Cisco IOS Release 12.1(11)EA1 and 12.1(11)YJ
November 2002
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7814982=
Text Part Number: 78-14982-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS M ANUAL ARE SUBJECT TO CHA NGE WITHOUT NO TICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSI BILITY FOR THEIR APPLICA TION OF ANY PRODUCT S.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORT H IN THE INFORMATION PACKET T HAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THE SE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAI M ALL WARRANTIE S, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NO NINFRINGEM ENT OR ARISING FROM A COURS E OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING ,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE S.
CCIP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, iQ Breakthrough, iQ Expertise,
iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice LAN are trademarks of Cisco Systems, Inc.;
Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are service marks of Cisco
Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo,
Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step,
GigaStack, Internet Quotient, IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar,
SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship
Management Interf ace Options1-7
Advantage s of Us in g CMS and Cluster ing Switches1-7
Network Configuration Examples1-8
Design Concepts for Using the Switch1-8
Small to Medium-Sized Network Configuration1-11
Collapsed Backbone and Switch Cluster Configuration1-13
Large Campus Configuration1-14
Hotel Network Confi guration1-16
Multidwelling Network Using Catalyst 2950 Switches1-18
Long-Distance, High-Bandwidth Transport Configuration1-20
IOS Command Modes2-1
Getting Help2-3
Specifying Ports in Interface Configuration Mode2-4
Abbreviating Commands2-5
Using no and default Forms of Commands2-5
Understanding CLI Messages2-5
Using Command History2-6
Changing the Command Hi story Buffer Size2-6
Recalling Commands2-6
Disabling the Command History Feature2-7
Using Editing Features2-7
Enabling and Disa bling Editing Features2-7
Editing Commands through Keystrokes2-8
Editing Command Lines that Wrap2-9
Searching and Filtering Output of show and more Commands2-10
Accessing the CLI2-10
CHAPTER
Accessing the CLI from a Browser2-11
3Getting Started with CMS3-1
Features3-2
Front Panel View3-4
Cluster Tree3-6
Front-Panel Ima ges3-7
Redundant Power System LED3-8
Port Modes and LEDs3-8
VLAN Membership Modes3-9
Topology View3-10
Topology Icons3-12
Device and Link Labe ls3-13
Colors in the Topol ogy View3-14
Topology Display Options3-15
Menus and Toolbar3-15
Understanding IE2100 Series Configuration Registrar Software5-1
CNS Configuration Service5-2
CNS Event Service5-3
NameSpace M a pper5-3
What You Should Know About ConfigID, DeviceID, and Host Name5-3
ConfigID5-3
DeviceID5-4
Host Name and DeviceID5-4
Using Host Name, DeviceID, and ConfigID5-4
Understanding CNS Embedded Agents5-5
Initial Configuration5-5
Incremental (P ar tial) Configurat ion5-6
Synchronized Configuration5-6
Configuring CNS Embe dded Agents5-6
Enabling Automate d CNS Configuration5-6
Enabling the CNS Event Agent5-8
Enabling the CNS Configuration Agent5-9
Enabling an Initial Configuration5-9
Enabling a Partial Configuration5-12
CHAPTER
vi
Displaying CNS Configuration5-13
6Clustering Switches6-1
Understanding Switch Clusters6-2
Command Switch Characteristics6-3
Standby Command Switch Characteristics6-3
Candidate Switch and Member Switch Characteristics6-4
Planning a Switch Cluster6-5
Automatic Discovery of Cluster Candidates and Members6-5
Discovery th ro ug h CD P H op s6-6
Discovery through Non-CDP-Capable and Noncluster-Capable Devices6-7
Discovery through the Same Management VLAN6-8
Discovery through Di fferent Management VLANs6-9
Discovery of Newly Installed Switches6-10
Other Considerations for Cluster Standby Groups6-13
Automatic Recovery of Cluster Configuration6-15
IP Addresses6-15
Host Names6-16
Passwords6-16
SNMP Community Strings6-16
