Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-23389-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)
Obtaining Documentation, Obtaining Support, and Security Guidelinesxxix
CHAPTER
1Overview1-1
Features1-1
Ease-of-Deployment and Ease-of-Use Features1-1
Performance Features1-2
Management Options1-3
Manageability Features1-4
Availability and Redundancy Features1-5
VLAN Features1-5
Security Features1-6
QoS and CoS Features1-7
Power over Ethernet Features (WS-C2928-24LT-C only)1-7
Monitoring Features1-8
Default Settings After Initial Switch Configuration1-8
Network Configuration Examples1-11
Design Concepts for Using the Switch1-11
Small to Medium-Sized Network Using Catalyst 2928 Switches1-14
Campus Network Using Catalyst 2928 Switches1-15
Where to Go Next1-16
CHAPTER
OL-23389-01
2Using the Command-Line Interface2-1
Understanding Command Modes2-1
Understanding the Help System2-3
Understanding Abbreviated Commands2-3
Understanding no and default Forms of Commands2-4
Understanding CLI Error Messages2-4
Using Configuration Logging2-4
Catalyst 2928 Switch Software Configuration Guide
iii
Contents
Using Command History2-5
Changing the Command History Buffer Size2-5
Recalling Commands2-6
Disabling the Command History Feature2-6
Using Editing Features2-6
Enabling and Disabling Editing Features2-6
Editing Commands through Keystrokes2-7
Editing Command Lines that Wrap2-8
Searching and Filtering Output of show and more Commands2-9
Accessing the CLI2-9
Accessing the CLI through a Console Connection or through Telnet2-9
CHAPTER
3Assigning the Switch IP Address and Default Gateway3-1
Understanding DHCP-based Autoconfiguration and Image Update3-4
DHCP Autoconfiguration3-5
DHCP Auto-Image Update3-5
Limitations and Restrictions3-5
Configuring DHCP-Based Autoconfiguration3-6
DHCP Server Configuration Guidelines3-6
Configuring the TFTP Server3-7
Configuring the DNS3-7
Configuring the Relay Device3-7
Obtaining Configuration Files3-8
Example Configuration3-9
Configuring the DHCP Auto Configuration and Image Update Features3-11
Configuring DHCP Autoconfiguration (Only Configuration File)3-11
Configuring DHCP Auto-Image Update (Configuration File and Image)3-12
Configuring the Client3-13
Manually Assigning IP Information3-14
iv
Checking and Saving the Running Configuration3-14
Modifying the Startup Configuration3-15
Default Boot Configuration3-16
Automatically Downloading a Configuration File3-16
Specifying the Filename to Read and Write the System Configuration3-16
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Booting Manually3-17
Booting a Specific Software Image3-18
Controlling Environment Variables3-18
Scheduling a Reload of the Software Image3-20
Configuring a Scheduled Reload3-20
Displaying Scheduled Reload Information3-21
Enabling Automated CNS Configuration4-6
Enabling the CNS Event Agent4-7
Enabling the Cisco IOS CNS Agent4-8
Enabling an Initial Configuration4-9
Enabling a Partial Configuration4-11
CHAPTER
OL-23389-01
Displaying CNS Configuration4-12
5Clustering Switches5-1
Understanding Switch Clusters5-1
Cluster Command Switch Characteristics5-2
Standby Cluster Command Switch Characteristics5-3
Candidate Switch and Cluster Member Switch Characteristics5-3
Planning a Switch Cluster5-4
Automatic Discovery of Cluster Candidates and Members5-4
Discovery Through CDP Hops5-4
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices5-5
Discovery Through Different VLANs5-6
Catalyst 2928 Switch Software Configuration Guide
v
Contents
Discovery Through Different Management VLANs5-7
Discovery of Newly Installed Switches5-8
HSRP and Standby Cluster Command Switches5-9
Virtual IP Addresses5-10
Other Considerations for Cluster Standby Groups5-10
Automatic Recovery of Cluster Configuration5-11
IP Addresses5-12
Hostnames5-12
Passwords5-12
