Catalyst 6500 Series Switch Cisco IOS
Software Configuration Guide—Release
12.1 E
Cisco IOS Release 12.1 E
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7814099=
Text Part Number: 78-14099-04
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human Network are
trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You,
Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,
Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing,
FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo,
LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels,
ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the
WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0807R)
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
Accessing the CLI through the EIA/TIA-232 Console Interface1
Accessing the CLI through Telnet2
Performing Command Line Processing3
Performing History Substitution3
Cisco IOS Command Modes 4
Displaying a List of Cisco IOS Commands and Syntax5
ROM-Monitor Command-Line Interface6
3Configuring the Switch for the First Time 1
78-14099-04
Default Configuration1
Configuring the Switch2
Using the Setup Facility or the setup Command2
Using Configuration Mode10
Checking the Running Configuration Before Saving10
Saving the Running Configuration Settings11
Reviewing the Configuration11
Configuring a Default Gateway12
Configuring a Static Route12
Configuring a BOOTP Server14
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3
Contents
Protecting Access to Privileged EXEC Commands15
Setting or Changing a Static Enable Password15
Using the enable password and enable secret Commands15
Setting or Changing a Line Password16
Setting TACACS+ Password Protection for Privileged EXEC Mode16
Encrypting Passwords17
Configuring Multiple Privilege Levels17
Recovering a Lost Enable Password19
Modifying the Supervisor Engine Startup Configuration20
Understanding the Supervisor Engine Boot Configuration20
Configuring the Software Configuration Register21
Specifying the Startup System Image24
Understanding Flash Memory24
BOOTLDR Environment Variable25
CONFIG_FILE Environment Variable26
Controlling Environment Variables26
CHAPTER
CHAPTER
4Configuring EHSA Supervisor Engine Redundancy1
Supervisor Engine Redundant Operation1
Supervisor Engine Redundancy Requirements2
Synchronizing the Supervisor Engine Configurations3
Displaying the Supervisor Engine Redundancy4
Copying Files to the Redundant Supervisor Engine4
5Configuring RPR and RPR+ Supervisor Engine Redundancy1
Supervisor Engine Redundancy Guidelines and Restrictions4
RPR+ Guidelines and Restrictions4
Hardware Configuration Guidelines and Restrictions5
Restrictions5
Configuration Mode Restrictions6
Configuring Supervisor Engine Redundancy6
Configuring RPR and RPR+6
Synchronizing the Supervisor Engine Configurations7
Displaying the Redundancy States8
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
4
78-14099-04
Performing a Fast Software Upgrade9
Copying Files to an MSFC10
Contents
CHAPTER
6Configuring Interfaces1
Understanding Interface Configuration1
Using the Interface Command2
Configuring a Range of Interfaces4
Defining and Using Interface-Range Macros6
Configuring Optional Interface Features7
Configuring Ethernet Interface Speed and Duplex Mode7
Configuring Jumbo Frame Support10
Configuring IEEE 802.3Z Flow Control14
Configuring the Port Debounce Timer15
Adding a Description for an Interface16
Understanding Online Insertion and Removal17
Monitoring and Maintaining Interfaces17
Monitoring Interface Status17
Clearing Counters on an Interface18
Resetting an Interface19
Shutting Down and Restarting an Interface19
CHAPTER
CHAPTER
7Configuring LAN Ports for Layer 2 Switching1
Understanding How Layer 2 Switching Works1
Understanding Layer 2 Ethernet Switching1
Understanding VLAN Trunks2
Layer 2 LAN Port Modes4
Default Layer 2 LAN Interface Configuration5
Layer 2 LAN Interface Configuration Guidelines and Restrictions6
Restrictions6
Guidelines6
Configuring LAN Interfaces for Layer 2 Switching7
Configuring a LAN Port for Layer 2 Switching7
Configuring a Layer 2 Switching Port as a Trunk8
Configuring a LAN Interface as a Layer 2 Access Port14
Configuring a Custom IEEE 802.1Q EtherType Field Value16
8Configuring VTP1
Understanding How VTP Works1
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
5
Contents
Understanding the VTP Domain2
Understanding VTP Modes2
Understanding VTP Advertisements2
Understanding VTP Version 23
Understanding VTP Pruning3
VTP Default Configuration5
VTP Configuration Guidelines and Restrictions5
Configuring VTP6
Configuring VTP Global Parameters6
Configuring the VTP Mode8
Displaying VTP Statistics10
VLAN Configuration Options9
Creating or Modifying an Ethernet VLAN10
Assigning a Layer 2 LAN Interface to a VLAN12
Configuring the Internal VLAN Allocation Policy12
Mapping 802.1Q VLANs to ISL VLANs12
10Configuring Private VLANs1
Understanding How Private VLANs Work1
Private VLAN Configuration Restrictions and Guidelines2
Configuring Private VLANs5
Configuring a VLAN as a Private VLAN5
Associating Secondary VLANs with a Primary VLAN6
Mapping Secondary VLANs to the Layer 3 VLAN Interface of a Primary VLAN7
Configuring a Layer 2 Interface as a Private VLAN Host Port8
Configuring a Layer 2 Interface as a Private VLAN Promiscuous Port9
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6
78-14099-04
Contents
CHAPTER
CHAPTER
11Configuring Cisco IP Phone Support1
Understanding Cisco IP Phone Support1
Cisco IP Phone Connections1
Cisco IP Phone Voice Traffic2
Cisco IP Phone Data Traffic3
Cisco IP Phone Power Configurations3
Default Cisco IP Phone Support Configuration4
Cisco IP Phone Support Configuration Guidelines and Restrictions4
Configuring Cisco IP Phone Support5
Configuring Voice Traffic Support5
Configuring Data Traffic Support7
Configuring Inline Power Support8
12Configuring Layer 3 Interfaces1
Configuring IP Routing and Addresses2
Configuring IPX Routing and Network Numbers6
Configuring AppleTalk Routing, Cable Ranges, and Zones7
Configuring Other Protocols on Layer 3 Interfaces8
CHAPTER
CHAPTER
13Configuring EtherChannels1
Understanding How EtherChannels Work1
EtherChannel Feature Overview2
Understanding How EtherChannels Are Configured2
Understanding Port Channel Interfaces5
Understanding Load Balancing5
EtherChannel Feature Configuration Guidelines and Restrictions5
Configuring EtherChannels6
Configuring Port Channel Logical Interfaces for Layer 3 EtherChannels7
Configuring Channel Groups8
Configuring the LACP System Priority and System ID10
Configuring EtherChannel Load Balancing11
14Configuring IEEE 802.1Q Tunneling and Layer 2 Protocol Tunneling1
Understanding How 802.1Q Tunneling Works1
802.1Q Tunneling Configuration Guidelines and Restrictions4
Restrictions4
Guidelines4
78-14099-04
Configuring 802.1Q Tunneling5
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
7
Contents
Preconfiguration Tasks6
Configuring 802.1Q Tunnel Ports6
Configuring the Switch to Tag Native VLAN Traffic7
Understanding How Layer 2 Protocol Tunneling Works7
Configuring Support for Layer 2 Protocol Tunneling8
CHAPTER
15Configuring STP and IEEE 802.1s MST1
Understanding How STP Works2
STP Overview2
Understanding the Bridge ID3
Understanding Bridge Protocol Data Units4
Election of the Root Bridge4
STP Protocol Timers5
Creating the Spanning Tree Topology5
STP Port States6
STP and IEEE 802.1Q Trunks12
Understanding How IEEE 802.1w RSTP Works13
IEEE 802.1w RSTP Overview13
RSTP Port Roles13
RSTP Port States14
Rapid-PVST14
Understanding How IEEE 802.1s MST Works14
IEEE 802.1s MST Overview15
MST-to-PVST Interoperability16
Common Spanning Tree18
MST Instances18
MST Configuration Parameters18
MST Regions19
Message Age and Hop Count20
Default STP Configuration21
STP and MST Configuration Guidelines21
Configuring STP22
Enabling STP23
Enabling the Extended System ID24
Configuring the Root Bridge25
Configuring a Secondary Root Bridge26
Configuring STP Port Priority27
Configuring STP Port Cost29
Configuring the Bridge Priority of a VLAN30
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
8
78-14099-04
Configuring the Hello Time32
Configuring the Forward-Delay Time for a VLAN32
Configuring the Maximum Aging Time for a VLAN33
Enabling Rapid-PVST33
Default IP Multicast Layer 3 Switching Configuration7
IP Multicast Layer 3 Switching Configuration Guidelines and Restrictions8
PFC2 with MSCF28
PFC1 with MSFC or MSCF28
PFC1 and PFC2 General Restrictions9
Unsupported Features9
Configuring IP Multicast Layer 3 Switching9
Source Specific Multicast with IGMPv3, IGMP v3lite, and URD10
Enabling IP Multicast Routing Globally10
Enabling IP PIM on Layer 3 Interfaces10
Enabling IP Multicast Layer 3 Switching on Layer 3 Interfaces11
Configuring the Layer 3 Switching Global Threshold11
Enabling Installation of Directly Connected Subnets12
Enabling NetFlow-Based Rate Limiting of RPF Failures12
Enabling CEF-Based Rate Limiting of RPF Failures13
Enabling Shortcut-Consistency Checking13
Configuring ACL-Based Filtering of RPF Failures14
Displaying RPF Failure Rate-Limiting Information14
Displaying IP Multicast Layer 3 Hardware Switching Summary14
Displaying the IP Multicast Routing Table16
Displaying IP Multicast Layer 3 Switching Statistics17
Using Debug Commands18
Clearing IP Multicast Layer 3 Switching Statistics19
CHAPTER
10
19Configuring IP Unicast Layer 3 Switching on Supervisor Engine 11
Understanding How IP MLS Works2
IP MLS Overview2
IP MLS Flows2
Layer 3 MLS Cache3
Flow Masks3
Layer 3-Switched Packet Rewrite4
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
IP MLS Operation5
Default IP MLS Configuration6
IP MLS Configuration Guidelines and Restrictions6
Configuring IP MLS6
Enabling IP MLS Globally6
Disabling and Enabling IP MLS on a Layer 3 Interface7
Displaying the Interface IP MLS Configuration7
Configuring the MLS Aging-Time8
Setting the Minimum IP MLS Flow Mask8
Displaying IP MLS Cache Entries9
Displaying IP MLS Information9
Displaying IP MLS Cache Entries for a Specific Destination Address10
Displaying Cache Entries for a Specific Source IP Address10
Displaying Entries for a Specific IP Flow11
Contents
CHAPTER
Clearing IP MLS Cache Entries11
Displaying IP MLS Contention Table and Statistics12
Troubleshooting IP MLS14
20Configuring IPX Unicast Layer 3 Switching on Supervisor Engine 11
Supervisor Engine DoS Protection2
Security ACLs2
QoS ACLs4
Forwarding Information Base Rate-Limiting5
ARP Throttling5
Monitoring Packet Drop Statistics6
802.1X Port-Based Authentication Guidelines and Restrictions6
78-14099-04
Configuring 802.1X Port-Based Authentication7
Enabling 802.1X Port-Based Authentication 7
Configuring Switch-to-RADIUS-Server Communication 8
Enabling Periodic Reauthentication10
Manually Reauthenticating the Client Connected to a Port11
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
13
Contents
Initializing Authentication for the Client Connected to a Port11
Changing the Quiet Period11
Changing the Switch-to-Client Retransmission Time12
Setting the Switch-to-Client Retransmission Time for EAP-Request Frames13
Setting the Switch-to-Authentication-Server Retransmission Time for Layer 4 Packets13
Setting the Switch-to-Client Frame Retransmission Number14
Enabling Multiple Hosts14
Resetting the 802.1X Configuration to the Default Values15
Displaying 802.1X Status15
CHAPTER
CHAPTER
CHAPTER
26Configuring Port Security1
Understanding Port Security1
Default Port Security Configuration2
Port Security Guidelines and Restrictions2
Configuring Port Security2
Configuring Port Security on an Interface3
Configuring Port Security Aging4
Displaying Port Security Settings5
27Configuring Layer 3 Protocol Filtering on Supervisor Engine 11
Understanding How Layer 3 Protocol Filtering Works1
Configuring Layer 3 Protocol Filtering2
Enabling Layer 3 Protocol Filtering2
Configuring Layer 3 Protocol Filtering on a Layer 2 LAN Interface3
Verifying Layer 3 Protocol Filtering Configuration3
28Configuring Traffic Storm Control1
CHAPTER
14
Understanding Traffic Storm Control1
Default Traffic Storm Control Configuration2
Enabling Traffic Storm Control2
Displaying Traffic Storm Control Settings4
29Configuring Broadcast Suppression1
Understanding How Broadcast Suppression Works1
Broadcast Suppression Configuration Guidelines and Restrictions2
Enabling Broadcast Suppression3
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Contents
CHAPTER
CHAPTER
30Configuring CDP1
Understanding How CDP Works1
Configuring CDP1
Enabling CDP Globally2
Displaying the CDP Global Configuration2
Enabling CDP on a Port2
Displaying the CDP Interface Configuration3
Monitoring and Maintaining CDP3
31Configuring PFC QoS1
Understanding How PFC QoS Works1
Hardware Supported by PFC QoS2
QoS Terminology3
PFC QoS Feature Flowcharts6
PFC QoS Feature Summary11
Ingress LAN Port Features12
PFC Marking and Policing16
LAN Egress Port Features21
PFC QoS Statistics Data Export24
PFC QoS Default Configuration25
PFC QoS Configuration Guidelines and Restrictions31
Guidelines:31
Restrictions32
Configuring PFC QoS33
Enabling PFC QoS Globally33
Enabling Queueing-Only Mode34
Creating Named Aggregate Policers35
Configuring a PFC QoS Policy37
Enabling or Disabling Microflow Policing50
Enabling Microflow Policing of Bridged Traffic50
Enabling or Disabling PFC Features on an Interface51
Enabling VLAN-Based PFC QoS on Layer 2 LAN Ports52
Configuring the Trust State of Ethernet LAN and OSM Ingress Ports53
Configuring the Ingress LAN Port CoS Value54
Configuring Standard-Queue Drop Threshold Percentages54
Mapping CoS Values to Drop Thresholds59
Allocating Bandwidth Between LAN-Port Transmit Queues64
Setting the Receive-Queue Size Ratio on a 1p1q0t or 1p1q8t Ingress LAN Ports64
Setting the LAN-Port Transmit-Queue Size Ratio65
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
15
Contents
Configuring DSCP Value Maps66
Configuring PFC QoS Statistics Data Export70
CHAPTER
CHAPTER
32Configuring UDLD1
Understanding How UDLD Works1
UDLD Overview1
UDLD Aggressive Mode2
Default UDLD Configuration3
Configuring UDLD3
Enabling UDLD Globally3
Enabling UDLD on Individual LAN Interfaces4
Disabling UDLD on Fiber-Optic LAN Interfaces5
Configuring the UDLD Probe Message Interval5
Resetting Disabled LAN Interfaces6
33Configuring NDE1
Understanding How NDE Works1
NDE Overview2
NDE from the MSFC2
NDE from the PFC2
Default NDE Configuration7
CHAPTER
Configuring NDE8
Configuring NDE on the PFC8
Configuring NDE on the MSFC13
Displaying the NDE Address and Port Configuration14
Configuring NDE Flow Filters15
Displaying the NDE Configuration17
34Configuring Local SPAN and RSPAN1
Understanding How Local SPAN and RSPAN Work1
Local SPAN and RSPAN Overview1
Local SPAN and RSPAN Sessions3
Monitored Traffic4
SPAN Sources4
Destination Ports5
Local SPAN and RSPAN Configuration Guidelines and Restrictions5
Local SPAN and RSPAN Session Limits5
Local SPAN and RSPAN Source and Destination Limits6
16
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Local SPAN and RSPAN Guidelines and Restrictions6
VSPAN Guidelines and Restrictions7
RSPAN Guidelines and Restrictions7
Configuring Local SPAN and RSPAN8
Local SPAN and RSPAN Configuration Overview8
Configuring RSPAN VLANs9
Configuring Local or RSPAN Sources9
Monitoring Specific Source VLANs on a Source Trunk Port10
Configuring Local SPAN and RSPAN Destinations10
Verifying the Configuration12
Configuration Examples13
Specifying a Version of WCCP7
Configuring a Service Group Using WCCPv28
Excluding Traffic on a Specific Interface from Redirection9
Registering a Router to a Multicast Address10
Using Access Lists for a WCCP Service Group10
Setting a Password for a Router and Cache Engines11
Verifying and Monitoring WCCP Configuration Settings12
WCCP Configuration Examples12
Changing the Version of WCCP on a Router Example13
Performing a General WCCPv2 Configuration Example13
Running a Web Cache Service Example13
Running a Reverse Proxy Service Example14
Registering a Router to a Multicast Address Example14
Using Access Lists Example14
Setting a Password for a Router and Cache Engines Example15
Verifying WCCP Settings Example15
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
17
Contents
CHAPTER
CHAPTER
36Configuring SNMP IfIndex Persistence1
Understanding SNMP IfIndex Persistence1
Configuring SNMP IfIndex Persistence1
Enabling and Disabling SNMP IfIndex Persistence Globally2
Enabling and Disabling SNMP IfIndex Persistence on Specific Interfaces2
Configuring the Switching Mode3
Configuring Fabric-Required Mode4
Configuring an LCD Message5
CHAPTER
Monitoring the Switch Fabric Module5
Displaying the Module Information5
Displaying the Switch Fabric Module Redundancy Status6
Displaying Fabric Channel Switching Modes6
Displaying the Fabric Status7
Displaying the Fabric Utilization7
Displaying Fabric Errors7
38Power Management and Environmental Monitoring1
Understanding How Power Management Works1
Enabling or Disabling Power Redundancy2
Using the CLI to Power Modules Off and On3
Using the CLI to View System Power Status3
Using the CLI to Power Cycle Modules4
Determining System Power Requirements4
Understanding How Environmental Monitoring Works4
Using CLI Commands to Monitor System Environmental Status4
Understanding LED Environmental Indications4
18
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Contents
APPENDIX
INDEX
AAcronyms1
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
19
Contents
20
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Audience
Preface
This preface describes who should read the Catalyst 6500 Series Switch Cisco IOS Software
Configuration Guide, how it is organized, and its document conventions.