TACACS+ and RADIUS6-17
Access Modes in CMS6-17
Management VLAN6-18
LRE Profiles 6-18
Availability of Switch-Specific Features in Switch Clusters6-19
Creating a Switch Cluster6-19
Enabling a Command Switch6-19
Adding Member Switches6-20
Creating a Cluster Standby Group6-22
Verifying a Switch Cl uster6-24
Contents
CHAPTER
Using the CLI to Manage Switch Clusters6-25
Catalyst1900 and Catalyst2820 CLI Considerations6-25
Using SNMP to Manage Sw itch Clusters6-26
7Administering the Switch7-1
Preventing Unautho rized Access to Your Switch7-1
Protecting Access to Privileged EXEC Commands7-2
Default Password and Privilege Level Configuration7-2
Setting or Changing a Static Enable Password7-3
Protecting Enable and Enable Secret Passwords with Encryption7-4
Disabling Password Recovery7-5
Setting a Telnet Password for a Terminal Line7-6
Configuring User name and Password Pairs7-7
Configuring Multiple Privilege Lev e ls7-8
Identifying the TACACS+ Server Host and Setting th e Authentication Key7-13
Configuring TACACS+ Login Authentication7-14
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services7-16
Starting TACACS+ Accounting7-17
Default RADIUS Configu ration7-20
Identifying the RADIUS Server Host 7-20
Configuring RADI US Login Authentication7-23
Defining AAA Server Groups7-25
Configuring RADIUS Authorization for User Privileged Access and Network Services7-27
Starting RADIUS Accounting7-28
Configuring Set tings for All RADIUS Servers7-29
Configuring the Switch to Use Vendor-Specific RADIUS Attributes7-29
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication7-30
Displaying the RADIUS Configuration7-31
Configuring the Switch for Local Authenticat ion and Authorization7-32
Configuring the Switch for Secure Shell7-33
Understanding SSH7-33
Configuring SSH7-33
Managing the System Time and Date7-34
Understanding the System Clock 7-34
Understanding Network Time Protocol7-34
Configuring NTP7-36
Default NTP Config uration7-37
Configuring NTP Authentication7-37
Configuring NTP Associations7-38
Configuring NTP Broadcast Service7-39
Configuring NTP Ac cess Restrictions7-40
Configuring the Source IP Address for NTP Packets7-42
Displaying the NTP C onfiguration7-43
Configuring Ti me and Date Manually7-43
Setting the System Clock7-44
Displaying the Time and Date Configuration7-44
Configuring the Time Zone 7-45
Configuring Summer Time (Daylight Saving Time)7-46
Default System Name and Prompt Configuration7-48
Configuring a System Name7-48
Configuring a System Prompt7-49
Understanding DNS7-49
Default DNS Configuration7-50
Setting Up DNS7-50
Displaying the DNS Configuration7-51
Creating a Banner7-51
Default Banner Con figuration7-51
Configuring a Message-of-the-Day Login Banner7-52
Configuring a Login Banner7-53
Managing the MAC Address Table7-54
Building the Address Table7-54
MAC Addresses and VLANs7-55
Default MAC Address Tab le Configuration7-55
Changing the Addres s Aging Time7-55
Removing Dynamic Address Entries7-56
Configuring MAC Address Notification Traps7-56
Adding and Removing Static Address Entries7-58
Adding and Removing Secure Addresses7-59
Displaying Addre ss Table Entries7-60
Contents
CHAPTER
Managing the ARP Table7-61
Switch Software Releases7-61
Changing the Switch-to-Client Retransmission Time8-12
Setting the Switch-to-Client Frame-Retransmission Number8-13
Enabling Multiple Hosts8-13
Resetting the 802 .1X Configuration to the Default Values8-14
Displaying 802.1X Statistics and Status8-14
CHAPTER
9Configuring the Switch Interfaces9-1
Understanding Interface Types9-1
Access Ports9-2
Trunk Ports9-2
Port-Based VLANs9-3
EtherChannel Por t Groups9-3
Connecting Interfaces9-3
Using the Interface Command9-4
Procedures for Configuring Interfaces9-4
Configuring a Range of Interfaces9-6
Configuring and Using Interface-Range Macros9-8
Configuring Switch Interfaces9-9
Default Etherne t Interface Configuration9-10
SFP Configuration9-10
Configuring Interface Speed and Duplex Mode9-11
Configuration Guidelines9-12
Setting the Interface Speed and Duplex Parameters9-13
