Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-19720-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Obtaining Documentation, Obtaining Support, and Security Guidelinesxxxvii
CHAPTER
1Overview1-1
Features1-1
Ease-of-Deployment and Ease-of-Use Features1-2
Performance Features1-3
Management Options1-5
Manageability Features1-5
Availability and Redundancy Features1-7
VLAN Features1-8
Security Features1-8
QoS and CoS Features1-11
Layer 3 Features1-12
Power over Ethernet Features1-12
Monitoring Features1-12
Default Settings After Initial Switch Configuration1-13
Network Configuration Examples1-15
Design Concepts for Using the Switch1-15
Small to Medium-Sized Network Using Catalyst 2975 Switches1-19
Long-Distance, High-Bandwidth Transport Configuration1-20
CHAPTER
OL-19720-02
Where to Go Next1-21
2Using the Command-Line Interface2-1
Understanding Command Modes2-1
Understanding the Help System2-3
Understanding Abbreviated Commands2-4
Understanding no and default Forms of Commands2-4
Understanding CLI Error Messages2-5
Catalyst 2975 Switch Software Configuration Guide
iii
Contents
Using Configuration Logging2-5
Using Command History2-6
Changing the Command History Buffer Size2-6
Recalling Commands2-6
Disabling the Command History Feature2-7
Using Editing Features2-7
Enabling and Disabling Editing Features2-7
Editing Commands through Keystrokes2-8
Editing Command Lines that Wrap2-9
Searching and Filtering Output of show and more Commands2-10
Accessing the CLI2-10
Accessing the CLI through a Console Connection or through Telnet2-10
CHAPTER
3Assigning the Switch IP Address and Default Gateway3-1
Understanding DHCP-based Autoconfiguration and Image Update3-5
DHCP Autoconfiguration3-5
DHCP Auto-Image Update3-6
Limitations and Restrictions3-6
Configuring DHCP-Based Autoconfiguration3-7
DHCP Server Configuration Guidelines3-7
Configuring the TFTP Server3-8
Configuring the DNS3-8
Configuring the Relay Device3-9
Obtaining Configuration Files3-9
Example Configuration3-10
Configuring the DHCP Auto Configuration and Image Update Features3-12
Configuring DHCP Autoconfiguration (Only Configuration File)3-12
Configuring DHCP Auto-Image Update (Configuration File and Image)3-13
Configuring the Client3-14
Manually Assigning IP Information3-15
iv
Checking and Saving the Running Configuration3-16
Configuring the NVRAM Buffer Size3-17
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Modifying the Startup Configuration3-18
Default Boot Configuration3-18
Automatically Downloading a Configuration File3-18
Specifying the Filename to Read and Write the System Configuration3-19
Booting Manually3-19
Booting a Specific Software Image3-20
Controlling Environment Variables3-21
Scheduling a Reload of the Software Image3-23
Configuring a Scheduled Reload3-23
Displaying Scheduled Reload Information3-24
Enabling Automated CNS Configuration4-6
Enabling the CNS Event Agent4-7
Enabling the Cisco IOS CNS Agent4-9
Enabling an Initial Configuration4-9
Enabling a Partial Configuration4-12
CHAPTER
OL-19720-02
Displaying CNS Configuration4-13
5Clustering Switches5-1
Understanding Switch Clusters5-1
Cluster Command Switch Characteristics5-3
Standby Cluster Command Switch Characteristics5-3
Candidate Switch and Cluster Member Switch Characteristics5-4
Catalyst 2975 Switch Software Configuration Guide
v
Contents
Planning a Switch Cluster5-5
Automatic Discovery of Cluster Candidates and Members5-5
Discovery Through CDP Hops5-5
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices5-7
Discovery Through Different VLANs5-7
Discovery Through Different Management VLANs5-8
Discovery of Newly Installed Switches5-9
HSRP and Standby Cluster Command Switches5-10
Virtual IP Addresses5-11
Other Considerations for Cluster Standby Groups5-11
Automatic Recovery of Cluster Configuration5-12
IP Addresses5-13
Hostnames5-13
Passwords5-14
SNMP Community Strings5-14
Switch Clusters and Switch Stacks5-14