This guide is for experienced network administrators who are responsible for configuring and
maintaining Catalyst 6500 series switches.
Organization
This guide is organized as follows:
ChapterTitleDescription
Chapter 1Product OverviewPresents an overview of the Catalyst 6500 series
Chapter 2Command-Line InterfacesDescribes how to use the command-line interface
Chapter 3Configuring the Switch for the
Chapter 4Configuring EHSA Supervisor
Chapter 5Configuring RPR and RPR+
Chapter 6Configuring InterfacesDescribes how to configure non-layer-specific
Chapter 7Configuring LAN Ports for Layer
Chapter 8Configuring VTPDescribes how to configure the VLAN Trunking
Chapter 9Configuring VLANsDescribes how to configure VLANs.
Chapter 10 Configuring Private VLANsDescribes how to configure private VLANs.
First Time
Engine Redundancy
Supervisor Engine Redundancy
2 Switching
switches.
(CLI).
Describes how to perform a baseline configuration.
Describes how to configure EHSA supervisor engine
redundancy.
Describes how to configure RPR and RPR+
supervisor engine redundancy.
features on LAN interfaces.
Describes how to configure LAN interfaces to
support Layer 2 features, including VLAN trunks.
Protocol (VTP).
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
21
Organization
Preface
ChapterTitleDescription
Chapter 11 Configuring Cisco IP Phone
Support
Chapter 12 Configuring Layer 3 InterfacesDescribes how to configure LAN interfaces to
Chapter 13 Configuring EtherChannelsDescribes how to configure Layer 2 and Layer 3
Chapter 14 Configuring IEEE 802.1Q
Tunneling and Layer 2 Protocol
Tunneling
Chapter 15 Configuring STP and IEEE 802.1s
MST
Chapter 16 Configuring Optional STP
Features
Chapter 17 Configuring IP Unicast Layer 3
Switching on Supervisor Engine 2
Chapter 18 Configuring IP Multicast Layer 3
Switching
Chapter 19 Configuring IP Unicast Layer 3
Switching on Supervisor Engine 1
Chapter 20 Configuring IPX Unicast Layer 3
Switching on Supervisor Engine 1
Chapter 21 Configuring IGMP SnoopingDescribes how to configure Internet Group
Chapter 22 Configuring RGMPDescribes how to configure Router-Port Group
Chapter 23 Configuring Network SecurityDescribes how to configure network security features
Chapter 24 Configuring Denial of Service
Protection
Chapter 25 Configuring IEEE 802.1X
Port-Based Authentication
Chapter 26 Configuring Port SecurityDescribes how to configure port security.
Chapter 27 Configuring Layer 3 Protocol
Filtering on Supervisor Engine 1
Chapter 28 Configuring Traffic Storm Control Describes how to configure traffic storm control.
Chapter 29 Configuring Broadcast
Suppression
Chapter 30 Configuring CDPDescribes how to configure Cisco Discovery Protocol
Chapter 32 Configuring UDLDDescribes how to configure the UniDirectional Link
Chapter 31 Configuring PFC QoSDescribes how to configure quality of service (QoS).
Describes how to configure Cisco IP Phone support.
support Layer 3 features.
EtherChannel port bundles.
Describes how to configure IEEE 802.1Q tunneling
and Layer 2 protocol tunneling.
Describes how to configure the Spanning Tree
Protocol (STP) and explains how STP works.
Describes how to configure the STP PortFast,
UplinkFast, and BackboneFast features.
Describes how to configure IP unicast Layer 3
switching for Supervisor Engine 2.
Describes how to configure IP Multicast Multilayer
Switching (MMLS).
Describes how to configure IP unicast Layer 3
switching for Supervisor Engine 1.
Describes how to configure IPX unicast Layer 3
switching for Supervisor Engine 1.
Management Protocol (IGMP) snooping.
Management Protocol (RGMP).
that are unique to the Catalyst 6500 series switches.
Describes how to configure denial of service
protection.
Describes how to configure IEEE 802.1X port-based
authentication.
Describes how to configure Layer 3 protocol filtering
on Supervisor Engine 1.
Describes how to configure broadcast suppression.
(CDP).
Detection (UDLD) protocol.
22
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Preface
ChapterTitleDescription
Chapter 33 Configuring NDEDescribes how to configure Neflow Data Export
Chapter 34 Configuring Local SPAN and
RSPAN
Chapter 35 Configuring Web Cache Services
Using WCCP
Chapter 36 Configuring SNMP IfIndex
Persistence
Chapter 37 Configuring the Switch Fabric
Module
Chapter 38 Power Management and
Environmental Monitoring
Related Documentation
Related Documentation
(NDE).
Describes how to configure the Switch Port Analyzer
(SPAN).
Describes how to configure web cache services using
WCCP.
Describes how to configure SNMP ifIndex
persistence.
Describes how to configure the Switch Fabric
Module.
Describes how to configure power management and
environmental monitoring features.
The following publications are available for the Catalyst 6500 series switches:
• Catalyst 6500 Series Switch Installation Guide
• Catalyst 6500 Series Switch Module Installation Guide
• Catalyst 6500 Series Switch Cisco IOS Command Reference
• Catalyst 6500 Series Switch Cisco IOS System Message Guide
• Release Notes for Cisco IOS Release 12.1 E on the Catalyst 6500 and Cisco 7600
Supervisor Engine and MSFC
• Cisco IOS Configuration Guides and Command References—Use these publications to help you
configure Cisco IOS software features not described in the Catalyst 6500 series switch publications:
–
Configuration Fundamentals Configuration Guide
–
Configuration Fundamentals Command Reference
–
Bridging and IBM Networking Configuration Guide
–
Bridging and IBM Networking Command Reference
–
Interface Configuration Guide
–
Interface Command Reference
–
Network Protocols Configuration Guide, Part 1, 2, and 3
–
Network Protocols Command Reference, Part 1, 2, and 3
–
Security Configuration Guide
–
Security Command Reference
–
Switching Services Configuration Guide
78-14099-04
–
Switching Services Command Reference
–
Voice, Video, and Home Applications Configuration Guide
–
Voice, Video, and Home Applications Command Reference
–
Software Command Summary
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
23
Conventions
• For information about MIBs, go to this URL:
Conventions
This document uses the following conventions:
–
Software System Error Messages
–
Debug Command Reference
–
Internetwork Design Guide
–
Internetwork Troubleshooting Guide
–
Configuration Builder Getting Started Guide
The Cisco IOS Configuration Guides and Command References are located at this URL:
boldface fontCommands, command options, and keywords are in boldface.
italic fontArguments for which you supply values are in italics.
[ ]Elements in square brackets are optional.
{ x | y | z }Alternative keywords are grouped in braces and separated by vertical bars.
[ x | y | z ]Optional alternative keywords are grouped in brackets and separated by
vertical bars.
stringA nonquoted set of characters. Do not use quotation marks around the
string or the string will include the quotation marks.
screen fontTerminal sessions and information the system displays are in screen font.
boldface screen
Information you must enter is in boldface screen font.
font
italic screen fontArguments for which you supply values are in italic screen font.
This pointer highlights an important line of text in an example.
^The symbol ^ represents the key labeled Control—for example, the key
combination ^D in a screen display means hold down the Control key
while you press the D key.
< >Nonprinting characters, such as passwords are in angle brackets.
Notes use the following conventions:
24
NoteMeans reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Preface
Conventions
Cautions use the following conventions:
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
25
Conventions
Preface
26
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
CHA PTER
1
Product Overview
The Cisco IOS on the Catalyst 6500 Series Switches product supports the following hardware and
software:
Fabric-enabled switching modules with a distributed forwarding card (DFC)
• Supervisor Engine 1, PFC, and MSFC or MSFC2
• All Layer 2 and Layer 3 configuration from the same user interface
• Except for VLANs, Layer 2 and Layer 3 configuration is stored in a standard IOS configuration file
Refer to the Release Notes for Cisco IOS Release 12.1 E on the Catalyst 6500 and Cisco 7600
Supervisor Engine and MSFC publication for complete information about the chassis, modules,
and software features supported by the Catalyst 6500 series switches:
The Embedded CiscoView network management system is a web-based interface that uses HTTP and
SNMP to provide a graphical representation of the switch and to provide a GUI-based management and
configuration interface. You can download the Java Archive (JAR) files for Embedded CiscoView at
this URL:
To install and configure Embedded CiscoView, perform the following steps:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Router# dir device_name
Router# delete device_name:cv/*
Router# squeeze device_name:
Router# archive tar /xtract tftp://
ip address of tftp server/ciscoview.tar
device_name:cv
Router# dir device_name:
Router# configure terminal
Router(config)# ip http server
Router(config)# snmp-server community stringro
Router(config)# snmp-server community stringrw
Displays the contents of the device.
If you are installing Embedded CiscoView for the first
time, or if the CiscoView directory is empty, skip to
Step 4.
Removes existing files from the CiscoView directory.
Recovers the space in the file system.
Extracts the CiscoView files from the tar file on the TFTP
server to the CiscoView directory.
Displays the contents of the device.
In a redundant configuration, repeat Step 1 through
Step 5 for the file system on the redundant supervisor
engine.
Enters global configuration mode.
Enables the HTTP web server.
Configures the SNMP password for read-only operation.
Configures the SNMP password for read/write operation.
1-2
NoteThe default password for accessing the switch web page is the enable-level password of the switch.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 1 Product Overview
For more information about web access to the switch, refer to “Using the Cisco Web Browser” in the
IOS Configuration Fundamentals Configuration Guide at this URL:
• Displaying a List of Cisco IOS Commands and Syntax, page 2-5
• ROM-Monitor Command-Line Interface, page 2-6
Accessing the CLI
These sections describe accessing the CLI:
• Accessing the CLI through the EIA/TIA-232 Console Interface, page 2-1
• Accessing the CLI through Telnet, page 2-2
Accessing the CLI through the EIA/TIA-232 Console Interface
NoteEIA/TIA-232 was known as recommended standard 232 (RS-232) before its acceptance as a standard by
the Electronic Industries Alliance (EIA) and Telecommunications Industry Association (TIA).
Perform initial configuration over a connection to the EIA/TIA-232 console interface. Refer to the
Catalyst 6500 Series Switch Module Installation Guide for console interface cable connection
procedures.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
2-1
Accessing the CLI
To make a console connection, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Press Return.Brings up the prompt.
Router> enable
Password: password
Router#
Router# quit
After making a console connection, you see this display:
Press Return for Console prompt
Router> enable
Password:
Router#
Accessing the CLI through Telnet
Chapter 2 Command-Line Interfaces
Initiates enable mode enable.
Completes enable mode enable.
Exits the session when finished.
Step 1
Step 2
Step 3
Step 4
Step 5
NoteBefore you can make a Telnet connection to the switch, you must configure an IP address (see the
“Configuring IP Routing and Addresses” section on page 12-2).
The switch supports up to eight simultaneous Telnet sessions. Telnet sessions disconnect automatically
after remaining idle for the period specified with the exec-timeout command.
To make a Telnet connection to the switch, perform this task:
CommandPurpose
telnet {hostname | ip_addr}
Makes a Telnet connection from the remote host, to the
switch you want to access.
Password: password
Router#
Initiates authentication.
NoteIf no password has been configured, press
Return.
Router> enable
Password: password
Router#
Router# quit
Initiates enable mode enable.
Completes enable mode enable.
Exits the session when finished.
2-2
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 2 Command-Line Interfaces
This example shows how to open a Telnet session to the switch:
unix_host% telnet Router_1
Trying 172.20.52.40...
Connected to 172.20.52.40.
Escape character is '^]'.
User Access Verification
Password:
Router_1> enable
Password:
Router_1#
Performing Command Line Processing
Commands are not case sensitive. You can abbreviate commands and parameters if the abbreviations
contain enough letters to be different from any other currently available commands or parameters. You
can scroll through the last 20 commands stored in the history buffer, and enter or edit the command at
the prompt. Table 2- 1 lists the keyboard shortcuts for entering and editing commands.
Performing Command Line Processing
Table 2-1Keyboard Shortcuts
KeystrokesPurpose
Press Ctrl-B or
press the left arrow key
Press Ctrl-F or
press the right arrow key
1
Moves the cursor back one character
Moves the cursor forward one character
1
Press Ctrl-AMoves the cursor to the beginning of the command line
Press Ctrl-EMoves the cursor to the end of the command line
Press Esc BMoves the cursor back one word
Press Esc FMoves the cursor forward one word
1. The arrow keys function only on ANSI-compatible terminals such as VT100s.
Performing History Substitution
The history buffer stores the last 20 commands you entered. History substitution allows you to access
these commands without retyping them, by using special abbreviated commands. Table 2-2 lists the
history substitution commands.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
2-3
Cisco IOS Command Modes
Table 2-2History Substitution Commands
CommandPurpose
Ctrl-P or the up arrow key.
Ctrl-N or the down arrow key.
Router# show history
1. The arrow keys function only on ANSI-compatible terminals such as VT100s.
1
1
Cisco IOS Command Modes
Chapter 2 Command-Line Interfaces
Recalls commands in the history buffer, beginning
with the most recent command. Repeat the key
sequence to recall successively older commands.
Returns to more recent commands in the history
buffer after recalling commands with Ctrl-P or the
up arrow key. Repeat the key sequence to recall
successively more recent commands.
While in EXEC mode, lists the last several
commands you have just entered.
NoteFor complete information about Cisco IOS command modes, refer to the Cisco IOS Configuration
Fundamentals Configuration Guide and the Cisco IOS Configuration Fundamentals Command
Reference publication at this URL:
The Cisco IOS user interface is divided into many different modes. The commands available to you
depend on which mode you are currently in. To get a list of the commands in a given mode, type a
question mark (?) at the system prompt. See the “Displaying a List of Cisco IOS Commands and Syntax”
section on page 2-5.
When you start a session on the switch, you begin in user mode, often called user EXEC mode. Only a
limited subset of the commands are available in EXEC mode. To have access to all commands, you must
enter privileged EXEC mode. Normally, you must type in a password to access privileged EXEC mode.
From privileged EXEC mode, you can type in any EXEC command or access global configuration mode.
The configuration modes allow you to make changes to the running configuration. If you later save the
configuration, these commands are stored across reboots. You must start at global configuration mode.
From global configuration mode, you can enter interface configuration mode, subinterface configuration
mode, and a variety of protocol-specific modes.
NoteWith Release 12.1(11b)E and later, when you are in configuration mode you can enter EXEC mode-level
commands by entering the do keyword before the EXEC mode-level command.
ROM-monitor mode is a separate mode used when the switch cannot boot properly. For example, the
switch might enter ROM-monitor mode if it does not find a valid system image when it is booting, or if
its configuration file is corrupted at startup. See the “ROM-Monitor Command-Line Interface” section
on page 2-6.
Table 2-3 lists and describes frequently used Cisco IOS modes.
2-4
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 2 Command-Line Interfaces
Displaying a List of Cisco IOS Commands and Syntax
Table 2-3Frequently Used Cisco IOS Command Modes
ModeDescription of UseHow to AccessPrompt
User EXECConnect to remote devices, change
terminal settings on a temporary
basis, perform basic tests, and
display system information.
