Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7811194=
Text Part Number: 78-11194-03
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOU T
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE
PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONS IBILITY FOR THEIR
APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORT H IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED
“AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCL AIM ALL WARRANTI ES, EXPRESSE D OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR P URPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROF ITS OR LOSS OR DAMAG E TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
AccessPath, AtmDirector, Browse with Me, CCIP, CCSI, CD-PAC, CiscoLink, the Cisco Powered Network logo, Cisco Systems Netw ork ing Academy ,
the Cisco Systems Networking Academy logo, Cisco Unity, Fast Step, Follow Me Browsing, FormShare, FrameShare, IGX, Internet Quotie nt, IP/VC, iQ
Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, MGX, the Networkers logo, ScriptBuilder, ScriptShare, SMARTnet,
TransPath, Voice LAN, Wavelength Router, and WebViewer are trademarks of Cisco Systems, Inc.; Changi ng t he Way We Work, Live, Play, and Learn,
and Discover All That’s Possible are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP,
Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems
logo, Empowering the Internet Generat ion, Ent erprise/ Solver, Ether Channel, EtherSwi tch, Fast Hub, FastSwi tch, Gi gaStack, IOS, IP/T V, LightS tr eam,
MICA, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter,
and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any ot her company. (0110R)
Catalyst 3550 Multilayer Swi tch Softw are Configuration Guide
Audiencexxvii
Purposexxvii
Organizationxxviii
Conventionsxxx
Related Publicationsxxxi
Obtaining Documentationxxxi
World Wide Webxxxi
Documentation CD-ROM xxxi
Ordering Documentationxxxii
Documentat ion Feedbackxxxii
Obtaining Technical Assistancexxxii
Cisco.comxxxiii
Technical Assistance Centerxxxiii
Cisco TAC Web Sitexxxiii
Cisco TAC Escalation Centerxxxiv
CONTENTS
CHAPTER
CHAPTER
1Overview1-1
Features1-1
Management Options1-5
Management Interf ace Options1-5
Advantage s of Us in g CMS and Cluster ing Switches1-6
Network Configuration Examples1-7
Design Concepts1-7
Small to Medium-Sized Network Using Mixed Switches1-11
Large Network Using Only Catalyst 3550 Switches1-13
Multidwelling Network Using Catalyst 3550 Switches1-14
2Using the Command-Line Interface2-1
IOS Command Modes2-1
Getting Help2-3
Abbreviating Commands2-3
Using no and default Forms of Commands2-4
DHCP Client Request Process4-4
Configuring the DHCP Server4-5
Configuring the TFTP Server4-5
Configuring the DNS4-6
Configuring the Relay Device4-6
Obtaining Configuration Files4-7
Example Con fi guration4-8
Manually Assigning IP Information4-10
Checking and Saving the Running Configuration4-10
Modifying the S ta rtup Configurat ion4-12
Default Boot Configuration4-12
Automatically Downloading a Configuration File4-12
Specifying the Filename to Read and Write the System Confi guration4-13
Configuring a Scheduled Reload4-17
Displaying Sched uled Reload Information4-18
CHAPTER
5Clustering Switches5-1
Understanding Switch Clusters5-2
Command Switch Characteristics5-2
Standby Command Switch Characteristics5-3
Candidate and Member Switches Characteristics5-3
Planning a Switch Cluster5-4
Automatic Discovery of Cluster Candidates and Members5-4
Discovery th ro ug h CD P H op s5-5
Discovery through Non-CDP-Capable and Noncluster-Capable Devices5-6
Discovery through Di fferent VLANs5-7
Discovery through the Same Management VLAN5-8
Discovery through Di fferent Management VLANs5-9
Discovery through Routed Ports5-10
Discovery of Newly Installed Switches5-11
HSRP and Standby Command Switches5-12
Virtual IP Addres s es5-13
Automatic Recovery of Cluster Configuration5-13
Considerations for Cluster Standby Groups5-14
IP Addresses5-15
