Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-12189-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work,
Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP,
CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone,
iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers,
Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to
Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain
other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0804R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
DHCP Server Configuration Guidelines3-5
Configuring the TFTP Server3-6
Configuring the DNS3-6
Configuring the Relay Device3-7
Obtaining Configuration Files3-7
Example Configuration3-8
Understanding DHCP-based Autoconfiguration and Image Update3-10
DHCP Autoconfiguration3-10
DHCP Auto-Image Update3-10
Limitations and Restrictions3-10
Configuring the DHCP Auto Configuration and Image Update Features3-11
Configuring DHCP Autoconfiguration (Only Configuration File)3-11
Configuring DHCP Auto-Image Update (Configuration File and Image)3-12
Configuring the Client3-13
Manually Assigning IP Information3-14
iv
Configuring Protected Mode3-15
Understanding Protected Mode3-15
Configuration Guidelines and Restrictions3-16
Enabling Protected Mode3-16
Checking and Saving the Running Configuration3-17
Modifying the Startup Configuration3-18
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Default Boot Configuration3-18
Automatically Downloading a Configuration File3-18
Specifying the Filename to Read and Write the System Configuration3-18
Booting Manually3-19
Booting a Specific Software Image3-20
Controlling Environment Variables3-21
Scheduling a Reload of the Software Image3-23
Configuring a Scheduled Reload3-23
Displaying Scheduled Reload Information3-24
Enabling Automated CNS Configuration4-6
Enabling the CNS Event Agent4-7
Enabling the Cisco IOS CNS Agent4-9
Enabling an Initial Configuration4-9
Enabling a Partial Configuration4-13
CHAPTER
OL-12189-01
Displaying CNS Configuration4-14
5Managing Switch Stacks5-1
Understanding Switch Stacks5-1
Switch Stack Membership5-3
Stack Master Election and Re-Election5-6
Switch Stack Bridge ID and Router MAC Address5-8
Stack Member Numbers5-8
Stack Member Priority Values5-9
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
v
Contents
Switch Stack Offline Configuration5-9
Effects of Adding a Provisioned Switch to a Switch Stack5-10
Effects of Replacing a Provisioned Switch in a Switch Stack5-11
Effects of Removing a Provisioned Switch from a Switch Stack5-11
Hardware Compatibility and SDM Mismatch Mode in Switch Stacks5-11
Switch Stack Software Compatibility Recommendations5-12
Stack Protocol Version Compatibility5-12
Major Version Number Incompatibility Among Switches5-12
Minor Version Number Incompatibility Among Switches5-12
Understanding Auto-Upgrade and Auto-Advise5-13
Auto-Upgrade and Auto-Advise Example Messages5-14
Incompatible Software and Stack Member Image Upgrades5-16
Switch Stack Configuration Files5-16
Additional Considerations for System-Wide Configuration on Switch Stacks5-17
Switch Stack Management Connectivity5-17
Connectivity to the Switch Stack Through an IP Address5-18
Connectivity to the Switch Stack Through an SSH Session5-18
Connectivity to the Switch Stack Through Console Ports or Ethernet Management Ports5-18
Connectivity to Specific Stack Members5-18
Switch Stack Configuration Scenarios5-19
CHAPTER
Configuring the Switch Stack5-21
Default Switch Stack Configuration5-21
Configuration Guidelines5-21
Enabling Persistent MAC Address5-22
Assigning Stack Member Information5-24