Privileged EXEC (enable) Set operating parameters. The
privileged command set includes
the commands in user EXEC
mode, as well as the configure
command. Use this command to
access the other command modes.
Global configurationConfigure features that affect the
system as a whole.
Interface configurationMany features are enabled for a
particular interface. Interface
commands enable or modify the
operation of an interface.
Console configurationFrom the directly connected
console or the virtual terminal
used with Telnet, use this
configuration mode to configure
the console interface.
Log in.
From the user EXEC mode, enter
the enable command and the
enable password.
From the privileged EXEC mode,
enter the configure terminal
command.
From global configuration mode,
enter the interface type slot/port
command.
From global configuration mode,
enter the line console 0 command.
Router>
Router#
Router(config)#
Router(config-if)#
Router(config-line)#
The Cisco IOS command interpreter, called the EXEC, interprets and executes the commands you enter.
You can abbreviate commands and keywords by entering just enough characters to make the command
unique from other commands. For example, you can abbreviate the show command to sh and the
configure terminal command to config t.
When you type exit, the switch backs out one level. To exit configuration mode completely and return
to privileged EXEC mode, press Ctrl-Z.
Displaying a List of Cisco IOS Commands and Syntax
In any command mode, you can display a list of available commands by entering a question mark (?).
Router> ?
To display a list of commands that begin with a particular character sequence, type in those characters
followed by the question mark (?). Do not include a space. This form of help is called word help because
it completes a word for you.
Router# co?
configure
To display keywords or arguments, enter a question mark in place of a keyword or argument. Include a
space before the question mark. This form of help is called command syntax help because it reminds you
which keywords or arguments are applicable based on the command, keywords, and arguments you have
already entered.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
2-5
ROM-Monitor Command-Line Interface
For example:
Router# configure ?
memory Configure from NV memory
network Configure from a TFTP network host
overwrite-network Overwrite NV memory from TFTP network host
terminal Configure from the terminal
<cr>
To redisplay a command you previously entered, press the up arrow key or Ctrl-P. You can continue to
press the up arrow key to see the last 20 commands you entered.
TipIf you are having trouble entering a command, check the system prompt, and enter the question mark (?)
for a list of available commands. You might be in the wrong command mode or using incorrect syntax.
Enter exit to return to the previous mode. Press Ctrl-Z or enter the end command in any mode to
immediately return to privileged EXEC mode.
ROM-Monitor Command-Line Interface
Chapter 2 Command-Line Interfaces
The ROM-monitor is a ROM-based program that executes upon platform power-up, reset, or when a fatal
exception occurs. The switch enters ROM-monitor mode if it does not find a valid software image, if the
NVRAM configuration is corrupted, or if the configuration register is set to enter ROM-monitor mode.
From the ROM-monitor mode, you can load a software image manually from Flash memory, from a
network server file, or from bootflash.
You can also enter ROM-monitor mode by restarting and pressing the Break key during the first 60
seconds of startup.
NoteThe Break key is always enabled for 60 seconds after rebooting, regardless of whether the Break key is
configured to be off by configuration register settings.
To access the ROM-monitor mode through a terminal server, you can escape to the Telnet prompt and
enter the send break command for your terminal emulation program to break into ROM-monitor mode.
Once you are in ROM-monitor mode, the prompt changes to rommon 1>. Enter a question mark (?) to
see the available ROM-monitor commands.
For more information about the ROM-monitor commands, refer to the Catalyst 6500 Series Switch Cisco IOS Command Reference publication.
2-6
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
CHA PTER
Configuring the Switch for the First Time
This chapter contains information about how to initially configure the Catalyst 6500 series switch, which
supplements the administration information and procedures in these publications:
• Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.1, at this URL:
• Protecting Access to Privileged EXEC Commands, page 3-15
• Recovering a Lost Enable Password, page 3-19
• Modifying the Supervisor Engine Startup Configuration, page 3-20
Default Configuration
Table 3-1 shows the default configuration.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-1
Configuring the Switch
Table 3-1Default Configuration
FeatureDefault Value
Administrative connectionNormal mode
Global informationNo value for the following:
System clockNo value for system clock time
PasswordsNo passwords configured for normal mode or
Prompt
Configuring the Switch
Chapter 3 Configuring the Switch for the First Time
• System name
• System contact
• Location
enable mode (press the Return key)
Router>
These sections describe how to configure the switch:
• Using the Setup Facility or the setup Command, page 3-2
• Using Configuration Mode, page 3-10
• Checking the Running Configuration Before Saving, page 3-10
• Saving the Running Configuration Settings, page 3-11
• Reviewing the Configuration, page 3-11
• Configuring a Default Gateway, page 3-12
• Configuring a Static Route, page 3-12
• Configuring a BOOTP Server, page 3-14
NoteWith Release 12.1(11b)E and later, when you are in configuration mode you can enter EXEC mode-level
commands by entering the do keyword before the EXEC mode-level command.
Using the Setup Facility or the setup Command
These sections describe the setup facility and the setup command:
• Setup Overview, page 3-2
• Configuring the Global Parameters, page 3-3
Setup Overview
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-2
• Configuring Interfaces, page 3-8
At initial startup, the switch automatically defaults to the setup facility. (The setup command facility
functions exactly the same as a completely unconfigured system functions when you first boot it up.)
You can run the setup facility by entering the setup command at the enable prompt (#).
78-14099-04
Chapter 3 Configuring the Switch for the First Time
When you enter the setup command, current system configuration defaults are displayed in square
brackets [ ] as you move through the setup command process and are queried by the system to make
changes.
For example, you will see this display when you use the setup facility:
Configuring interface FastEtherent3/1:
Is this interface in use?: yes
Configure IP on this interface?: yes
When you use the setup command, you see this display:
Configuring interface FastEthernet4/1:
Is this interface in use?[yes]: yes
Configure IP on this interface?[yes]: yes
Configuring the Global Parameters
When you first start the setup facility or enter the setup command, you are queried by the system to
configure the global parameters, which are used for controlling system-wide settings.
To boot the switch and enter the global parameters, follow these steps:
Configuring the Switch
Step 1Connect a console terminal to the console interface on the supervisor engine, and then boot the system
to the user EXEC prompt (
Router>).
The following display appears after you boot the Catalyst 6500 series switch (depending on your
configuration, your display might not exactly match the example):
System Bootstrap, Version 6.1(2)
Copyright (c) 1994-2000 by cisco Systems, Inc.
c6k_sup2 processor with 131072 Kbytes of main memory
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
78-14099-04
Cisco Internetwork Operating System Software
IOS (tm) c6sup2_sp Software (c6sup2_sp-SPV-M), Version 12.1(5c)EX, EARLY DEPLOYM
ENT RELEASE SOFTWARE (fc1)
Synced to mainline version: 12.1(5c)
TAC:Home:Software:Ios General:CiscoIOSRoadmap:12.1
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-3
Configuring the Switch
Chapter 3 Configuring the Switch for the First Time
Copyright (c) 1986-2001 by cisco Systems, Inc.
Compiled Wed 28-Mar-01 18:36 by hqluong
Image text-base: 0x30020980, data-base: 0x306B8000
Start as Primary processor
00:00:05: %SYS-3-LOGGER_FLUSHING: System pausing to ensure console debugging out
put.
00:00:03: Currently running ROMMON from S (Gold) region
00:00:05: %OIR-6-CONSOLE: Changing console ownership to route processor
System Bootstrap, Version 12.1(3r)E2, RELEASE SOFTWARE (fc1)
Copyright (c) 2000 by cisco Systems, Inc.
Cat6k-MSFC2 platform with 131072 Kbytes of main memory
rommon 1 > boot
Self decompressing the image : #################################################
################################################################################
## [OK]
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) MSFC2 Software (C6MSFC2-BOOT-M), Version 12.1(3a)E4, EARLY DEPLOYMENT R
ELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Sat 14-Oct-00 05:33 by eaarmas
Image text-base: 0x30008980, data-base: 0x303B6000
cisco Cat6k-MSFC2 (R7000) processor with 114688K/16384K bytes of memory.
Processor board ID SAD04430J9K
R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache
Last reset from power-on
X.25 software, Version 3.0.0.
509K bytes of non-volatile configuration memory.
16384K bytes of Flash internal SIMM (Sector size 512K).
3-4
Press RETURN to get started!
NoteThe first two sections of the configuration script (the banner and the installed hardware) appear
only at initial system startup. On subsequent uses of the setup command facility, the setup script
begins with the following System Configuration Dialog.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
--- System Configuration Dialog ---
Continue with configuration dialog? [yes/no]: y
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.
Basic management setup configures only enough connectivity
for management of the system, extended setup will ask you
to configure each interface on the system
NoteThe examples in this section are intended as examples only. Your configuration might look
differently depending on your system configuration.
Step 2Enter yes or press Return when asked if you want to enter the configuration dialog and if you want to
see the current interface summary. Press Return to accept the default (yes):
Would you like to enter the initial configuration dialog? [yes]:
Configuring the Switch
First, would you like to see the current interface summary? [yes]:
This example of a yes response (displayed during the setup facility) shows a switch at first-time startup;
that is, nothing has been configured:
Current interface summary
Interface IP-Address OK? Method Status Protocol
Vlan1 unassigned YES TFTP administratively down down
GigabitEthernet1/1 unassigned YES TFTP administratively down down
GigabitEthernet1/2 unassigned YES TFTP administratively down down
GigabitEthernet3/1 unassigned YES TFTP administratively down down
GigabitEthernet3/2 unassigned YES TFTP administratively down down
GigabitEthernet3/3 unassigned YES TFTP administratively down down
GigabitEthernet3/4 unassigned YES TFTP administratively down down
GigabitEthernet3/5 unassigned YES TFTP administratively down down
GigabitEthernet3/6 unassigned YES TFTP administratively down down
GigabitEthernet3/7 unassigned YES TFTP administratively down down
GigabitEthernet3/8 unassigned YES TFTP administratively down down
78-14099-04
(Additional displayed text omitted from this example.)
This example of a yes response (displayed during the setup command facility) shows a switch with some
interfaces already configured:
Current interface summary
Interface IP-Address OK? Method Status Protocol
Vlan1 unassigned YES TFTP administratively down down
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-5
Configuring the Switch
Step 3Choose which protocols to support on your interfaces. On IP installations only, you can accept the
Chapter 3 Configuring the Switch for the First Time
GigabitEthernet1/1 172.20.52.34 YES NVRAM up up
GigabitEthernet1/2 unassigned YES TFTP administratively down down
GigabitEthernet3/1 unassigned YES TFTP administratively down down
GigabitEthernet3/2 unassigned YES TFTP administratively down down
GigabitEthernet3/3 unassigned YES TFTP administratively down down
GigabitEthernet3/4 unassigned YES TFTP administratively down down
GigabitEthernet3/5 unassigned YES TFTP administratively down down
GigabitEthernet3/6 unassigned YES TFTP administratively down down
GigabitEthernet3/7 unassigned YES TFTP administratively down down
GigabitEthernet3/8 unassigned YES TFTP administratively down down
<...output truncated...>
default values for most of the questions.
A typical minimal configuration using IP follows and continues through Step 8:
Configuring global parameters:
Enter host name [Router]: Router
Step 4Enter the enable secret password when the following is displayed (remember this password for future
reference):
The enable secret is a password used to protect access to
privileged EXEC and configuration modes. This password, after
entered, becomes encrypted in the configuration.
Enter enable secret: barney
Step 5Enter the enable password when the following is displayed (remember this password for future
reference):
The enable password is used when you do not specify an
enable secret password, with some older software versions, and
some boot images.
Enter enable password: wilma
The commands available at the user EXEC level are a subset of those available at the privileged EXEC
level. Because many privileged EXEC commands are used to set operating parameters, you should
protect these commands with passwords to prevent unauthorized use.
You must enter the correct password to gain access to privileged EXEC commands. When you are
running from the boot ROM monitor, the enable password might be the correct one to use, depending on
your boot ROM level.
The enable and enable secret passwords need to be different for effective security. You can enter the same
password for both enable and enable secret during the setup script, but you receive a warning message
indicating that you should enter a different password.
3-6
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
NoteAn enable secret password can contain from 1 to 25 uppercase and lowercase alphanumeric
characters; an enable password can contain any number of uppercase and lowercase
alphanumeric characters. In both cases, a number cannot be the first character. Spaces are also
valid password characters; for example, “two words” is a valid password. Leading spaces are
ignored; trailing spaces are recognized.
Step 6Enter the virtual terminal password when the following is displayed (remember this password for future
reference):
The virtual terminal password is used to protect
access to the router over a network interface.
Enter virtual terminal password: bambam
Step 7In most cases you will use IP routing. If so, you must also select an interior routing protocol, for
example, the Enhanced Interior Gateway Routing Protocol (EIGRP).
Enter yes (the default) or press Return to configure IP, and then select EIGRP:
Configure IP? [yes]:
Configure EIGRP routing? [yes]:
Your IGRP autonomous system number [1]: 301
Configuring the Switch
Step 8Enter yes or no to accept or refuse SNMP management:
Configure SNMP Network Management? [yes]:
Community string [public]:
For complete SNMP information and procedures, refer to these publications:
To provide a review of what you have done, a display similar to the following appears and lists all of the
configuration parameters you selected in Steps 3 through 8. These parameters and their defaults are
shown in the order in which they appeared on your console terminal:
The following configuration command script was created:
hostname router
enable secret 5 $1$S3Lx$uiTYg2UrFK1U0dgWdjvxw.
enable password lab
line vty 0 4
password lab
no snmp-server
!
ip routing eigrp 301
!
interface Vlan1
shutdown
no ip address
!
interface GigabitEthernet1/1
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-7
Configuring the Switch
Chapter 3 Configuring the Switch for the First Time
shutdown
no ip address
!
interface GigabitEthernet1/2
shutdown
no ip address
!
.
<...output truncated...>
.!
end
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
Enter your selection [2]: 2
% You can enter the setup, by typing setup at IOS command prompt
Router#
This completes the procedure on how to configure global parameters. The setup facility continues with
the process to configure interfaces in the next section “Configuring Interfaces.”
Configuring Interfaces
This section provides steps for configuring installed interfaces (using the setup facility or setup
command facility) to allow communication over your external networks. To configure the interface
parameters, you need your interface network addresses, subnet mask information, and which protocols
you want to configure. (For additional interface configuration information on each of the modules
available, refer to the individual configuration notes that shipped with your modules.)
NoteThe examples in this section are intended as examples only. Your configuration might look differently
depending on your system configuration.
To configure interfaces, follow these steps:
Step 1At the prompt for the Gigabit Ethernet interface configuration, enter the appropriate responses for your
requirements, using your own address and subnet mask:
Do you want to configure GigabitEthernet1/1 interface? [no]: yes
Configure IP on this interface? [no]: yes
IP address for this interface: 172.20.52.34
Subnet mask for this interface [255.255.0.0] : 255.255.255.224
Class B network is 172.20.0.0, 27 subnet bits; mask is /27
Step 2At the prompt for all other interface types, enter the appropriate responses for your requirements:
Do you want to configure FastEthernet5/1 interface? [no]: y
Configure IP on this interface? [no]: y
IP address for this interface: 172.20.52.98
Subnet mask for this interface [255.255.0.0] : 255.255.255.248
Class B network is 172.20.0.0, 29 subnet bits; mask is /29
3-8
Repeat this step for each interface you need to configure. Proceed to Step 3 to check and verify your
configuration parameters.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
When you reach and respond to the configuration dialog for the last installed interface, your interface
configuration is complete.
Step 3Check and verify the entire list of configuration parameters, which should display on your console
terminal and end with the following query:
Use this configuration? [yes/no]:
A no response places you back at the enable prompt (#). You will need to reenter the setup command to
reenter your configuration. A yes response saves the running configuration to NVRAM as follows:
Use this configuration? [yes/no]: yes
[OK]
Use the enabled mode ‘configure’ command to modify this configuration.
Press RETURN to get started!
After you press the Return key, this prompt appears:
Router>
This completes the procedures for configuring global parameters and interface parameters in your
system. Your interfaces are now available for limited use.