SNMP Community Strings5-13
TACACS+ and RADIUS5-13
LRE Profiles 5-13
Using the CLI to Manage Switch Clusters5-13
Catalyst 1900 and Catalyst 2820 CLI Considerations5-14
Understanding the System Clock 7-1
Understanding Network Time Protocol7-2
Configuring NTP7-4
Default NTP Configuration7-4
Configuring NTP Authentication7-4
Configuring NTP Associations7-5
Configuring NTP Broadcast Service7-6
Configuring NTP Access Restrictions7-8
Configuring the Source IP Address for NTP Packets7-10
Displaying the NTP Configuration7-11
Configuring Time and Date Manually7-11
Setting the System Clock7-11
Displaying the Time and Date Configuration7-12
vi
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Configuring the Time Zone 7-12
Configuring Summer Time (Daylight Saving Time)7-13
Configuring a System Name and Prompt7-14
Default System Name and Prompt Configuration7-15
Configuring a System Name7-15
Understanding DNS7-15
Default DNS Configuration7-16
Setting Up DNS7-16
Displaying the DNS Configuration7-17
Creating a Banner7-17
Default Banner Configuration7-17
Configuring a Message-of-the-Day Login Banner7-17
Configuring a Login Banner7-18
Managing the MAC Address Table7-19
Building the Address Table7-20
MAC Addresses and VLANs7-20
Default MAC Address Table Configuration7-20
Changing the Address Aging Time7-20
Removing Dynamic Address Entries7-21
Configuring MAC Address Notification Traps7-21
Adding and Removing Static Address Entries7-23
Configuring Unicast MAC Address Filtering7-24
Displaying Address Table Entries7-26
Contents
CHAPTER
OL-23389-01
Managing the ARP Table7-26
8Configuring Switch-Based Authentication8-1
Preventing Unauthorized Access to Your Switch8-1
Protecting Access to Privileged EXEC Commands8-2
Default Password and Privilege Level Configuration8-2
Setting or Changing a Static Enable Password8-3
Protecting Enable and Enable Secret Passwords with Encryption8-3
Disabling Password Recovery8-5
Setting a Telnet Password for a Terminal Line8-6
Configuring Username and Password Pairs8-6
Configuring Multiple Privilege Levels8-7
Setting the Privilege Level for a Command8-8
Changing the Default Privilege Level for Lines8-9
Logging into and Exiting a Privilege Level8-9
Configuring RADIUS Authorization for User Privileged Access and Network Services8-27
Starting RADIUS Accounting8-28
Configuring Settings for All RADIUS Servers8-29
Configuring the Switch to Use Vendor-Specific RADIUS Attributes8-29
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication8-31
Displaying the RADIUS Configuration8-31
viii
Configuring the Switch for Local Authentication and Authorization8-32
Configuring the Switch for Secure Shell8-33
Understanding SSH8-33
SSH Servers, Integrated Clients, and Supported Versions8-33
Limitations8-34
Configuring SSH8-34
Configuration Guidelines8-34
Setting Up the Switch to Run SSH8-35
Configuring the SSH Server8-36
Displaying the SSH Configuration and Status8-36
Configuring the Switch for Secure Socket Layer HTTP8-37
Understanding Secure HTTP Servers and Clients8-37
Certificate Authority Trustpoints8-37
CipherSuites8-39
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Configuring Secure HTTP Servers and Clients8-39
Default SSL Configuration8-39
SSL Configuration Guidelines8-40
Configuring a CA Trustpoint8-40
Configuring the Secure HTTP Server8-41
Configuring the Secure HTTP Client8-42
Displaying Secure HTTP Server and Client Status8-43
Configuring the Switch for Secure Copy Protocol8-43
Device Roles9-2
Authentication Process9-3
Authentication Initiation and Message Exchange9-5
Ports in Authorized and Unauthorized States9-7
IEEE 802.1x Host Mode9-7
IEEE 802.1x Accounting9-8
IEEE 802.1x Accounting Attribute-Value Pairs9-8
Using IEEE 802.1x Authentication with VLAN Assignment9-9
Using IEEE 802.1x Authentication with Guest VLAN9-11