Assigning a Stack Member Number5-24
Setting the Stack Member Priority Value5-25
Provisioning a New Member for a Switch Stack5-25
Accessing the CLI of a Specific Stack Member5-26
Displaying Switch Stack Information5-27
6Administering the Switch6-1
Managing the System Time and Date6-1
Understanding the System Clock 6-1
Understanding Network Time Protocol6-2
Configuring NTP6-3
Default NTP Configuration6-4
Configuring NTP Authentication6-4
Configuring NTP Associations6-5
vi
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Configuring NTP Broadcast Service6-6
Configuring NTP Access Restrictions6-8
Configuring the Source IP Address for NTP Packets6-10
Displaying the NTP Configuration6-11
Configuring Time and Date Manually6-11
Setting the System Clock6-11
Displaying the Time and Date Configuration6-12
Configuring the Time Zone 6-12
Configuring Summer Time (Daylight Saving Time)6-13
Configuring a System Name and Prompt6-14
Default System Name and Prompt Configuration6-15
Configuring a System Name6-15
Understanding DNS6-15
Default DNS Configuration6-16
Setting Up DNS6-16
Displaying the DNS Configuration6-17
Contents
CHAPTER
Creating a Banner6-17
Default Banner Configuration6-17
Configuring a Message-of-the-Day Login Banner6-18
Configuring a Login Banner6-18
Managing the MAC Address Table6-19
Building the Address Table6-20
MAC Addresses and VLANs6-20
MAC Addresses and Switch Stacks6-20
Default MAC Address Table Configuration6-21
Changing the Address Aging Time6-21
Removing Dynamic Address Entries6-22
Configuring MAC Address Notification Traps6-22
Adding and Removing Static Address Entries6-24
Configuring Unicast MAC Address Filtering6-25
Displaying Address Table Entries6-26
Managing the ARP Table6-26
7Configuring Switch-Based Authentication7-1
OL-12189-01
Preventing Unauthorized Access to Your Switch7-1
Protecting Access to Privileged EXEC Commands7-2
Default Password and Privilege Level Configuration7-2
Setting or Changing a Static Enable Password7-3
Protecting Enable and Enable Secret Passwords with Encryption7-3
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
vii
Contents
Disabling Password Recovery7-5
Setting a Telnet Password for a Terminal Line7-6
Configuring Username and Password Pairs7-6
Configuring Multiple Privilege Levels7-7
Default SSL Configuration7-44
SSL Configuration Guidelines7-44
Configuring a CA Trustpoint7-45
Configuring the Secure HTTP Server7-45
Configuring the Secure HTTP Client7-47
Displaying Secure HTTP Server and Client Status7-48
Contents
CHAPTER
CHAPTER
Configuring the Switch for Secure Copy Protocol7-48
Information About Secure Copy7-48
8Configuring SDM Templates8-1
Understanding the SDM Templates8-1
Dual IPv4 and IPv6 SDM Templates8-2
SDM Templates and Switch Stacks8-3
Device Roles9-2
Authentication Process9-3
Authentication Initiation and Message Exchange9-5
Ports in Authorized and Unauthorized States9-7
OL-12189-01
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
ix
Contents
IEEE 802.1x Authentication and Switch Stacks9-8
IEEE 802.1x Host Mode9-8
IEEE 802.1x Accounting9-9
IEEE 802.1x Accounting Attribute-Value Pairs9-9
Using IEEE 802.1x Authentication with VLAN Assignment9-10
Using IEEE 802.1x Authentication with Per-User ACLs9-12
Using IEEE 802.1x Authentication with Guest VLAN9-13
Using IEEE 802.1x Authentication with Restricted VLAN9-14
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass9-15
Using IEEE 802.1x Authentication with Voice VLAN Ports9-16
Using IEEE 802.1x Authentication with Port Security9-17
Using IEEE 802.1x Authentication with Wake-on-LAN9-18