If you want to modify the currently saved configuration parameters after the initial configuration, enter
the setup command. To perform more complex configurations, enter configuration mode and use the
configure command. Check the current state of the switch using the show version command, which
displays the software version and the interfaces, as follows:
Router# show version
Cisco Internetwork Operating System Software
IOS (tm) c6sup2_rp Software (c6sup2_rp-JS-M), Version 12.1(13)E1, EARLY DEPLOYM)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Wed 06-Nov-02 13:57 by eaarmas
Image text-base: 0x40008C00, data-base: 0x41A72000
Configuring the Switch
78-14099-04
ROM: System Bootstrap, Version 12.1(11r)E1, RELEASE SOFTWARE (fc1)
BOOTLDR: c6sup2_rp Software (c6sup2_rp-JS-M), Version 12.1(13)E1, EARLY DEPLOYM)
Router uptime is 4 hours, 22 minutes
Time since Router switched to active is 4 hours, 22 minutes
System returned to ROM by power-on (SP by power-on)
System image file is "sup-bootflash:c6sup22-js-mz.121-13.E1"
cisco Catalyst 6000 (R7000) processor with 112640K/18432K bytes of memory.
Processor board ID SAD06210067
R7000 CPU at 300Mhz, Implementation 39, Rev 3.3, 256KB L2, 1024KB L3 Cache
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
4 Virtual Ethernet/IEEE 802.3 interface(s)
48 FastEthernet/IEEE 802.3 interface(s)
2 Gigabit Ethernet/IEEE 802.3 interface(s)
381K bytes of non-volatile configuration memory.
16384K bytes of Flash internal SIMM (Sector size 512K).
Configuration register is 0x2102
Router#
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-9
Configuring the Switch
For detailed interface configuration information, refer to the Cisco IOS Interface Configuration Guide
at this URL:
In either of these configuration modes, you can enter any changes to the configuration. Enter the end
command to exit configuration mode.
Step 5Save your settings. (See the “Saving the Running Configuration Settings” section on page 3-11.)
Your switch is now minimally configured and can boot with the configuration you entered. To see a list
of the configuration commands, enter ? at the prompt or press the help key in configuration mode.
Checking the Running Configuration Before Saving
You can check the configuration settings you entered or changes you made by entering the show
running-config command at the privileged EXEC prompt (#) as follows:
Router# show running-config
Building configuration...
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-10
78-14099-04
Chapter 3 Configuring the Switch for the First Time
Current configuration:
Current configuration : 3441 bytes
!
version 12.1
service timestamps debug datetime localtime
service timestamps log datetime localtime
no service password-encryption
!
hostname Router
!
boot buffersize 522200
boot system flash slot0:c6sup22-jsv-mz.121-5c.EX.bin
boot bootldr bootflash:c6msfc2-boot-mz.121-3a.E4
enable password lab
!
redundancy
main-cpu
auto-sync standard
ip subnet-zero
no ip finger
!
cns event-service server
!
<...output truncated...>
!
interface FastEthernet3/3
ip address 172.20.52.19 255.255.255.224
!
<...output truncated...>
!
line con 0
exec-timeout 0 0
transport input none
line vty 0 4
exec-timeout 0 0
password lab
login
transport input lat pad mop telnet rlogin udptn nasi
!
end
Router#
Configuring the Switch
Saving the Running Configuration Settings
To store the configuration or changes to your startup configuration in NVRAM, enter the copy
running-config startup-config command at the privileged EXEC prompt (#) as follows:
Router# copy running-config startup-config
This command saves the configuration settings that you created in configuration mode. If you fail to do
this step, your configuration will be lost the next time you reload the system.
Reviewing the Configuration
To display information stored in NVRAM, enter the show startup-config EXEC command. The display
should be similar to the display from the show running-config EXEC command.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
3-11
Configuring the Switch
Configuring a Default Gateway
NoteThe switch uses the default gateway only when it is not configured with a routing protocol.
To send data to another subnet when the switch is not configured with a routing protocol, configure a
default gateway. The default gateway must be the IP address of an interface on a router in the same
subnet.
To configure a default gateway, perform this task:
CommandPurpose
Step 1
Step 2
Router(config)# ip default-gateway A.B.C.D
Router# show ip route
This example shows how to configure a default gateway and how to verify the configuration:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# ip default-gateway 172.20.52.35
Router(config)# end
3d17h: %SYS-5-CONFIG_I: Configured from console by console
Router# show ip route
Default gateway is 172.20.52.35
Chapter 3 Configuring the Switch for the First Time
Configures a default gateway.
Verifies that the default gateway appears correctly in the
IP routing table.
Host Gateway Last Use Total Uses Interface
ICMP redirect cache is empty
Router#
Configuring a Static Route
If your Telnet station or SNMP network management workstation is on a different network from your
switch and a routing protocol has not been configured, you might need to add a static routing table entry
for the network where your end station is located.
To configure a static route, perform this task:
CommandPurpose
Step 1
Step 2
Router(config)# ip routedest_IP_address mask
{forwarding_IP | vlanvlan_ID}
Router# show running-config
This example shows how to use the ip route command to configure a static route to a workstation at IP
address 171.10.5.10 on the switch with a subnet mask and IP address 172.20.3.35 of the forwarding
router:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# ip route 171.10.5.10 255.255.255.255 172.20.3.35
Router(config)# end
Router#
Configures a static route.
Verifies the static route configuration.
3-12
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
This example shows how to use the show running-config command to confirm the configuration of the
previously configured static route:
Router# show running-config
Building configuration...
.
<...output truncated...>
.
ip default-gateway 172.20.52.35
ip classless
ip route 171.10.5.10 255.255.255.255 172.20.3.35
no ip http server
!
line con 0
transport input none
line vty 0 4
exec-timeout 0 0
password lab
login
transport input lat pad dsipcon mop telnet rlogin udptn nasi
!
end
Router#
Configuring the Switch
This example shows how to use the ip route command to configure a static route to a workstation at IP
address 171.20.5.3 on the switch with subnet mask and connected over VLAN 1:
Router# configure terminal
Router(config)# ip route 171.20.5.3 255.255.255.255 vlan 1
Router(config)# end
Router#
This example shows how to use the show running-config command to confirm the configuration of the
previously configured static route:
Router# show running-config
Building configuration...
.
<...output truncated...>
.
ip default-gateway 172.20.52.35
ip classless
ip route 171.20.52.3 255.255.255.255 Vlan1
no ip http server
!
!
x25 host z
!
line con 0
transport input none
line vty 0 4
exec-timeout 0 0
password lab
login
transport input lat pad dsipcon mop telnet rlogin udptn nasi
!
end
78-14099-04
Router#
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-13
Configuring the Switch
Configuring a BOOTP Server
The Bootstrap Protocol (BOOTP) automatically assigns an IP address by adding the MAC and IP
addresses of the interface to the BOOTP server configuration file. When the switch boots, it
automatically retrieves the IP address from the BOOTP server.
The switch performs a BOOTP request only if the current IP address is set to 0.0.0.0. (This address is
the default address for a new switch or a switch that has had its startup-config file cleared using the erase
command.)
To allow your switch to retrieve its IP address from a BOOTP server, you must first determine the MAC
address of the switch and add that MAC address to the BOOTP configuration file on the BOOTP server.
To create a BOOTP server configuration file, follow these steps:
Step 1Install the BOOTP server code on the workstation, if it is not already installed.
Step 2Determine the MAC address from the label on the chassis.
Step 3Add an entry in the BOOTP configuration file (usually /usr/etc/bootptab) for each switch. Press Return
after each entry to create a blank line between each entry. See the example BOOTP configuration file
that follows in Step 4.
Step 4Enter the reload command to reboot and automatically request the IP address from the BOOTP server.
This example BOOTP configuration file shows the added entry:
# /etc/bootptab: database for bootp server (/etc/bootpd)
#
# Blank lines and lines beginning with '#' are ignored.
#
# Legend:
#
# first field -- hostname
# (may be full domain name and probably should be)
#
# hd -- home directory
# bf -- bootfile
# cs -- cookie servers
# ds -- domain name servers
# gw -- gateways
# ha -- hardware address
# ht -- hardware type
# im -- impress servers
# ip -- host IP address
# lg -- log servers
# lp -- LPR servers
# ns -- IEN-116 name servers
# rl -- resource location protocol servers
# sm -- subnet mask
# tc -- template host (points to similar host entry)
# to -- time offset (seconds)
# ts -- time servers
#
<information deleted>
#
#########################################################################
# Start of individual host entries
#########################################################################
Router: tc=netcisco0: ha=0000.0ca7.ce00: ip=172.31.7.97:
dross: tc=netcisco0: ha=00000c000139: ip=172.31.7.26:
<information deleted>
Chapter 3 Configuring the Switch for the First Time
3-14
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
Protecting Access to Privileged EXEC Commands
Protecting Access to Privileged EXEC Commands
The following tasks provide a way to control access to the system configuration file and privileged
EXEC commands:
• Setting or Changing a Static Enable Password, page 3-15
• Using the enable password and enable secret Commands, page 3-15
To display the password or access level configuration, see the “Displaying the Password, Access Level,
and Privilege Level Configuration” section on page 3-19.
Using the enable password and enable secret Commands
To provide an additional layer of security, particularly for passwords that cross the network or that are
stored on a TFTP server, you can use either the enable password or enable secret commands. Both
commands configure an encrypted password that you must enter to access enable mode (the default) or
to access a specified privilege level. We recommend that you use the enable secret command.
If you configure the enable secret command, it takes precedence over the enable password command;
the two commands cannot be in effect simultaneously.
To configure the switch to require an enable password, perform either of these tasks:
Establishes a password for the privileged EXEC mode.
Specifies a secret password, saved using a nonreversible
encryption method. (If enable password and enable secret
commands are both set, users must enter the enable secret
password.)
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
3-15
Protecting Access to Privileged EXEC Commands
Use either of these commands with the level option to define a password for a specific privilege level.
After you specify the level and set a password, give the password only to users who need to have access
at this level. Use the privilege level configuration command to specify commands accessible at various
levels.
If you enable the service password-encryption command, the password you enter is encrypted. When
you display it with the more system:running-config command, it displays in encrypted form.
If you specify an encryption type, you must provide an encrypted password that you copy from another
Catalyst 6500 series switch configuration.
NoteYou cannot recover a lost encrypted password. You must clear NVRAM and set a new password. See the
“Recovering a Lost Enable Password” section on page 3-19 if you lose or forget your password.
To display the password or access level configuration, see the “Displaying the Password, Access Level,
and Privilege Level Configuration” section on page 3-19.
Setting or Changing a Line Password
Chapter 3 Configuring the Switch for the First Time
To set or change a password on a line, perform this task:
CommandPurpose
Router(config-line)# passwordpassword
To display the password or access level configuration, see the “Displaying the Password, Access Level,
and Privilege Level Configuration” section on page 3-19.
Sets a new password or change an existing password for the
privileged level.
Setting TACACS+ Password Protection for Privileged EXEC Mode
For complete information about TACACS+, refer to these publications:
To set the TACACS+ protocol to determine whether or not a user can access privileged EXEC mode,
perform this task:
CommandPurpose
Router(config)# enable use-tacacs
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-16
Sets the TACACS-style user ID and password-checking
mechanism for the privileged EXEC mode.
78-14099-04
Chapter 3 Configuring the Switch for the First Time
When you set TACACS password protection at the privileged EXEC mode, the enable EXEC command
prompts for both a new username and a password. This information is then sent to the TACACS+ server
for authentication. If you are using the extended TACACS+, it also sends any existing UNIX user
identification code to the TACACS+ server.
CautionIf you enter the enable use-tacacs command, you must also enter tacacs-server authenticate enable,
or you are locked out of the privileged EXEC mode.
NoteWhen used without extended TACACS, the enable use-tacacs command allows anyone with a valid
username and password to access the privileged EXEC mode, creating a potential security problem. This
problem occurs because the switch cannot tell the difference between a query resulting from entering the
enable command and an attempt to log in without extended TACACS.
Encrypting Passwords
Because protocol analyzers can examine packets (and read passwords), you can increase access security
by configuring the Cisco IOS software to encrypt passwords. Encryption prevents the password from
being readable in the configuration file.
Protecting Access to Privileged EXEC Commands
To configure the Cisco IOS software to encrypt passwords, perform this task:
CommandPurpose
Router(config)# service password-encryption
Encryption occurs when the current configuration is written or when a password is configured. Password
encryption is applied to all passwords, including authentication key passwords, the privileged command
password, console and virtual terminal line access passwords, and Border Gateway Protocol (BGP)
neighbor passwords. The service password-encryption command keeps unauthorized individuals from
viewing your password in your configuration file.
CautionThe service password-encryption command does not provide a high level of network security. If you
use this command, you should also take additional network security measures.
Although you cannot recover a lost encrypted password (that is, you cannot get the original password
back), you can regain control of the switch after you lose or forget the encrypted password. See the
“Recovering a Lost Enable Password” section on page 3-19 if you lose or forget your password.
To display the password or access level configuration, see the “Displaying the Password, Access Level,
and Privilege Level Configuration” section on page 3-19.
Encrypts a password.
Configuring Multiple Privilege Levels
By default, the Cisco IOS software has two modes of password security: user EXEC mode and privileged
EXEC mode. You can configure up to 16 hierarchical levels of commands for each mode. By configuring
multiple passwords, you can allow different sets of users to have access to specified commands.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
3-17
Protecting Access to Privileged EXEC Commands
For example, if you want many users to have access to the clear line command, you can assign it level 2
security and distribute the level 2 password widely. If you want more restricted access to the configure
command, you can assign it level 3 security and distribute that password to more restricted users.
These tasks describe how to configure additional levels of security:
• Setting the Privilege Level for a Command, page 3-18
• Changing the Default Privilege Level for Lines, page 3-18
• Logging In to a Privilege Level, page 3-18
• Exiting a Privilege Level, page 3-19
• Displaying the Password, Access Level, and Privilege Level Configuration, page 3-19
Setting the Privilege Level for a Command
To set the privilege level for a command, perform this task:
Chapter 3 Configuring the Switch for the First Time
Sets the privilege level for a command.
Specifies the enable password for a privilege level.
To display the password or access level configuration, see the “Displaying the Password, Access Level,
and Privilege Level Configuration” section on page 3-19.
Changing the Default Privilege Level for Lines
To change the default privilege level for a given line or a group of lines, perform this task:
CommandPurpose
Router(config-line)# privilege levellevel
Changes the default privilege level for the line.
To display the password or access level configuration, see the “Displaying the Password, Access Level,
and Privilege Level Configuration” section on page 3-19.
Logging In to a Privilege Level
To log in at a specified privilege level, perform this task:
CommandPurpose
Router# enablelevel
Logs into a specified privilege level.
3-18
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
Exiting a Privilege Level
To exit to a specified privilege level, perform this task:
CommandPurpose
Router# disablelevel
Exits to a specified privilege level.
Displaying the Password, Access Level, and Privilege Level Configuration
To display the password, access level, and privilege level configuration, perform this task:
CommandPurpose
Step 1
Step 2
Router# show running-config
Router# show privilege
This example shows how to display the password and access level configuration:
Router# show running-config
<...output truncated...>
enable password lab
<...output truncated...>
Displays the password and the access level configuration.
Shows the privilege level configuration.
Recovering a Lost Enable Password
This example shows how to display the privilege level configuration:
Router# show privilege
Current privilege level is 15
Router#
Recovering a Lost Enable Password
To recover a lost enable password, follow these steps:
Step 1Connect to the console interface.
Step 2Configure the switch to boot up without reading the configuration memory (NVRAM).
Step 3Reboot the system.
Step 4Access enable mode (which can be done without a password when one is not configured).
Step 5View or change the password, or erase the configuration.
Step 6Reconfigure the switch to boot up and read the NVRAM as it normally does.
Step 7Reboot the system.
78-14099-04
NotePassword recovery requires the Break signal. You must be familiar with how your terminal or PC
terminal emulator issues this signal. For example, in ProComm, the Alt-B keys generate the Break
signal. In a Windows terminal session, you press the Break or Ctrl and Break keys simultaneously.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-19
Chapter 3 Configuring the Switch for the First Time
Modifying the Supervisor Engine Startup Configuration
Modifying the Supervisor Engine Startup Configuration
These sections describe how the startup configuration on the supervisor engine works and how to modify
the configuration register and BOOT variable:
• Understanding the Supervisor Engine Boot Configuration, page 3-20
• Configuring the Software Configuration Register, page 3-21
• Specifying the Startup System Image, page 3-24
• Understanding Flash Memory, page 3-24
• BOOTLDR Environment Variable, page 3-25
• CONFIG_FILE Environment Variable, page 3-26
• Controlling Environment Variables, page 3-26
Understanding the Supervisor Engine Boot Configuration
These next sections describe how the boot configuration works on the supervisor engine.
Understanding the Supervisor Engine Boot Process
The supervisor engine boot process involves two software images: ROM monitor and supervisor engine
software. When the switch is powered up or reset, the ROM-monitor code is executed. Depending on the
NVRAM configuration, the supervisor engine either stays in ROM-monitor mode or loads the supervisor
engine software.