Using IEEE 802.1x Authentication with Restricted VLAN9-12
Using IEEE 802.1x Authentication with Voice VLAN Ports9-13
Using IEEE 802.1x Authentication with Port Security9-13
Using IEEE 802.1x Authentication with MAC Authentication Bypass9-14
802.1x Authentication with Restricted VLAN9-15
Common Session ID9-16
IEEE 802.1x Authentication9-19
VLAN Assignment and Guest VLAN9-20
MAC Authentication Bypass9-20
Upgrading from a Previous Software Release9-20
Configuring IEEE 802.1x Authentication9-20
Configuring the Switch-to-RADIUS-Server Communication9-22
Configuring the Host Mode9-23
Configuring Periodic Re-Authentication9-24
Manually Re-Authenticating a Client Connected to a Port9-24
OL-23389-01
Catalyst 2928 Switch Software Configuration Guide
ix
Contents
Changing the Quiet Period9-25
Changing the Switch-to-Client Retransmission Time9-25
Setting the Switch-to-Client Frame-Retransmission Number9-26
Setting the Re-Authentication Number9-27
Configuring IEEE 802.1x Accounting9-27
Configuring a Guest VLAN9-28
Configuring a Restricted VLAN9-29
Configuring MAC Authentication Bypass9-31
Disabling IEEE 802.1x Authentication on the Port9-31
Resetting the IEEE 802.1x Authentication Configuration to the Default Values9-32
Displaying IEEE 802.1x Statistics and Status9-32
CHAPTER
10Configuring Web-Based Authentication10-1
Understanding Web-Based Authentication10-1
Device Roles10-2
Host Detection10-2
Session Creation10-3
Authentication Process10-3
Local Web Authentication Banner10-4
Web Authentication Customizable Web Pages10-6
Guidelines10-6
Web-based Authentication Interactions with Other Features10-7
Port Security10-7
LAN Port IP10-8
Gateway IP10-8
ACLs10-8
Context-Based Access Control10-8
802.1x Authentication10-8
EtherChannel10-8
Configuring Web-Based Authentication10-9
Default Web-Based Authentication Configuration10-9
Web-Based Authentication Configuration Guidelines and Restrictions10-9
Web-Based Authentication Configuration Task List10-10
Configuring the Authentication Rule and Interfaces10-10
Configuring AAA Authentication10-11
Configuring Switch-to-RADIUS-Server Communication 10-11
Configuring the HTTP Server10-13
Customizing the Authentication Proxy Web Pages10-13
Specifying a Redirection URL for Successful Login10-15
Catalyst 2928 Switch Software Configuration Guide
x
OL-23389-01
Configuring an AAA Fail Policy10-15
Configuring the Web-Based Authentication Parameters10-16
Configuring a Web Authentication Local Banner10-16
Removing Web-Based Authentication Cache Entries10-17
Displaying Web-Based Authentication Status10-17
Contents
CHAPTER
CHAPTER
11Configuring Portal-Based Authentication11-1
Understanding Portal-Based Authentication11-1
Configuring Portal-Based Authentication11-2
Default Portal-Based Authentication Configuration11-2
Enabling Portal-Based Authentication on the Switch11-3
Enabling Portal-Based Authentication on an Interface11-4
Configuring the Switch-to-RADIUS-Server Communication11-4
Monitoring Portal-Based Authentication11-6
12Configuring Interface Characteristics12-1
Understanding Interface Types12-1
Port-Based VLANs12-2
Switch Ports12-2
Access Ports12-2
Trunk Ports12-3
Power over Ethernet (PoE) Ports (WS-C2928-24LT-C only)12-4
Supported Protocols and Standards12-4
Powered-Device Detection and Initial Power Allocation12-5
Power Management Modes12-5
Power Monitoring and Power Policing12-6
Connecting Interfaces12-9
OL-23389-01
Using Interface Configuration Mode12-9
Procedures for Configuring Interfaces12-10
Configuring a Range of Interfaces12-10
Configuring and Using Interface Range Macros12-12
Configuring Ethernet Interfaces12-14
Default Ethernet Interface Configuration12-14
Setting the Type of a Dual-Purpose Uplink Port12-15
Configuring Interface Speed and Duplex Mode12-17
Speed and Duplex Configuration Guidelines12-17