Configuring Media Types for Gigabit Interfaces9-14
Configuring IEEE 802.3X Flow Control on Gigabit Ethernet Ports9-14
Adding a Descripti on for an Interface9-16
CHAPTER
x
Monitoring and Maintaining the Interfaces9-16
Monitoring Interface and Controller Status9-16
Clearing and Reset ting Interfaces and Counte rs9-19
Shutting Down and Restarting the Interface9-19
10Configuring LRE10-1
Ports on the 295 0 LR E10-1
LRE Links and LRE Profil es10-2
Guidelines for Us ing LRE Profiles10-7
CPE Ethernet Link Guidelines10-7
Considerations for Connected Cisco 575 LRE CPEs10-7
Considerations for Connected Cisco 585 LRE CPEs10-8
Assigning a Global Profile to All LRE Ports10-8
Assigning a Profile to a Specific LRE Port10-9
Assigning a Global Sequence to All LRE Ports10-9
Assigning a Sequence to a Specific LRE Port10-10
Using Rate Selection to Automatically Assign Profiles10-10
Precedence10-11
Profile Lockin g10-11
Link Qualification and SNR Margins10-12
LRE Link Persist ence10-14
LRE Link Monitor10-14
Upgrading LRE Switch Firmware10-15
Configuring for an LRE Upgrade10-15
Performing an LRE Upgrade10-16
Global Configuration of LRE Upgrades10-17
Controller Configuration of LRE Upgrades10-17
LRE Upgrade Behavior Details10-18
LRE Upgrade Example10-18
Contents
CHAPTER
11Configuring STP11-1
Understanding Spanning-Tree Features11-1
STP Overview11-2
Supported Spanning-Tree Instances11-2
Bridge Protocol Data Units11-2
Election of the Root Switch11-3
Bridge ID, Switch Priority, and Extended System ID11-4
Spanning-Tree Timers11-4
Creating the Spann ing-Tree Topology11-5
Spanning-Tree I nterface States11-5
Spanning Tree and Redundant Connectivity11-8
Accelerated Aging to Retain Connectivity11-9
Configuring Spanning-Tree Features11-9
Default STP Confi guration11-10
STP Configuration Guidelines11-10
Disabling STP11-12
Configuring the Root Switch11-12
Configuring a Sec ondary Root Switch11-14
Configuring the Port Priority11-15
Configuring the Path Cost11-16
Configuring the Switch Priority of a VLAN11-18
Configuring the Hello Time11-19
Configuring th e Forwarding-Delay Time for a VLAN11-19
Configuring th e Maximum-Aging Time for a VLAN11-20
Configuring STP for Use in a Cascaded Stack11-20
CHAPTER
Displaying the Spanning-Tree Status11-21
12Configuring RSTP and MSTP12-1
Understanding RSTP12-2
Port Roles and the Active Topology12-2
Rapid Convergence12-3
Synchronization of Port Roles12-4
Bridge Protocol Data Unit Format and Processing12-5
Processing Super ior BPDU Information12-6
Processing Inferior BPDU Information12-6
Topology Changes12-6
Understanding MSTP12-7
Multiple Spanning-Tree Regions12-7
IST, CIST, and CST12-8
Operations Within an MST Region12-8
Operations Betwee n MST Regions12-9
Hop Count12-10
Boundary Ports12-10
xii
Interoperability with 802.1D STP12-11
Configuring RSTP and MSTP Features12-11
Default RSTP and MSTP Configuration12-12
RSTP and MSTP Configuration Guidelines12-12
Specifying the MST Region Configuration and Enabling MSTP12-13
Configuring the Root Switch12-14
Configuring a Secondary Root Switch12-16
Configuring the Port Priority12-17
Configuring the Path Cost12-18
Configuring the Switch Priority12-19
Configuring the Hello Time12-19
Configuring the Forwarding-Delay Time12-20
Configuring th e Maximum-Aging Time12-21
Configuring the Maximum-Hop Count12-21
Specifying the Link Type to Ensure Rapid Transiti ons12-22
Restarting the Protocol Migration Process12-22
Displaying the MST Configuration and Status12-23
Contents
CHAPTER
13Configuring Optional Spanning-Tree Features13-1
Understanding Optional Spanning-Tree Features13-1
Understanding Po rt Fast13-2
Understanding BPD U Guard13-3
Understanding BPDU Filtering13-3
Understanding UplinkFast13-4
Understanding Cross-Stack UplinkFast13-5
How CSUF Works13-6
Events That Cause Fast Convergence13-7
Limitations13-8
VLAN Configuration in VLAN Configuration Mode14-6
Saving VLAN Configuration14-7
Default Etherne t VLAN Configuration14-8
Creating or Modifying an Ethernet VLAN14-8
Deleting a VLAN14-10
Assigning St at ic-Access Port s to a VLAN14-11
802.1Q Configura tion Considerations14-16