Using IEEE 802.1x Authentication with MAC Authentication Bypass9-18
Network Admission Control Layer 2 IEEE 802.1x Validation9-20
Using Multidomain Authentication9-20
Using Web Authentication9-21
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass9-25
MAC Authentication Bypass9-26
Configuring IEEE 802.1x Authentication9-26
Configuring the Switch-to-RADIUS-Server Communication9-28
Configuring the Host Mode9-29
Configuring Periodic Re-Authentication9-30
Manually Re-Authenticating a Client Connected to a Port9-30
Changing the Quiet Period9-31
Changing the Switch-to-Client Retransmission Time9-31
Setting the Switch-to-Client Frame-Retransmission Number9-32
Setting the Re-Authentication Number9-32
Configuring IEEE 802.1x Accounting9-33
Configuring a Guest VLAN9-34
Configuring a Restricted VLAN9-35
Configuring the Inaccessible Authentication Bypass Feature9-37
Configuring IEEE 802.1x Authentication with WoL9-39
Configuring MAC Authentication Bypass9-40
Configuring NAC Layer 2 IEEE 802.1x Validation9-41
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
x
OL-12189-01
Configuring Web Authentication9-42
Disabling IEEE 802.1x Authentication on the Port9-44
Resetting the IEEE 802.1x Authentication Configuration to the Default Values9-45
Procedures for Configuring Interfaces10-8
Configuring a Range of Interfaces10-9
Configuring and Using Interface Range Macros10-10
Using the Internal Ethernet Management Port10-12
Understanding the Internal Ethernet Management Port10-12
Supported Features on the Ethernet Management Port10-13
Layer 3 Routing Configuration Guidelines10-14
Monitoring the Ethernet Management Port10-14
OL-12189-01
Configuring Ethernet Interfaces10-14
Default Ethernet Interface Configuration10-15
Configuring Interface Speed and Duplex Mode10-16
Speed and Duplex Configuration Guidelines10-16
Setting the Interface Speed and Duplex Parameters10-17
Configuring IEEE 802.3x Flow Control10-18
Configuring Auto-MDIX on an Interface10-19
Adding a Description for an Interface10-20
Configuring Layer 3 Interfaces10-20
Configuring the System MTU10-22
Monitoring and Maintaining the Interfaces10-24
Monitoring Interface Status10-24
Clearing and Resetting Interfaces and Counters10-25
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
VLAN Configuration in VLAN Database Configuration Mode12-7
Saving VLAN Configuration12-7
Default Ethernet VLAN Configuration12-8
Creating or Modifying an Ethernet VLAN12-9
Deleting a VLAN12-10
Assigning Static-Access Ports to a VLAN12-11
xii
Configuring Extended-Range VLANs12-12
Default VLAN Configuration12-12
Extended-Range VLAN Configuration Guidelines12-13
Creating an Extended-Range VLAN12-14
Creating an Extended-Range VLAN with an Internal VLAN ID12-15
Displaying VLANs12-16
Configuring VLAN Trunks12-16
Trunking Overview12-16
Encapsulation Types12-19
IEEE 802.1Q Configuration Considerations12-19
Default Layer 2 Ethernet Interface VLAN Configuration12-20
Configuring an Ethernet Interface as a Trunk Port12-20
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Interaction with Other Features12-20
Configuring a Trunk Port12-21
Defining the Allowed VLANs on a Trunk12-22
Changing the Pruning-Eligible List12-23
Configuring the Native VLAN for Untagged Traffic12-24
Configuring Trunk Ports for Load Sharing12-24
Load Sharing Using STP Port Priorities12-25
Load Sharing Using STP Path Cost12-27
Configuring VMPS12-28
Understanding VMPS12-28
Dynamic-Access Port VLAN Membership12-29
Default VMPS Client Configuration12-30
VMPS Configuration Guidelines12-30
Configuring the VMPS Client12-30
Entering the IP Address of the VMPS12-31
