Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7811380=
Text Part Number: 78-11380-03
gygyy
N
i
t
A
S
L
r
A
b
THE SPECIFICATIONS AND INFORMATION REGARDING TH E PRODUCTS I N THIS M ANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MU ST TAKE F ULL RESPON SIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATIO N PACKET T HAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY T HIS REFERENCE . IF YOU A RE UNABLE TO LO CATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HER EIN, ALL DO CUME NT FILES AN D SOFT WARE OF THE SE SUPP LIERS ARE PROV IDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLI ERS DISCLAI M ALL WARRAN TIES, EX PRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A P ARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR I TS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION,LOST PROFITS ORLOSS ORDAMAGE TO DATAARISING OUT OFTHE USE OR INABILITY TOUSE THIS MAN UAL , EVEN IFCISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POS SIBILIT Y OF SUC H DAMAGES .
etworking Academy logo, Cisco Unity, Fast Step, Follow Me Browsing, FormShare, FrameShare, IGX, Internet Quotient, IP/VC, iQ Breakthrough, iQ Expertise, iQ FastTrack, the
Q Logo, iQ Net Readiness Scorecard, MGX, the Networkers logo, ScriptBuilder, ScriptShare, SMARTnet, TransPath, Voice LAN, Wavelength Router, and WebViewer are
rademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and Discover All That’s Possible are service marks of Cisco Systems, Inc.; and Aironet,
ystems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastSwitch, GigaStack, IOS, IP/TV,
ightStream, MICA, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are
egistered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
ll other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship
etween Cisco and any other company. (0110R)
Catalyst 2950 Desktop Sw it ch Softw are Configuration Guide
Audiencexvii
Purposexvii
Organizationxviii
Conventionsxix
Related Publicationsxx
Obtaining Documentationxx
World Wide Webxx
Documentation CD-ROMxxi
Ordering Documenta tionxxi
Documentation Feedbackxxi
Obtaining Technical Assistancexxi
Cisco.comxxii
Technical Assistance Centerxxii
Cisco TAC Web Sitexxii
Cisco TAC Escalation Centerxxiii
CONTENTS
CHAPTER
CHAPTER
1Overview1-1
Features1-1
Management Options1-6
Management Interf ace Options1-6
Advantages of Using CMS and Clustering Switches1-7
Network Configura tion Examples1-8
Design Concepts for Using the Switch1-8
Small to Medium-Sized Network Configuration1-10
Collapsed Backbone and Switch Cluster Configuration1-12
Large Campus Configuration1-13
IOS Command Modes3-1
Getting Help3-3
Abbreviating Commands3-3
Using no and default Forms of Commands3-4
Understanding CLI Messages3-4
Using Command History3-5
Changing the Command Hi story Buffer Size3-5
Recalling Commands3-5
Disabling the Command History Feature3-5
Using Editing Fea tures3-6
Enabling and Disabling Editing Features3-6
Editing Commands through Keystrokes3-6
Editing Command Lines that Wrap3-7
Searching and Filtering Output of show and more Commands3-8
Accessing the CLI3-9
Accessing the CLI from a Browser3-9
CHAPTER
CHAPTER
Saving Configuration Changes3-10
Where to Go Next3-10
4General Switch Administration4-1
Basic IP Connectivity to the Switch4-1
Switch Software Releases4-2
Console Port Acces s4-2
Telnet Access to the CLI4-2
HTTP Access to CMS4-3
SNMP Network Management Platforms4-4
SNMP Versions4-4
Using FTP to Access the MIB Files4-5
Using SNMP to Access MIB Variables4-5
Default Settings4-6
Automatic Discovery of Cluster Candidates and Members5-4
Discovery through CDP Hops5-5
Discovery through Non-CDP-Capable and Noncluster-Capable Devices5-6
Discovery through the Same Management VLAN5-7
Discovery through Different Management VLANs5-8
Discovery of Newly Installed Switches5-9
HSRP and Standby Command Switches5-10
Virtual IP Addres s es5-11
Automatic Recovery of Cluster Configuration5-11
Consideration s for Cluster Standby Groups5-12
IP Addresses5-13
Host Names5-14