Default Layer 2 Ethernet Inte rfa c e VL A N Co nf ig uration14-17
Configuring an Ethernet Interface as a Trunk Port14-17
Interaction with Other Features14-17
Configuring a Trunk Port14-18
Defining the Allo w e d V LA N s on a Tr un k14-19
Changing the Pruning-Eligible List14-20
Configuring the Native VLAN for Untagged Traffic14-20
Load Sharing Using STP14-21
Load Sharing Using STP Port Priorities14-21
Load Sharing Using STP Path Cost14-23
Configuring VMPS14-24
Understanding VMPS14-25
Dynamic Port VLAN Membership14-25
VMPS Databa se Co nfiguration Fi le14-26
Default VMPS Configuration14-27
VMPS Configu ra tion Guidelines14-28
Entering the IP Address of the VMPS14-28
Configuring Dynamic Access Ports on VMPS Clients14-29
Reconfirming VLAN Memberships14-30
Changing the Reconfirmation Interval14-30
Changing the Retry Count14-30
Monitoring the VMPS14-31
Troubleshooting Dynamic Port VLAN Membership14-31
VMPS Configuration Example14-32
Contents
CHAPTER
15Configuring VTP15-1
Understanding VTP15-1
The VTP Domain15-2
VTP Modes15-3
VTP Advertisements15-3
VTP Version 215-4
VTP Pruning15-4
Default Voice VLAN Configuration16-2
Voice VLAN Config uration Guidelines16-3
Configuring a Port to Connect to a Cisco7960 IP Phone16-3
Configuring Ports to Carry Voice Traffic in 802.1Q Frames16-4
Configuring Ports to Carry Voice Traffic in 802.1P Priority Tagged Frames16-4
Overriding the CoS Priority of Incoming Data Frames16-5
Configuring the IP Phone to Trust the CoS Priority of Incoming Data Frames16-6
Displaying Voic e VLAN16-6
CHAPTER
17Configuring IGMP Snooping and MVR17-1
Understanding IGMP Snooping17-1
Joining a Multicast Group17-2
Leaving a Multicast Group17-4
Immediate-Leave Processing17-4
Configuring IGMP Snooping17-5
Default IGMP Snoo ping Configuration17-5
Enabling or Dis a bl in g IG M P Sno o pi ng17-5
Setting the Snooping Method17-6
Configuring a Multicast Router Port17-7
Configuring a Host Statically to Join a Group17-8
Enabling IGMP Immediate-Leave Processing17-9
Understanding Storm Control18-1
Default Storm Control Configuration18-2
Enabling Storm Control18-2
Disabling Storm Control18-3
Configuring Protected Ports18-3
Configuring Port Security18-4
Understanding Po rt Security18-5
Secure MAC Addresses18-5
Security Viol at ions18-6
Default Port Security Configuration18-7
Port Security Configuration Guidelines18-7
Enabling and Configuring Port Security18-7
Enabling and Confi guring Port Security Aging18-10
Displaying Port -Based Traffic Control Settings18-12
19Configuring UDLD19-1
CHAPTER
CHAPTER
Understanding UDLD19-1
Configuring UDLD19-3
Default UDLD Configuration19-3
Enabling UDLD Globally19-4
Enabling UDLD on an Interface19-4
Resetting an Interface Shut Down by UDLD19-5
Displaying UDLD Status19-6
20Configuring CDP20-1
Understanding CDP20-1
Configuring CDP20-2
Default CDP Config uration20-2
Configuring the CDP Characteristics20-2
Disabling and Enabling CDP20-3
Disabling and Enabling CDP on an Interface20-4
SPAN Session21-3
Traffic Typ es21-3
Source Port21-4
Destination Por t21-5
Reflector Port21-5
VLAN-Based SPAN21-6
SPAN Traffic21-6
SPAN and RSPAN Interaction with Other Features21-7
SPAN and RSPAN Session Limit s21-8
Default SPAN and RSPAN Conf iguration21-8
Configuring SPAN21-8
SPAN Configuration Guidelines21-8
Creating a SPAN Session and Specifying Ports to Monitor21-9
Removing Ports from a SPAN Se ss io n21-11
Specifying VLANs to Monitor21-12
Specifying VLANs to Filter21-13
CHAPTER
CHAPTER
Configuring RSPAN21-14
RSPAN Configuration Guidelines21-14
Creating an RSPAN Session21-15
Creating an RSPAN Destination Session21-16
Removing Ports from an RSPAN Se s sion21-17
Specifying VLANs to Monitor21-18
Specifying VLANs to Filter21-19
Displaying SPAN and RSPAN Status21-20
22Configuring RMON22-1
Understanding RMON22-1
Configuring RMON22-2
Default RMON Configuration22-3
Configuring RMON Alarms and Events22-3
Configuring RMON Col lection on an Interface22-5
Displaying RMON Status22-6
23Configuring System Message Logging23-1
xviii
Understanding System Message Logging23-1