Setting the Interface Speed and Duplex Parameters12-18
Configuring IEEE 802.3x Flow Control12-19
Configuring Auto-MDIX on an Interface12-20
Catalyst 2928 Switch Software Configuration Guide
xi
Contents
Configuring a Power Management Mode on a PoE Port12-21
Budgeting Power for Devices Connected to a PoE Port12-22
Configuring Power Policing12-24
Adding a Description for an Interface12-25
Configuring the System MTU12-26
Monitoring and Maintaining the Interfaces12-27
Monitoring Interface Status12-28
Clearing and Resetting Interfaces and Counters12-28
Shutting Down and Restarting the Interface12-29
CHAPTER
13Configuring VLANs13-1
Understanding VLANs13-1
Supported VLANs13-2
VLAN Port Membership Modes13-3
Configuring Normal-Range VLANs13-4
Token Ring VLANs13-5
Normal-Range VLAN Configuration Guidelines13-5
Saving VLAN Configuration13-6
Default Ethernet VLAN Configuration13-6
Creating or Modifying an Ethernet VLAN13-7
Deleting a VLAN13-8
Assigning Static-Access Ports to a VLAN13-9
Disabled State16-6
How a Switch or Port Becomes the Root Switch or Root Port16-7
Spanning Tree and Redundant Connectivity16-7
Spanning-Tree Address Management16-8
Accelerated Aging to Retain Connectivity16-8
Spanning-Tree Modes and Protocols16-9
Supported Spanning-Tree Instances16-9
Spanning-Tree Interoperability and Backward Compatibility16-10
STP and IEEE 802.1Q Trunks16-10
xiv
Configuring Spanning-Tree Features16-10
Default Spanning-Tree Configuration16-11
Spanning-Tree Configuration Guidelines16-12
Changing the Spanning-Tree Mode.16-13
Disabling Spanning Tree16-14
Configuring the Root Switch16-14
Configuring a Secondary Root Switch16-16
Configuring Port Priority16-16
Configuring Path Cost16-18
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Configuring the Switch Priority of a VLAN16-19
Configuring Spanning-Tree Timers16-20
Configuring the Hello Time16-20
Configuring the Forwarding-Delay Time for a VLAN16-21
Configuring the Maximum-Aging Time for a VLAN16-21
Configuring the Transmit Hold-Count 16-22
Displaying the Spanning-Tree Status16-22
Contents
CHAPTER
17Configuring MSTP17-1
Understanding MSTP17-2
Multiple Spanning-Tree Regions17-2
IST, CIST, and CST17-2
Operations Within an MST Region17-3
Operations Between MST Regions17-3
IEEE 802.1s Terminology17-5
Hop Count17-5
Boundary Ports17-6
IEEE 802.1s Implementation17-6
Port Role Naming Change17-6
Interoperation Between Legacy and Standard Switches17-7
Detecting Unidirectional Link Failure17-7
Interoperability with IEEE 802.1D STP17-8
Understanding RSTP17-8
Port Roles and the Active Topology17-9
Rapid Convergence17-9
Synchronization of Port Roles17-11
Bridge Protocol Data Unit Format and Processing17-12
Default MSTP Configuration17-14
MSTP Configuration Guidelines17-14
Specifying the MST Region Configuration and Enabling MSTP17-15
Configuring the Root Switch17-17
Configuring a Secondary Root Switch17-18
Configuring Port Priority 17-19
Configuring Path Cost17-20
Configuring the Switch Priority17-21
Catalyst 2928 Switch Software Configuration Guide
xv
Contents
Configuring the Hello Time17-22
Configuring the Forwarding-Delay Time17-23
Configuring the Maximum-Aging Time17-23
Configuring the Maximum-Hop Count17-24
Specifying the Link Type to Ensure Rapid Transitions17-24
Designating the Neighbor Type17-25
Restarting the Protocol Migration Process17-25
Default DHCP Snooping Configuration19-8
DHCP Snooping Configuration Guidelines19-9
Configuring the DHCP Relay Agent 19-10
Enabling DHCP Snooping and Option 8219-11
Enabling the DHCP Snooping Binding Database Agent19-12
Displaying DHCP Snooping Information19-13
Understanding IP Source Guard19-13
Source IP Address Filtering19-14
Source IP and MAC Address Filtering19-14
IP Source Guard for Static Hosts19-15
Configuring IP Source Guard19-15
Default IP Source Guard Configuration19-16