TACACS+ and RADIUS5-16
LRE Profiles5-16
CHAPTER
Using the CLI to Manage Switch Clusters5-16
Using SNMP to Manage Switch Clusters5-17
6Managing Switch Stacks6-1
Understanding Stacks6-1
Stack Membership6-3
Master Election6-4
Stack MAC Address6-5
Member Numbers6-6
Member Priority Values6-6
Stack Offline Configuration6-7
Effects of Adding a Provisioned Switch to a Stack6-7
Effects of Replacing a Provisioned Switch in a Stack6-9
Effects of Removing a Provisioned Switch from a Stack6-9
Stack Software Compatibility Recommendations6-9
Stack Protocol Version Compatibility6-9
Major Version Number Incompatibility Among Switches6-9
Minor Version Number Incompatibility Among Switches6-9
Understanding Auto-Upgrade and Auto-Advise6-10
Auto-Upgrade and Auto-Advise Example Messages6-11
Incompatible Software and Member Image Upgrades6-13
vi
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Stack Configuration Files6-13
Additional Considerations for System-Wide Configuration on Switch Stacks6-13
Stack Management Connectivity6-14
Stack Through an IP Address6-14
Stack Through an SSH Session6-14
Stack Through Console Ports6-15
Specific Members6-15
Stack Configuration Scenarios6-15
Configuring the Switch Stack6-17
Default Switch Stack Configuration6-17
Enabling Persistent MAC Address6-17
Assigning Stack Member Information6-19
Assigning a Member Number6-19
Setting the Member Priority Value6-20
Provisioning a New Member for a Stack6-20
Changing the Stack Membership6-21
Contents
CHAPTER
Accessing the CLI of a Specific Member6-22
Displaying Stack Information6-22
Troubleshooting Stacks6-23
Manually Disabling a Stack Port6-23
Re-Enabling a Stack Port While Another Member Starts6-23
Understanding the show switch stack-ports summary Output6-24
Identifying Loopback Problems6-25
Software Loopback6-25
Software Loopback Example: No Connected Stack Cable6-26
Software Loopback Examples: Connected Stack Cables6-26
Hardware Loopback6-27
Hardware Loopback Example: LINK OK event6-27
Hardware Loop Example: LINK NOT OK Event6-28
Finding a Disconnected StackWiseStackCable6-28
Fixing a Bad Connection Between Stack Ports6-29
7Administering the Switch7-1
Managing the System Time and Date7-1
Understanding the System Clock 7-1
Understanding Network Time Protocol7-2
OL-19720-02
Catalyst 2975 Switch Software Configuration Guide
vii
Contents
Configuring NTP7-4
Default NTP Configuration7-4
Configuring NTP Authentication7-5
Configuring NTP Associations7-6
Configuring NTP Broadcast Service7-7
Configuring NTP Access Restrictions7-8
Configuring the Source IP Address for NTP Packets7-10
Displaying the NTP Configuration7-11
Configuring Time and Date Manually7-11
Setting the System Clock7-11
Displaying the Time and Date Configuration7-12
Configuring the Time Zone 7-12
Configuring Summer Time (Daylight Saving Time)7-13
Configuring a System Name and Prompt7-14
Default System Name and Prompt Configuration7-15
Configuring a System Name7-15
Understanding DNS7-15
Default DNS Configuration7-16
Setting Up DNS7-16
Displaying the DNS Configuration7-17
Creating a Banner7-17
Default Banner Configuration7-17
Configuring a Message-of-the-Day Login Banner7-18
Configuring a Login Banner7-19
Managing the MAC Address Table7-19
Building the Address Table7-20
MAC Addresses and VLANs7-20
MAC Addresses and Switch Stacks7-21
Default MAC Address Table Configuration7-21
Changing the Address Aging Time7-21
Removing Dynamic Address Entries7-22
Configuring MAC Address Change Notification Traps7-22
Configuring MAC Address Move Notification Traps7-24
Configuring MAC Threshold Notification Traps7-25
Adding and Removing Static Address Entries7-26
Configuring Unicast MAC Address Filtering7-27
Disabling MAC Address Learning on a VLAN7-28
Displaying Address Table Entries7-30
Default Password and Privilege Level Configuration9-3
Setting or Changing a Static Enable Password9-3
Protecting Enable and Enable Secret Passwords with Encryption9-4