Host Names5-16
Passwords5-16
SNMP Community Strings5-16
TACACS+5-17
Access Modes in CMS5-17
LRE Profiles5-17
Availability of Switch-Specific Features i n Switch Clusters5-18
vi
Creating a Switch Cluster5-18
Enabling a Command Switch5-19
Adding Member Switches5-20
Creating a Cluster Standby Group5-22
Verifying a Switch Cl uster5-24
Using the CLI to Manage Switch Clusters5-25
Catalyst1900 and Catalyst2820 CLI Considerations5-25
Preventing Unauthorized Access to Your Switch6-1
Protecting Access to Privileged EXEC Commands6-2
Default Password and Privilege Level Configuration6-3
Setting or Changing a Static Enable Password6-3
Protecting Enable and Enable Secret Passwords with Encryption6-4
Disabling Password Recovery6-5
Setting a Telnet Password for a Terminal Line6-6
Configuring User name and Password Pairs6-7
Configuring Multiple Privilege Levels6-8
Setting the Priv ilege Level for a Command6-8
Changing the Default Privilege Level for Lines6-9
Logging into and Exiting a Privilege Level6-10
Default RADIUS Configu ration6-20
Identifying the RADI US Server Host 6-20
Configuring RADI US Login Authentication6-23
Defining AAA Server Groups6-24
Configuring RADIUS Authorization for User Privil eged Access and Network Services6-26
Starting RADIUS Accounting6-27
Configuring Set tings for All RADIUS Servers6-28
Configuring the Switch to Use Vendor-Specific RADIUS Attributes6-28
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication6-29
Displaying the RADIUS Configuration6-30
Configuring the Switch for Local Authentication and Authorization6-31
Understanding the System Clock 6-32
Understanding Network Time Protocol6-32
Configuring NTP6-34
Default NTP Config uration6-35
Configuring NTP Authentication6-35
Configuring NTP Associations6-36
Configuring NTP Broadcast Service6-37
Configuring NTP Ac cess Restrictions6-38
Configuring the Source IP Address for NTP Packets6-40
Displaying the NTP C onfiguration6-41
Configuring Ti me and Date Manually6-41
Setting the System Clock6-42
Displaying the Time and Date Configuration6-42
Configuring the Time Zone 6-43
Configuring Summer Time (Daylight Saving Time)6-44
Configuring a System Name and Prompt6-46
Default System Name and Prompt Configuration6-46
Configuring a System Name6-46
Configuring a System Prompt6-47
Understanding DNS6-47
Default DNS Configuration6-48
Setting Up DNS6-48
Displaying the DNS Configuration6-49
Creating a Banner6-49
Default Banner Con figuration6-49
Configuring a Message-of-the-Day Login Banner6-50
Configuring a Login Banner6-51
Managing the MAC Address Table6-51
Building the Address Table6-52
MAC Addresses and VLANs6-52
Default MAC Address Tab le Configuration6-53
Changing the Addres s Aging Time6-53
Removing Dynamic Address Entries6-54
Configuring MAC Address Notification Traps6-54
Adding and Removing Static Address Entries6-56
Displaying Addre ss Table Entries6-57
viii
Optimizing System Resources for User-Selected Features6-57
Device Roles7-2
Authentication Initiation and Message Exchange7-3
Ports in Authorized and Unauthorized States7-4
Supported Topologies7-4
Configuring 802.1X Authentication7-5
Default 802.1X Configuration7-6
802.1X Configur ation Guidelines7-7
Enabling 802.1X Authentication7-8
Configuring th e Switch-to-RADIUS-Server Communication7-9
Enabling Periodic Re-Authentication7-10
Manually Re-Authenticating a Client Connected to a Port7-11
Changing the Quiet Period7-11
Changing the Switch-to-Client Retransmission Time7-12
Setting the Switch-to-Client Frame-Retransmission Number7-13
Enabling Multiple Hosts7-13
Resetting the 802.1X Configuration to the Default Values7-14
CHAPTER
Displaying 802.1X Statistics and Status7-14
8Configuring Interface Characteristics8-1
Understanding Interface Types8-1
Port-Based VLANs8-2
Switch Ports8-2
Access Ports8-2
Trunk Ports8-3
EtherChannel Por t Groups8-3
Switch Virtual Interfaces8-4
Routed Ports8-4
Connecting Interfaces8-5
Using the Interface Command8-6
Procedures for Configuring Interfaces8-7