Two user-configurable parameters determine how the switch boots: the configuration register and the
BOOT environment variable. The configuration register is described in the “Modifying the Boot Field
and Using the boot Command” section on page 3-22. The BOOT environment variable is described in
the “Specifying the Startup System Image” section on page 3-24.
Understanding the ROM Monitor
The ROM monitor executes upon power-up, reset, or when a fatal exception occurs. The switch enters
ROM-monitor mode if the switch does not find a valid software image, if the NVRAM configuration is
corrupted, or if the configuration register is set to enter ROM-monitor mode. From ROM-monitor mode,
you can manually load a software image from bootflash or a Flash PC card.
NoteFor complete syntax and usage information for the ROM monitor commands, refer to the Catalyst 6500
Series Switch Cisco IOS Command Reference publication.
You can also enter ROM-monitor mode by restarting and then pressing the Break key during the first 60
seconds of startup. If you are connected through a terminal server, you can escape to the Telnet prompt
and enter the send break command to enter ROM-monitor mode.
3-20
NoteThe Break key is always enabled for 60 seconds after rebooting, regardless of whether the
configuration-register setting has the Break key disabled.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
The ROM monitor has these features:
• Power-on confidence test
• Hardware initialization
• Boot capability (manual boot and autoboot)
• Debug utility and crash analysis
• Monitor call interface (EMT calls—the ROM monitor provides information and some functionality
to the running software images through EMT calls)
• File system (the ROM monitor knows the simple file system and supports the newly developed file
system through the dynamic linked file system library [MONLIB])
• Exception handling
Configuring the Software Configuration Register
The switch uses a 16-bit software configuration register, which allows you to set specific system
parameters. Settings for the software configuration register are written into NVRAM.
Modifying the Supervisor Engine Startup Configuration
Following are some reasons for changing the software configuration register settings:
• To select a boot source and default boot filename.
• To enable or disable the Break function.
• To control broadcast addresses.
• To set the console terminal baud rate.
• To load operating software from Flash memory.
• To recover a lost password.
• To allow you to manually boot the system using the boot command at the bootstrap program prompt.
• To force an automatic boot from the system bootstrap software (boot image) or from a default system
image in onboard Flash memory, and read any boot system commands that are stored in the
configuration file in NVRAM.
Table 3-2 lists the meaning of each of the software configuration memory bits, and Table 3-3 defines the
boot field.
CautionThe recommended configuration register setting is 0x2102. If you configure a setting that leaves break
enabled and you send a break sequence over a console connection, the switch drops into ROMMON.
Table 3-2Software Configuration Register Bit Meaning
78-14099-04
Bit Number1HexadecimalMeaning
00 to 030x0000 to 0x000F Boot field (see Table 3-3)
060x0040Causes system software to ignore NVRAM contents
070x0080OEM
2
bit enabled
080x0100Break disabled
090x0200Use secondary bootstrap
100x0400Internet Protocol (IP) broadcast with all zeros
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-21
Modifying the Supervisor Engine Startup Configuration
Table 3-2Software Configuration Register Bit Meaning (continued)
Bit Number1HexadecimalMeaning
11 to 120x0800 to 0x1000 Console line speed (default is 9600 baud)
130x2000Boot default Flash software if network boot fails
140x4000IP broadcasts do not have network numbers
150x8000Enable diagnostic messages and ignore NVRAM contents
1. The factory default value for the configuration register is 0x2102.
2. OEM = original equipment manufacturer.
Table 3-3Explanation of Boot Field (Configuration Register Bits 00 to 03)
Boot Field Meaning
00Stays at the system bootstrap prompt
01Boots the first system image in onboard Flash memory
02 to 0FSpecifies a default filename for booting over the network;
enables boot system commands that override the default filename
Chapter 3 Configuring the Switch for the First Time
Modifying the Boot Field and Using the boot Command
The configuration register boot field determines whether or not the switch loads an operating system
image, and if so, where it obtains this system image. The following sections describe using and setting
the configuration register boot field, and the tasks you must perform to modify the configuration register
boot field.
Bits 0 through 3 of the software configuration register form the boot field.
NoteThe factory default configuration register setting for systems and spares is 0x2102.
When the boot field is set to either 0 or 1 (0-0-0-0 or 0-0-0-1), the system ignores any boot instructions
in the system configuration file and the following occurs:
• When the boot field is set to 0, you must boot the operating system manually by entering the boot
command to the system bootstrap program or ROM monitor.
• When the boot field is set to 1, the system boots the first image in the onboard bootflash single
in-line memory module (SIMM).
• When the entire boot field equals a value between 0-0-1-0 and 1-1-1-1, the switch loads the system
image specified by boot system commands in the startup configuration file.
You can enter the boot command only, or enter the command and include additional boot instructions,
such as the name of a file stored in Flash memory, or a file that you specify for booting from a network
server. If you use the boot command without specifying a file or any other boot instructions, the system
boots from the default Flash image (the first image in onboard Flash memory). Otherwise, you can
instruct the system to boot from a specific Flash image (using the boot system flashfilename command).
You can also use the boot command to boot images stored in the Flash PC cards located in Flash PC card
slot 0 or slot 1 on the supervisor engine. If you set the boot field to any bit pattern other than 0 or 1, the
system uses the resulting number to form a filename for booting over the network.
You must set the boot field for the boot functions you require.
3-22
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
Modifying the Boot Field
You modify the boot field from the software configuration register. To modify the software configuration
register boot field, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Router# show version
Router# configure terminal
Router(config)# config-registervalue
Router(config)# end
Router# reload
To modify the configuration register while the switch is running Cisco IOS, follow these steps:
Modifying the Supervisor Engine Startup Configuration
Determines the current configuration register setting.
Enters configuration mode, selecting the terminal option.
Modifies the existing configuration register setting to
reflect the way in which you want the switch to load a
system image.
Exits configuration mode.
Reboots to make your changes take effect.
Step 1Enter the enable command and your password to enter privileged level as follows:
Router> enable
Password:
Router#
Step 2Enter the configure terminalcommand at the EXEC mode prompt (#) as follows:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Step 3Configure the configuration register to 0x2102 as follows:
Router(config)# config-register 0x2102
Set the contents of the configuration register by entering the config-register value configuration
command, where value is a hexadecimal number preceded by 0x (see Table 3-2 on page 3-21).
Step 4Enter the end command to exit configuration mode. The new value settings are saved to memory;
however, the new settings do not take effect until the system software is reloaded by rebooting the
system.
Step 5Enter the show version EXEC command to display the configuration register value currently in effect
and that will be used at the next reload. The value is displayed on the last line of the screen display, as
in this example:
Configuration register is 0x141 (will be 0x2102 at next reload)
Step 6Save your settings. (See the “Saving the Running Configuration Settings” section on page 3-11.
However, note that configuration register changes take effect only after the system reloads, such as when
you enter a reload command from the console.)
78-14099-04
Step 7Reboot the system. The new configuration register value takes effect with the next system boot.
This completes the procedure for making configuration register changes.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-23
Modifying the Supervisor Engine Startup Configuration
Verifying the Configuration Register Setting
Enter the show version EXEC command to verify the current configuration register setting. In
ROM-monitor mode, enter the o command to verify the value of the configuration register boot field.
To verify the configuration register setting, perform this task:
CommandPurpose
Router# show version | include Configuration register
In this example, the show version command indicates that the current configuration register is set so that
the switch does not automatically load an operating system image. Instead, it enters ROM-monitor mode
and waits for user-entered ROM monitor commands. The new setting instructs the switch to load a
system image from commands in the startup configuration file or from a default system image stored on
a network server.
Router1# show version | include Configuration register
Configuration register is 0x2102
Router#
Displays the configuration register setting.
Chapter 3 Configuring the Switch for the First Time
Specifying the Startup System Image
You can enter multiple boot commands in the startup configuration file or in the BOOT environment
variable to provide backup methods for loading a system image.
NoteStore the system software image in the sup-bootflash: or slot0: device, not in the bootflash: device.
Store the boot loader image, if any, in the MSFC bootflash: device.
The BOOT environment variable is also described in the “Specify the Startup System Image in the
Configuration File” section in the “Loading and Maintaining System Images and Microcode” chapter of
the Cisco IOS Configuration Fundamentals Configuration Guide.
Understanding Flash Memory
The following sections describe Flash memory:
• Flash Memory Features, page 3-25
• Security Features, page 3-25
• Flash Memory Configuration Process, page 3-25
NoteThe descriptions in the following sections applies to both the bootflash device and to removable Flash
memory cards.
3-24
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
Flash Memory Features
The Flash memory components allow you to do the following:
• Copy the system image to Flash memory using TFTP.
• Copy the system image to Flash memory using rcp.
• Boot the system from Flash memory either automatically or manually.
• Copy the Flash memory image to a network server using TFTP or rcp.
• Boot manually or automatically from a system software image stored in Flash memory.
Security Features
The Flash memory components support the following security features:
• Flash memory cards contain a write-protect switch that you can use to protect data. You must set the
switch to unprotected to write data to the Flash PC card.
• The system image stored in Flash memory can be changed only from privileged EXEC level on the
console terminal.
Modifying the Supervisor Engine Startup Configuration
Flash Memory Configuration Process
To configure your switch to boot from Flash memory, follow these steps:
Step 1Copy a system image to Flash memory using TFTP or rcp (refer to the Cisco IOS Configuration
Step 2Configure the system to boot automatically from the file in Flash memory. You might need to change the
configuration register value. See the “Modifying the Boot Field and Using the boot Command” section
on page 3-22, for more information on modifying the configuration register.
Step 3Save your configurations.
Step 4Power cycle and reboot your system to ensure that all is working as expected.
BOOTLDR Environment Variable
The BOOTLDR environment specifies the Flash file system and filename containing the boot loader
image.
78-14099-04
CautionWith a Supervisor Engine 1 and MSFC1, do not erase the boot loader image from the MSFC1 bootflash:
device. The boot loader must be present in the MSFC1 bootflash: device to boot a Supervisor Engine 1
and MSFC1 successfully.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-25
Modifying the Supervisor Engine Startup Configuration
CONFIG_FILE Environment Variable
For Class A Flash file systems, the CONFIG_FILE environment variable specifies the file system and
filename of the configuration file to use for initialization (startup). Valid file systems can include
nvram:, slot0:, and sup-bootflash:.
For detailed file management configuration information, refer to the Cisco IOS Configuration Fundamentals Configuration Guide at this URL:
After you save the CONFIG_FILE environment variable to your startup configuration, the switch checks
the variable upon startup to determine the location and filename of the configuration file to use for
initialization.
The switch uses the NVRAM configuration during initialization when the CONFIG_FILE environment
variable does not exist or when it is null (such as at first-time startup). If the switch detects a problem
with NVRAM or a checksum error, the switch enters setup mode. See the “Using the Setup Facility or
the setup Command” section on page 3-2 for more information on the setup command facility.
Chapter 3 Configuring the Switch for the First Time
Controlling Environment Variables
Although the ROM monitor controls environment variables, you can create, modify, or view them with
certain commands. To create or modify the BOOT, BOOTLDR, and CONFIG_FILE environment
variables, use the boot system, boot bootldr, and boot config global configuration commands.
Refer to the “Specify the Startup System Image in the Configuration File” section in the “Loading and
Maintaining System Images and Microcode” chapter of the Configuration Fundamentals Configuration Guide for details on setting the BOOT environment variable. Refer to the “Specify the Startup
Configuration File” section in the “Modifying, Downloading, and Maintaining Configuration Files”
chapter of the Configuration Fundamentals Configuration Guide for details on setting the
CONFIG_FILE variable.
NoteWhen you use the boot system, boot bootldr, and boot config global configuration commands, you
affect only the running configuration. You must save the environment variable settings to your startup
configuration to place the information under ROM monitor control and for the environment variables to
function as expected. Enter the copy system:running-config nvram:startup-config command to save
the environment variables from your running configuration to your startup configuration.
You can view the contents of the BOOT, BOOTLDR, and the CONFIG_FILE environment variables
using the show bootvar command. This command displays the settings for these variables as they exist
in the startup configuration as well as in the running configuration if a running configuration setting
differs from a startup configuration setting.
This example shows how to check the BOOT, BOOTLDR, and the CONFIG_FILE environment
variables:
Router# show bootvar
BOOT variable = slot0:c6sup22-jsv-mz.121-5c.EX.bin,1;
CONFIG_FILE variable does not exist
BOOTLDR variable = bootflash:c6msfc2-boot-mz.121-3a.E4
Configuration register is 0x2
Router#
3-26
To display the contents of the configuration file pointed to by the CONFIG_FILE environment variable,
enter the more nvram:startup-config command.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 3 Configuring the Switch for the First Time
Setting the BOOTLDR Environment Variable
To set the BOOTLDR environment variable, perform this task:
Modifying the Supervisor Engine Startup Configuration
Verifies that bootflash contains the boot loader image.
Enters the configuration mode from the terminal.
Sets the BOOTLDR environment variable to specify the
Flash device and filename of the boot loader image. This
step modifies the runtime BOOTLDR environment
variable.
Exits configuration mode.
Saves this runtime BOOTLDR environment variable to
your startup configuration.
(Optional) Verifies the contents of the BOOTLDR
environment variable.
This example shows how to set the BOOTLDR variable:
Router# dir bootflash:
Directory of bootflash:/
1 -rw- 1599488 Nov 29 1999 11:12:29 c6msfc-boot-mz.120-7.XE.bin
15990784 bytes total (14391168 bytes free)
Router# configure terminal
Router (config)# boot bootldr bootflash:c6msfc-boot-mz.120-7.XE.bin
Router (config)# end
Router# copy system:running-config nvram:startup-config
[ok]
Router# show bootvar
BOOT variable = sup-bootflash:c6sup-js-mz.120-7.XE.bin,1;
CONFIG_FILE variable does not exist
BOOTLDR variable = bootflash:c6msfc-boot-mz.120-7.XE.bin
Configuration register is 0x0
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
3-27
Modifying the Supervisor Engine Startup Configuration
Chapter 3 Configuring the Switch for the First Time
3-28
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
CHA PTER
4
Configuring EHSA Supervisor Engine
Redundancy
With 12.1 E releases earlier than Release 12.1(13)E, the Catalyst 6500 series switch supports dual
supervisor engines with EHSA.
NoteEHSA is not supported in Release 12.1(13)E and later releases (see Chapter 5, “Configuring RPR and
RPR+ Supervisor Engine Redundancy,” for information about RPR or RPR+ redundancy in Release
Catalyst 6500 series switches support fault resistance by allowing a redundant supervisor engine to take
over if the primary supervisor engine fails. The redundant supervisor engine runs in EHSA standby
mode.
NoteThe EHSA feature is not supervisor engine mirroring or load balancing. Network services are disrupted
until the redundant supervisor engine takes over and the switch recovers.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
4-1
Supervisor Engine Redundant Operation
EHSA standby mode provides the following features:
• Auto-startup and bootvar synchronization between active and redundant supervisor engines
• Hardware signals that detect and decide the active or redundant status of supervisor engines
• Clock synchronization every 60 seconds from the active to the redundant supervisor engine
• A redundant supervisor engine that is booted but not all subsystems are up: if the active supervisor
engine fails, the redundant supervisor engine becomes fully operational
• An operational supervisor engine present in place of the failed unit becomes the redundant
supervisor engine
NoteThe two Gigabit Ethernet interfaces on the redundant supervisor engine are always active.
When the switch is powered on, EHSA runs between the two supervisor engines. The supervisor engine
that boots first, either in slot 1 or 2, becomes the EHSA active supervisor engine. The Multilayer Switch
Feature Card (MSFC or MSFC2) and Policy Feature Card (PFC or PFC2) become fully operational. The
MSFC and PFC on the redundant supervisor engine come out of reset but are not operational.
The following events cause an EHSA switchover:
• Clock synchronization failure between supervisor engines
• MSFC or PFC failure on the active supervisor engine
NoteIf the redundant supervisor engine is running Catalyst operating system software, remove
the active supervisor engine and boot the switch with only the redundant supervisor engine
installed. Follow the procedures in the release notes to convert the redundant supervisor
engine from Catalyst operating system software.
• The configuration register in the startup-config must be set to autoboot (see the “Modifying the Boot
Field” section on page 3-23).
NoteEHSA does not support booting from the network.
If these requirements are met, the switch functions in EHSA mode by default.
Synchronizing the Supervisor Engine Configurations
During normal operation, the startup-config and config-registers configuration are synchronized by
default between the two supervisor engines. In a switchover, the new active supervisor engine uses the
current configuration.
Supervisor Engine Redundant Operation
Step 1
Step 2
Step 3
Step 4
Step 5
NoteThe boot variables are not synchronized by default.