Configuring System Message Logging23-2
System Log Message Format23-2
Default System Message Logging Configuration23-3
Disabling and Enabling Message Logging23-4
Setting the Message D isplay Destination Device23-4
Synchronizing Log Messages23-6
Enabling and Disa bling Timestamps on Log Messages23-7
Enabling and Disabling Sequence Numbers in Log Messages23-8
Defining the Message Severity Level23-8
Limiting Syslog Messages Sent to the History Table and to SNMP23-10
Configuring UNIX Syslog Servers23-10
Logging Messages to a UNIX Syslog Daemon23-11
Configuring the UNIX System Logging Facility23-11
Displaying the Lo gging Configuration23-12
Contents
CHAPTER
24Configuring SNMP24-1
Understanding SNMP24-1
SNMP Versions24-2
SNMP Manager Functions24-3
SNMP Agent Fu nc ti on s24-3
SNMP Community Strings24-4
Using SNMP to Access MIB Variables 24-4
SNMP Notifications24-5
Configuring SNMP24-5
Default SNMP Configuration24-6
SNMP Configuration Guidelines24-6
Disabling the SNMP Agent24-7
Configuring Commun ity Strings24-7
Configuring SNMP Groups and Users24-8
Configuring SNMP Notifications24-10
Setting the Agent Contact and Location Informat ion24-13
Limiting TFTP Servers Used Through SNMP24-13
SNMP Exampl es24-14
CHAPTER
78-14982-01
Displaying SNMP Status24-15
25Configuring Network Security with ACLs25-1
Understanding ACLs25-2
Handling Fragmented and Unfragmented Traffic25-3
Understanding Access Control Parameters25-4
Guidelines for Applying ACLs to Physical Interfaces25-6
Configuring ACLs25-6
Unsupported Features25-7
Creating Standard and Extended IP ACLs25-7
Classifying Tr affic by Using ACLs26-16
Classifying Tr affic by Using Class Maps26-20
Classifying, Policing, and Marking Traffic by Using Policy Maps 26-21
Configuring CoS Map s26-24
Configuring the CoS-to-DSCP Map26-25
Configuring the DSCP-to-CoS Map26-26
Replacing a Failed Command Switch with a Cluster Member28-9
Replacing a Failed Command Switch with Another Switch28-10
Recovering from Lost Member Connectivity28-11
Preventing Auton egotiation Mismatches28-12
Troubleshooting LRE Port Configuration28-12
GBIC and SFP Module Secur ity and Identification28-13
Using Debug Commands28-14
Enabling Debuggi ng on a Specific Feature28-14
Enabling All-System Diagnostics28-15
Redirecting Debu g and Error Message Output28-15
Using the crashinfo File28-15
APPENDIX
APPENDIX
ASupported MIBsA-1
MIB ListA-1
Using FTP to Access th e MI B FilesA-2
BWorking with the IOS File System, Configuration Files, and Software ImagesB-1
Working with th e Fl ash File SystemB-1
Displaying Available File SystemsB-2
Setting the Default File SystemB-3
Displaying Information about Files on a File SystemB-3
Changing Directo ries and Displaying the Working DirectoryB-4
Creating and Removing DirectoriesB-4
Copying FilesB-5
Deleting FilesB-5
Creating, Displaying, and Extracting tar FilesB-6
Creating a tar FileB-6
Displaying the Co ntents of a tar FileB-7
Extracting a ta r Fil eB-7
Displaying the Contents of a FileB-8
xxii
Working with Configuration FilesB-8
Guidelines for Creating and Using Configuration FilesB-9
Configuration File Types and LocationB-10
Creating a Configuration File By Using a Text EditorB-10
Copying Configuration Files By Using TFTPB-11
Preparing to Download or Upload a Configuration File By Using TFTPB-11
Downloading the Con figuration File By Using TFTPB-12
Uploading the Configuration File By Using TFTPB-12
Preparing to Download or Upload a Configuration File By Using FTPB-13
Downloading a Configuration File By Using FTPB-14
Uploading a Confi guration File By Using FTPB-15
Copying Configuration Files By Using RCPB-16
Preparing to Download or Upload a Configuration File By Using RCPB-17
Downloading a Configuration File By Using RCPB-17
Uploading a Confi guration File By Using RCPB-18
Clearing Configuration InformationB-19
Clearing the St a rtu p Co nfiguration Fi leB-19
Deleting a Stored Configuration FileB-20
Working with So ft w a re Ima g esB-20
Image Location on the SwitchB-20
tar File Format of Images on a Server or Cisco.comB-21
Copying Image Files By Using TFTPB-22