Configuring a Range of Interfaces8-9
Configuring and Using Interface Range Macros8-11
Configuring IEEE 802.3X Flow Control8-16
Adding a Descripti on for an Interface8-17
Monitoring and Maintaining the Layer 2 Interface8-18
Monitoring Interface and Controller Status8-18
Clearing and Reset ting Interfaces and Counters8-20
Shutting Down and Restarting the Interface8-21
Configuring Layer 3 Interfaces8-22
CHAPTER
9Creating and Maintaining VLANs9-1
Understanding VLANs9-1
Number of Supported VLANs9-2
VLAN Port Membership Modes9-3
Using the VLAN Trunki ng Protocol9-3
The VTP Domain and VTP Modes9-4
VTP Advertisements9-5
VTP Version 29-6
VTP Pruning9-6
Configuring VTP9-8
Default VTP Confi guration9-8
VTP Configuration Guidelines9-8
Configuring a VTP Server9-10
Configuring a VTP Client9-11
Disabling VTP (VTP Transparent Mode)9-11
Enabling VTP Version 29-12
Enabling VTP Pruning9-13
Monitoring VTP9-13
VLANs in the VTP Database9-15
Token Ring VLANs9-15
Default VLAN Configuration9-15
VLAN Configuration Guidelines9-16
Configuring VLANs in the VTP Database9-17
Adding an Ethernet VLAN9-17
Modifying an Ethernet VLAN9-18
Deleting a VLAN from th e Database9-18
Assigning St at ic-Access Port s to a VLAN9-19
Displaying VLANs in the VTP Database9-21
802.1Q Configura tion Considerations9-24
Default Layer 2 Ethernet Inte rfa c e VL A N Co nf ig ur ation9-24
Configuring an Ethernet Interface as a Trunk Port9-25
Configuring a Trunk Port9-25
Defining the Allo w e d V LA N s on a Tr un k9-27
Changing the Pruning-Eligible List9-28
Configuring the Native VLAN for Untagged Traffi c9-29
Load Sharing Using STP9-29
Load Sharing Using STP Port Priorities9-30
Configuring STP Port Priorities and Load Sharing9-30
Load Sharing Using STP Path Cost9-32
Configuring STP Path Costs and Load Sharing9-32
Understanding VMPS9-33
Dynamic Port VLAN Membership9-34
VMPS Databa se Co nfiguration Fi le9-34
VMPS Configuration Guidelines9-36
Default VMPS Configuration9-37
Configuring an I nterface as a Layer 2 Dynamic Access Port9-37
Entering the IP Address of the VMPS9-37
Configuring Dynamic Access Ports on VMPS Clients9-38
Reconfirming VLAN Memberships9-39
Changing the Reconfirmation Interval9-39
Changing the Retry Count9-39
Administering and Monitoring the VMPS9-40
Troubleshooting Dynamic Port VLAN Membership9-40
Dynamic Port VLAN Membershi p Configuration Example9-40
Contents
CHAPTER
78-11194-03
10Configuring STP10-1
Understanding Basic STP Features10-1
Supported STP Instances10-2
STP Overview10-2
Bridge ID, Switch Priority, and Extended System ID10-3
Election of the Root Switch10-3
Bridge Protocol Data Units10-4
STP Timers10-5
Creating the STP Top ology10-5
STP Interface States10-6
Default STP Confi guration10-21
Disabling STP10-22
Configuring the Root Switch10-22
Configuring a Sec ondary Root Switch10-24
Configuring STP Port Priority10-26
Configuring STP Path Cost10-27
Configuring the Switch Priority of a VLAN10-28
Configuring the Hello Time10-29
Configuring th e Forwarding-Delay Time for a VLAN10-29
Configuring th e Maximum-Aging Time for a VLAN10-30
Configuring STP for Use in a Cascaded Stack10-30
Displaying STP Status10-31
Configuring Advanced STP Features10-32
Configuring Port Fast10-32
Configuring BPDU Gu ard10-33
Configuring Upl inkFast for Use with Redundant Links10-34
Configuring Cross-Stack UplinkFast10-35
Configuring BackboneFast10-36
Joining a Multicast Group11-2
Leaving a Multicast Group11-4
Immediate-Leave Processing11-4
Configuring IGMP Snooping11-5
Default IGMP Snoo ping Configuration11-5
Enabling or Disabling IGMP Snooping11-5
Setting the Snoopi ng Method11-6
Configuring a Multicast Router Port11-7
Configuring a Host Statically to Join a Group11-8
SNMP Versions18-2
SNMP Manager Functions18-2
SNMP Agent Fu nc ti on s18-3
SNMP Community Strings18-3
Using SNMP to Access MIB Variables 18-3
Configuring SNMP18-4
Default SNMP Configuration18-4
Disabling the SNMP Agent18-5
Configuring Commun ity Strings18-5
Configuring Trap Managers and Enabling Traps18-7