Passwords5-14
SNMP Community Strings5-14
TACACS+5-15
Access Modes in CMS5-15
Management VLAN5-15
LRE Profiles5-16
Availability of Switch-Specific Features in Switch Clusters5-16
CHAPTER
Creating a Switch Cluster5-16
Enabling a Command Switch5-17
Adding Member Switches5-18
Creating a Cluster Standby Group5-20
Verifying a Switch Cl uster5-22
Using the CLI to Manage Switch Clusters5-23
Catalyst1900 and Catalyst 2820 CLI Considerations5-23
Using SNMP to Manage Switch Clusters5-24
6Configuring the System6-1
Changing IP Information6-1
Manually Assigning and Removing Switch IP Information6-2
Using DHCP-Based Autoconfiguration6-2
Example Configuration6-8
Changing the Password6-10
Setting the System Date and Time6-11
Configuring Daylight Saving Time6-11
Configuring the Network Time Protocol6-11
Configuring the Switch as an NTP Client6-11
Enabling NTP Authentication6-11
Configuring the Switch for NTP Broadcast-Client Mode6-12
Configuring SNMP6-12
Disabling and Enabling SNMP6-12
Entering Community Strings6-12
Adding Trap Managers6-12
Configuring CDP6-13
Configuring CDP for Extended Discovery6-14
Contents
Managing the ARP Table6-14
Managing the MAC Address Tables6-15
MAC Addresses and VLANs6-15
Changing the Addres s Aging Time6-16
Removing Dynamic Address Entries6-16
MAC Address Notification6-17
Enabling Notification of Learned or Deleted MAC Addresses6-17
Adding Secure Addresses6-18
Removing Secure Addresses6-18
Adding and Removing Static Address Entries6-18
Configuring Static Addresses for EtherChann el Port Groups6-19
Configuring TACACS+6-20
Configuring the TACACS+ Server Host6-20
Configuring Login Authentication6-21
Specifying TACACS+ Authorization for Privileged EXEC Access and Network Services6-22
Starting TACACS+ Accounting6-22
Configuring a Switch for Local AAA6-23
Defining AAA Server Groups6-31
Configuring RADIUS Authorization for Privilege d EXEC Access and Network Services6-33
Starting RADIUS Accounting6-34
Configuring Set tings for All RADIUS Servers6-35
Configuring the Switch to Use Vendor-Specific RADIUS Attributes6-35
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication6-36
Device Roles7-2
Authentication Initiation and Message Exchange7-3
Ports in Authorized and Unauthorized States7-4
Supported Topologies7-5
Configuring 802.1X Authentication7-6
Default 802.1X Configuration7-6
802.1X Configur ation Guidelines7-7
Enabling 802.1X Authentication7-8
Configuring th e Switch-to-RADIUS-Server Communication7-9
Enabling Periodic Re-Authentication7-10
Manually Re-Authe nticating a Client Connected to a Port7-11
Changing the Quiet Period7-11
Changing the Switch-to-Client Retransmission Time7-12
Setting the Switch-to-Client Frame-Retransmission Number7-13
Enabling Multiple Hosts7-13
Resetting the 802.1X Configuration to the Defa ult Values7-14
Displaying 802.1X Statistics and Status7-14
CHAPTER
8Configuring VLANs8-1
Overview8-1
Management VLANs8-3
Changing the Manageme nt VLAN for a New Switch8-3
Changing the Management VLAN Through a Telnet Connection8-4
Assigning VLAN Port Membership Modes8-4
VLAN Membership Combinations8-6
Assigning Static-Access Ports to a VLAN8-7
Using VTP8-7
Dynamic Port VLAN Membership8-29
VMPS Databa se Configuration File8-29
VMPS Configuration Guidelines8-31
Default VMPS Configuration8-31
Configuring Dyna mic VLAN Membership8-31
Configuring Dyna mic Ports on VMPS Clients8-32
Reconfirming VLAN Membe rships8-33
Changing the Reconfirmation Interval8-33
Changing the Retry Count8-33
Administering and Monitoring the VMPS8-34
Troubleshooting Dynamic Port VLAN Membership8-34
Dynamic Port VLAN Membership Configuration Example8-34
CHAPTER
9Configuring STP9-1
Understanding Basic STP Features9-1
Supported STP Instances9-2
STP Overview9-2
Election of the Root Switch9-3
Bridge Protocol Data Units9-3
STP Timers9-4
Creating the STP Topology9-4
STP Interface States9-5
Connecting the Stack Ports9-15
Understanding BackboneFast9-17
Understanding Root Guard9-19
Configuring Basic STP Features9-20
Default STP Confi guration9-20
Disabling STP9-21
