
• Streamline business processes and improve productivity
• Resolve technical issues with online support
• Download and te st so ft war e pa ck ag es
• Order Cisco learning m ateri als and me rcha ndise
• Register for online skill assessment, training, and certification programs
If you want to obtain customized information and service, you can self-register on Cisco.com. To access
Cisco.com, go to this URL:
http://www.cisco.com
Technical Assistance Center
The Cisco Technical Assistan ce Center ( TAC) is av ailab le to all c ustomers who need technica l assistan ce
with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC
Web S i te an d t h e C is co TAC Escalation Cen ter.
Cisco TAC inquiries are categorized accordi ng to the urgency of the issue :
• Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities,
product installation, or basi c product configuration.
• Priority level 3 (P3)—Your network performance is degraded. Ne twork functio nality i s noticeab ly
impaired, but most business operations continue.
• Priority level 2 (P2)—Your production network is severely degraded, affecting signi ficant aspect s
of business operations. No workar oun d is available.
• Priority leve l 1 (P1)—Your production network is down, and a critical impact to business operations
will occur if se rv ice is n ot r esto re d qui ck ly. No workaround i s available.
The Cisco TAC resource that you choose is ba sed on the prio rity of th e proble m and the co nditions of
service cont rac ts , w h en appl ic ab le .
Cisco TAC Website
You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time.
The site provides around-the-clock access to online tools, knowledge bases, and software. To access the
Cisco TAC Web Site, go to t his URL:
http://www.cisco.com/tac
78-11380-05
All customers, partners, and resellers who have a valid Cisco service contract have complete access to
the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a
Cisco.com login I D a nd passwor d. If yo u have a valid servi ce con tra ct but do no t have a login ID or
password, go to this URL to register:
If you are a Cisco.com registere d user, and you cannot resol ve your tech ni cal issues by using the Cisco
TAC Web Site, you can open a case onl ine by using the TAC Case Open too l at this URL :
http://www.cisco.com/tac/caseopen
If you have Internet access, we recommend that you open P3 and P4 cases through t he Cisco TAC
Web Site.
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These
classifications are assigned when severe network degradation significantly impacts business operations.
When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer
automatically opens a case.
To obtain a d ir ect or y of t oll- free C isco TAC telephone numbers for yo ur co unt ry, go to this URL:
Before calling, please check with your network operationscenter to determine the le v el of Cisco suppor t
services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network
Supported Accounts (NSA). When you call the center, please have available your service agreement
number and your product se rial numbe r.