Setting the Agent Co ntact and Location Information18-9
Limiting TFTP Servers Used Through SNMP18-9
SNMP Exampl es18-10
Displaying SNMP Status18-10
19Configuring Network Security with ACLs19-1
Understanding ACLs19-1
Supported ACLs19-2
Router ACLs19-2
VLAN Maps19-3
Handling Fragmented and Unfragmented Traffic19-4
Configuring Router ACLs19-5
Hardware and Software Handling of Router ACLs19-5
Unsupported Features19-6
Creating Standard and Extended IP ACLs19-6
Access List Numbers19-7
Creating a Numbered Standard ACL19-8
Creating a Numbered Extended ACL19-9
Creating Named Standard and Extended ACLs19-14
Applying Time Ranges to ACLs19-15
Including Comments About Entries in ACLs19-18
Applying the ACL to an Int erface or Terminal Line19-18
Displaying ACLs and Access Groups19-20
ACL Configuration Examples19-22
Configuring the Trust State on Ports within the QoS Domain20-22
Configuring the CoS Value for an Interface20-24
Configuring th e DSCP Trust State on a Port Bordering Another QoS Domain20-25
Configuring a QoS Policy20-26
Classifying Tr affic by Using ACLs20-27
Classifying Tr affic by Using Class Maps20-30
Classifying, Policing, and Marking Traffic by Using Policy Maps 20-32
Classifying, Policing, and Marking Traffic by Using Aggregate Policers20-37
Configuring DSCP Maps20-39
Configuring the CoS-to-DSCP Map20-39
Configuring the IP-Precedence-to-DSCP Map20-40
Configuring the Policed-DSCP Map20-41
Configuring the DSCP-to-CoS Map20-42
Configuring th e DSCP-to-DSCP-Mutation Map20-43
Configuring Egress Queues on Gigabit-Capable Ethernet Ports20-44
Mapping CoS Values to Select Egress Queues20-45
Configuring the Egress Queue Size Ratios20-46
Configuring Tai l-Drop Threshold Percentages20-47
Configuring WRED Drop Thresholds Percentages20-48
Configuring the Egress Expedite Queue20-50
Allocating Bandwidth among Egress Queues20-50
Configuring Egress Queues on 10/100 Ethernet Ports20-51
Mapping CoS Values to Select Egress Queues20-52
Configuring th e Mi nimum-Reserve Levels20-53
Configuring the Egress Expedite Queue20-54
Allocating Bandwidth among Egress Queues20-54
QoS Configuration for the Common Wiring Closet20-57
QoS Configuration for the Intelligent Wiring Closet20-58
QoS Configuration for the Distribution Layer20-59
21Configuring EtherChannel21-1
Understanding EtherChannel21-1
Understanding Po rt-Channel Interfaces21-2
Understanding th e Port Aggregation Protocol21-3
PAgP Modes21-4
Physical Learners and Aggregate-Port Learners21-5
PAgP Interaction with Other Features21-5
Configuring Ci sco Express Forwarding22-53
Configuring the Number of Equal-Cost Routing Paths22-54
Configuring Static Routes22-55
Specifying Default Routes22-56
Specifying a Default Network22-56
Redistributing Routing Information22-57
Filtering Rou tin g Info r m at ion22-61
Setting Passive Interfaces22-61
Controlling Advertising and Processing in Routing Updates22-62
Filtering Sources of Routing Information22-62
Managing Authentication Keys22-63
Monitoring and Maintaining the IP Network22-64
23Configuring HSRP23-1
Understanding HSRP23-1
Configuring HSRP23-3
Default HSRP Configuration23-4
Enabling HSRP23-4
Configuring HSRP Group Attributes23-6
Configuring HSRP Priority23-6
Configuring HSRP Authentication and Timers23-8
Configuring HSRP Groups and Clustering23-9
Auto-RP and BSR Configuration Guidelines24-15
Configuring Basic Multicast Routing24-15
Configuring a Rendezvous Point24-17
Manually Assigning an RP to Multicast Groups24-17
Configuring Auto-RP24-18
Configuring PI Mv2 BSR24-22
Using Auto-RP and a BSR24-27
Monitoring the RP Mapping Information24-27
Troubleshooting PIMv1 and PIMv2 Interoperability Problems24-28
Configuring Adva nced PIM Features24-28
Understanding PIM Shared Tree and Source Tree24-28
Delaying the Use of PIM Shortest-Path Tree24-29
Modifying the PIM Router-Query Message Interval24-30
Configuring Opt ional IGMP Features24-31
Default IGMP Configuration24-31
Changing the IGMP Version24-32