To manually synchronize the configurations used by the two supervisor engines, perform this task on the
active supervisor engine:
Forces a manual synchronization of the configuration
files in NVRAM.
NoteThis step is not required to synchronize the
running configuration file in DRAM.
NoteThe auto-sync standard command does not synchronize the boot variables.
This example shows how to reenable the default automatic synchronization feature using the auto-sync
standard command to synchronize the startup-config and config-register configuration of the active
supervisor engine with the redundant supervisor engine:
Router(config)# redundancy
Router(config-r)# main-cpu
Router(config-r-mc)# auto-sync standard
Router(config-r-mc)# auto-sync bootvar
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
4-3
Supervisor Engine Redundant Operation
Router(config-r-mc)# end
Router# copy running-config startup-config
NoteTo manually synchronize only individual elements of the standard auto-sync configuration, disable the
default automatic synchronization feature.
This example shows how to disable default automatic synchronization and only allow automatic
synchronization of the config-registers of the active supervisor engine to the redundant supervisor
engine while disallowing synchronization of the startup configuration:
Router(config)# redundancy
Router(config-r)# main-cpu
Router(config-r-mc)# no auto-sync standard
Router(config-r-mc)# auto-sync config-register
Router(config-r-mc)# end
Router# copy running-config startup-config
Displaying the Supervisor Engine Redundancy
To display both supervisor engines, perform this task:
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
CHA PTER
5
Configuring RPR and RPR+
Supervisor Engine Redundancy
Release 12.1(13)E and later releases support supervisor engine redundancy with Route Processor
Redundancy (RPR) and Route Processor Redundancy Plus (RPR+). This chapter describes how to
configure supervisor engine redundancy with RPR and RPR+.
NoteEnhanced high system availability (EHSA) is not supported in Release 12.1(13)E and later releases.
These sections describe supervisor engine redundancy:
• Supervisor Engine Redundancy Overview, page 5-1
• RPR+ Operation, page 5-2
• Supervisor Engine Synchronization, page 5-3
Supervisor Engine Redundancy Overview
Catalyst 6500 series switches support fault resistance by allowing a redundant supervisor engine to take
over if the primary supervisor engine fails. RPR supports a switchover time of 2 to 4 minutes and RPR+
supports a switchover time of 30 to 60 seconds.
When RPR+ mode is used, the redundant supervisor engine is fully initialized and configured, which
shortens the switchover time. The active supervisor engine checks the image version of the redundant
supervisor engine when the redundant supervisor engine comes online. If the image on the redundant
supervisor engine does not match the image on the active supervisor engine, RPR redundancy mode is used.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
5-1
Understanding Supervisor Engine Redundancy
RPR Operation
RPR supports the following features:
• Auto-startup and bootvar synchronization between active and redundant supervisor engines
• Hardware signals that detect and decide the active or redundant status of supervisor engines
• Clock synchronization every 60 seconds from the active to the redundant supervisor engine
• A redundant supervisor engine that is booted but not all subsystems are up: if the active supervisor
engine fails, the redundant supervisor engine become fully operational
• An operational supervisor engine present in place of the failed unit becomes the redundant
supervisor engine
• Support for fast software upgrade (FSU) (See the “Performing a Fast Software Upgrade” section on
page 5-9).
NoteWhen a redundant supervisor engine is in standby mode, the two Gigabit Ethernet interfaces on the
redundant supervisor engine are always active.
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
When the switch is powered on, RPR runs between the two supervisor engines. The supervisor engine
that boots first, either in slot 1 or 2, becomes the RPR active supervisor engine. The Multilayer Switch
Feature Card (MSFC or MSFC2) and Policy Feature Card (PFC or PFC2) become fully operational. The
MSFC and PFC on the redundant supervisor engine come out of reset but are not operational.
The following events cause an RPR switchover:
• Clock synchronization failure between supervisor engines
• MSFC or PFC failure on the active supervisor engine
• A manual switchover.
In a switchover, the redundant supervisor engine becomes fully operational and the following occurs:
• All switching modules power up again
• Remaining subsystems on the MSFC (including Layer 2 and Layer 3 protocols) are brought up
• Access control lists (ACLs) are reprogrammed into supervisor engine hardware
NoteIn a switchover, there is a disruption of traffic because some address states are lost and then restored after
they are dynamically redetermined.
RPR+ Operation
With RPR+, the redundant supervisor engine is fully initialized and configured, which shortens the
switchover time if the active supervisor engine fails or if a manual switchover is performed.
When the switch is powered on, RPR+ runs between the two supervisor engines. The supervisor engine
that boots first, either in slot 1 or 2, becomes the active supervisor engine. The Multilayer Switch Feature
Card (MSFC or MSFC2) and Policy Feature Card (PFC or PFC2) become fully operational. The MSFC
and PFC on the redundant supervisor engine come out of reset but are not operational.
5-2
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
RPR+ enhances RPR by providing the following additional benefits:
• Reduced switchover time
Depending on the configuration, the switchover time is in the range of 30 to 60 seconds.
• Installed modules are not reloaded
Because both the startup configuration and the running configuration are continually synchronized
from the active to the redundant supervisor engine, installed modules are not reloaded during a
switchover.
• Online insertion and removal (OIR) of the redundant supervisor engine
RPR+ allows OIR of the redundant supervisor engine for maintenance. When the redundant
supervisor engine is inserted, the active supervisor engine detects its presence and begins to
transition the redundant supervisor engine to fully initialized state.
• Synchronization of OIR events
• Manual user-initiated switchover using the redundancy force-switchover command
The following events cause an RPR+ switchover:
• Clock synchronization failure between supervisor engines
Understanding Supervisor Engine Redundancy
• MSFC or PFC failure on the active supervisor engine
Supervisor Engine Synchronization
During RPR mode operation, the startup-config and config-registers configuration are synchronized by
default between the two supervisor engines. In a switchover, the new active supervisor engine uses the
current configuration.
NoteUnless auto-synchronization has been disabled, the boot variables are synchronized by default.
When a redundant supervisor engine configuration is running in RPR+ mode, the following operations
trigger synchronization:
• When a redundant supervisor engine first comes online, the configuration information is
synchronized in bulk from the active supervisor engine to the redundant supervisor engine. This
synchronization overwrites any existing startup configuration file on the redundant supervisor
engine.
• When configuration changes occur during normal operation, RPR+ performs an incremental
synchronization from the active supervisor engine to the redundant supervisor engine. RPR+
synchronizes user-entered CLI commands incrementally line-by-line from the active supervisor
engine to the redundant supervisor engine.
78-14099-04
Note• Even though the redundant supervisor engine is fully initialized, it only interacts with the active
supervisor engine to receive incremental changes to the configuration files as they occur. You cannot
enter CLI commands on the redundant supervisor engine.
• Synchronization of the startup configuration file is enabled by default in RPR+ mode.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
5-3
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
Supervisor Engine Redundancy Guidelines and Restrictions
Supervisor Engine Redundancy Guidelines and Restrictions
These sections describe supervisor engine redundancy configuration guidelines and restrictions:
• RPR+ Guidelines and Restrictions, page 5-4
• Hardware Configuration Guidelines and Restrictions, page 5-5
• Configuration Mode Restrictions, page 5-6
RPR+ Guidelines and Restrictions
The following guidelines and restrictions apply to RPR+:
Restrictions
• RPR+ redundancy does not support configuration entered in VLAN database mode. Use global
configuration mode with RPR+ redundancy (see Chapter 9, “Configuring VLANs”).
• Configuration changes made through SNMP are not synchronized to the redundant supervisor
engine. Enter a copy running-config startup-config command to synchronize the configuration on
the redundant supervisor engine.
• Supervisor engine redundancy does not provide supervisor engine mirroring or supervisor engine
load balancing. Only one supervisor engine is active. Network services are disrupted until the
redundant supervisor engine takes over and the switch recovers.
• With RPR+, both supervisor engines must run the same version of Cisco IOS software. If the
supervisor engines are not running the same version of Cisco IOS software, the redundant supervisor
engine comes online in RPR mode.
• The Forwarding Information Base (FIB) tables are cleared on a switchover. As a result, routed traffic
is interrupted until route tables reconverge.
• Static IP routes are maintained across a switchover because they are configured from entries in the
configuration file.
• Information about dynamic states maintained on the active supervisor engine is not synchronized to
the redundant supervisor engine and is lost on switchover.
These are examples of dynamic state information that is lost at switchover:
–
Frame Relay switched virtual circuits (SVCs)
NoteFrame Relay-switched DLCI information is maintained across a switchover because Frame
Relay-switched DLCI configuration is in the configuration file.
–
All terminated PPP sessions
–
All ATM SVC information
–
All terminated TCP and other connection-oriented Layer 3 and Layer 4 sessions
5-4
–
BGP sessions
–
All Automatic Protection System (APS) state information
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
Supervisor Engine Redundancy Guidelines and Restrictions
Guidelines
• The two Gigabit Ethernet interfaces on the redundant supervisor engine are always active.
• RPR+ switchover takes place after the failed supervisor engine completes a core dump. A core dump
can take up to 15 minutes. To get faster switchover time, disable core dump on the supervisor
engines.
Hardware Configuration Guidelines and Restrictions
For redundant operation, the following hardware configuration guidelines and restrictions apply:
Restrictions
• Supervisor engine redundancy does not support nondefault VLAN data file names or locations. Do
not enter the vtp filefile_name command on a switch that has a redundant supervisor engine.
• Cisco IOS running on the supervisor engine and the MSFC supports redundant configurations where
the supervisor engines and MSFC routers are identical. If they are not identical, one will boot first
and become active and hold the other supervisor engine and MSFC in a reset condition.
• Each supervisor engine must have the resources to run the switch on its own, which means all
supervisor engine resources are duplicated. In other words, each supervisor engine has its own Flash
device and console port connections.
Guidelines
• Make separate console connections to each supervisor engine. Do not connect a Y cable to the
console ports.
• Both supervisor engines must have the same system image (see the “Copying Files to an MSFC”
section on page 5-10).
NoteIf the redundant supervisor engine is running Catalyst operating system software, remove
the active supervisor engine and boot the switch with only the redundant supervisor engine
installed. Follow the procedures in the current release notes to convert the redundant
supervisor engine from Catalyst software.
• The configuration register in the startup-config must be set to autoboot (see the “Modifying the Boot
Field” section on page 3-23).
• Before installing a redundant supervisor engine, enter the no vtp file command to return to the
default configuration.
NoteThere is no support for booting from the network.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
5-5
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
Configuring Supervisor Engine Redundancy
Configuration Mode Restrictions
The following configuration restrictions apply during the startup synchronization process:
• You cannot perform configuration changes during the startup (bulk) synchronization. If you attempt
to make configuration changes during this process, the following message is generated:
Config mode locked out till standby initializes
• If configuration changes occur at the same time as a supervisor engine switchover, these
configuration changes are lost.
Configuring Supervisor Engine Redundancy
These sections describe how to configure supervisor engine redundancy:
• Configuring RPR and RPR+, page 5-6
• Synchronizing the Supervisor Engine Configurations, page 5-7
• Displaying the Redundancy States, page 5-8
Configuring RPR and RPR+
To configure RPR or RPR+, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Router(config)# redundancy
Router(config-red)# mode {rpr | rpr-plus}
Router# show running-config
Router# show redundancy states
This example shows how to configure the system for RPR+ and display the redundancy state:
Router> enable
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# redundancy
Router(config-red)# mode rpr-plus
Router(config-red)# ^Z
Router# show redundancy states
my state = 13 -ACTIVE
peer state = 1 -DISABLED
Mode = Simplex
Unit = Primary
Unit ID = 1
Enters redundancy configuration mode.
Configures RPR or RPR+. When this command is
entered, the redundant supervisor engine is reloaded and
begins to work in RPR or RPR+ mode.
Synchronizing the Supervisor Engine Configurations
During normal operation, the startup-config and config-registers configuration are synchronized by
default between the two supervisor engines. In a switchover, the new active supervisor engine uses the
current configuration.
To manually synchronize the configurations used by the two supervisor engines, perform this task on the
active supervisor engine:
Forces a manual synchronization of the configuration
files in NVRAM.
Configuring Supervisor Engine Redundancy
NoteThis step is not required to synchronize the
running configuration file in DRAM.
NoteThe auto-sync standard command does not synchronize the boot variables.
This example shows how to reenable the default automatic synchronization feature using the auto-sync
standard command to synchronize the startup-config and config-register configuration of the active
supervisor engine with the redundant supervisor engine:
Router(config)# redundancy
Router(config-red)# main-cpu
Router(config-r-mc)# auto-sync standard
Router(config-r-mc)# auto-sync bootvar
Router(config-r-mc)# end
Router# copy running-config startup-config
NoteTo manually synchronize only individual elements of the standard auto-sync configuration, disable
the default automatic synchronization feature.
This example shows how to disable default automatic synchronization and only allow automatic
synchronization of the config-registers of the active supervisor engine to the redundant supervisor
engine while disallowing synchronization of the startup configuration:
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
5-7
Configuring Supervisor Engine Redundancy
Router(config-r-mc)# no auto-sync standard
Router(config-r-mc)# auto-sync config-register
Router(config-r-mc)# end
Router# copy running-config startup-config
Displaying the Redundancy States
To display the redundancy states, perform this task:
CommandPurpose
Router# show redundancy states
This example shows how to display the redundancy states:
Router# show redundancy states
my state = 13 -ACTIVE
peer state = 8 -STANDBY HOT
Mode = Duplex
Unit = Primary
Unit ID = 1
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
Displays the redundancy states.
Redundancy Mode (Operational) = Route Processor Redundancy Plus
Redundancy Mode (Configured) = Route Processor Redundancy Plus
Split Mode = Disabled
Manual Swact = Enabled
Communications = Up
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 5 Configuring RPR and RPR+ Supervisor Engine Redundancy
Performing a Fast Software Upgrade
The fast software upgrade (FSU) procedure supported by RPR allows you to upgrade the Cisco IOS
image on the supervisor engines without reloading the system.
NoteIf you are performing a first-time upgrade to RPR from EHSA, you must reload both supervisor engines.
FSU from EHSA is not supported.
To perform an FSU, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Router# copysource_device:source_filename {disk0
| disk1}:target_filename
Or:
Router# copy source_device:source_filename
sup-bootflash:target_filename
Or:
Router# copysource_device:source_filename
{slavedisk0 | slavedisk1}:target_filename
Or:
Router# copy source_device:source_filename
slavesup-bootflash:target_filename
Router# config terminal
Router(config)# config-register 0x2102
Router(config)# boot system flashdevice:file_name
Router# copy running-config start-config
Router# hw-module {module num} reset
Router# redundancy force-switchover
Copies the new Cisco IOS image to the disk0: device or
the disk1: device on the active supervisor engine.
Copies the new Cisco IOS image to the bootflash:
device on the active supervisor engine.
Copies the new Cisco IOS image to the disk0: device or
the disk1: device on the redundant supervisor engine.
Copies the new Cisco IOS image to the bootflash:
device on the redundant supervisor engine.
Configures the supervisor engines to boot the new image.
Saves the configuration.
Reloads the redundant supervisor engine and brings it
back online (running the new version of the Cisco IOS
software).
NoteBefore reloading the redundant supervisor
Conducts a manual switchover to the redundant
supervisor engine. The redundant supervisor engine
becomes the new active supervisor engine running the
new Cisco IOS image. The modules are reloaded and the
module software is downloaded from the new active
supervisor engine.
The old active supervisor engine reboots with the new
image and becomes the redundant supervisor engine.
NoteTo perform an EHSA to RPR FSU, use the reload
Performing a Fast Software Upgrade
engine, make sure you wait long enough to ensure
that all configuration synchronization changes
have completed.
command in Step 5.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
Step 3Enter the show interfaces EXEC command to see a list of all interfaces that are installed. A report is
provided for each interface that the device supports, as shown in this display:
Router# show interfaces fastethernet 5/48
FastEthernet5/48 is up, line protocol is up
Hardware is C6k 100Mb 802.3, address is 0050.f0ac.3083 (bia 0050.f0ac.3083)
Internet address is 172.20.52.18/27
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Half-duplex, 100Mb/s
ARP type: ARPA, ARP Timeout 04:00:00
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue :0/40 (size/max)
5 minute input rate 1000 bits/sec, 1 packets/sec
5 minute output rate 1000 bits/sec, 1 packets/sec
4834677 packets input, 329545368 bytes, 0 no buffer
Received 4796465 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
51926 packets output, 15070051 bytes, 0 underruns
0 output errors, 2 collisions, 2 interface resets
6-2
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Router#
Step 4Enter the show hardware EXEC command to see a list of the system software and hardware:
Router# show hardware
Cisco Internetwork Operating System Software
IOS (tm) c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(5c)EX, EARLY DEPLOY)
Synced to mainline version: 12.1(5c)
TAC:Home:Software:Ios General:CiscoIOSRoadmap:12.1
Copyright (c) 1986-2001 by cisco Systems, Inc.