Configuring Dynamic-Access Ports on VMPS Clients12-31
Reconfirming VLAN Memberships12-32
Changing the Reconfirmation Interval12-32
Changing the Retry Count12-32
Monitoring the VMPS12-33
Troubleshooting Dynamic-Access Port VLAN Membership12-33
VMPS Configuration Example12-34
Contents
CHAPTER
OL-12189-01
13Configuring VTP13-1
Understanding VTP13-1
The VTP Domain13-2
VTP Modes13-3
VTP Advertisements13-3
VTP Version 213-4
VTP Pruning13-4
VTP and Switch Stacks13-6
Limitations with Other Features15-9
Configuring and Associating VLANs in a Private VLAN15-10
Configuring a Layer 2 Interface as a Private-VLAN Host Port15-11
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port15-13
Mapping Secondary VLANs to a Primary VLAN Layer 3 VLAN Interface15-14
Monitoring Private VLANs15-15
Contents
CHAPTER
16Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling16-1
STP Overview17-2
Spanning-Tree Topology and BPDUs17-3
Bridge ID, Switch Priority, and Extended System ID17-4
Spanning-Tree Interface States17-5
Blocking State17-6
Listening State17-7
Learning State17-7
Forwarding State17-7
Disabled State17-7
How a Switch or Port Becomes the Root Switch or Root Port17-8
Spanning Tree and Redundant Connectivity17-8
Spanning-Tree Address Management17-9
Accelerated Aging to Retain Connectivity17-9
Spanning-Tree Modes and Protocols17-10
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
xv
Contents
Supported Spanning-Tree Instances17-10
Spanning-Tree Interoperability and Backward Compatibility17-11
STP and IEEE 802.1Q Trunks17-11
VLAN-Bridge Spanning Tree17-11
Spanning Tree and Switch Stacks17-12
Configuring Spanning-Tree Features17-12
Default Spanning-Tree Configuration17-13
Spanning-Tree Configuration Guidelines17-13
Changing the Spanning-Tree Mode.17-15
Disabling Spanning Tree17-16
Configuring the Root Switch17-16
Configuring a Secondary Root Switch17-18
Configuring Port Priority17-18
Configuring Path Cost17-20
Configuring the Switch Priority of a VLAN17-21
Configuring Spanning-Tree Timers17-22
Configuring the Hello Time17-22
Configuring the Forwarding-Delay Time for a VLAN17-23
Configuring the Maximum-Aging Time for a VLAN17-23
Configuring the Transmit Hold-Count 17-24
CHAPTER
Displaying the Spanning-Tree Status17-24
18Configuring MSTP18-1
Understanding MSTP18-2
Multiple Spanning-Tree Regions18-2
IST, CIST, and CST18-3
Operations Within an MST Region18-3
Operations Between MST Regions18-4
IEEE 802.1s Terminology18-5
Hop Count18-5
Boundary Ports18-6
IEEE 802.1s Implementation18-6
Port Role Naming Change18-7
Interoperation Between Legacy and Standard Switches18-7
Detecting Unidirectional Link Failure18-8
MSTP and Switch Stacks18-8
Interoperability with IEEE 802.1D STP18-9
Understanding RSTP18-9
Port Roles and the Active Topology18-9
xvi
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Rapid Convergence18-10
Synchronization of Port Roles18-11
Bridge Protocol Data Unit Format and Processing18-12
Processing Superior BPDU Information18-13
Processing Inferior BPDU Information18-13
Topology Changes18-13
Configuring MSTP Features18-14
Default MSTP Configuration18-15
MSTP Configuration Guidelines18-15
Specifying the MST Region Configuration and Enabling MSTP18-16
Configuring the Root Switch18-17
Configuring a Secondary Root Switch18-19
Configuring Port Priority 18-20
Configuring Path Cost18-21
Configuring the Switch Priority18-22
Configuring the Hello Time18-22
Configuring the Forwarding-Delay Time18-23
Configuring the Maximum-Aging Time18-24
Configuring the Maximum-Hop Count18-24
Specifying the Link Type to Ensure Rapid Transitions18-24
Designating the Neighbor Type18-25