Changing the IGMP Query Timeout for IGMPv224-32
Changing the Maximum Que ry Response Time for IGMPv224-33
Configuring the Multilayer Switch as a Member of a Group24-34
Controlling Access to IP Multicast Groups24-35
Modifying the IGMP Host-Query Message Interval24-36
Configuring the Multilayer Switch as a Statically Connected Member24-36
Configuring DVMRP I nteroperability24-44
Controlling Unicast Route Advertisements24-44
Configuring a DVMRP Tu nnel24-46
Advertising Network 0.0.0.0 to DVMRP Neighbors24-48
Responding to mrinfo Requests24-49
Configuring a Def ault MSDP Peer25-4
Caching Source-Active State25-6
Requesting Sourc e Information from an MSDP Peer25-8
Controlling Source Information that Your Switch Originates25-8
Redistributing Sources25-9
Filtering Sou rc e- A ctive Request M es s ag e s25-11
Controlling Source Information that Your Switch Forwards25-12
Using a Filter25-12
Using TTL to Limit the Multicast Data Sent in SA Messages25-14
Controlling Source Information that Your Switch Receives25-14
Configuring an MSDP Mes h Group25-16
Shutting Down an MSDP Peer25-16
Including a Bordering PIM Dense-Mode Region in MSDP25-17
Configuring an Originating Address other than the RP Address25-18
Default Fallback Bridging Configuration26-3
Creating a Bridge Group26-4
Preventing the Forwarding of Dynamically Learned Stations26-5
Configuring the Bridge Table Aging Time26-6
Filtering Fram e s by a Sp e cific MAC Addre ss26-6
Adjusting Spanning-Tree Parameters26-7
Changing the Switch Priority26-8
Changing the Interface Priority26-8
Assigning a Pa th Co st26-9
Adjusting BPDU Intervals26-10
Disabling the Spa nning Tree on an Interface26-12
Monitoring and Maintaining the Network26-12
27Troubleshooting27-1
Using Recovery Procedures27-1
Recovering from Corrupted Software27-2
Recovering from a Lost or Forgotten Password27-3
Password Recovery with Password Recovery Enable d27-3
Creating a Configuration File By Using a Text EditorB-10
Copying Configuration Files By Using TFTPB-10
Preparing to Download or Upload a Configuration File By Using TFTPB-10
Downloading the Configuration File By Using TFTPB-11
Uploading the Configuration File By Using TFTPB-12
Copying Configuration Files By Using FTPB-12
Preparing to Download or Upload a Configuration File By Using FTPB-13
Downloading a Configuration File By Using FTPB-13
Uploading a Confi guration File By Using FTPB-15
Copying Configuration Files By Using RCPB-16
Preparing to Download or Upload a Configuration File By Using RCPB-16
Downloading a Configuration File By Using RCPB-17
Uploading a Confi guration File By Using RCPB-18
Clearing Configuration InformationB-19
Clearing the St a rtu p Co nfiguration Fi leB-19
Deleting a Stored Configuration FileB-19
Contents
APPENDIX
Working with So ft w a re Ima g esB-19
Image Location on the SwitchB-20
tar File Format of Images on a Server or Cisco.comB-20
Copying Image Files By Using TFTPB-21
Preparing to Downl oad or Upload an Image File By Using TFTPB-22
Downloading an Image File By Using TFTPB-22
Uploading an Image Fi le By Using TFTPB-24
Copying Image Files By Using FTPB-25
Preparing to Downl oad or Upload an Image File By Using FTPB-25
Downloading an Image File By Using FTPB-26
Uploading an Image Fi le By Using FTPB-28
Copying Image Files By Using RCPB-29
Preparing to Downl oad or Upload an Image File By Using RCPB-29
Downloading an Image File By Using RCPB-30
Uploading an Image File By Using RCPB-32
CUnsupported CLI CommandsC-1
Access Control ListsC-1
Unsupported Privileged EXEC CommandsC-1
78-11194-03
ARP CommandsC-1
Unsupported Global Configuration CommandsC-1
Unsupported Interface Configuration CommandsC-1
This guide is for the network ing profe ssional man aging the Ca talyst 355 0 switch, he reafter referred t o
as the switch or the multilayer switch. Before using this guide, you should have experience working with
the Cisco IOS and be familiar with the concepts and term inolo g y of Et hernet and local area networking.