Configuring the Root Switch9-21
Configuring a Secondary Root Switch9-23
Configuring STP Port Priority9-24
Configuring STP Path Cost9-25
Configuring the Switch Priority of a VLAN9-26
Configuring the Hello Time9-27
Configuring th e Forwarding-Delay Time for a VLAN9-27
Configuring the Maximum-Aging Time for a VLAN9-28
Configuring STP for Use in a Cascaded Cluster9-28
Displaying STP Status9-29
Contents
CHAPTER
Configuring Advanced STP Features9-30
Configuring Port Fast9-30
Configuring BPDU Gu ard9-31
Configuring Upl inkFast for Use with Redundant Links9-32
Configuring Cross-Stack UplinkFast9-33
Configuring BackboneFast9-34
Configuring Root Guard9-34
10Configuring the Switch Ports10-1
Changing the Port Speed and Duplex Mode10-1
Connecting to Devi ces That Do Not Autonegotiate10-2
Setting Speed and Duplex Parameters10-2
Configuring IEEE 802.3X Flow Control10-3
Understanding Po rt-Channel Interfaces10-9
Understanding th e Port Aggregation Protocol10-10
PAgP Modes10-10
Physical Learners and Aggregate-Port Learners10-11
PAgP Interaction with Other Features10-12
Understanding Lo ad Balancing and Forwarding Methods10-12
Default EtherCha nnel Configuration10-13
EtherChannel Configuration Guidelines10-14
Configuring EtherChannels10-14
Configuring EtherChannel Load Balancing10-16
Configuring the PAgP Learn Method and Priority10-17
Displaying Ethe rChannel and PAgP Status10-17
Configuring UniDirectional Link Detection10-18
Understanding SPA N10-18
SPAN Concepts and Termi nology10-19
SPAN Session10-19
Traffic Types10-19
Source Port10-20
Destination Por t10-20
SPAN Traffic10-21
SPAN Interaction with Other Features10-21
CHAPTER
Configuring SPAN10-22
SPAN Configuration Gui delines10-22
Creating a SPAN Session and Specifying Ports to Monitor10-23
Removing Ports from a SPAN Sess io n10-24
Displaying SPAN Status10-25
11Configuring IGMP Snooping and MVR11-1
Understanding and Configuring IGMP Snooping11-1
Enabling or Disabling IGMP Snooping11-2
CLI: Enabling or Disabling IGMP Snooping11-2
Immediate-Leave Processing11-3
CLI: Enabling IGMP Immediate-Leave Processing11-3
Setting the Snooping Method11-4
Joining a Multicast Group11-4
Statically Confi guring a Host to Join a Group11-5
CLI: Statical ly Configuring a Interface to Join a Group11-6
Leaving a Multicast Group11-6
CLI: Configuring a Multicast Router Port11-7
Understanding Multi cast VLAN Registration11-7
Using MVR in a Multicast Television Application11-8
Configuration Guidelines and Limitations11-10
Default MVR Configuration11-10
Configuring MVR Global Parameters11-10
Configuring MV R Interfaces11-12
Displaying MVR11-14
Contents
CHAPTER
12Configuring Network Security with ACLs12-1
Understanding ACLs12-1
ACLs12-2
Handling Fragmented and Unfragmented Traffic12-3
Understanding Access Control Parameters12-4
Guidelines for Configuring ACLs on the Catalyst 2950 Switches12-5
Configuring ACLs12-6
Unsupported Feat ures12-6
Creating Standard and Extended IP ACLs12-7
ACL Numbers12-7
Creating a Numbered Standard ACL12-8
Creating a Numbered Extended ACL12-9
Creating Named Standard and Extended ACLs12-12
Including Comments About Entries in ACLs12-14
Applying the ACL to an Interface or Terminal Line12-15
Displaying ACLs12-16
Displaying Access Groups12-17
Examples for Compiling ACLs12-18
Creating Named MAC Extended ACLs12-20
Creating MAC Access Groups12-21
CHAPTER
13Configuring QoS13-1
Understanding QoS13-2
Basic QoS Model13-3
Classification13-4
Classification Based on QoS ACLs13-5
Classification Based on Class Maps and Policy Maps13-5
Policing and Marking13-6
Mapping Tables13-7
How Class of Service Works13-8
Port Priority13-8
Port Scheduling13-8
CoS and WRR13-8
Configuring QoS13-9
Default QoS Config uration13-9
Configuratio n Guidelines13-10
Configuring Classification Using Port Trust States13-10
Configuring the Trust State on Ports within the Q oS Domain13-11
Configuring the CoS Value for an Interface13-13
Configuring a QoS Policy13-13
Classifying Tr affic by Using ACLs13-14
Classifying Tr affic by Using Class Maps13-17