Preparing to Downl oad or Upload an Image File By Using TFTPB-22
Downloading an Image File By Using TFTPB-23
Uploading an Image Fi le By Using TFTPB-24
Copying Image Files By Using FTPB-25
Preparing to Downl oad or Upload an Image File By Using FTPB-25
Downloading an Image File By Using FTPB-26
Uploading an Image Fi le By Using FTPB-28
Copying Image Files By Using RCPB-29
Preparing to Downl oad or Upload an Image File By Using RCPB-29
Downloading an Image File By Using RCPB-30
Uploading an Image File By Using RCPB-32
The Catalyst 2 950 Desktop Switch Software Configuration G uide i s for t he n etwor k mana ger
responsible for configuring the Catalyst 2950 switches, hereafter referred to as the switches. Before
using this guide, you should be familiar with the concepts and terminology of Ethernet and local area
networking.
Purpose
This guide provides information about configuring and troubleshooting a Catalyst 2950 or Catalyst 2950
Long-Reach Ethe rnet (LRE) sw itch o r s witc h cl uste rs. It inc lude s d escri ption s of th e ma na geme nt
interface options and the features supported by the switch software. The non-LRE switch is supp o rted by
either the standard software image (SI) or the enhanced software image (EI). The EI provides a richer set of
features, including access control lists (ACLs), enhanced quality of service (QoS) features, the Secure Shell
Protocol, extended-range VLANs, and Remote Switch Port Analyzer (RSPAN). For a list of switches that
support the SI and the EI, see Table 1-1 on page 1. The 2950 LRE switch is suppo rted by an a v ariation of the
enhanced software image [12.1(11)LRE].
Use this guide with other documents for information about these topics:
• Requirements—This guide assumes that you have met the hardware and software requirements and
cluster compatibility requirements described in the release notes.
• Start-up information—This guide assumes that you have assigned switch IP info rmati on and
passwords by using the setup program descri bed in the rele ase notes .
• Cluster Management Sui te (CMS) i nformat ion—This guide provides an overview of the CMS
web-based, switch mana geme nt int erface. For inf orm ation a bout CMS r e quireme nts an d the
procedures for browser and plug-in configuration and accessing CMS, refer to the release notes. For
CMS field-level window descriptions and procedures, re fer to th e CMS online he lp.
• Cluster configuration—This guide provides inform ation a bout planni ng for, creating, and
maintaining switch clusters. Because configuring switch clusters is most easily performed through
CMS, this guide does not provide the command-line interface (CLI) procedures. For the cluster
commands, refer to the comm and re ferenc e for th is releas e.
78-14982-01
• CLI command information—This guide provides an overview for using the CLI. For complete
syntax and usage information about the commands that have been specifically created or changed
for the switches, re fer to th e comm and ref erence for this re lease .
This guide does not descri be system message s you might enc ounter or how to install your switch. For
more inform ation, refer to the Catalyst 2950 Desktop Switch System Message Guide for this release and
to the Catalyst 2950 Desktop Sw itch Ha rdware Installation Guide .
NoteThis guide does not repe at the conc epts and CLI proce dures provided in the st andar d Cisco IOS
Release 12.1 docume ntation . For informa tion ab out the stan dard IO S Releas e 12.1 co mmands, re fer to
the IOS documen tation se t available fro m t he Ci sco.c om ho me p ag e at Service and Support > T echni cal Documents. On t he Cisco Produ ct Documentation hom e page, select Release 12.1 from the Ci sco
IOS Software drop-down list.
NoteThis guide describes the featu res for Catalyst 295 0 sw itches. Cisco IOS Rel ease 12.1(11)EA1 is not for
use with the Long-Reach Ethernet (LRE) switches. Do not install release 12.1(11)EA1 on Catalyst 2950
LRE switches, and do not instal l releas e 12.1(11) YJ on non-LR E switches.