Disabling Password Recovery9-5
Setting a Telnet Password for a Terminal Line9-6
Configuring Username and Password Pairs9-7
Configuring Multiple Privilege Levels9-8
Identifying the TACACS+ Server Host and Setting the Authentication Key9-13
Configuring TACACS+ Login Authentication9-14
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services9-16
Starting TACACS+ Accounting9-17
Establishing a Session with a Router if the AAA Server is Unreachable9-18
Displaying the TACACS+ Configuration9-18
Controlling Switch Access with RADIUS9-18
Understanding RADIUS9-18
RADIUS Operation9-20
RADIUS Change of Authorization9-20
Overview9-20
Change-of-Authorization Requests9-21
Catalyst 2975 Switch Software Configuration Guide
ix
Contents
CoA Request Response Code9-22
CoA Request Commands9-23
Stacking Guidelines for Session Termination9-26
Configuring RADIUS9-27
Default RADIUS Configuration9-27
Identifying the RADIUS Server Host 9-28
Configuring RADIUS Login Authentication9-30
Defining AAA Server Groups9-32
Configuring RADIUS Authorization for User Privileged Access and Network Services9-34
Starting RADIUS Accounting9-35
Establishing a Session with a Router if the AAA Server is Unreachable9-36
Configuring Settings for All RADIUS Servers9-36
Configuring the Switch to Use Vendor-Specific RADIUS Attributes9-36
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication9-38
Configuring CoA on the Switch9-39
Monitoring and Troubleshooting CoA Functionality9-40
Configuring RADIUS Server Load Balancing9-40
Displaying the RADIUS Configuration9-40
Configuring the Switch for Local Authentication and Authorization9-40
Configuring the Switch for Secure Shell9-41
Understanding SSH9-42
SSH Servers, Integrated Clients, and Supported Versions9-42
Limitations9-43
Configuring SSH9-43
Configuration Guidelines9-43
Setting Up the Switch to Run SSH9-43
Configuring the SSH Server9-44
Displaying the SSH Configuration and Status9-45
Configuring the Switch for Secure Socket Layer HTTP9-46
Default SSL Configuration9-48
SSL Configuration Guidelines9-49
Configuring a CA Trustpoint9-49
Configuring the Secure HTTP Server9-50
Configuring the Secure HTTP Client9-51
Displaying Secure HTTP Server and Client Status9-52
Catalyst 2975 Switch Software Configuration Guide
x
OL-19720-02
Configuring the Switch for Secure Copy Protocol9-52
Bypass10-36
MAC Authentication Bypass10-36
Maximum Number of Allowed Devices Per Port10-37
Configuring 802.1x Readiness Check10-37
Configuring Voice Aware 802.1x Security10-38
Configuring 802.1x Violation Modes10-39
Configuring 802.1x Authentication10-40
Configuring the Switch-to-RADIUS-Server Communication10-41
Configuring the Host Mode10-43
Configuring Periodic Re-Authentication10-44
Manually Re-Authenticating a Client Connected to a Port10-45
Changing the Quiet Period10-45
Changing the Switch-to-Client Retransmission Time10-46
Setting the Switch-to-Client Frame-Retransmission Number10-47
Setting the Re-Authentication Number10-47
Enabling MAC Move10-48
Enabling MAC Replace10-48
Configuring 802.1x Accounting10-49
Configuring a Guest VLAN10-50
Configuring a Restricted VLAN10-51
Configuring the Inaccessible Authentication Bypass Feature10-53
Configuring 802.1x Authentication with WoL10-56
Configuring MAC Authentication Bypass10-57
Configuring 802.1x User Distribution10-58
Configuring NAC Layer 2 802.1x Validation10-59
Configuring an Authenticator and a Supplicant Switch with NEAT10-60
Configuring NEAT with Auto Smartports Macros10-61
xii
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs10-61
Configuring Downloadable ACLs10-62
Configuring a Downloadable Policy10-62
Configuring VLAN ID-based MAC Authentication10-64
Configuring Flexible Authentication Ordering10-64
Configuring Open1x10-65
Disabling 802.1x Authentication on the Port10-65
Resetting the 802.1x Authentication Configuration to the Default Values10-66
Displaying 802.1x Statistics and Status10-67