Classifying, Policing, and Marking Traffic by Usi ng Policy Maps 13-18
Configuring CoS Map s13-21
Configuring the CoS-to-DSCP Map13-21
Configuring the DSCP-to-CoS Map13-22
Configuring CoS an d WRR13-23
CLI: Configuring CoS Priority Queues13-24
Configuring WR R13-24
Recovering from Lost Member Connectivity14-5
Recovering from a Comma nd Switch Failure14-5
Replacing a Failed Command Switch with a Cluster Member14-6
Replacing a Failed Command Switch with Another Switch14-7
Recovering from a Fa iled Command Switch Without HSRP14-8
The Catalyst 2 950 Desktop Switch Softw are Configuration Guide is for the network manager
responsible for configuring the Ca talyst 2950 switches, hereafter referred to as the switches. Before
using this guide, you sh ould be familiar with the concepts and terminology of Ethernet and local area
networking.
Purpose
This guide provides information abo ut configuring and trou ble shooting a switch o r switch clusters. I t
includes descriptions of the management interface options and the features supported by the s witch
software. The Catalyst 295 0 sw itch i s supp orted by either the standard software image or the enh ance d
softwareimage. The enhanced software image provides a richer set of features, including access control
lists (ACLs) and enhance d quality of servi ce ( QoS) features.
The enhanced so ftwar e i mage supports these switches:
• Catalyst 2950C-24
• Catalyst 2950G-12-E I
• Catalyst 2950G-24-E I
• Catalyst 2950G-24-E I-DC
• Catalyst 2950G-48-E I
• Catalyst 2950T-24
The standard software image supports these switches:
• Catalyst 2950-12
• Catalyst 2950-24
Use this guide with other d ocume nts for informat ion about these to pics:
• Requirements—This guide assumes that you have met the hardware and software requirements and
cluster compatibility requirements described in the release notes.
• Start-up information—This guide assu mes that you have assigned switch IP i nform ation and
passwords by using the setup program described in the release notes.
• Cluster Management Suite (CMS) information—This guide provides an overview of the CMS
web-based, switch management in terface. For information about CMS re quire ments and the
proceduresforbrowser and plug-in configuration and accessing CMS, refer to the release notes. For
CMS field-level window descriptions and procedures, refer to the CMS online he lp.
• Cluster configuration—This guide provides information about planning for, creating, and
maintaining switch clusters. Because configuring switch clusters is most easily performed through
CMS, this guide does not provide the command-line interface (CLI) procedures. For the cluster
commands, refer to the Catalyst 2 950 Desktop Switch Comm and Reference.
• CLI command information—This guide provides an overview for u si ng the CLI. For com plet e
syntax and usa ge information about the com ma nds that have been spe cificall y created or changed
for the Catalyst 2950 switches, refe r to the Catalyst 2950 Desktop Switch Command Reference.
NoteThis gui de does not repeat the conc e pts and CLI procedures provided in the stand ar d Cisco IOS Release
12.1 documentat ion. For information a bo ut t he standard IOS Release 12.1 commands, refe r to the IOS
documentation s et available from the Ci sco.c om home page a t Service and Support > Technical
Documents
Software drop-down list.
. On the Cisco Product Documentation home page, select Release 12.1 from the C isco IOS
Organization
The organization of this guide is as follows:
Chapter 1, “Overv i ew,” lists th e software feat ur es of this rele a se and provides examples of h ow the
switch can be deployed in a network.
Chapter 2, “Getting Started with CMS,” d es cr ib es the Clus ter Managem en t Suite (CMS ) web-based,
switch management interface. For inform ation on configuring your web browser and accessing CMS,
refer to the release notes. For field-level description s of all CMS w indows and pro cedu res for usi ng the
CMS windows, refer to the online help.
Chapter 3, “Using the Comman d-L ine Int erface, ” describes how to access the command modes, use the
command-lineinterface (CLI), and describes CLI messages thatyou mightreceive. It also describes how
to get help, abbreviate commands, use no and default fo rms of commands, use command history and
editing features, and how to search and filter the output of show and more commands.
Chapter 4, “General Switch Administration,” includes the switch-configuration default settings and
information a bout software relea ses, accessing the management interfaces, an d u si ng Simple Network
Management Protoco l (SNM P).
Chapter 5, “Clustering Switches,” describes switch clusters and the considerations for creating and
maintaining them. The online help provides the CMS procedures for configuring switch clusters.
Configuring switch clusters is most easily performed through CMS; therefore, CLI procedures are not
provided. Cluster commands are described in the Catalyst 2950 Desktop Switch Command Reference.
Chapter 6, “Configuring the System,” provides the co nside rati ons and CLI p roce dures for configuring
switch-wide settings. The online help provides the CMS procedures for configuring switch-wide
settings.
Chapter 7, “Configuring 802.1X Port- Based Authentication ,” provides the c onsiderations and CLI
procedures for configuring 802.1X port-based auth entic atio n . Th e onl ine help provides t he CMS
procedures.
Chapter 8, “Configuring VLANs,” provides the considerations and CLI procedures for configuring
VLANs. The onli ne help provides the CMS procedures.
Chapter 9, “Configuring STP,” provides the conside rati ons a nd CL I proc edure s fo r co nfiguring basic and
advanced spanning- tree features. T he online help provides the C MS procedures.
Chapter 10, “Configuring the Switch Ports,” provides the considerations and CLI pro cedu res for
configuring the swi tch ports. The onli ne h elp provides the CM S pr oced ures for configuring t he sw itch
ports.
Chapter 11, “Configuring IGMP Snooping and MVR,” provides the cons id erat ion s and CL I proce dures
for configuring Internet Group Management Protocol (IGMP) snooping. It also describes Multicast
VLAN Registration (MVR), a local IGMP snooping feature available on the switch. The online help
provides the CMS procedures .
Chapter 12, “Configuring Network Security with ACLs,” provides the considerations and CLI
procedures for configuring network security by using access control lists (ACLs). It describes how to
apply ACLs to interface s a nd provides examples. The online help p rovid es t he CM S procedures.
Chapter 13, “Configuring QoS,” pr ovides the conside ratio ns and CLI procedures for configuring quality
of service (QoS). With this feature, you can providepreferentialtreatmentto certain types of traffic. The
online help pr ovides the CMS procedur es.
Chapter 14, “Troubleshooting,” describes how to identify and resolve software problems related to the
IOS s oftware.
Appendix A, “Error Messag es for Security and QoS Co nfigurati ons” lists the CLI error mess ag es for
configuring security using ACLs and fo r configuring QoS.
Appendix B, “System Messages,” lists the IOS system messages for the switch.
Conventions
This guide uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Interactive examples use these conventions:
Notes, cautions, and tips use these conventions and symbols:
• Commands and keywords are in boldface text.
• Arguments for wh ich you supply values are in italic.
You can order printed copie s of docume nts wi th a DOC- xxxxxx= number from the Cisco.c om site s and
from the telephone numbers listed in the “Obtain ing Docu mentatio n” sectiononpagexx.
Preface
• Release Notes for the Catalyst 2950 Switch ( not orderable but i s available o n Cisco.com)
NoteSwitch requi rem ents and procedures for in itial configurations and software upgr a des tend t o change and
therefore appear only in the release note s. Befo re inst alling, co nfigurin g, or upgra ding the sw itch, re fer
to the release notes on Cisco.com for the latest information.
• Catalyst 2950 Des ktop Switch Software Configuration Guide, (order number DOC-7811380=)
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM
package, whi ch i s s hip ped with your prod uc t. T he Documentatio n CD -ROM is up date d m on thl y a nd m ay
be more curre nt than printed documentatio n. The CD-ROM package is available as a s ingl e unit or
through an annual subscription.
Ordering Documentation
Cisco documentation is available in this ways:
• Registered Cisco Dir ect Customers can order Cisco product docum ent ation from the Ne tworkin g
Products MarketPlace:
http://www.cisco.com/cgi-bin/order/order_root.pl
• RegisteredCisco.comusers can order the Documentation CD-ROMthrough the online Subscription
Store:
http://www.cisco.com/go/subscription
Obtaining Technical Assistance
• Nonregistered Cisc o.co m u ser s ca n o rd er doc um enta tion through a loc al a cco unt r ep resen tat ive by
calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, elsewhere in North
America, by calling 800 553-NETS (6387).
Documentation Feedback
If you are read ing Ci sco p rod uct documentation on the WorldWideWeb, you can send us your comments
by completing the online survey.When you display the document listing for this platform, click Give Us
Your Feedback. Af ter you display the survey, select the manual that you wi sh to comment on. Click
Submit to send your comments to the Cisc o d oc ument ati on group.You can e-mail your commen ts to
bug-doc@cisco.com.
To submit your comments by mail, use t he r esponse card behind the front cover of your document, or
write to the following address:
Cisco Systems
Attn: Document Resource C onn ect ion
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistanc e
Cisco provides Cisco.c om as a starting point for all technical assistanc e. Customers and pa rtn ers c an
obtain documen tation, troubleshooting tips, and sa mpl e co nfigurati ons from online tools by using the
Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registeredusers havecomplete access to
the technical support resources on the Cisco TAC Web Site.
Cisco.com is the foundation of a suite of i ntera ct ive, networked services that provides im medi ate, ope n
access to Cisco inform atio n, net workin g solut ions, se rvi ces, pr ogr ams, a nd re source s at any t ime, fr om
anywhere in the world.
Cisco.com is a highly integrat ed Internet appli cati on and a powerful, easy-to-use tool that provide s a
broad range of features and servi ces to help you to
• Streamline business p rocesses and improve produ ctivity
• Resolve technical issues with online supp ort
• Download and test software packages
• Order Cisco lea rning materials and merchandise
• Register for online skill assessment, tr aining, and certification programs
You can self-register on Cisco.com to obtain customized information and service. To access Cisco.com,
go to the following URL:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC is available to all customers who need technical assistance with a Cisco product,
technology, or solution. Two types of support a re available through the C isco TAC: the Cisco TAC
Web Site and the Cisco TAC Escalation Center.
Inquiries to Ci sco TAC are categorized according to the urgency of the issue:
• Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities,
product installation , or basic produc t c onfigurat ion.
• Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably
impaired, but most business operations continue.
• Priority level 2 (P2)—Your pro ductio n network is severely d egraded , affecting significant aspects
of business operations. N o work aroun d is available.
• Priority level1 (P1)—Your p roduc tion network is down, and a critical impact t o business operati ons
will occur if service is not restore d quickly. No workaround is available.
Which Cisco TAC resource you choose i s based on the priority o f th e problem and the conditions of
service contracts, when applicable.
Cisco TAC Web Site
The Cisco TAC WebSiteallows you to resolve P3 and P4 issues yourself, saving both cost and tim e. The
site provides around-the-clock access to online tools, knowledge bases, and software. To access the
CiscoTACWebSite,gotothefollowingURL:
http://www.cisco.com/tac
All customers, partners, and resellers who have a valid Cisco services contract have complete access to
the technical su pport resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a
Cisco.com login I D a nd password. If you have a valid service contract but do not have a login ID or
password, go to th e fo llowing UR L t o register:
If you cannot re solve yo ur technical issues by using the Cisco TAC Web Site, and you are a Cisco.com
registered user, you can open a case online by using the TAC Case Open tool at the following URL:
http://www.cisco.com/tac/caseopen
If you have Interne t a cces s, it is recom mende d that you op en P3 and P4 cases through t he Cisco TAC
Web Site.
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses issues that are classified as priority level 1 or priority
level 2 ; t hese classifications ar e assigned when severe network degradation significantly i mpac ts
business operation s. When you contact the TAC Escalati on Center wit h a P1 or P2 proble m, a Cisco TAC
engineer will automatically open a case.
To obta in a directory of toll-free Cisco TAC tele ph one numbers for your countr y, go to the following
URL:
Before calling , please ch eck with your network operations center to determine the level of Cisco supp ort
services to which your company is entitled; for example, SMARTnet, SMARTnet Onsite, or Network
Supported Accounts (NSA). In add ition , please have available your service agreement number and your
product serial n umb er.