IP Source Guard Configuration Guidelines19-16
Enabling IP Source Guard19-16
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port19-18
Contents
CHAPTER
Displaying IP Source Guard Information19-21
Understanding DHCP Server Port-Based Address Allocation19-21
Configuring DHCP Server Port-Based Address Allocation19-22
Displaying DHCP Server Port-Based Address Allocation19-25
20Configuring Dynamic ARP Inspection20-1
Understanding Dynamic ARP Inspection20-1
Interface Trust States and Network Security20-3
Rate Limiting of ARP Packets20-4
Relative Priority of ARP ACLs and DHCP Snooping Entries20-4
Logging of Dropped Packets20-4
Configuring Dynamic ARP Inspection20-5
Default Dynamic ARP Inspection Configuration20-5
Dynamic ARP Inspection Configuration Guidelines20-6
Configuring Dynamic ARP Inspection in DHCP Environments20-7
Configuring ARP ACLs for Non-DHCP Environments20-8
Limiting the Rate of Incoming ARP Packets20-10
Performing Validation Checks20-11
Configuring the Log Buffer20-12
IGMP Versions21-2
Joining a Multicast Group21-3
Leaving a Multicast Group21-4
Immediate Leave 21-5
IGMP Configurable-Leave Timer21-5
IGMP Report Suppression21-5
Configuring IGMP Snooping21-6
Default IGMP Snooping Configuration21-6
Enabling or Disabling IGMP Snooping21-6
Setting the Snooping Method21-7
Configuring a Multicast Router Port21-8
Configuring a Host Statically to Join a Group21-9
Enabling IGMP Immediate Leave21-9
Configuring the IGMP Leave Timer21-10
Configuring TCN-Related Commands21-11
Controlling the Multicast Flooding Time After a TCN Event21-11
Recovering from Flood Mode21-12
Disabling Multicast Flooding During a TCN Event21-12
Configuring the IGMP Snooping Querier21-13
Disabling IGMP Report Suppression21-14
CHAPTER
xviii
Displaying IGMP Snooping Information21-14
Configuring IGMP Filtering and Throttling21-16
Default IGMP Filtering and Throttling Configuration21-16
Configuring IGMP Profiles21-17
Applying IGMP Profiles21-18
Setting the Maximum Number of IGMP Groups21-19
Configuring the IGMP Throttling Action21-19
Displaying IGMP Filtering and Throttling Configuration21-20
22Configuring Port-Based Traffic Control22-1
Configuring Storm Control22-1
Understanding Storm Control22-1
Default Storm Control Configuration22-3
Configuring Storm Control and Threshold Levels22-3
Configuring Small-Frame Arrival Rate22-5
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Configuring Protected Ports22-6
Default Protected Port Configuration22-6
Protected Port Configuration Guidelines22-6
Configuring a Protected Port22-7
Configuring Port Blocking22-7
Default Port Blocking Configuration22-7
Blocking Flooded Traffic on an Interface22-7
Configuring Port Security22-8
Understanding Port Security22-9
Secure MAC Addresses22-9
Security Violations22-10
Default Port Security Configuration22-11
Port Security Configuration Guidelines22-11
Enabling and Configuring Port Security22-12
Enabling and Configuring Port Security Aging22-17
Displaying Port-Based Traffic Control Settings22-18
Contents
CHAPTER
CHAPTER
23Configuring CDP23-1
Understanding CDP23-1
Configuring CDP23-2
Default CDP Configuration23-2
Configuring the CDP Characteristics23-2
Disabling and Enabling CDP23-3
Disabling and Enabling CDP on an Interface23-4
Modes of Operation25-1
Methods to Detect Unidirectional Links25-2
Configuring UDLD25-3
Default UDLD Configuration25-4
Configuration Guidelines25-4
Enabling UDLD Globally25-5
Enabling UDLD on an Interface25-5
Resetting an Interface Disabled by UDLD25-6
Default SPAN Configuration26-7
Configuring Local SPAN26-7
SPAN Configuration Guidelines26-7
Creating a Local SPAN Session26-8
Creating a Local SPAN Session and Configuring Incoming Traffic26-11
Specifying VLANs to Filter26-12
Displaying SPAN Status26-13
27Configuring RMON27-1
Understanding RMON27-1
Configuring RMON27-2