Restarting the Protocol Migration Process18-26
Events that Cause Fast Convergence19-7
Understanding BackboneFast19-7
Understanding EtherChannel Guard19-10
Understanding Root Guard19-10
Understanding Loop Guard19-11
Configuring Optional Spanning-Tree Features19-11
Default Optional Spanning-Tree Configuration19-12
OL-12189-01
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
xvii
Contents
Optional Spanning-Tree Configuration Guidelines19-12
Enabling Port Fast19-12
Enabling BPDU Guard19-13
Enabling BPDU Filtering19-14
Enabling UplinkFast for Use with Redundant Links19-15
Enabling Cross-Stack UplinkFast19-16
Enabling BackboneFast19-16
Enabling EtherChannel Guard19-17
Enabling Root Guard19-18
Enabling Loop Guard19-18
Displaying the Spanning-Tree Status19-19
CHAPTER
CHAPTER
20Configuring Flex Links and the MAC Address-Table Move Update Feature20-1
Understanding Flex Links and the MAC Address-Table Move Update20-1
Flex Links20-1
VLAN Flex Link Load Balancing and Support20-2
MAC Address-Table Move Update20-3
Configuring Flex Links and MAC Address-Table Move Update20-4
Configuration Guidelines20-5
Default Configuration20-5
Configuring Flex Links20-6
Configuring VLAN Load Balancing on Flex Links20-8
Configuring the MAC Address-Table Move Update Feature20-9
Monitoring Flex Links and the MAC Address-Table Move Update Information20-11
21Configuring DHCP Features and IP Source Guard21-1
Understanding DHCP Features21-1
DHCP Server21-2
DHCP Relay Agent21-2
DHCP Snooping21-2
Option-82 Data Insertion21-3
Cisco IOS DHCP Server Database21-6
DHCP Snooping Binding Database21-6
DHCP Snooping and Switch Stacks21-8
xviii
Configuring DHCP Features21-8
Default DHCP Configuration21-8
DHCP Snooping Configuration Guidelines21-9
Configuring the DHCP Server21-10
DHCP Server and Switch Stacks21-10
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Configuring the DHCP Relay Agent 21-11
Specifying the Packet Forwarding Address21-11
Enabling DHCP Snooping and Option 8221-12
Enabling DHCP Snooping on Private VLANs21-14
Enabling the Cisco IOS DHCP Server Database21-14
Enabling the DHCP Snooping Binding Database Agent21-14
Displaying DHCP Snooping Information21-15
Understanding IP Source Guard21-16
Source IP Address Filtering21-16
Source IP and MAC Address Filtering21-17
Configuring IP Source Guard21-17
Default IP Source Guard Configuration21-17
IP Source Guard Configuration Guidelines21-17
Enabling IP Source Guard21-18
Displaying IP Source Guard Information21-19
Contents
CHAPTER
CHAPTER
22Configuring Dynamic ARP Inspection22-1
Understanding Dynamic ARP Inspection22-1
Interface Trust States and Network Security22-3
Rate Limiting of ARP Packets22-4
Relative Priority of ARP ACLs and DHCP Snooping Entries22-4
Logging of Dropped Packets22-5
Configuring Dynamic ARP Inspection22-5
Default Dynamic ARP Inspection Configuration22-5
Dynamic ARP Inspection Configuration Guidelines22-6
Configuring Dynamic ARP Inspection in DHCP Environments22-7
Configuring ARP ACLs for Non-DHCP Environments22-8
Limiting the Rate of Incoming ARP Packets22-10
Performing Validation Checks22-11
Configuring the Log Buffer22-12
IGMP Versions23-3
Joining a Multicast Group23-3
Leaving a Multicast Group23-5
Immediate Leave 23-6
IGMP Configurable-Leave Timer23-6
OL-12189-01
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
xix
Contents
IGMP Report Suppression23-6
IGMP Snooping and Switch Stacks23-7
Configuring IGMP Snooping23-7
Default IGMP Snooping Configuration23-7
Enabling or Disabling IGMP Snooping23-8
Setting the Snooping Method23-9
Configuring a Multicast Router Port23-10