Contents
CHAPTER
11Configuring Web-Based Authentication11-1
Understanding Web-Based Authentication11-1
Device Roles11-2
Host Detection11-2
Session Creation11-3
Authentication Process11-3
Local Web Authentication Banner11-4
Web Authentication Customizable Web Pages11-6
Guidelines11-6
Web-based Authentication Interactions with Other Features11-7
Port Security11-7
LAN Port IP11-8
Gateway IP11-8
ACLs11-8
Context-Based Access Control11-8
802.1x Authentication11-8
EtherChannel11-8
Configuring Web-Based Authentication11-9
Default Web-Based Authentication Configuration11-9
Web-Based Authentication Configuration Guidelines and Restrictions11-9
Web-Based Authentication Configuration Task List11-10
Configuring the Authentication Rule and Interfaces11-10
Configuring AAA Authentication11-11
Configuring Switch-to-RADIUS-Server Communication 11-11
Configuring the HTTP Server11-13
Customizing the Authentication Proxy Web Pages11-13
Specifying a Redirection URL for Successful Login11-15
Configuring an AAA Fail Policy11-15
Configuring the Web-Based Authentication Parameters11-16
OL-19720-02
Catalyst 2975 Switch Software Configuration Guide
xiii
Contents
Configuring a Web Authentication Local Banner11-16
Removing Web-Based Authentication Cache Entries11-17
Displaying Web-Based Authentication Status11-17
CHAPTER
12Configuring Interface Characteristics12-1
Understanding Interface Types12-1
Port-Based VLANs12-2
Switch Ports12-2
Access Ports12-2
Trunk Ports12-3
Switch Virtual Interfaces12-3
EtherChannel Port Groups12-4
Dual-Purpose Uplink Ports12-4
Power over Ethernet Ports12-4
Supported Protocols and Standards12-5
Powered-Device Detection and Initial Power Allocation12-5
Power Management Modes12-7
Power Monitoring and Power Policing12-8
Connecting Interfaces12-10
Using Interface Configuration Mode12-11
Procedures for Configuring Interfaces12-12
Configuring a Range of Interfaces12-12
Configuring and Using Interface Range Macros12-14
xiv
Configuring Ethernet Interfaces12-16
Default Ethernet Interface Configuration12-16
Setting the Type of a Dual-Purpose Uplink Port12-17
Configuring Interface Speed and Duplex Mode12-19
Speed and Duplex Configuration Guidelines12-19
Setting the Interface Speed and Duplex Parameters12-20
Configuring IEEE 802.3x Flow Control12-21
Configuring Auto-MDIX on an Interface12-22
Configuring a Power Management Mode on a PoE Port12-23
Budgeting Power for Devices Connected to a PoE Port12-24
Configuring Power Policing12-26
Adding a Description for an Interface12-27
Configuring Layer 3 SVIs12-27
Configuring the System MTU12-28
Monitoring and Maintaining the Interfaces12-29
Monitoring Interface Status12-30
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Clearing and Resetting Interfaces and Counters12-30
Shutting Down and Restarting the Interface12-31
Contents
CHAPTER
13Configuring VLANs13-1
Understanding VLANs13-1
Supported VLANs13-2
VLAN Port Membership Modes13-3
Configuring Normal-Range VLANs13-4
Token Ring VLANs13-5
Normal-Range VLAN Configuration Guidelines13-5
Configuring Normal-Range VLANs13-6
Default Ethernet VLAN Configuration13-6
Creating or Modifying an Ethernet VLAN13-7
Deleting a VLAN13-8
Assigning Static-Access Ports to a VLAN13-9
IEEE 802.1Q Configuration Considerations13-14
Default Layer 2 Ethernet Interface VLAN Configuration13-14
Configuring an Ethernet Interface as a Trunk Port13-15
Interaction with Other Features13-15
Configuring a Trunk Port13-16
Defining the Allowed VLANs on a Trunk13-17
Changing the Pruning-Eligible List13-18
Configuring the Native VLAN for Untagged Traffic13-19
Configuring Trunk Ports for Load Sharing13-19
Load Sharing Using STP Port Priorities13-20
Load Sharing Using STP Path Cost13-21
OL-19720-02
Configuring VMPS13-23
Understanding VMPS13-23
Dynamic-Access Port VLAN Membership13-24
Default VMPS Client Configuration13-24
VMPS Configuration Guidelines13-24
Configuring the VMPS Client13-25
Catalyst 2975 Switch Software Configuration Guide
xv
Contents
Entering the IP Address of the VMPS13-25
Configuring Dynamic-Access Ports on VMPS Clients13-26
Reconfirming VLAN Memberships13-26
Changing the Reconfirmation Interval13-27
Changing the Retry Count13-27
Monitoring the VMPS13-28
Troubleshooting Dynamic-Access Port VLAN Membership13-28
VMPS Configuration Example13-28
CHAPTER
CHAPTER
14Configuring Voice VLAN14-1
Understanding Voice VLAN14-1
Cisco IP Phone Voice Traffic14-2
Cisco IP Phone Data Traffic14-3
Configuring Voice VLAN14-3
Default Voice VLAN Configuration14-3
Voice VLAN Configuration Guidelines14-3
Configuring a Port Connected to a Cisco 7960 IP Phone14-5
Configuring Cisco IP Phone Voice Traffic14-5
Configuring the Priority of Incoming Data Frames14-6
Displaying Voice VLAN14-7
15Configuring VTP15-1
Understanding VTP15-1
The VTP Domain15-2
VTP Modes15-3
VTP Advertisements15-4
VTP Version 215-4
VTP Version 315-5
VTP Pruning15-6
VTP and Switch Stacks15-7
Configuring a VTP Version 3 Primary Server15-13
Enabling the VTP Version15-14
Enabling VTP Pruning15-15
Configuring VTP on a Per-Port Basis15-15
Adding a VTP Client Switch to a VTP Domain15-16
Monitoring VTP15-17
Contents
CHAPTER
16Configuring STP16-1
Understanding Spanning-Tree Features16-1
STP Overview16-2
Spanning-Tree Topology and BPDUs16-3
Bridge ID, Switch Priority, and Extended System ID16-5
Spanning-Tree Interface States16-5
Blocking State16-7
Listening State16-7
Learning State16-7
Forwarding State16-7
Disabled State16-8
How a Switch or Port Becomes the Root Switch or Root Port16-8
Spanning Tree and Redundant Connectivity16-9
Spanning-Tree Address Management16-9
Accelerated Aging to Retain Connectivity16-9
Spanning-Tree Modes and Protocols16-10
Supported Spanning-Tree Instances16-10
Spanning-Tree Interoperability and Backward Compatibility16-11
STP and IEEE 802.1Q Trunks16-11
Spanning Tree and Switch Stacks16-12
OL-19720-02
Configuring Spanning-Tree Features16-12
Default Spanning-Tree Configuration16-13
Spanning-Tree Configuration Guidelines16-13
Changing the Spanning-Tree Mode.16-15
Disabling Spanning Tree16-16
Configuring the Root Switch16-16
Configuring a Secondary Root Switch16-18
Configuring Port Priority16-18
Configuring Path Cost16-20
Configuring the Switch Priority of a VLAN16-21
Catalyst 2975 Switch Software Configuration Guide
xvii
Contents
Configuring Spanning-Tree Timers16-22
Configuring the Hello Time16-22
Configuring the Forwarding-Delay Time for a VLAN16-23
Configuring the Maximum-Aging Time for a VLAN16-23
Configuring the Transmit Hold-Count 16-24
Displaying the Spanning-Tree Status16-24
CHAPTER
17Configuring MSTP17-1
Understanding MSTP17-2
Multiple Spanning-Tree Regions17-2
IST, CIST, and CST17-3
Operations Within an MST Region17-3
Operations Between MST Regions17-4
IEEE 802.1s Terminology17-5
Hop Count17-6
Boundary Ports17-6
IEEE 802.1s Implementation17-7
Port Role Naming Change17-7
Interoperation Between Legacy and Standard Switches17-7
Detecting Unidirectional Link Failure17-8
MSTP and Switch Stacks17-9
Interoperability with IEEE 802.1D STP17-9
Understanding RSTP17-9
Port Roles and the Active Topology17-10
Rapid Convergence17-11
Synchronization of Port Roles17-12
Bridge Protocol Data Unit Format and Processing17-13
Default MSTP Configuration17-16
MSTP Configuration Guidelines17-16
Specifying the MST Region Configuration and Enabling MSTP17-17
Configuring the Root Switch17-19
Configuring a Secondary Root Switch17-20
Configuring Port Priority 17-21
Configuring Path Cost17-23
Configuring the Switch Priority17-24
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Configuring the Hello Time17-25
Configuring the Forwarding-Delay Time17-25
Configuring the Maximum-Aging Time17-26
Configuring the Maximum-Hop Count17-26
Specifying the Link Type to Ensure Rapid Transitions17-27
Designating the Neighbor Type17-27
Restarting the Protocol Migration Process17-28
Displaying DHCP Server Port-Based Address Allocation20-26
Contents
CHAPTER
CHAPTER
21Configuring Dynamic ARP Inspection21-1
Understanding Dynamic ARP Inspection21-1
Interface Trust States and Network Security21-3
Rate Limiting of ARP Packets21-4
Relative Priority of ARP ACLs and DHCP Snooping Entries21-4
Logging of Dropped Packets21-5
Configuring Dynamic ARP Inspection21-5
Default Dynamic ARP Inspection Configuration21-5
Dynamic ARP Inspection Configuration Guidelines21-6
Configuring Dynamic ARP Inspection in DHCP Environments21-7
Configuring ARP ACLs for Non-DHCP Environments21-9
Limiting the Rate of Incoming ARP Packets21-11
Performing Validation Checks21-12
Configuring the Log Buffer21-13
IGMP Versions22-2
Joining a Multicast Group22-3
Leaving a Multicast Group22-5
Immediate Leave 22-5
IGMP Configurable-Leave Timer22-5
IGMP Report Suppression22-5
IGMP Snooping and Switch Stacks22-6
OL-19720-02
Configuring IGMP Snooping22-6
Default IGMP Snooping Configuration22-7
Enabling or Disabling IGMP Snooping22-7
Catalyst 2975 Switch Software Configuration Guide
xxi
Contents
Setting the Snooping Method22-8
Configuring a Multicast Router Port22-9
Configuring a Host Statically to Join a Group22-10
Enabling IGMP Immediate Leave22-10
Configuring the IGMP Leave Timer22-11
Configuring TCN-Related Commands22-12
Controlling the Multicast Flooding Time After a TCN Event22-12
Recovering from Flood Mode22-12
Disabling Multicast Flooding During a TCN Event22-13
Configuring the IGMP Snooping Querier22-14
Disabling IGMP Report Suppression22-15
Displaying IGMP Snooping Information22-15
Understanding Multicast VLAN Registration22-17
Using MVR in a Multicast Television Application22-17
Configuring MVR22-19
Default MVR Configuration22-19
MVR Configuration Guidelines and Limitations22-20
Configuring MVR Global Parameters22-20
Configuring MVR Interfaces22-21
CHAPTER
Displaying MVR Information22-23
Configuring IGMP Filtering and Throttling22-24
Default IGMP Filtering and Throttling Configuration22-25
Configuring IGMP Profiles22-25
Applying IGMP Profiles22-26
Setting the Maximum Number of IGMP Groups22-27
Configuring the IGMP Throttling Action22-28
Displaying IGMP Filtering and Throttling Configuration22-29
23Configuring Port-Based Traffic Control23-1
Configuring Storm Control23-1
Understanding Storm Control23-2
Default Storm Control Configuration23-3
Configuring Storm Control and Threshold Levels23-3
Configuring Small-Frame Arrival Rate23-5
Configuring Protected Ports23-6
Default Protected Port Configuration23-7
Protected Port Configuration Guidelines23-7
Configuring a Protected Port23-7
xxii
Configuring Port Blocking23-8
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Default Port Blocking Configuration23-8
Blocking Flooded Traffic on an Interface23-8
Configuring Port Security23-9
Understanding Port Security23-9
Secure MAC Addresses23-9
Security Violations23-10
Default Port Security Configuration23-11
Port Security Configuration Guidelines23-12
Enabling and Configuring Port Security23-13
Enabling and Configuring Port Security Aging23-17
Port Security and Switch Stacks23-18
Displaying Port-Based Traffic Control Settings23-18
Contents
CHAPTER
CHAPTER
24Configuring CDP24-1
Understanding CDP24-1
CDP and Switch Stacks24-2
Configuring CDP24-2
Default CDP Configuration24-2
Configuring the CDP Characteristics24-3
Disabling and Enabling CDP24-3
Disabling and Enabling CDP on an Interface24-4
Monitoring and Maintaining CDP24-5
25Configuring LLDP, LLDP-MED, and Wired Location Service25-1
Understanding LLDP, LLDP-MED, and Wired Location Service25-1
LLDP25-1
LLDP-MED25-2
Wired Location Service25-3
Configuring LLDP, LLDP-MED, and Wired Location Service25-5
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service25-12
Catalyst 2975 Switch Software Configuration Guide
xxiii
Contents
CHAPTER
CHAPTER
26Configuring UDLD26-1
Understanding UDLD26-1
Modes of Operation26-1
Methods to Detect Unidirectional Links26-2
Configuring UDLD26-3
Default UDLD Configuration26-4
Configuration Guidelines26-4
Enabling UDLD Globally26-5
Enabling UDLD on an Interface26-6
Resetting an Interface Disabled by UDLD26-6
Displaying UDLD Status26-7
27Configuring SPAN and RSPAN27-1
Understanding SPAN and RSPAN27-1
Local SPAN27-2
Remote SPAN27-3
SPAN and RSPAN Concepts and Terminology27-4
RSPAN VLAN27-9
SPAN and RSPAN Interaction with Other Features27-9
SPAN and RSPAN and Switch Stacks27-10
xxiv
Configuring SPAN and RSPAN27-10
Default SPAN and RSPAN Configuration27-11
Configuring Local SPAN27-11
SPAN Configuration Guidelines27-11
Creating a Local SPAN Session27-12
Creating a Local SPAN Session and Configuring Incoming Traffic27-14
Specifying VLANs to Filter27-16
Configuring RSPAN27-17
RSPAN Configuration Guidelines27-17
Configuring a VLAN as an RSPAN VLAN27-18
Creating an RSPAN Source Session27-19
Creating an RSPAN Destination Session27-20
Creating an RSPAN Destination Session and Configuring Incoming Traffic27-21
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Specifying VLANs to Filter27-23
Displaying SPAN and RSPAN Status27-24
Contents
CHAPTER
CHAPTER
28Configuring RMON28-1
Understanding RMON28-2
Configuring RMON28-3
Default RMON Configuration28-3
Configuring RMON Alarms and Events28-3
Collecting Group History Statistics on an Interface28-5
Collecting Group Ethernet Statistics on an Interface28-6
Displaying RMON Status28-7
29Configuring System Message Logging29-1
Understanding System Message Logging29-1
Configuring System Message Logging29-2
System Log Message Format29-2
Default System Message Logging Configuration29-4
Disabling Message Logging29-4
Setting the Message Display Destination Device29-5
Synchronizing Log Messages29-6
Enabling and Disabling Time Stamps on Log Messages29-8
Enabling and Disabling Sequence Numbers in Log Messages29-8
Defining the Message Severity Level29-9
Limiting Syslog Messages Sent to the History Table and to SNMP29-10
Enabling the Configuration-Change Logger29-11
Configuring UNIX Syslog Servers29-12
Logging Messages to a UNIX Syslog Daemon29-13
Configuring the UNIX System Logging Facility29-13
CHAPTER
OL-19720-02
Displaying the Logging Configuration29-14
30Configuring SNMP30-1
Understanding SNMP30-1
SNMP Versions30-2
SNMP Manager Functions30-3
SNMP Agent Functions30-4
SNMP Community Strings30-4
Using SNMP to Access MIB Variables 30-4
SNMP Notifications30-5
Catalyst 2975 Switch Software Configuration Guide
xxv
Contents
SNMP ifIndex MIB Object Values30-5
Configuring SNMP30-6
Default SNMP Configuration30-6
SNMP Configuration Guidelines30-7
Disabling the SNMP Agent30-7
Configuring Community Strings30-8
Configuring SNMP Groups and Users30-9
Configuring SNMP Notifications30-12
Setting the CPU Threshold Notification Types and Values30-15
Setting the Agent Contact and Location Information30-16
Limiting TFTP Servers Used Through SNMP30-16
SNMP Examples30-17
Displaying SNMP Status30-18
CHAPTER
31Configuring Network Security with ACLs31-1
Understanding ACLs31-1
Supported ACLs31-2
Port ACLs31-3
Router ACLs31-4
Handling Fragmented and Unfragmented Traffic31-4
ACLs and Switch Stacks31-5
Configuring IPv4 ACLs31-6
Creating Standard and Extended IPv4 ACLs31-6
Access List Numbers31-7
Creating a Numbered Standard ACL31-8
Creating a Numbered Extended ACL31-9
Resequencing ACEs in an ACL31-13
Creating Named Standard and Extended ACLs31-13
Using Time Ranges with ACLs31-15
Including Comments in ACLs31-16
Applying an IPv4 ACL to a Terminal Line31-17
Applying an IPv4 ACL to an Interface31-18
Hardware and Software Treatment of IP ACLs31-19
Troubleshooting ACLs31-19
IPv4 ACL Configuration Examples31-20
Numbered ACLs31-21
Extended ACLs31-21
Named ACLs31-21
Time Range Applied to an IP ACL31-21
xxvi
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Commented IP ACL Entries31-22
Creating Named MAC Extended ACLs31-22
Applying a MAC ACL to a Layer 2 Interface31-23