Default RMON Configuration27-3
Configuring RMON Alarms and Events27-3
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Collecting Group History Statistics on an Interface27-5
Collecting Group Ethernet Statistics on an Interface27-5
Displaying RMON Status27-6
Contents
CHAPTER
28Configuring System Message Logging28-1
Understanding System Message Logging28-1
Configuring System Message Logging28-2
System Log Message Format28-2
Default System Message Logging Configuration28-3
Disabling Message Logging28-3
Setting the Message Display Destination Device28-4
Synchronizing Log Messages28-5
Enabling and Disabling Time Stamps on Log Messages28-7
Enabling and Disabling Sequence Numbers in Log Messages28-7
Defining the Message Severity Level28-8
Limiting Syslog Messages Sent to the History Table and to SNMP28-9
Enabling the Configuration-Change Logger28-10
Configuring UNIX Syslog Servers28-11
Logging Messages to a UNIX Syslog Daemon28-11
Configuring the UNIX System Logging Facility28-12
Displaying the Logging Configuration28-13
CHAPTER
OL-23389-01
29Configuring SNMP29-1
Understanding SNMP29-1
SNMP Versions29-2
SNMP Manager Functions29-3
SNMP Agent Functions29-4
SNMP Community Strings29-4
Using SNMP to Access MIB Variables 29-4
SNMP Notifications29-5
SNMP ifIndex MIB Object Values29-5
Configuring SNMP29-6
Default SNMP Configuration29-6
SNMP Configuration Guidelines29-7
Disabling the SNMP Agent29-7
Configuring Community Strings29-8
Configuring SNMP Groups and Users29-9
Configuring SNMP Notifications29-11
Setting the Agent Contact and Location Information29-15
Catalyst 2928 Switch Software Configuration Guide
xxi
Contents
Limiting TFTP Servers Used Through SNMP29-15
SNMP Examples29-16
Displaying SNMP Status29-17
CHAPTER
30Configuring Network Security with ACLs30-1
Understanding ACLs30-1
ACL Overview30-2
Port ACLs30-2
Handling Fragmented and Unfragmented Traffic30-3
Configuring IPv4 ACLs30-4
Creating Standard and Extended IPv4 ACLs30-5
Access List Numbers30-5
Creating a Numbered Standard ACL30-6
Creating a Numbered Extended ACL30-7
Resequencing ACEs in an ACL30-12
Creating Named Standard and Extended ACLs30-12
Using Time Ranges with ACLs30-14
Including Comments in ACLs30-15
Applying an IPv4 ACL to a Terminal Line30-16
Applying an IPv4 ACL to a VLAN Interface30-16
Hardware and Software Treatment of IP ACLs30-17
Troubleshooting ACLs30-18
IPv4 ACL Configuration Examples30-18
Verifying the Problem and Cause33-24
Troubleshooting Power over Ethernet (PoE)33-25
Contents
APPENDIX
APPENDIX
ASupported MIBsA-1
MIB ListA-1
Using FTP to Access the MIB FilesA-3
BWorking with the Cisco IOS File System, Configuration Files, and Software ImagesB-1
Working with the Flash File SystemB-1
Displaying Available File SystemsB-2
Setting the Default File SystemB-3
Displaying Information about Files on a File SystemB-3
Changing Directories and Displaying the Working DirectoryB-3
Creating and Removing DirectoriesB-4
Copying FilesB-4
Deleting FilesB-5
Creating, Displaying, and Extracting tar FilesB-5
Creating a tar FileB-6
Displaying the Contents of a tar FileB-6
Extracting a tar FileB-7
Displaying the Contents of a FileB-7
OL-23389-01
Working with Configuration FilesB-8
Guidelines for Creating and Using Configuration FilesB-8
Configuration File Types and LocationB-9
Creating a Configuration File By Using a Text EditorB-9
Copying Configuration Files By Using TFTPB-10
Preparing to Download or Upload a Configuration File By Using TFTPB-10
Downloading the Configuration File By Using TFTPB-11
Uploading the Configuration File By Using TFTPB-11
Catalyst 2928 Switch Software Configuration Guide
xxv
Contents
Copying Configuration Files By Using FTPB-12
Preparing to Download or Upload a Configuration File By Using FTPB-12
Downloading a Configuration File By Using FTPB-13
Uploading a Configuration File By Using FTPB-14