Configuring a Blade Server Statically to Join a Group23-10
Enabling IGMP Immediate Leave23-11
Configuring the IGMP Leave Timer23-12
Configuring TCN-Related Commands23-12
Controlling the Multicast Flooding Time After a TCN Event23-13
Recovering from Flood Mode23-13
Disabling Multicast Flooding During a TCN Event23-14
Configuring the IGMP Snooping Querier23-14
Disabling IGMP Report Suppression23-16
CHAPTER
Displaying IGMP Snooping Information23-16
Understanding Multicast VLAN Registration23-18
Using MVR in a Multicast Television Application23-18
Configuring MVR23-20
Default MVR Configuration23-20
MVR Configuration Guidelines and Limitations23-20
Configuring MVR Global Parameters23-21
Configuring MVR Interfaces23-22
Displaying MVR Information23-24
Configuring IGMP Filtering and Throttling23-24
Default IGMP Filtering and Throttling Configuration23-25
Configuring IGMP Profiles23-25
Applying IGMP Profiles23-27
Setting the Maximum Number of IGMP Groups23-27
Configuring the IGMP Throttling Action23-28
Displaying IGMP Filtering and Throttling Configuration23-29
Understanding Storm Control25-1
Default Storm Control Configuration25-3
Configuring Storm Control and Threshold Levels25-3
Configuring Protected Ports25-5
Default Protected Port Configuration25-5
Protected Port Configuration Guidelines25-6
Configuring a Protected Port25-6
Configuring Port Blocking25-6
Default Port Blocking Configuration25-7
Blocking Flooded Traffic on an Interface25-7
Configuring Port Security25-7
Understanding Port Security25-8
Secure MAC Addresses25-8
Security Violations25-9
Default Port Security Configuration25-10
Port Security Configuration Guidelines25-10
Enabling and Configuring Port Security25-12
Enabling and Configuring Port Security Aging25-16
Port Security and Switch Stacks25-17
Port Security and Private VLANs25-17
OL-12189-01
Displaying Port-Based Traffic Control Settings25-18
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
xxi
Contents
CHAPTER
CHAPTER
26Configuring CDP26-1
Understanding CDP26-1
CDP and Switch Stacks26-2
Configuring CDP26-2
Default CDP Configuration26-2
Configuring the CDP Characteristics26-2
Disabling and Enabling CDP26-3
Disabling and Enabling CDP on an Interface26-4
Monitoring and Maintaining CDP26-5
27Configuring LLDP and LLDP-MED27-1
Understanding LLDP and LLDP-MED27-1
Understanding LLDP27-1
Understanding LLDP-MED27-2
Configuring LLDP and LLDP-MED27-3
Default LLDP Configuration27-3
Configuring LLDP Characteristics27-4
Disabling and Enabling LLDP Globally27-4
Disabling and Enabling LLDP on an Interface27-5
Configuring LLDP-MED TLVs27-6
CHAPTER
CHAPTER
Monitoring and Maintaining LLDP and LLDP-MED27-7
28Configuring UDLD28-1
Understanding UDLD28-1
Modes of Operation28-1
Methods to Detect Unidirectional Links28-2
Configuring UDLD28-3
Default UDLD Configuration28-4
Configuration Guidelines28-4
Enabling UDLD Globally28-5
Enabling UDLD on an Interface28-6
Resetting an Interface Disabled by UDLD28-6
Displaying UDLD Status28-7
29Configuring SPAN and RSPAN29-1
Understanding SPAN and RSPAN29-1
Local SPAN29-2
Remote SPAN29-3
xxii
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
SPAN and RSPAN Concepts and Terminology29-4
SPAN Sessions29-4
Monitored Traffic29-5
Source Ports29-6
Source VLANs29-7
VLAN Filtering29-7
Destination Port29-8
RSPAN VLAN29-9
SPAN and RSPAN Interaction with Other Features29-9
SPAN and RSPAN and Switch Stacks29-10
Configuring SPAN and RSPAN29-10
Default SPAN and RSPAN Configuration29-11
Configuring Local SPAN29-11
SPAN Configuration Guidelines29-11
Creating a Local SPAN Session29-12
Creating a Local SPAN Session and Configuring Incoming Traffic29-14