NoteSome features r equi re t hat you have the enhan ced software image installed on your switch. Se e t he
CHAPTER
1
Overview
This chapter provid es these topics abou t t he C ataly st 29 50 switch software:
• Features
• Management option s
• Examples of t he Catalyst 2950 switches in d ifferent network topologi es
The Catalyst 295 0 s oftwa re su ppor ts t he s wit che s li sted in the Release Notes for the Catalyst 2950
Cisco IOS Release 12.1(6)EA2b. Table 1-1 descr ibes the features supported in this release.
“Purpose” sectiononpagexviifor a list of the switches that suppo rt this. The f ootno te for Table 1-1 lists
the features available for this software image.
78-11380-03
NoteTable 4-2 on page 4-7 lists the defaults for all key features. It also includes re fere nces to wher e you can
• Cluster Management Suite (CMS) software for simplified switch and switch cluster management through a web
browser, such a s Netscape Commun icat or or Microsoft In ter net Explorer, from anywhere i n y our intranet
• Switch clustering technology used with CMS for
–
Unified configuration, monitoring, authentication, and software upgrade of multiple switches (refer to the r elease
notes for a list of eligible cluster members).
–
Automatic discovery of candidate switches and creation of clusters of up to 16 switches that can be managed
through a sin gle IP address.
–
Extended discovery of cluster candidates that are not directly connected to the command switch.
• Hot Standby Router Protocol (HSRP) for command-swi tch redundancy. The redundant comma nd switches used for
HSRP must have compatible software releases.
NoteSee the “Advantages of Using CMS and Clustering Sw itc he s” sectiononpage1-7. Refer to the release notes for the
CMS, cluster hardware, software, a nd browser requirements.
Performance
• Autosensing of speed on the 10/100 ports and autonegotiation of duplex mode on all switch ports for optimizing
bandwidth
• IEEE 802.3x flow control on Gigabit ports operating i n full-duplex mode
• Fast EtherCha nn el and Gigabit EtherChannel for enhanced fault tole ranc e and for provid ing up to 2 G bps of bandwidth
between sw itc hes, routers, and servers
• Support for mini-jumbo frames. The Catalyst 2950 switches running Cisco IOS Release12.1(6)EA2 or later support frame
sizes 1500 to 1530 bytes
• Per-port broadcast storm control for preventing faulty end stat ion s f rom d egradin g overall system performanc e w ith
broadcast storm s
• Port Aggregation Protocol (PAgP) for automatic creation of EtherChannel links
• Internet Group Management P rotoc ol (IGMP) snooping support to limit flooding of IP multica st traffic
• Multicast VLAN registration (MVR) to continuously send multicast streams in a multicast VLAN, but to isolate the
streams from subscriber VLAN s for bandwidth a nd security reaso ns
• Protected port ( private VLAN edge port) option for restricting the forwarding of traffic to d esignated p orts on the same
• UniDirectional link detection (UDLD) on all Ethernet ports for detecting and disabling unidirectional links on
fiber-optic interfaces caused by incorrect fiber-optic wiring or port faults
• IEEE 802.1d Spanning Tree Protocol (STP) for redundant backbone co nne ctio ns and loop- fre e networks. ST P has these
features
–
Per-VLAN Spanning Tree (PVST) for balancing load across virtual LANs (VLANs)
–
Port Fast mode for elimin ating f orward delay by enabling a port to immediately change from a blocking st ate t o a
forwarding s tat e
–
UplinkFast, cross-stack UplinkFast, and BackboneFast for fast convergence afte r a spanning-tre e topology change
and for achieving load balancing between redund ant uplinks, inclu ding Gigabit uplinks and cross-stack Gigabit
uplinks
–
STP root guard for preventing switc hes outside the n etwor k c ore from becomin g th e STP root
NoteA Catalyst 2 950 switch can sup port up to 64 spanning-tree ins tanc es (see Table 8-1 on page 8-2).
VLAN Support
• Catalyst 2950 switches suppo rt 2 50 por t-based V LANs for assigning users to VLANs associated with appropria te
network resources, traffic patterns, and bandwidth.
NoteThe Catalyst 2950-12 and Catalyst 2950 -24 switches supp ort only 64 port -base d VLANs.