Organization
Preface
This guide is organized into these chapters:
Chapter 1, “Ove rv i ew,” lists the software features of this release and provides examples of how the
switch can be deployed in a network.
Chapter 2, “Using the Command-Line Interface,” describes how to access the command modes, use the
CLI, and describes CLI messa ges that you migh t receive. It also describes how to get help, abbr eviate
commands, use no and default forms of commands, use command history and editing features, and how
to search and filter the output of show and more commands.
Chapter 3, “Getting Started with CMS,” describes the CMS web-based , switch ma nagement interface.
For information about configuring your web browser and accessing CMS, refer to the release notes. For
field-level descriptions of all CMS wi ndows and pr oc edure s f or usi ng t h e CM S wi ndows, refer to the
online help.
Chapter 4, “Assigning the Switch IP Address and Default Gateway,” describes how to create the initial
switch configuration (for example, assign the switch IP address and default gateway information) by
using a variety of automatic and manua l metho ds.
Chapter 5, “Configuring IE2100 CNS Agents,” describes how to conf igure Cisco I ntelligence Engine 2 100
(IE2100) Series Cisco Networking Services (CNS) embedded agents on your switch. By using the
IE2100 Series Configuration Registrar network management application, you can automate initial
configurations and conf iguration upd ates by generatin g switch-specific con figuration changes, sending t hem
to the switch, executing the configuration change, and logging the results.
Chapter 6, “Clust ering Switches,” describes switch c luster s and the cons ider ation s for creat ing and
maintaining them. The online help provides the CMS procedures for configuring switch clusters.
Configuring switch cl usters is mo st e asily pe rfo rmed t hroug h C MS; th eref or e, CL I pr ocedu re s are not
provided. Cluster comman ds are de scribed in the Ca tal yst 295 0 De skto p S witch Comm an d Re ference.
xxvi
Chapter 7, “Administering the Switch,” descr ibes how to perform one-tim e operat ions to admi nister
your switch. It de scr ibes how to prevent una uthor ized ac cess to y our swit ch t hroug h t he use of
passwords, privilege levels, the Terminal Access Controller Access Control System Plus (TACACS+),
and the Remote Authenticat ion Dia l-In User Ser vice (RA DIUS) a nd the Sec ure Shell (SSH) Proto col. It
also describes how to set the syste m date an d ti me, set syste m n ame and pro mp t, c reate a lo gin ba nn er,
and how to manage the MAC address and Address Resolut ion Protocol (ARP) tabl es.
Chapter 8, “Configuring 802.1X Port-Based Authentication,” d escri bes how to configu re 80 2.1X
port-based authenti ca tion to prevent unauthorized devices (clients) from gaining access to the network.
As LANs extend t o hote ls, air por ts , and c or por ate lob bi es , in sec ure environme nts cou l d b e cr ea te d.
Chapter 9, “Configuring the Switch Interfaces,” defines the types of interfaces on the switch. It describes
the interface global configuration comma nd an d prov ides pr ocedu re s f or c onfiguri ng physi cal
interfaces.
Chapter 10, “Configuring LRE,” describes how to configure LRE-spe cific fe ature s o n your sw itch .
Chapter 11, “Configuring STP,” describes how to configure the Spanning Tree Protocol (STP) on your
switch.
Chapter 12, “Configuring RSTP and MSTP,” describes how to configure the Cisco implementation o f
the IEEE 802.1W Rapid STP (RSTP) and the IEEE 802.1S Multiple STP (MSTP) on your switch. RSTP
provides rapid convergence, and M STP en ab les VLA Ns t o be g rou pe d in to a sp an ning- tre e i nstan ce .
Chapter 13, “Configuring Optional Spanning-Tree Features,” describes how to configure optional
spanning-tree featur es that can be used when you r switc h is running the per-VLAN spann ing-tr ee
(PVST) or the MS TP.
Chapter 14, “Configuring VLANs,” describes how to create and maintain VLANs. It includes
information about t he V LAN data base , VLAN c onfiguration m ode s, ext ende d-r ange VLA Ns , V LAN
trunks, and the VLAN Membership Policy Server (VMPS).
Chapter 15, “Configuring VTP,” describes how to use the VLA N Trunking Pro toco l (VT P) VLA N
database for managin g V LANs. I t inc ludes V T P cha racteri stic s and c onfiguration .