Specifying VLANs to Filter29-15
Configuring RSPAN29-16
RSPAN Configuration Guidelines29-16
Configuring a VLAN as an RSPAN VLAN29-17
Creating an RSPAN Source Session29-18
Specifying VLANs to Filter29-19
Creating an RSPAN Destination Session29-20
Creating an RSPAN Destination Session and Configuring Incoming Traffic29-21
Contents
CHAPTER
CHAPTER
OL-12189-01
Displaying SPAN and RSPAN Status29-23
30Configuring RMON30-1
Understanding RMON30-1
Configuring RMON30-2
Default RMON Configuration30-3
Configuring RMON Alarms and Events30-3
Collecting Group History Statistics on an Interface30-5
Collecting Group Ethernet Statistics on an Interface30-5
Displaying RMON Status30-6
31Configuring System Message Logging31-1
Understanding System Message Logging31-1
Configuring System Message Logging31-2
System Log Message Format31-2
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
xxiii
Contents
Default System Message Logging Configuration31-4
Disabling Message Logging31-4
Setting the Message Display Destination Device31-5
Synchronizing Log Messages31-6
Enabling and Disabling Time Stamps on Log Messages31-8
Enabling and Disabling Sequence Numbers in Log Messages31-8
Defining the Message Severity Level31-9
Limiting Syslog Messages Sent to the History Table and to SNMP31-10
Enabling the Configuration-Change Logger31-11
Configuring UNIX Syslog Servers31-12
Logging Messages to a UNIX Syslog Daemon31-12
Configuring the UNIX System Logging Facility31-13
Displaying the Logging Configuration31-14
CHAPTER
32Configuring SNMP32-1
Understanding SNMP32-1
SNMP Versions32-2
SNMP Manager Functions32-3
SNMP Agent Functions32-4
SNMP Community Strings32-4
Using SNMP to Access MIB Variables 32-4
SNMP Notifications32-5
SNMP ifIndex MIB Object Values32-5
Configuring SNMP32-6
Default SNMP Configuration32-6
SNMP Configuration Guidelines32-6
Disabling the SNMP Agent32-7
Configuring Community Strings32-8
Configuring SNMP Groups and Users32-9
Configuring SNMP Notifications32-11
Setting the Agent Contact and Location Information32-15
Limiting TFTP Servers Used Through SNMP32-15
SNMP Examples32-16
CHAPTER
xxiv
Displaying SNMP Status32-17
34Configuring Network Security with ACLs34-1
Understanding ACLs34-1
Supported ACLs34-2
Port ACLs34-3
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
OL-12189-01
Router ACLs34-4
VLAN Maps34-5
Handling Fragmented and Unfragmented Traffic34-5
ACLs and Switch Stacks34-6
Configuring IPv4 ACLs34-7
Creating Standard and Extended IPv4 ACLs34-7
Access List Numbers34-8
ACL Logging34-9
Creating a Numbered Standard ACL34-10
Creating a Numbered Extended ACL34-11
Resequencing ACEs in an ACL34-15
Creating Named Standard and Extended ACLs34-15
Using Time Ranges with ACLs34-17
Including Comments in ACLs34-19
Applying an IPv4 ACL to a Terminal Line34-19
Applying an IPv4 ACL to an Interface34-20
Hardware and Software Treatment of IP ACLs34-22
IPv4 ACL Configuration Examples34-22
Numbered ACLs34-24
Extended ACLs34-24
Named ACLs34-25
Time Range Applied to an IP ACL34-25
Commented IP ACL Entries34-25
ACL Logging34-26
Contents
OL-12189-01
Creating Named MAC Extended ACLs34-27
Applying a MAC ACL to a Layer 2 Interface34-28
Configuring VLAN Maps34-29
VLAN Map Configuration Guidelines34-30
Creating a VLAN Map34-31
Examples of ACLs and VLAN Maps34-32
Applying a VLAN Map to a VLAN34-34
Using VLAN Maps in Your Network34-34
Denying Access to a Server on Another VLAN34-34
Using VLAN Maps with Router ACLs34-35
VLAN Maps and Router ACL Configuration Guidelines34-35
Examples of Router ACLs and VLAN Maps Applied to VLANs34-36
ACLs and Switched Packets34-36
ACLs and Bridged Packets34-37
ACLs and Routed Packets34-38
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
Default IPv6 ACL Configuration35-5
Interaction with Other Features and Switches35-5
Creating IPv6 ACLs35-5
Applying an IPv6 ACL to an Interface35-8
Displaying IPv6 ACLs35-9
36Configuring QoS36-1
Understanding QoS36-2
Basic QoS Model36-3
Classification36-5
Classification Based on QoS ACLs36-7
Classification Based on Class Maps and Policy Maps36-7
Policing and Marking36-8
Policing on Physical Ports36-9
Policing on SVIs36-10
Mapping Tables36-12
Queueing and Scheduling Overview36-13
Weighted Tail Drop36-13
SRR Shaping and Sharing36-14
Queueing and Scheduling on Ingress Queues36-15
Queueing and Scheduling on Egress Queues36-17
Packet Modification36-19
xxvi
Configuring Auto-QoS36-20
Generated Auto-QoS Configuration36-21
Effects of Auto-QoS on the Configuration36-25
Auto-QoS Configuration Guidelines36-25
Enabling Auto-QoS for VoIP36-26
Auto-QoS Configuration Example36-27
Displaying Auto-QoS Information36-29
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
QoS ACL Guidelines36-32
Applying QoS on Interfaces36-32
Policing Guidelines36-33
General QoS Guidelines36-33
Enabling QoS Globally36-34
Enabling VLAN-Based QoS on Physical Ports36-34
Configuring Classification Using Port Trust States36-35
Configuring the Trust State on Ports within the QoS Domain36-35
Configuring the CoS Value for an Interface36-37
Configuring a Trusted Boundary to Ensure Port Security36-38
Enabling DSCP Transparency Mode36-39
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain36-40
Configuring a QoS Policy36-42
Classifying Traffic by Using ACLs36-43
Classifying Traffic by Using Class Maps36-46
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps 36-48
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps 36-52
Classifying, Policing, and Marking Traffic by Using Aggregate Policers36-58
Configuring DSCP Maps36-60
Configuring the CoS-to-DSCP Map36-60
Configuring the IP-Precedence-to-DSCP Map36-61
Configuring the Policed-DSCP Map36-62
Configuring the DSCP-to-CoS Map36-63
Configuring the DSCP-to-DSCP-Mutation Map36-64
Configuring Ingress Queue Characteristics36-66
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds36-67
Allocating Buffer Space Between the Ingress Queues36-68
Allocating Bandwidth Between the Ingress Queues36-68
Configuring the Ingress Priority Queue36-69
Configuring Egress Queue Characteristics36-70
Configuration Guidelines36-71
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set36-71
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID36-73
Configuring SRR Shaped Weights on Egress Queues36-75
Contents
OL-12189-01
Cisco Catalyst Switch Module 3110 and 3012 for IBM BladeCenter Software Configuration Guide
xxvii
Contents
Configuring SRR Shared Weights on Egress Queues36-76
Configuring the Egress Expedite Queue36-76
Limiting the Bandwidth on an Egress Interface36-77
Displaying Standard QoS Information36-78
CHAPTER
37Configuring EtherChannels and Link-State Tracking37-1
Understanding EtherChannels37-1
EtherChannel Overview37-2
Port-Channel Interfaces37-4
Port Aggregation Protocol37-5
PAgP Modes37-5
PAgP Interaction with Other Features37-6
Link Aggregation Control Protocol37-6
LACP Modes37-6
LACP Interaction with Other Features37-7
EtherChannel On Mode37-7
Load-Balancing and Forwarding Methods37-7
EtherChannel and Switch Stacks37-9
Enabling Directed Broadcast-to-Physical Broadcast Translation38-16
Forwarding UDP Broadcast Packets and Protocols38-17
Establishing an IP Broadcast Address38-17
Flooding IP Broadcasts38-18