Displaying IPv4 ACL Configuration31-25
Contents
CHAPTER
CHAPTER
32Configuring Cisco IOS IP SLAs Operations32-1
Understanding Cisco IOS IP SLAs32-1
Using Cisco IOS IP SLAs to Measure Network Performance32-2
IP SLAs Responder and IP SLAs Control Protocol32-3
Response Time Computation for IP SLAs32-4
Configuring IP SLAs Operations32-5
Default Configuration32-5
Configuration Guidelines32-5
Configuring the IP SLAs Responder32-6
Monitoring IP SLAs Operations32-6
33Configuring QoS33-1
Understanding QoS33-1
Basic QoS Model33-4
Classification33-5
Classification Based on QoS ACLs33-8
Classification Based on Class Maps and Policy Maps33-8
Policing and Marking33-9
Policing on Physical Ports33-10
Mapping Tables33-11
Queueing and Scheduling Overview33-12
Weighted Tail Drop33-12
SRR Shaping and Sharing33-13
Queueing and Scheduling on Ingress Queues33-14
Queueing and Scheduling on Egress Queues33-16
Packet Modification33-19
OL-19720-02
Configuring Auto-QoS33-20
Generated Auto-QoS Configuration33-20
VOIP Device Specifics33-21
Enhanced Auto-QoS for Video, Trust, and Classification33-22
Auto-QoS Configuration Migration33-22
Global Auto-QoS Configuration33-23
Auto-QoS Generated Configuration For VoIP Devices33-26
Auto-QoS Generated Configuration For Enhanced Video, Trust, and Classify Devices33-27
Catalyst 2975 Switch Software Configuration Guide
xxvii
Contents
Effects of Auto-QoS on the Configuration33-30
Auto-QoS Configuration Guidelines33-30
Auto-QoS Enhanced Considerations33-31
Enabling Auto-QoS33-31
Troubleshooting Auto QoS Commands33-32
Displaying Auto-QoS Information33-32
Configuring Standard QoS33-33
Default Standard QoS Configuration33-33
Default Ingress Queue Configuration33-34
Default Egress Queue Configuration33-34
Default Mapping Table Configuration33-35
Standard QoS Configuration Guidelines33-36
QoS ACL Guidelines33-36
Policing Guidelines33-36
General QoS Guidelines33-37
Enabling QoS Globally33-37
Configuring Classification Using Port Trust States33-37
Configuring the Trust State on Ports within the QoS Domain33-37
Configuring the CoS Value for an Interface33-39
Configuring a Trusted Boundary to Ensure Port Security33-40
Enabling DSCP Transparency Mode33-41
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain33-42
Configuring a QoS Policy33-44
Classifying Traffic by Using ACLs33-45
Classifying Traffic by Using Class Maps33-48
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps33-50
Classifying, Policing, and Marking Traffic by Using Aggregate Policers33-55
Configuring DSCP Maps33-57
Configuring the CoS-to-DSCP Map33-57
Configuring the IP-Precedence-to-DSCP Map33-58
Configuring the Policed-DSCP Map33-59
Configuring the DSCP-to-CoS Map33-60
Configuring the DSCP-to-DSCP-Mutation Map33-61
Configuring Ingress Queue Characteristics33-63
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds33-63
Allocating Buffer Space Between the Ingress Queues33-65
Allocating Bandwidth Between the Ingress Queues33-65
Configuring the Ingress Priority Queue33-66
Configuring Egress Queue Characteristics33-67
Configuration Guidelines33-68
xxviii
Catalyst 2975 Switch Software Configuration Guide
OL-19720-02
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set33-68
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID33-70
Configuring SRR Shaped Weights on Egress Queues33-72
Configuring SRR Shared Weights on Egress Queues33-73
Configuring the Egress Expedite Queue33-74
Limiting the Bandwidth on an Egress Interface33-74
Displaying Standard QoS Information33-75
Contents
CHAPTER
CHAPTER
34Configuring Static IP Unicast Routing34-1
Understanding IP Routing34-1
Types of Routing34-2
IP Routing and Switch Stacks34-2
128-Bit Wide Unicast Addresses35-3
DNS for IPv635-3
ICMPv635-4
Neighbor Discovery35-4
IPv6 Stateless Autoconfiguration and Duplicate Address Detection35-4
IPv6 Applications35-4
Dual IPv4 and IPv6 Protocol Stacks35-4
SNMP and Syslog Over IPv635-5
HTTP(S) Over IPv635-6