Copying Configuration Files By Using RCPB-15
Preparing to Download or Upload a Configuration File By Using RCPB-16
Downloading a Configuration File By Using RCPB-16
Uploading a Configuration File By Using RCPB-17
Clearing Configuration InformationB-18
Clearing the Startup Configuration FileB-18
Deleting a Stored Configuration FileB-18
Working with Software ImagesB-19
Image Location on the SwitchB-20
tar File Format of Images on a Server or Cisco.comB-20
Copying Image Files By Using TFTPB-21
Preparing to Download or Upload an Image File By Using TFTPB-21
Downloading an Image File By Using TFTPB-22
Uploading an Image File By Using TFTPB-24
Copying Image Files By Using FTPB-24
Preparing to Download or Upload an Image File By Using FTPB-25
Downloading an Image File By Using FTPB-26
Uploading an Image File By Using FTPB-27
Copying Image Files By Using RCPB-28
Preparing to Download or Upload an Image File By Using RCPB-29
Downloading an Image File By Using RCPB-30
Uploading an Image File By Using RCPB-32
APPENDIX
xxvi
CUnsupported Commands in Cisco IOS Release 12.2(55)EZC-1
Unsupported Global Configuration CommandC-5
Unsupported Interface Configuration CommandC-5
VLANC-5
Unsupported Global Configuration CommandC-5
Unsupported vlan-config CommandC-6
Unsupported User EXEC CommandsC-6
VTPC-6
Unsupported Privileged EXEC CommandsC-6
I
NDEX
OL-23389-01
Catalyst 2928 Switch Software Configuration Guide
xxvii
Contents
xxviii
Catalyst 2928 Switch Software Configuration Guide
OL-23389-01
Audience
Purpose
Preface
This guide is for the networking professional managing the Catalyst 2928 switch, hereafter referred to
as the switch. Before using this guide, you should have experience working with the Cisco IOS software
and be familiar with the concepts and terminology of Ethernet and local area networking.
This guide provides the information that you need to configure Cisco IOS software features on your
switch. The Catalyst 2928 software provides enterprise-class intelligent services.
This guide provides procedures for using the commands that have been created or changed for use with
the Catalyst 2928 switch. It does not provide detailed information about these commands. For detailed
information about these commands, see the Catalyst 2928 Switch Command Reference for this release.
For information about the standard Cisco IOS Release 12.2 commands, see the Cisco IOS documentation
set available from the Cisco.com home page at Technical Support & Documentation > Cisco IOS Software.
This guide does not provide detailed information on the graphical user interfaces (GUIs) for the
embedded device manager that you can use to manage the switch. However, the concepts in this guide
are applicable to the GUI user. For information about the device manager, see the switch online help.
This guide does not describe system messages you might encounter or how to install your switch. For
more information, see the Catalyst 2928 Switch System Message Guide for this release and the Catalyst 2928 Switch Hardware Installation Guide.
For documentation updates, see the release notes for this release.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
OL-23389-01
• Square brackets ([ ]) mean optional elements.
Catalyst 2928 Switch Software Configuration Guide
xxvii
Preface
• Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
Interactive examples use these conventions:
• Terminal sessions and system displays are in screen font.
• Information you enter is in boldface screen font.
• Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
Notes, cautions, and timesavers use these conventions and symbols:
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Publications
These documents provide complete information about the switch and are available from this
Cisco.com site: