Cisco IE 2000 User Manual

Cisco IE 2000 Switch Software Configuration Guide
Cisco IOS Release 15.0(1)EY July 2012
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 527-0883
Text Part Number: OL-25866-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
Cisco IE 2000 Switch Software Configuration Guide
© 2012 Cisco Systems, Inc. All rights reserved.
IMPLIED, INCLUDING, WITHOUT
CONTENTS
Preface li
Audience li
Purpose li
Conventions li
Related Publications lii
Obtaining Documentation, Obtaining Support, and Security Guidelines liii
CHAPTER
1 Configuration Overview 1-1
Features 1-1
Feature Software Licensing 1-1
Ease-of-Deployment and Ease-of-Use Features 1-2 Performance Features 1-2 Management Options 1-3 Industrial Application 1-4 Manageability Features 1-4 Availability and Redundancy Features 1-5 VLAN Features 1-6 Security Features 1-7 QoS and CoS Features 1-10 Monitoring Features 1-11
Default Settings After Initial Switch Configuration 1-11
Network Configuration Examples 1-14
Design Concepts for Using the Switch 1-14 Ethernet-to-the-Factory Architecture 1-15
Enterprise Zone 1-15 Demilitarized Zone 1-16 Manufacturing Zone 1-16 Topology Options 1-18
CHAPTER
OL-25866-01
Where to Go Next 1-21
2 Using the Command-Line Interface 2-1
Information About Using the Command-Line Interface 2-1
Command Modes 2-1 Help System 2-3
Cisco IE 2000 Switch Software Configuration Guide
iii
Contents
Understanding Abbreviated Commands 2-4 No and default Forms of Commands 2-4
CLI Error Messages 2-5
Configuration Logging 2-5
How to Use the CLI to Configure Features 2-6
Configuring the Command History 2-6
Changing the Command History Buffer Size 2-6 Recalling Commands 2-6 Disabling the Command History Feature 2-7
Using Editing Features 2-7
Enabling and Disabling Editing Features 2-7 Editing Commands Through Keystrokes 2-7
Editing Command Lines That Wrap 2-9 Searching and Filtering Output of show and more Commands 2-10 Accessing the CLI 2-10
Accessing the CLI through a Console Connection or through Telnet 2-10
CHAPTER
3 Configuring Switch Alarms 3-1
Finding Feature Information 3-1
Information About Switch Alarms 3-1
Global Status Monitoring Alarms 3-2 FCS Error Hysteresis Threshold 3-2 Port Status Monitoring Alarms 3-2 Triggering Alarm Options 3-3 External Alarms 3-4 Default Switch Alarm Settings 3-5
How to Configure Switch Alarms 3-5
Configuring External Alarms 3-5 Configuring the Power Supply Alarms 3-6 Configuring the Switch Temperature Alarms 3-6 Associating the Temperature Alarms to a Relay 3-7 Configuring the FCS Bit Error Rate Alarm 3-7
Setting the FCS Error Threshold 3-7
Setting the FCS Error Hysteresis Threshold 3-8 Configuring Alarm Profiles 3-8
Creating an Alarm Profile 3-8
Modifying an Alarm Profile 3-8
Attaching an Alarm Profile to a Specific Port 3-9 Enabling SNMP Traps 3-9
iv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Monitoring and Maintaining Switch Alarms Status 3-9
Configuration Examples for Switch Alarms 3-10
Configuring External Alarms: Example 3-10 Associating Temperature Alarms to a Relay: Examples 3-10 Creating or Modifying an Alarm Profile: Example 3-10 Setting the FCS Error Hysteresis Threshold: Example 3-11 Configuring a Dual Power Supply: Examples 3-11 Displaying Alarm Settings: Example 3-11
Additional References 3-12
Related Documents 3-12 Standards 3-12 MIBs 3-12 RFCs 3-13 Technical Assistance 3-13
Contents
CHAPTER
4 Performing Switch Setup Configuration 4-1
Restrictions for Performing Switch Setup Configuration 4-1
Information About Performing Switch Setup Configuration 4-1
Switch Boot Process 4-1 Default Switch Boot Settings 4-3 Switch Boot Optimization 4-3 Switch Information Assignment 4-4 Switch Default Settings 4-4 DHCP-Based Autoconfiguration Overview 4-4
DHCP Client Request Process 4-5
DHCP-Based Autoconfiguration and Image Update 4-6
DHCP Autoconfiguration 4-6
DHCP Auto-Image Update 4-6 DHCP Server Configuration Guidelines 4-7 TFTP Server 4-7 DNS Server 4-8 Relay Device 4-8 How to Obtain Configuration Files 4-9 How to Control Environment Variables 4-10