Compiled Wed 28-Mar-01 17:52 by hqluong
Image text-base: 0x30008980, data-base: 0x315D0000
ROM: System Bootstrap, Version 12.1(3r)E2, RELEASE SOFTWARE (fc1)
BOOTFLASH: c6sup2_rp Software (c6sup2_rp-JSV-M), Version 12.1(5c)EX, EARLY DEPL)
Router uptime is 2 hours, 55 minutes
System returned to ROM by power-on (SP by power-on)
Running default software
cisco Catalyst 6000 (R7000) processor with 114688K/16384K bytes of memory.
Processor board ID SAD04430J9K
R7000 CPU at 300Mhz, Implementation 39, Rev 2.1, 256KB L2, 1024KB L3 Cache
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
1 Virtual Ethernet/IEEE 802.3 interface(s)
48 FastEthernet/IEEE 802.3 interface(s)
2 Gigabit Ethernet/IEEE 802.3 interface(s)
381K bytes of non-volatile configuration memory.
Using the Interface Command
16384K bytes of Flash internal SIMM (Sector size 512K).
Configuration register is 0x2
Router#
Step 5To begin configuring Fast Ethernet port 5/5, enter the interface keyword, interface type, and slot
number/port number at the privileged EXEC prompt, as shown in the following example:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface fastethernet 5/5
Router(config-if)#
NoteYou do not need to add a space between the interface type and interface number. For example,
in the preceding line you can specify either fastethernet 5/5 or fastethernet5/5.
Step 6After each interface command, enter the interface configuration commands your particular interface
requires.
The commands you enter define the protocols and applications that will run on the interface. The
commands are collected and applied to the interface command until you enter another interface
command or press Ctrl-Z to get out of interface configuration mode and return to privileged EXEC
mode.
Step 7After you configure an interface, check its status by using the EXEC show commands listed in
“Monitoring and Maintaining Interfaces” section on page 6-17.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-3
Configuring a Range of Interfaces
Configuring a Range of Interfaces
The interface-range configuration mode allows you to configure multiple interfaces with the same
configuration parameters. After you enter the interface-range configuration mode, all command
parameters you enter are attributed to all interfaces within that range until you exit out of the
interface-range configuration mode.
To configure a range of interfaces with the same configuration, perform this task:
CommandPurpose
Router(config)# interface range
{{vlan vlan_ID - vlan_ID [, vlan vlan_ID - vlan_ID]}
| {type slot/port - port [, type slot/port - port]} |
{macro_name [, macro_name]}}
Router(config)# no interface range
{{vlanvlan_ID - vlan_ID [, vlanvlan_ID - vlan_ID]}
| {macro_name [, macro_name]}}
When configuring a range of interfaces, note the following syntax information:
• For information about macros, see the “Defining and Using Interface-Range Macros” section on
page 6-6.
Selects the range of interfaces to be configured.
Selects the range of VLAN interfaces to remove.
Chapter 6 Configuring Interfaces
• You can enter up to five comma-separated ranges.
• You are not required to enter spaces before or after the comma.
• With releases earlier than Release 12.1(26)E, you must add a space between the interface numbers
and the dash when using the interface range command. For example, interface range fastethernet
1 - 5 is valid syntax; interface range fastethernet 1-5 is invalid.
• With Release 12.1(26)E and later releases, you do not need to add a space between the interface
numbers and the dash when using the interface range command.
• With releases earlier than Release 12.1(14)E, the interface range command supports these interface
keywords:
–
ethernet
–
fastethernet
–
gigabitethernet
–
tengigabitethernet
• With Release 12.1(14)E and later releases, the interface range command supports these additional
interface keywords:
–
pos
–
loopback
–
tunnel
• With Release 12.1(14)E and later releases, you can use the no interface range command to delete
VLAN interfaces.
• With releases earlier than Release 12.1(14)E, you cannot use the no keyword with the range
keyword to delete VLAN interfaces.
• With Release 12.1(14)E and later releases, you can use the interface range command to create
VLAN interfaces.
6-4
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
• With releases earlier than Release 12.1(26)E, for VLAN interfaces, the interface range command
supports only those VLAN interfaces for which Layer 2 VLANs have been created with the
interface vlan command (the show running-configuration command displays the configured
VLAN interfaces). The interface range command does not support VLAN interfaces that are not
displayed by the show running-configuration command.
• With Release 12.1(26)E and later releases, the interface range command supports VLAN interfaces
for which Layer 2 VLANs have not been created with the interface vlan command.
• With releases earlier than Release 12.1(14)E, you cannot use the interface range command to create
VLAN interfaces: the interface range command is supported only to modify VLAN interfaces that
have been created with the interface vlan command. You can enter the show running-configuration command to display the configured VLAN interfaces.
NoteThe link state messages (LINK-3-UPDOWN and LINEPROTO-5-UPDOWN) are disabled by default.
Enter the logging event link status command on each interface where you want the messages enabled.
This example shows how to reenable all Fast Ethernet ports 5/1 to 5/5:
Router(config)# interface range fastethernet 5/1 - 5
Router(config-if)# no shutdown
Router(config-if)#
*Oct 6 08:24:35: %LINK-3-UPDOWN: Interface FastEthernet5/1, changed state to up
*Oct 6 08:24:35: %LINK-3-UPDOWN: Interface FastEthernet5/2, changed state to up
*Oct 6 08:24:35: %LINK-3-UPDOWN: Interface FastEthernet5/3, changed state to up
*Oct 6 08:24:35: %LINK-3-UPDOWN: Interface FastEthernet5/4, changed state to up
*Oct 6 08:24:35: %LINK-3-UPDOWN: Interface FastEthernet5/5, changed state to up
*Oct 6 08:24:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet5/
5, changed state to up
*Oct 6 08:24:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet5/
3, changed state to up
*Oct 6 08:24:36: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet5/
4, changed state to up
Router(config-if)#
Configuring a Range of Interfaces
78-14099-04
This example shows how to use a comma to add different interface type strings to the range to reenable
all Fast Ethernet ports in the range 5/1 to 5/5 and both Gigabit Ethernet ports (1/1 and 1/2):
Router(config-if)# interface range fastethernet 5/1 - 5, gigabitethernet 1/1 - 2
Router(config-if)# no shutdown
Router(config-if)#
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface FastEthernet5/1, changed state to up
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface FastEthernet5/2, changed state to up
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface FastEthernet5/3, changed state to up
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface FastEthernet5/4, changed state to up
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface FastEthernet5/5, changed state to up
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface GigabitEthernet1/1, changed state to
up
*Oct 6 08:29:28: %LINK-3-UPDOWN: Interface GigabitEthernet1/2, changed state to
up
*Oct 6 08:29:29: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet5/
5, changed state to up
*Oct 6 08:29:29: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet5/
3, changed state to up
*Oct 6 08:29:29: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet5/
4, changed state to up
Router(config-if)#
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-5
Defining and Using Interface-Range Macros
If you enter multiple configuration commands while you are in interface-range configuration mode, each
command is executed as it is entered (they are not batched together and executed after you exit
interface-range configuration mode).
If you exit interface-range configuration mode while the commands are being executed, some commands
may not be executed on all interfaces in the range. Wait until the command prompt reappears before
exiting interface-range configuration mode.
Defining and Using Interface-Range Macros
You can define an interface-range macro to automatically select a range of interfaces for configuration.
Before you can use the macro keyword in the interface range macro command string, you must define
the macro.
To define an interface-range macro, perform this task:
To show the defined interface-range macro configuration, perform this task:
CommandPurpose
Router# show running-config
Shows the defined interface-range macro configuration.
This example shows how to display the defined interface-range macro named enet_list:
Router# show running-config | include define
define interface-range enet_list FastEthernet5/1 - 4
Router#
To use an interface-range macro in the interface range command, perform this task:
CommandPurpose
Router(config)# interface range macro macro_name
Selects the interface range to be configured using the values
saved in a named interface-range macro.
This example shows how to change to the interface-range configuration mode using the interface-range
macro enet_list:
Router(config)# interface range macro enet_list
Router(config-if)#
6-6
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
Configuring Optional Interface Features
These sections describe optional interface features:
• Configuring Ethernet Interface Speed and Duplex Mode, page 6-7
• Configuring Jumbo Frame Support, page 6-10
• Configuring IEEE 802.3Z Flow Control, page 6-14
• Configuring the Port Debounce Timer, page 6-15
• Adding a Description for an Interface, page 6-16
Configuring Ethernet Interface Speed and Duplex Mode
These sections describe how to configure Ethernet port speed and duplex mode:
• Speed and Duplex Mode Configuration Guidelines, page 6-7
• Setting the Ethernet Interface Speed, page 6-8
• Setting the Interface Duplex Mode, page 6-8
Configuring Optional Interface Features
• Configuring Link Negotiation on Gigabit Ethernet Ports, page 6-8
• Displaying the Speed and Duplex Mode Configuration, page 6-9
Speed and Duplex Mode Configuration Guidelines
You usually configure Ethernet port speed and duplex mode parameters to auto and allow the
Catalyst 6500 series switch to negotiate the speed and duplex mode between ports. If you decide to
configure the port speed and duplex modes manually, consider the following information:
• If you set the Ethernet port speed to auto, the switch automatically sets the duplex mode to auto.
• If you enter the no speed command, the switch automatically configures both speed and duplex to
auto.
• If you configure an Ethernet port speed to a value other than auto (for example, 10, 100, or
1000 Mbps), configure the connecting port to match. Do not configure the connecting port to
negotiate the speed.
• If you manually configure the Ethernet port speed to either 10 or 100 Mbps, the switch prompts you
to also configure the duplex mode on the port.
NoteCatalyst 6500 series switches cannot automatically negotiate Ethernet port speed and duplex mode if the
connecting port is configured to a value other than auto.
78-14099-04
CautionChanging the Ethernet port speed and duplex mode configuration might shut down and reenable the
interface during the reconfiguration.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-7
Configuring Optional Interface Features
Setting the Ethernet Interface Speed
NoteIf you set the Ethernet port speed to auto on a 10/100-Mbps or 10/100/1000-Mbps Ethernet port, both
speed and duplex are autonegotiated.
To set the port speed for a 10/100 or a 10/100/1000-Mbps Ethernet port, perform this task:
CommandPurpose
Step 1
Step 2
Router(config)# interface fastethernetslot/port
Router(config-if)# speed {10 | 100 | 1000 | auto}
Router(config-if)# no speed
This example shows how to set the speed to 100 Mbps on the Fast Ethernet port 5/4:
Reverts to the default configuration (speed auto).
Setting the Interface Duplex Mode
Note• 10-Gigabit Ethernet and Gigabit Ethernet are full duplex only. You cannot change the duplex mode
on 10-Gigabit Ethernet or Gigabit Ethernet ports or on a 10/100/1000-Mps port configured for
Gigabit Ethernet.
• If you set the port speed to auto on a 10/100-Mbps or a 10/100/1000-Mbps Ethernet port, both speed
and duplex are autonegotiated. You cannot change the duplex mode of autonegotiation ports.
To set the duplex mode of an Ethernet or Fast Ethernet port, perform this task:
CommandPurpose
Step 1
Step 2
Router(config)# interface fastethernetslot/port
Router(config-if)# duplex [auto | full | half]
Router(config-if)# no duplex
This example shows how to set the duplex mode to full on Fast Ethernet port 5/4:
Router(config)# interface fastethernet 5/4
Router(config-if)# duplex full
Selects the Ethernet port to be configured.
Sets the duplex mode of the Ethernet port.
Reverts to the default configuration (duplex auto).
Configuring Link Negotiation on Gigabit Ethernet Ports
NoteLink negotiation does not negotiate port speed.
On Gigabit Ethernet ports, link negotiation exchanges flow-control parameters, remote fault
information, and duplex information. Link negotiation is enabled by default.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-8
78-14099-04
Chapter 6 Configuring Interfaces
The ports on both ends of a link must have the same setting. The link will not come up if the ports at
each end of the link are set inconsistently (link negotiation enabled on one port and disabled on the other
port).
Table 6-1 shows the four possible link negotiation configurations and the resulting link status for each
configuration.
Table 6-1Link Negotiation Configuration and Possible Link Status
Link Negotiation StateLink Status
Local PortRemote PortLocal PortRemote Port
OffOffUpUp
On On Up Up
OffOnUpDown
On OffDownUp
To configure link negotiation on a port, perform this task:
Reverts to the default configuration (link negotiation
enabled).
This example shows how to enable link negotiation on Gigabit Ethernet port 5/4:
Router(config)# interface gigabitethernet 5/4
Router(config-if)# no speednonegotiate
Displaying the Speed and Duplex Mode Configuration
To display the speed and duplex mode configuration for a port, perform this task:
CommandPurpose
Router# show interfacestype1 slot/port
1. type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet
This example shows how to display the speed and duplex mode of Fast Ethernet port 5/4:
Router# show interfaces fastethernet 5/4
FastEthernet5/4 is up, line protocol is up
Hardware is Cat6K 100Mb Ethernet, address is 0050.f0ac.3058 (bia 0050.f0ac.3058)
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 100Mb/s
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:33, output never, output hang never
Displays the speed and duplex mode configuration.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
CautionThe following switching modules support a maximum ingress frame size of 8092 bytes:
• WS-X6516-GE-TX when operating at 100 Mbps
• WS-X6148-RJ-45 and WS-X6148-RJ-45V
• WS-X6148-RJ21 and WS-X6148-RJ21V
• WS-X6248-RJ-45
• WS-X6248-TEL
• WS-X6248A-RJ-45
• WS-X6248A-TEL
• WS-X6348-RJ-45 and WS-X6348-RJ45V
• WS-X6348-RJ-21 and WX-X6348-RJ21V
When jumbo frame support is configured, these modules drop ingress frames larger than 8092 bytes.
NoteThe WS-X6548-GE-TX, WS-X6548V-GE-TX, WS-X6148-GE-TX, and WS-X6148V-GE-TX do not
support jumbo frames.
Understanding Jumbo Frame Support
6-10
These sections describe jumbo frame support:
• Jumbo Frame Support Overview, page 6-11
• Ethernet Ports, page 6-12
• VLAN Interfaces, page 6-13
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
Jumbo Frame Support Overview
A jumbo frame is a frame larger than the default Ethernet frame size. You enable jumbo frame support
by configuring a larger-than-default maximum transmission unit (MTU) size on a port or VLAN
interface and, with Release 12.1(13)E and later releases, configuring the global LAN port MTU size.
Note• Jumbo frame support fragments routed traffic in software on the MSFC.
• Jumbo frame support does not fragment bridged traffic.
These sections provide an overview of jumbo frame support:
• Bridged and Routed Traffic Size Check at Ingress 10, 10/100, and 100 Mbps Ethernet and 10 Gigabit
Ethernet Ports, page 6-11
• Bridged and Routed Traffic Size Check at Ingress Gigabit Ethernet Ports, page 6-11
• Routed Traffic Size Check on the PFC, page 6-11
• Bridged and Routed Traffic Size Check at Egress 10, 10/100, and 100 Mbps Ethernet Ports, page
6-11
Configuring Optional Interface Features
• Bridged and Routed Traffic Size Check at Egress Gigabit Ethernet and 10 Gigabit Ethernet Ports,
page 6-12
Bridged and Routed Traffic Size Check at Ingress 10, 10/100, and 100 Mbps Ethernet and 10 Gigabit Ethernet Ports
Jumbo frame support compares ingress traffic size with the global LAN port MTU size at ingress 10,
10/100, and 100 Mbps Ethernet and 10 Gigabit Ethernet LAN ports that have a nondefault MTU size
configured. The port drops traffic that is oversized.
With Release 12.1(13)E and later releases, you can configure the global LAN port MTU size (see the
“Configuring the Global LAN Port MTU Size” section on page 6-14). With earlier releases, the global
LAN port MTU size is 9216 bytes and 9216 bytes is the only configurable nondefault MTU size for
Layer 2 LAN ports.
Bridged and Routed Traffic Size Check at Ingress Gigabit Ethernet Ports
Gigabit Ethernet LAN ports configured with a nondefault MTU size accept frames containing packets
of any size larger than 64 bytes. With a nondefault MTU size configured, Gigabit Ethernet LAN ports
do not check for oversize ingress frames.