This guide provides the information you need to configure Layer 2 and Layer 3 software features on your
switch. The Catalyst 3550 switch is supported by either th e standard multilayer so ftware image ( SMI)
or the enhanced multilayer software image (EMI). The EMI provides a richer set of enterprise-class
features, including hardware-based IP unicast and multicast routing, inter-VLAN routing, routed access
control lists (ACL s), and the Hot Standby Router Protocol (HSRP). All Catalyst 3550 Gigabit Ethernet
switches are shipped with the EMI pre-installed. Catalyst 3550 Fast Ethernet switches are shipped with
either the SMI or the E MI pre-installed . After initial deployment, you can order the En hanced Multilay er
Software Image Upg rad e kit to u pgrad e Ca talyst 3550 Fa st E therne t sw it ches from ru nning the SMI t o
the EMI.
This guide provides procedures for using the commands that have been created or changed for use with
the Catalyst 3550 switch. It does not provide detailed information about these commands. For detailed
information about t hese co mman ds, refe r to the C atalyst 3550 Multilayer Switch Command Reference
for this release. For information about the standard IOS Release 12.1 commands, refer to the IOS
documentation set available from the Cisco.com home page at Service and Support > Technical Documents. On the Cisco Product Documenta tio n hom e page , sel ect Release 12.1 from the Cisco IOS
Software drop-do wn li st.
This guide also inc lude s an ov er vie w of the C lus ter Man agem e nt Suit e ( CM S) w eb- ba sed, swit ch
management interface , which helps yo u create an d manage c lusters of switches . This guide doe s not
provide field-level descriptions of the CMS windows nor does it provide the procedures for configuring
switches and switch clus ters f rom CMS. For all CMS windo w d escript ion s and proc edur es, refe r to th e
CMS online help, which is integrated with the software image.
This guide does not describe system message s you might enc ounter or how to in stall your switch. For
more information , refe r to the Catalyst 3550 Multilayer Switch System Message Guide for thi s r ele ase
and to the Catalyst 3550 Multilayer Switch Hardware Installation Guide.
Chapter 1, “Overview,” lists the software features of this relea se and pro vides exa mples of how the
switch can be deployed in a network.
Chapter 2 , “Using the Command-Line Int erface,” describes how to access th e co mm an d mo des, use the
command-line interface (CLI), and describes CLI messages that you might receive. It also describes how
to get help, abbreviate commands, use no and default forms of commands, use c om mand hist ory a nd
editing features, and how to searc h and fil ter the output of show and more commands .
Chapter 3, “Getting Started with CMS,” describes the Cluster Ma nagement Suite (CMS) w eb-based,
switch management interfa ce. For inform ation on con figuring you r web brow ser and acce ssing CMS,
refer to the release notes. For fi eld-level descriptions of all CMS windows and procedures for usi ng the
CMS windows, refer to the online help.
Chapter 4, “Assigning the Switch IP Address and Default Gateway,” describes how to create the initial
switch configuration (for example, assign the switch IP address and default gateway information) by
using a variety of automatic and manua l methods. It also describes how to modify the switch start up
configuration.
Chapter 5, “Clustering Switches,” describes swi tch clus ters and the consid eratio ns for cr eating an d
maintaining them. The online help provides the CMS procedures for configuring switch clusters.
Configuring switch clu sters i s m ost easi ly p er forme d thro ugh CMS; the refo re, CL I pro cedur es a re n ot
provided. Cluster commands are described in the Catalyst 3550 Multilayer Switch Command Refer e n ce.
Preface
Chapter 6, “Administering the Switch,” describes how to perform one -time ope rations to administer
your switch. It describes how to prevent unaut horiz ed access to your sw itch through t he use of
passwords, privilege leve ls, the Terminal Access Controller Acce ss Control Sys tem Plus (TACACS+),
and the Remote Authentication Dia l -In User Ser vi ce ( RADI US). I t also d escrib es ho w to set th e sy stem
date and time, system name an d prompt, cr eate a logi n banne r, how to manage the MAC addres s table,
and how to opt imi ze sy st em r eso urce s f or user-sel ect ed f eat ures .
Chapter 7, “ Configur ing 802.1X Port-Base d Authent ication, ” desc ribes how to conf igure 802.1X
port-based authentication to prevent unauthori ze d devices (clients) from gaini ng access to the network.
As LANs exten d to ho tel s, air port s, an d cor por a te lo bbi es, i nsecu re envi r onmen ts c ould be c re at ed.
Chapter 8, “Configuring Interface Characteristics,” defines the types of Layer 2 and Layer 3 interfaces
on the switch. It describes the interface command and p rovi des pr oc ed ures for conf i guri ng phy sica l
interfaces.
Chapter 9, “Creating and Maintaining VLANs,” describes how to create and maintain VLANs. It
includes information about VLAN modes, the VLAN Trunking Protocol (VTP) database, and the VLAN
Membership Policy Server (VMPS).
Chapter 10, “Conf igur ing ST P,” describes how to configure basic and ad vance d spanni ng -tree fe ature s.
Chapter 11, “Configur ing IG MP Snoopi n g and M VR,” describes how to configure Layer 2 Internet
Group Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR),
a local IGMP snooping feature available on the switch, and how to use IGMP filtering to control
multicast group membership.
Chapter 12, “Configuring Port-Based Traffic Control,” describes how to reduce traffic storms by setting
broadcast, multicas t, and uni cast storm- control t hresho ld levels; ho w to protec t ports from rece iving
traffic from other ports on a switch; how to block unk nown broa dcast an d unicast tr affic; and how to
configure port securi ty using sec ure MAC addresses.
xxviii
Chapter 13, “C onfi guri ng CDP,” describes how to configure Cisc o Di scove ry Prot ocol ( CD P) on your
Chapter 14, “C onfi gu ring UD LD,” describes how to configure the UniDirectional Link Detection
(UDLD) feature. UDLD enables devices connected through fiber-optic or twisted-pair Ethernet cables
to monitor the physical configuration of the cables and detect when a unidirectional link exists.
Chapter 15, “Con figu ri ng SPAN,” describes how to configure Switch Port Analyzer (SPAN), which
selects network tr aff ic for analys is by a networ k analyz er such as a SwitchPr obe dev ice or othe r Remote
Monitoring (RMO N) p rob e. SPAN mirrors traffic received or se nt (or bo t h) on a sou rce po rt, or tra ffic
received on one or more sourc e ports or sour ce VLANs, to a destinatio n port.
Chapter 16, “C onfi guri ng RMO N,” desc ribe s h ow to c onf igur e re mote m on itori ng (RM O N). The
RMON feature, which is used with the Simple Network Management Protocol (SNMP) agent in the
switch, means tha t yo u c an m on ito r al l the tr affic flow ing am on g swit ches on a ll conn ec ted LAN
segments.
Chapter 17, “Configu ring System Me ssage Loggi ng,” de scribe s how to config ure sy stem m essage
logging. It describes the mes sage for mat, how to change th e message display desti nation dev ice, limi t
the type of messages sent, con figur e UN IX ser ve r syslo g daem on and de fine the UNIX syst em l oggi ng
facility, and timestamp messages.
Chapter 18, “C onfi guri ng SNMP,” describes how to config ure the Sim ple Ne two rk Ma nage ment
Protocol (SNMP). It describes how to configure community strings, enable trap managers and traps, set
the agent contact and location information, and how to limit TFTP servers used through SNMP.
Chapter 19, “Configu ring Net work Sec urity wi th ACLs,” descr ibes how to c on figur e ne twork se cu rity
on your switch using two types of access control lists (ACLs), router ACLs and VLAN maps. It describes
how to apply ACLs to interfaces and provides examples.
Chapter 20, “C onfi gu ring QoS,” describes how to configure quality of service (QoS) on your switch.
With this feature, you can provide prefe rentia l treatm ent to certa in type s traffic.
Chapter 21, “Configuring EtherChannel,” describes how to bundle a set of individual ports into a single
logical link on Layer 2 and Layer 3 interfaces.
Chapter 22, “Configuring IP Unicast Routing,” describes how to configuring IP unicast routing on your
switch, including con fig uri ng IP ad dressi ng fea ture s, Ro utin g Inform a tion Pr otoc ol ( RIP) , Int erior
Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF) protocol, and Enhanced IGRP
(EIGRP). To use this feature, you must have the enhanced multilayer software image installed on your
switch.
Chapter 23, “Configuring HSRP,” describes how to use Hot Standby Router Protocol (HSRP) to provide
routing redundancy for routing IP traffic without depending on the availability of any single router. To
use this feature, you must hav e the enha nced mul tilaye r software image i nstalle d on your swit ch.
Chapter 24, “Configu ring IP Mul ticast Rou ting,” how to configuring IP multicast routing. It describes
how to use an d confi gu re t he Int erne t G r oup Man ag emen t Pro t ocol (I GMP) , Proto co l-Ind ep en dent
Multicast (PIM) protocol, Cisco Group Management Protocol (CGMP) server functionality, and how to
inter-operate between PIM and Distance Vector Multicast Routing Protocol (DVMRP) domains. To use
this feature, you must have the enhanced multilayer software image installed on your switch.
Chapter 25, “Configuring MSDP,” describes how to configure the Multicast Source Discovery Protocol
(MSDP), which is a mechanism to connect multiple PIM sparse-mode domains. To use this feature, you
must have the enhanced multilayer software image installed on your switch.
78-11194-03
Chapter 26, “Configu ring Fallbac k Bridging, ” descr ibe s ho w t o confi gu re f all bac k b ridg ing o n you r
switch. With fallback bridging, you can br idge non-I P protocols be tween VL AN bridge domains an d
routed ports. T o use t his feature, you must have the e nhanced multilayer softwa re image installed on your
switch
Chapter 27, “Troubleshooting,” describes how to identify and resolve software proble ms related t o the
Appendix A, “Supported MIBs,” lists the supported MIBs for this release and how t o use FT P to acc ess
the MIB files.
Appendix B, “Working with the IOS File System, Configuration Files, and Software Images,” describes
how to manipulate the Flash file system , how to copy con figurat ion file s, and how to arc hive (up load
and download) software i mages.
Appendix C, “U nsup port ed CL I Comma nds ,” lists the unsupported command-line interface (CLI)
commands that ar e displ aye d when yo u e nte r the qu esti on mar k ( ? ) at th e switc h pro mpt. T he
unsupported commands are listed by software feature and command mode.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use th ese con vent ions:
Preface
• Commands and keyw or ds ar e in bo ldface text.
• Arguments for which you supply val ues are in italic.
• Square brackets ([ ]) mean optional elements.
• Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
Interactive ex am ples us e thes e conve ntions :
• Terminal sessions and system displays are in screen font.
• Information you ent er is in b oldface sc reen f ont .
• Nonprinting charac ters, such as passwor ds or tabs, ar e in angle bracke ts (< >).
Notes, cautions, and timesavers use these conventions and symbols:
NoteMeans reader take note. Notes contain he lpful sugg esti on s o r ref ere nces to m ate ria ls n ot c onta ine d
in this manual.
CautionMeans read er be careful. In this situation, you might do something that could result equipment
damage or loss of data.
TimesaverMeans the followin g will help you solv e a problem. The tips informa tion might not be
troubleshooting or e ven an a ction , but co uld be usefu l inf orm ati on.