Common Environment Variables 4-11 Scheduled Reload of the Software Image 4-11
OL-25866-01
How to Perform Switch Setup Configuration 4-12
Configuring DHCP Autoconfiguration (Only Configuration File) 4-12
Configuring DHCP Auto-Image Update (Configuration File and Image) 4-13
Cisco IE 2000 Switch Software Configuration Guide
v
Contents
Configuring the Client 4-14 Manually Assigning IP Information on a Routed Port 4-14 Manually Assigning IP Information to SVIs 4-15 Modifying the Startup Configuration 4-15
Specifying the Filename to Read and Write the System Configuration 4-15
Manually Booting the Switch 4-16
Booting a Specific Software Image 4-17
Monitoring Switch Setup Configuration 4-17
Verifying the Switch Running Configuration 4-17
Configuration Examples for Performing Switch Setup Configuration 4-18
Retrieving IP Information Using DHCP-Based Autoconfiguration: Example 4-18 Scheduling Software Image Reload: Examples 4-20 Configuring DHCP Auto-Image Update: Example 4-20 Configuring a Switch as a DHCP Server: Example 4-20 Configuring Client to Download Files from DHCP Server 4-21
CHAPTER
Additional References 4-22
Related Documents 4-22 Standards 4-22 MIBs 4-22 RFCs 4-22 Technical Assistance 4-22
5 Configuring Cisco IOS Configuration Engine 5-1
Finding Feature Information 5-1
Prerequisites for Configuring Cisco IOS Configuration Engine 5-1
Information About Configuring Cisco IOS Configuration Engine 5-2
Configuration Service 5-3 Event Service 5-3 NameSpace Mapper 5-4 CNS IDs and Device Hostnames 5-4
ConfigID 5-4
DeviceID 5-4
Hostname and DeviceID Interaction 5-5
Using Hostname, DeviceID, and ConfigID 5-5 Cisco IOS Agents 5-5
Initial Configuration 5-5
Incremental (Partial) Configuration 5-6
Synchronized Configuration 5-6
vi
How to Configure Cisco IOS Configuration Engine 5-7
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring Cisco IOS Agents 5-7
Enabling CNS Event Agent 5-7 Enabling Cisco IOS CNS Agent and an Initial Configuration 5-8 Enabling a Partial Configuration 5-10
Monitoring and Maintaining Cisco IOS Configuration Engine 5-11
Configuration Examples for Cisco IOS Configuration Engine 5-11
Enabling the CNS Event Agent: Example 5-11 Configuring an Initial CNS Configuration: Examples 5-11
Additional References 5-12
Related Documents 5-12 Standards 5-12 MIBs 5-12 RFCs 5-12 Technical Assistance 5-13
Contents
CHAPTER
6 Configuring Switch Clusters 6-1
Finding Feature Information 6-1
Prerequisites for Configuring Switch Clusters 6-1
Cluster Command Switch Characteristics 6-1 Standby Cluster Command Switch Characteristics 6-2 Candidate Switch and Cluster Member Switch Characteristics 6-2
Restrictions for Configuring Switch Clusters 6-3
Information About Configuring Switch Clusters 6-3
Benefits of Clustering Switches 6-3 Eligible Cluster Switches 6-3
How to Plan for Switch Clustering 6-4
Automatic Discovery of Cluster Candidates and Members 6-5
Discovery Through CDP Hops 6-5 Discovery Through Non-CDP-Capable and Noncluster-Capable Devices 6-7 Discovery Through Different VLANs 6-7 Discovery Through Different Management VLANs 6-8 Discovery Through Routed Ports 6-9
Discovery of Newly Installed Switches 6-10 IP Addresses 6-11 Hostnames 6-11 Passwords 6-12 SNMP Community Strings 6-12 TACACS+ and RADIUS 6-12 LRE Profiles 6-13
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
vii
Contents
Managing Switch Clusters 6-13
Using the CLI to Manage Switch Clusters 6-13 Using SNMP to Manage Switch Clusters 6-14
Additional References 6-15
Related Documents 6-15 Standards 6-15 MIBs 6-15 RFCs 6-15 Technical Assistance 6-15
CHAPTER
7 Performing Switch Administration 7-1
Finding Feature Information 7-1
Information About Performing Switch Administration 7-1
System Time and Date Management 7-1
System Clock 7-1 Network Time Protocol 7-2 NTP Version 4 7-3
DNS 7-4
Default DNS Configuration 7-4 Login Banners 7-4 System Name and Prompt 7-5 MAC Address Table 7-5
Address Table 7-5
