xxvii
Catalyst 2950 Desktop Switch Software Configuration Guide
78-14982-01
Preface
Organization
Chapter 8, “Configuring 802.1X Port-Based Authentication,” d escri bes how to configu re 80 2.1X
port-based authenti ca tion to prevent unauthorized devices (clients) from gaining access to the network.
As LANs extend t o hote ls, air por ts , and c or por ate lob bi es , in sec ure environme nts cou l d b e cr ea te d.
Chapter 9, “Configuring the Switch Interfaces,” defines the types of interfaces on the switch. It describes
the interface global configuration comma nd an d prov ides pr ocedu re s f or c onfiguri ng physi cal
interfaces.
Chapter 10, “Configuring LRE,” describes how to configure LRE-spe cific fe ature s o n your sw itch .
Chapter 11, “Configuring STP,” describes how to configure the Spanning Tree Protocol (STP) on your
switch.
Chapter 12, “Configuring RSTP and MSTP,” describes how to configure the Cisco implementation o f
the IEEE 802.1W Rapid STP (RSTP) and the IEEE 802.1S Multiple STP (MSTP) on your switch. RSTP
provides rapid convergence, and M STP en ab les VLA Ns t o be g rou pe d in to a sp an ning- tre e i nstan ce .
Chapter 13, “Configuring Optional Spanning-Tree Features,” describes how to configure optional
spanning-tree featur es that can be used when you r switc h is running the per-VLAN spann ing-tr ee
(PVST) or the MS TP.
Chapter 14, “Configuring VLANs,” describes how to create and maintain VLANs. It includes
information about t he V LAN data base , VLAN c onfiguration m ode s, ext ende d-r ange VLA Ns , V LAN
trunks, and the VLAN Membership Policy Server (VMPS).
Chapter 15, “Configuring VTP,” describes how to use the VLA N Trunking Pro toco l (VT P) VLA N
database for managin g V LANs. I t inc ludes V T P cha racteri stic s and c onfiguration .
Chapter 16, “Configuring Voice VLAN,” describes how to configure voice VLANs on the switch for a
connection to an IP phone.
Chapter 17, “Configuring IGMP Snooping and MV R,” describes how to configure Intern et Group
Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR), a local
IGMP snooping fea tur e available on t he swit ch, and how to u se IG MP filterin g to c ontro l mul tica st
group membership.
Chapter 18, “Configuring Port-Based Traffic Control,” describes how to reduce traffic storms by setting
broadcast, multicast, and unicast storm-control threshold levels; how to protect ports from receiving
traffic from other ports on a switch; how to configure port security by using secure MAC addresses; and
how to set the aging time for all secure addresses.
Chapter 20, “Configuring CDP,” describes how to con figure C isco Di scovery Prot ocol (CD P) on you r
switch.
Chapter 21, “Configuring SPAN and RSPAN,” describes how to configure Switched Port Analyzer
(SPAN) and Remot e SPAN (RSPAN), which sel ect n e twork t r affic for analy si s by a ne twor k ana lyz er
such as a SwitchProbe device or other Remote Monitoring (RMON) probe.
Chapter 22, “Configuring RMON,” describes how to configure remote monitoring (RMON). The
RMON feature, which is used with the Simple Network Management Protocol (SNMP) agent in the
switch, means that you can monitor all the traffic flowing among switches on all connected LAN
segments.
Chapter 23, “Configuring System Message Logging,” describes how to configure syst em messa ge
logging. It describes the message format and how to change the message display destination device, limit
the type of message s sent , c onfigure t he U NIX ser ver sy slog daem on, and define t he U NIX syste m
logging facility and timestamp messages.
Chapter 24, “Configuring SNMP,” describes how to configure the Simp le Networ k Ma nage ment
Protocol (SNMP). It describes how to configure community strings, enable trap managers and traps, set
the agent contact and location information, and how to limit TFTP servers used through SNMP.