Chapter 16, “Configuring Voice VLAN,” describes how to configure voice VLANs on the switch for a
connection to an IP phone.
Chapter 17, “Configuring IGMP Snooping and MV R,” describes how to configure Intern et Group
Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR), a local
IGMP snooping fea tur e available on t he swit ch, and how to u se IG MP filterin g to c ontro l mul tica st
group membership.
Chapter 18, “Configuring Port-Based Traffic Control,” describes how to reduce traffic storms by setting
broadcast, multicast, and unicast storm-control threshold levels; how to protect ports from receiving
traffic from other ports on a switch; how to configure port security by using secure MAC addresses; and
how to set the aging time for all secure addresses.
Chapter 20, “Configuring CDP,” describes how to con figure C isco Di scovery Prot ocol (CD P) on you r
switch.
Chapter 21, “Configuring SPAN and RSPAN,” describes how to configure Switched Port Analyzer
(SPAN) and Remot e SPAN (RSPAN), which sel ect n e twork t r affic for analy si s by a ne twor k ana lyz er
such as a SwitchProbe device or other Remote Monitoring (RMON) probe.
Chapter 22, “Configuring RMON,” describes how to configure remote monitoring (RMON). The
RMON feature, which is used with the Simple Network Management Protocol (SNMP) agent in the
switch, means that you can monitor all the traffic flowing among switches on all connected LAN
segments.
Chapter 23, “Configuring System Message Logging,” describes how to configure syst em messa ge
logging. It describes the message format and how to change the message display destination device, limit
the type of message s sent , c onfigure t he U NIX ser ver sy slog daem on, and define t he U NIX syste m
logging facility and timestamp messages.
78-14982-01
Chapter 24, “Configuring SNMP,” describes how to configure the Simp le Networ k Ma nage ment
Protocol (SNMP). It describes how to configure community strings, enable trap managers and traps, set
the agent contact and location information, and how to limit TFTP servers used through SNMP.
You can order printed copies of documents with a D OC-xxxxxx= number from the Cisco.com sites and
from the telephone numbers listed in the “Obtaining Docu me nta tio n” section on page xxix.
• Release Notes for the Catalyst 2950 Switch (not orderable but is available on Cisco.com)
• Release Notes for the Catalyst 2900 Series and Catalyst 3500 Series XL Switches (not orderable but
is available on Cisco.com)
NoteSwitch requirements and procedures for initial configurations and software upgrades tend to change and
therefore appear only in the release note s . Before installing, configuring, or upgrading the switch, refer
to the release notes on Cisco.com for the latest information.
• Catalyst 2950 D esktop Sw itch Comm and Refe rence (or der n um ber D OC -781 1381 =)
Related Publications
• Catalyst 2950 Desktop Switch System Message Guide (order num ber DOC-781 4233= )
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM
package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may
be more current than printed documentation. The CD-ROM package is available as a single unitor
through an annual subscription.
Ordering Documentation
You can order Cisco documen tation in th ese ways:
• Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from
the Networking Produ cts Market Pla ce:
http://www.cisco.com/cgi-bin/order/order_root.pl
• Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription
Store:
http://www.cisco.com/go/subscription
Preface
• Nonregistered Cisco.co m u ser s can o rd er docum en tati on th rou gh a l oc al ac count r epre sen tative by
calling Cisco Systems Corpo rate Headqu arter s (Califo rnia, U.S.A. ) at 408 526-7208 or, elsewhere
in North America, by calli ng 800 55 3-NE TS (6387).
Documentation Feedback
If you are reading Cisco product documentation on the World Wide W eb, you can send us your comments
by completing the online survey. When you display the document listing fo r this platfor m, cli ck Give
Us Your Feedback. After you display the survey , select the manual that you wish to comment on. Click
Submit to send your comments to the Cisc o document ation gro up.
You can e-mail your comm ents t o bug-doc@c isco.co m.
To submit you r co mme nts by ma il, u se th e r esponse ca rd behi nd the fro nt c over of your d oc um ent, o r
write to the following address:
Cisco Systems
Attn: Document Resour ce Connec tion
170 West Tasman Drive
San Jose, CA 95134- 988 3
We apprec iate yo ur comm en ts.
Obtaining Technical Assistanc e
xxx
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can
obtain online documentation, troubleshooting tips, and sample configurations from online tools by using
the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete
access to the technical support resources on the Cisco TAC Web Site.