MAC Addresses and VLANs 7-5
Default MAC Address Table Configuration 7-6
Address Aging Time for VLANs 7-6
MAC Address Change Notification Traps 7-6
Static Addresses 7-6
Unicast MAC Address Filtering 7-7
MAC Address Learning on a VLAN 7-8 ARP Table Management 7-8
viii
How to Perform Switch Administration 7-9
Configuring Time and Date Manually 7-9
Setting the System Clock 7-9
Configuring the Time Zone 7-9
Configuring Summer Time (Daylight Saving Time) 7-10
Configuring Summer Time (Exact Date and Time) 7-11 Configuring a System Name 7-11 Setting Up DNS 7-11
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring Login Banners 7-12
Configuring a Message-of-the-Day Login Banner 7-12 Configuring a Login Banner 7-13
Managing the MAC Address Table 7-13
Changing the Address Aging Time 7-13 Configuring MAC Address Change Notification Traps 7-14 Configuring MAC Address Move Notification Traps 7-15 Configuring MAC Threshold Notification Traps 7-15 Adding and Removing Static Address Entries 7-17 Configuring Unicast MAC Address Filtering 7-17 Disabling MAC Address Learning on a VLAN 7-17
Monitoring and Maintaining Switch Administration 7-18
Configuration Examples for Performing Switch Admininistration 7-18
Setting the System Clock: Example 7-18 Configuring Summer Time: Examples 7-18 Configuring a MOTD Banner: Examples 7-19 Configuring a Login Banner: Example 7-19 Configuring MAC Address Change Notification Traps: Example 7-19 Sending MAC Address Move Notification Traps: Example 7-20 Configuring MAC Threshold Notification Traps: Example 7-20 Adding the Static Address to the MAC Address Table: Example 7-20 Configuring Unicast MAC Address Filtering: Example 7-20
Contents
CHAPTER
Additional References 7-21
Related Documents 7-21 Standards 7-21 MIBs 7-21 RFCs 7-21 Technical Assistance 7-21
8 Configuring PTP 8-1
Finding Feature Information 8-1
Prerequisites for Configuring PTP 8-1
Restrictions for Configuring PTP 8-1
Information About Configuring PTP 8-1
Precision Time Protocol 8-1
How to Configure PTP 8-2
Default PTP Settings 8-2 Setting Up PTP 8-3
Monitoring and Maintaining the PTP Configuration 8-3
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
ix
Contents
Troubleshooting the PTP Configuration 8-4
Additional References 8-4
Related Documents 8-4 Standards 8-4 MIBs 8-4 RFCs 8-5 Technical Assistance 8-5
CHAPTER
9 Configuring PROFINET 9-1
Finding Feature Information 9-1
Restrictions for Configuring PROFINET 9-1
Information About Configuring PROFINET 9-1
PROFINET Device Roles 9-2 PROFINET Device Data Exchange 9-2
How to Configure PROFINET 9-4
Configuring PROFINET 9-4 Default Configuration 9-4 Enabling PROFINET 9-4
Monitoring and Maintaining PROFINET 9-5
Troubleshooting PROFINET 9-5
Additional References 9-6
Related Documents 9-6 Standards 9-6 MIBs 9-6 RFCs 9-6 Technical Assistance 9-6
CHAPTER
x
10 Configuring CIP 10-1
Finding Feature Information 10-1
Restrictions for Configuring CIP 10-1
Information About Configuring CIP 10-1
How to Configure CIP 10-1
Default Configuration 10-1 Enabling CIP 10-2
Monitoring CIP 10-2
Troubleshooting CIP 10-2
Additional References 10-3
Related Documents 10-3
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Standards 10-3 MIBs 10-3 RFCs 10-3 Technical Assistance 10-3
Contents
CHAPTER
11 Configuring SDM Templates 11-1
Finding Feature Information 11-1
Prerequisites for Configuring SDM Templates 11-1
Restrictions for Configuring SDM Templates 11-1
Information About Configuring SDM Templates 11-1
SDM Templates 11-1 Dual IPv4 and IPv6 SDM Default Template 11-3
How to Configure the Switch SDM Templates 11-4
Setting the SDM Template 11-4
Monitoring and Maintaining SDM Templates 11-4
Configuration Examples for Configuring SDM Templates 11-5
Configuring the IPv4-and-IPv6 Default Template: Example 11-5
Additional References 11-6
Related Documents 11-6 Standards 11-6 MIBs 11-6 RFCs 11-6 Technical Assistance 11-6
CHAPTER
OL-25866-01
12 Configuring Switch-Based Authentication 12-1
Finding Feature Information 12-1