• IEEE 802.1Q trunking protocol on all ports for network moves, adds, and changes; management and control of
broadcast a nd multicast traffic; and network secur ity by establi shing VLAN groups fo r high-security users and network
resources
• VLAN Membership Policy Server (VMPS) for dynamic VLAN membership
• VLAN Trunking Protocol (VTP) pruning for reducing network traffic by restricting flooded trafficto links destined for
stations receiving the traffic
• Dynamic Trunking Pro toc ol (DTP) for negotiating trun king on a link between two devices and for negotiating the type
• Bridge Protocol Data Unit (BPDU) Guard for shutting down a Port Fast-configured port when an invalid configuration
occurs
• Protected port o ption for restricting the forwarding of traffic to designated ports on the same switch
• Password-protected access (read-only and read-write access) to management interfaces ( CMS and CLI) for protection
against unauthori zed configuration cha nges
• Multilevel security for a choice of security level, notification, and resulting actions
• MAC-based p ort- level security for restricting the use of a switch port to a specific group of source addresses and
preventing switch acces s f rom unauthorized st ations
• Terminal Access Controll er A ccess Control System Plus (TACACS+), a proprietar y fea ture for managing network
security through a TACACS server
• 802.1X port-b ased authenticat ion to prevent unauthoriz ed devices from gain ing access to th e network
• Standard and extended IP access control lists (ACLs) for defining security policies
Quality of Service and Class of Service
Classification
•
IP Differentiated Services Code Point (IP DSCP) and class of service (CoS) marking priorities on a per-port basis for
protecting the performance of mission-critical applications
• Flow-based packet classification (classification based on information in the MAC, IP, and TCP/UDP headers) for
high-performance quality of service at the network edge, allowing for differentiated service levelsfor different types of
network traffic and for prioritizing mission-critical traffic in the network
1
1
1
1
• Support for IE EE 802.1P CoS s che du ling for classification and preferenti al treatment of high-priority voice traffic
Policing
• Traffic-policing policies on the switch port for allocating the amount of the port bandwidth to a specific traffic flow
• Policing traffic flows to restrict specific applications or traffic flows to metered, predefined rates
• Up to 60 policers on ingress Gigabit-capable Ethernet ports
Up to six polic ers o n ingress 10/100 ports
1
Granularity of 1 Mbps on 10/ 100 ports and 8 Mbps on 10/10 0/100 0 ports
• Out-of-profile markdown for packets that exceed bandwidth utilization limits
1
1
1
1
Egress Policing and Scheduling of Egress Queues
Four egress queues o n all switch ports. Support for strict priority and weighted r oun d-robin (WRR) CoS po lici es
• Switch LEDs that provide visual port and switch status
• Switch Port Analyzer (SPAN) for complete traffic monitoring on any port
• Four groups (hist ory, statistics, a larms, and events) of embe dded remote monitor ing (RMON) agent s for network
monitoring and traffic analysis
• MAC address notification for tr acking the MAC addresses that the switch has learned or removed
• Syslog facility for logging system messages about authentication or authorization errors, resource issues, and time-out
events
1. This feature is available only on a switch running the enhanced software image.
Management Options
The Catalyst 2 950 switches are d esign ed for plug-and-pl ay operation: you o nly need to assig n ba sic IP
information to the switch and connect it to the other devices in your network. If you have specific
network needs, you can configure an d moni tor the sw itch—on an individual basis or as part of a switch
cluster—through i ts various manag em en t interfaces.
This section discusses these topics:
• Interface options for manag ing the switches
• Advantages of clustering switches and using CMS
Management Interface Options
You can configure and monitor i ndividual switches and switch clusters by using these interfaces:
• CMS—CMS is a graphical user interface that can be launched from anywhere in your network
through a we b b rowser suc h as Netscape Communicator or Microsoft I nter net Explorer. C MS is
already installed on the switch. Using CMS, you can configure and m on itor a standalone switc h, a
specific cluster member, or an entire switch cluster. You can also display network topologies to
gather link information and to display switch images to modify switch and port level settings.
For more information about CMS, see Chapter 2, “Getting Started with CMS.”
• CLI—The sw itch IOS CLI so ftwar e is enhanced to support d esk top- switc hing features. You can
configure and monitor the switch and switch cluster members from the CLI. Youcan access the CLI
either by connecting your management station directly to the s witch console port or by using Telnet
from a remote management station.
For more informati on about the C LI, s ee Chapter 3, “Using t he Co mm an d-Li ne I nter face.”
• SNMP—SNMP provides a means to mo nitor and control the switch a nd switch cluster members.
You can manage switch configuration settings, performance, security,andcollect statisticsby using
SNMP management applicati ons such as CiscoWorks2000 LAN Management Suite (LMS) and HP
OpenView.