Routed Traffic Size Check on the PFC
For traffic that needs to be routed Jumbo frame support on the PFC compares traffic sizes to the
configured MTU sizes and provides Layer 3 switching for jumbo traffic between interfaces configured
with MTU sizes large enough to accommodate the traffic. Between interfaces that are not configured
with large enough MTU sizes, if the “do not fragment bit” is not set, the PFC sends the traffic to the
MSFC to be fragmented and routed in software. If the “do not fragment bit” is set, the PFC drops the
traffic.
78-14099-04
Bridged and Routed Traffic Size Check at Egress 10, 10/100, and 100 Mbps Ethernet Ports
10, 10/100, and 100 Mbps Ethernet LAN ports configured with a nondefault MTU size transmit frames
containing packets of any size larger than 64 bytes. With a nondefault MTU size configured, 10, 10/100,
and 100 Mbps Ethernet LAN ports do not check for oversize egress frames.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-11
Configuring Optional Interface Features
Bridged and Routed Traffic Size Check at Egress Gigabit Ethernet and 10 Gigabit Ethernet Ports
Jumbo frame support compares egress traffic size with the global egress LAN port MTU size at egress
Gigabit Ethernet and 10 Gigabit Ethernet LAN ports that have a nondefault MTU size configured. The
port drops traffic that is oversized.
With Release 12.1(13)E and later releases, you can configure the global LAN port MTU size (see the
“Configuring the Global LAN Port MTU Size” section on page 6-14). With earlier releases, the LAN
port MTU size is 9216 bytes and 9216 bytes is the only configurable nondefault MTU size for Layer 2
LAN ports.
Ethernet Ports
These sections describe configuring nondefault MTU sizes on Ethernet ports:
• Ethernet Port Overview, page 6-12
• Layer 3 Ethernet Ports, page 6-12
• Layer 2 Ethernet Ports, page 6-12
Ethernet Port Overview
Configuring a nondefault MTU size on a 10, 10/100, or 100 Mbps Ethernet port limits ingress packets
to the global LAN port MTU size and permits egress traffic of any size larger than 64 bytes.
Configuring a nondefault MTU size on a Gigabit Ethernet port permits ingress packets of any size larger
than 64 bytes and limits egress traffic to the global LAN port MTU size.
Chapter 6 Configuring Interfaces
Configuring a nondefault MTU size on a 10 Gigabit Ethernet port limits ingress and egress packets to
the global LAN port MTU size.
Configuring a nondefault MTU size on an Ethernet port limits routed traffic to the configured MTU size.
With Release 12.1(11b)E and later releases, you can configure the MTU size on any Ethernet port.
With earlier releases, you can configure the MTU size only on Gigabit Ethernet and 10-Gigabit Ethernet
ports.
Layer 3 Ethernet Ports
On a Layer 3 port, you can configure an MTU size that is different than the global LAN port MTU size.
With Release 12.1(13)E and later releases, you can configure a different MTU size on each Layer 3
Ethernet port.
With earlier releases, you can configure only a single larger-than-default MTU size on the switch for
Layer 3 Ethernet ports. When you configure a Layer 3 Ethernet port with a nondefault MTU size, the
switch automatically configures all other Layer 3 Ethernet ports and Layer 3 EtherChannels with
nondefault MTU sizes to the newly configured size. Layer 3 Ethernet ports and EtherChannels that have
not been changed from the default are not affected.
NoteTraffic through a Layer 3 Ethernet LAN port that is configured with a nondefault MTU size is also
subject to the global LAN port MTU size (see the “Configuring the Global LAN Port MTU Size” section
on page 6-14).
6-12
Layer 2 Ethernet Ports
On a Layer 2 port, you can only configure an MTU size that matches the global LAN port MTU size (see
the “Configuring the Global LAN Port MTU Size” section on page 6-14).
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
Release 12.1(13)E and later releases support nondefault MTU sizes between 1,500 and 9,216 bytes for
Layer 2 Ethernet ports, configured per-port with the mtu command and globally with the
system jumbomtu command.
With earlier releases, 9216 bytes is the only supported nondefault MTU size for Layer 2 Ethernet ports,
configured per-port with the mtu command.
VLAN Interfaces
You can configure a different MTU size on each Layer 3 VLAN interface. Configuring a nondefault
MTU size on a VLAN interface limits traffic to the nondefault MTU size.
You can configure the MTU size on VLAN interfaces to support jumbo frames with the following
hardware and software:
• Supervisor Engine 1 and Release 12.1(7)E or later
• Supervisor Engine 2 and Release 12.1(8a)E or later
Configuring MTU Sizes
These sections describe how to configure MTU sizes:
Configuring Optional Interface Features
• Configuring MTU Sizes, page 6-13
• Configuring the Global LAN Port MTU Size, page 6-14
Configuring the MTU Size
To configure the MTU size, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Router(config)# interface {{vlanvlan_ID} |
1
{{typeport_channel_number} slot/port}}
Router(config-if)# mtumtu_size
Router(config-if)# no mtu
Router(config-if)# end
Router# show running-config interface
[{gigabitethernet | tengigabitethernet}
slot/port]
slot/port} | {port-channel
1. type = ethernet, fastethernet, gigabitethernet, tengigabitethernet, or ge-wan
When configuring the MTU size, note the following syntax information:
• For VLAN interfaces and Layer 3 Ethernet ports, supported MTU values are from 64 to 9216 bytes.
• For Layer 2 Ethernet ports with Release 12.1(13)E and later releases, you can configure only the
• For Layer 2 Ethernet ports with earlier releases, the only supported MTU size is 9216 bytes.
Selects the interface to configure.
Configures the MTU size.
Reverts to the default MTU size (1500 bytes).
Exits configuration mode.
Displays the running configuration.
global egress LAN port MTU size (see the “Configuring the Global LAN Port MTU Size” section
on page 6-14).
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-13
Configuring Optional Interface Features
This example shows how to configure the MTU size on Gigabit Ethernet port 1/2:
Router# configure terminal
Router(config)# interface gigabitethernet 1/2
Router(config-if)# mtu 9216
Router(config-if)# end
This example shows how to verify the configuration:
Router# show interface gigabitethernet 1/2
GigabitEthernet1/2 is administratively down, line protocol is down
Hardware is C6k 1000Mb 802.3, address is 0030.9629.9f88 (bia 0030.9629.9f88)
MTU 9216 bytes, BW 1000000 Kbit, DLY 10 usec,
<...Output Truncated...>
Router#
Configuring the Global LAN Port MTU Size
To configure the global LAN port MTU size, perform this task:
CommandPurpose
Step 1
Step 2
Router(config)# system jumbomtumtu_size
Router(config)# no system jumbomtu
Router(config)# end
Chapter 6 Configuring Interfaces
Configures the global LAN port MTU size.
Reverts to the default global LAN port MTU size (9216
bytes).
Exits configuration mode.
Configuring IEEE 802.3Z Flow Control
Gigabit Ethernet and 10-Gigabit Ethernet ports on the Catalyst 6500 series switches use flow control to
stop the transmission of frames to the port for a specified time; other Ethernet ports use flow control to
respond to flow-control requests.
If a Gigabit Ethernet or 10-Gigabit Ethernet port receive buffer becomes full, the port transmits an
IEEE 802.3Z pause frame that requests remote ports to delay sending frames for a specified time. All
Ethernet ports (10 Gbps, 1 Gbps, 100 Mbps, and 10 Mbps) can receive and respond to IEEE 802.3Z
pause frames from other devices.
To configure flow control on an Ethernet port, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Router(config)# interface type1 slot/port
Router(config-if)# flowcontrol {receive | send}
{desired | off | on}
Router(config-if)# no flowcontrol {receive |
send}
Router# show interfaces [type1 slot/port]
flowcontrol
1. type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet
Selects the port to configure.
Configures a port to send or respond to pause frames.
Reverts to the default flow control settings.
Displays the flow-control configuration for all ports.
6-14
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
When configuring flow control, note the following syntax information:
• 10-Gigabit Ethernet ports are permanently configured to respond to pause frames.
• When the configuration of the remote ports is unknown, use the receive desired keywords to
configure a Gigabit Ethernet port to respond to received pause frames.
• Use the receive on keywords to configure a Gigabit Ethernet port to respond to received pause
frames.
• Use the receive off keywords to configure a Gigabit Ethernet port to ignore received pause frames.
• When configuring transmission of pause frames, note the following information:
–
–
–
This example shows how to turn on receive flow control and how to verify the flow-control
configuration:
Router# configure terminal
Router(config)# interface gigabitethernet 1/2
Router(config-if)# flowcontrol receive on
Router(config-if)# end
Router# show interfaces flowcontrol
Configuring Optional Interface Features
When the configuration of the remote ports is unknown, use the send desired keywords to
configure a port to send pause frames.
Use the send on keywords to configure a port to send pause frames.
Use the send off keywords to configure a port not to send pause frames.
Interface Send Receive
Gi1/1 Desired OFF
Gi1/2 Desired ON
Fa5/1 Not capable OFF
<output truncated>
Configuring the Port Debounce Timer
The port debounce timer delays notification of a link change, which can decrease traffic loss due to
network reconfiguration. Release 12.1(13)E and later releases support the port debounce timer on all
LAN ports. You can configure the port debounce timer separately on each LAN port.
CautionEnabling the port debounce timer causes link up and link down detections to be delayed, resulting in loss
of traffic during the debouncing period. This situation might affect the convergence and reconvergence
of some Layer 2 and Layer 3 protocols.
Table 6-2 lists the time delay that occurs before notification of a link change.
Table 6-2Port Debounce Timer Delay Time
Port TypeDebounce Timer DisabledDebounce Timer Enabled
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-15
Configuring Optional Interface Features
Table 6-2Port Debounce Timer Delay Time (continued)
Port TypeDebounce Timer DisabledDebounce Timer Enabled
Fiber Gigabit ports 10 milliseconds100 through 5000 milliseconds
10-Gigabit ports
To configure the debounce timer on a port, perform this task:
CommandPurpose
Step 1
Step 2
Step 3
Router(config)# interface type1 slot/port
Router(config-if)# link debounce
[timedebounce_time]
Router(config-if)# no link debounce
Router# show interfaces debounce
1. type = ethernet, fastethernet, or gigabitethernet
Chapter 6 Configuring Interfaces
NoteWith Release 12.1(13)E and later releases, you can
configure the port debounce timer on 10 Gigabit Ethernet
ports, but it has no effect. With Release 12.1(19)E and later
releases, you cannot configure the port debounce timer on
10 Gigabit Ethernet ports.
Selects the port to configure.
Configures the debounce timer.
NoteThe time keyword is supported only on fiber
Gigabit Ethernet ports.
Reverts to the default setting.
Verifies the configuration.
On fiber Gigabit Ethernet ports, you can increase the port debounce timer value in increments of
100 milliseconds up to 5000 milliseconds.
This example shows how to enable the port debounce timer on Fast Ethernet port 5/12:
Router(config)# interface fastethernet 5/12
Router(config-if)# link debounce
Router(config-if)# end
This example shows how to display the port debounce timer settings:
Router# show interfaces debounce | include enable
Fa5/12 enable 3100
Adding a Description for an Interface
You can add a description about an interface to help you remember its function. The description appears
in the output of the following commands: show configurationinterfaces.
To add a description for an interface, perform this task:
CommandPurpose
Router(config-if)# descriptionstring
Router(config-if)# no description
Adds a description for an interface.
Deletes a description from an interface.
, show running-config, and show
6-16
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
Understanding Online Insertion and Removal
This example shows how to add a description on Fast Ethernet port 5/5:
Router(config)# interface fastethernet 5/5
Router(config-if)# description Channel-group to "Marketing"
Understanding Online Insertion and Removal
The online insertion and removal (OIR) feature supported on the Catalyst 6500 series switches allows
you to remove and replace modules while the system is online. You can shut down the modules before
removal and restart it after insertion without causing other software or interfaces to shut down.
NoteDo not remove or install more than one module at a time. After you remove or install a module, check
the LEDs before continuing. For module LED descriptions, refer to the Catalyst 6500 Series Switch
Installation Guide.
When a module has been removed or installed, the Catalyst 6500 series switch stops processing traffic
for the module and scans the system for a configuration change. Each interface type is verified against
the system configuration, and then the system runs diagnostics on the new module. There is no disruption
to normal operation during module insertion or removal.
The switch can bring only an identical replacement module online. If the replacement module is different
from the removed module, you must configure it before the switch can bring it online.
Layer 2 MAC addresses are stored in an EEPROM, which allows modules to be replaced online without
requiring the system to update switching tables and data structures. Regardless of the types of modules
installed, the Layer 2 MAC addresses do not change unless you replace the supervisor engine. If you do
replace the supervisor engine, the Layer 2 MAC addresses of all ports change to those specified in the
address allocator on the new supervisor engine.
Monitoring and Maintaining Interfaces
You can perform the tasks in the following sections to monitor and maintain interfaces:
• Monitoring Interface Status, page 6-17
• Clearing Counters on an Interface, page 6-18
• Resetting an Interface, page 6-19
• Shutting Down and Restarting an Interface, page 6-19
Monitoring Interface Status
The software contains commands that you can enter at the EXEC prompt to display information about
the interface including the version of the software and the hardware and statistics about interfaces. The
following table lists some of the interface monitoring commands. (You can display the complete list of
show commands by using the show ? command at the EXEC prompt.) These commands are described
in the Cisco IOS Interface Command Reference publication.
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
6-17
Monitoring and Maintaining Interfaces
To display information about the interface, perform these tasks:
CommandPurpose
Router# show ibc
Router# show eobc
Router# show interfaces [type slot/port]
Router# show running-config
Router# show rif
Router# show protocols [type slot/port]
Router# show version
This example shows how to display the status of Fast Ethernet port 5/5:
Router# show protocols fastethernet 5/5
FastEthernet5/5 is up, line protocol is up
Router#
Displays current internal status information.
Displays current internal out-of-band information.
Displays the status and configuration of all or a specific
interface.
Displays the currently running configuration.
Displays the current contents of the routing information field
(RIF) cache.
Displays the global (system-wide) and interface-specific
status of any configured protocol.
Displays the hardware configuration, software version, the
names and sources of configuration files, and the boot images.
Chapter 6 Configuring Interfaces
Clearing Counters on an Interface
To clear the interface counters shown with the show interfaces command, perform this task:
CommandPurpose
Router# clear counters {{vlanvlan_ID} |
1
{type
slot/port} | {port-channel channel_ID}}
1. type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet
This example shows how to clear and reset the counters on Fast Ethernet port 5/5:
Router# clear counters fastethernet 5/5
Clear "show interface" counters on this interface [confirm] y
Router#
*Sep 30 08:42:55: %CLEAR-5-COUNTERS: Clear counter on interface FastEthernet5/5
The clear counters command clears all the current counters from the interface unless the optional
arguments specify a specific interface.
NoteThe clear counters command clears counters displayed with the EXEC show interfaces command, not
counters retrieved using SNMP.
Clears interface counters.
6-18
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Chapter 6 Configuring Interfaces
Resetting an Interface
To reset an interface, perform this task:
CommandPurpose
Router# clear interfacetype1 slot/port
1. type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet
Resets an interface.
This example shows how to reset Fast Ethernet port 5/5:
Router# clear interface fastethernet 5/5
Router#
Shutting Down and Restarting an Interface
You can shut down an interface, which disables all functions on the specified interface and shows the
interface as unavailable on all monitoring command displays. This information is communicated to other
network servers through all dynamic routing protocols. The interface is not included in any routing
updates.
Monitoring and Maintaining Interfaces
Step 1
Step 2
Step 3
To shut down an interface and then restart it, perform this task:
CommandPurpose
Router(config)# interface {{vlanvlan_ID} |
1
{type
slot/port} | {port-channelchannel_ID}}
Router(config-if)# shutdown
Router(config-if)# no shutdown
1. type = ethernet, fastethernet, gigabitethernet, or tengigabitethernet
Selects the interface to be configured.
Shuts down the interface.
Reenables the interface.
This example shows how to shut down Fast Ethernet port 5/5:
Router(config)# interface fastethernet 5/5
Router(config-if)# shutdown
Router(config-if)#
*Sep 30 08:33:47: %LINK-5-CHANGED: Interface FastEthernet5/5, changed state to
administratively down
This example shows how to reenable Fast Ethernet port 5/5:
Router(config-if)# no shutdown
Router(config-if)#
*Sep 30 08:36:00: %LINK-3-UPDOWN: Interface FastEthernet5/5, changed state to up
To check if an interface is disabled, enter the EXEC show interfaces command. An interface that has
been shut down is shown as administratively down in the show interfaces command display.
78-14099-04
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
6-19
Monitoring and Maintaining Interfaces
Chapter 6 Configuring Interfaces
6-20
Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide—Release 12.1 E
78-14099-04
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.