Prerequisites for Configuring Switch-Based Authentication 12-1
Restrictions for Configuring Switch-Based Authentication 12-1
Information About Configuring Switch-Based Authentication 12-2
Prevention for Unauthorized Switch Access 12-2 Password Protection 12-2
Default Password and Privilege Level Configuration 12-2 Enable Secret Passwords with Encryption 12-3 Password Recovery 12-3 Telnet Password for a Terminal Line 12-4 Username and Password Pairs 12-4 Multiple Privilege Levels 12-4
Switch Access with TACACS+ 12-5
Cisco IE 2000 Switch Software Configuration Guide
xi
Contents
TACACS+ 12-5
TACACS+ Operation 12-6
Default TACACS+ Configuration 12-7
TACACS+ Server Host and the Authentication Key 12-7
TACACS+ Login Authentication 12-7
TACACS+ Authorization for Privileged EXEC Access and Network Services 12-7
TACACS+ Accounting 12-8 Switch Access with RADIUS 12-8
RADIUS 12-8
RADIUS Operation 12-9
Default RADIUS Configuration 12-10
RADIUS Change of Authorization 12-10
CoA Request Commands 12-12
RADIUS Server Host 12-14
RADIUS Login Authentication 12-15
Radius Method List 12-15
AAA Server Groups 12-15
RADIUS Authorization for User Privileged Access and Network Services 12-16
RADIUS Accounting 12-16
Establishing a Session with a Router if the AAA Server is Unreachable 12-16
Vendor-Specific RADIUS Attributes 12-16
Vendor-Proprietary RADIUS Server Communication 12-17 Switch Access with Kerberos 12-17
Understanding Kerberos 12-17
Kerberos Operation 12-19
Kerberos Configuration 12-20 Local Authentication and Authorization 12-20 Secure Shell 12-21
SSH 12-21
SSH Servers, Integrated Clients, and Supported Versions 12-21
Limitations 12-22
SSH Configuration Guidelines 12-22 Switch for Secure Socket Layer HTTP 12-22
Secure HTTP Servers and Clients 12-22
Default SSL Settings 12-23
Certificate Authority Trustpoints 12-23
CipherSuites 12-24 Secure Copy Protocol 12-24
xii
How to Configure Switch-Based Authentication 12-26
Configuring Password Protection 12-26
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Setting or Changing a Static Enable Password 12-26 Protecting Enable and Enable Secret Passwords with Encryption 12-27 Disabling Password Recovery 12-27 Setting a Telnet Password for a Terminal Line 12-28 Configuring Username and Password Pairs 12-28 Setting the Privilege Level for a Command 12-29 Changing the Default Privilege Level for Lines 12-29 Logging Into and Exiting a Privilege Level 12-30
Configuring TACACS+ 12-30
Identifying the TACACS+ Server Host and Setting the Authentication Key 12-30 Configuring TACACS+ Login Authentication 12-31 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services 12-33 Starting TACACS+ Accounting 12-33
Configuring Radius Server Communication 12-33
Defining AAA Server Groups 12-35 Configuring RADIUS Login Authentication 12-36 Configuring RADIUS Authorization for User Privileged Access and Network Services 12-37 Starting RADIUS Accounting 12-37 Configuring Settings for All RADIUS Servers 12-37 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 12-38
Configuring CoA on the Switch 12-38 Configuring the Switch for Local Authentication and Authorization 12-39 Configuring Secure Shell 12-40
Setting Up the Switch to Run SSH 12-40
Configuring the SSH Server 12-40 Configuring Secure HTTP Servers and Clients 12-42
Configuring a CA Trustpoint 12-42
Configuring the Secure HTTP Server 12-42
Configuring the Secure HTTP Client 12-44
Contents
OL-25866-01
Monitoring and Maintaining Switch-Based Authentication 12-44
Configuration Examples for Configuring Switch-Based Authentication 12-45
Changing the Enable Password: Example 12-45 Configuring the Encrypted Password: Example 12-45 Setting the Telnet Password for a Terminal Line: Example 12-45 Setting the Privilege Level for a Command: Example 12-45 Configuring the RADIUS Server: Examples 12-45 Defining AAA Server Groups: Example 12-46 Configuring Vendor-Specific RADIUS Attributes: Examples 12-46 Configuring a Vendor-Proprietary RADIUS Host: Example 12-46 Sample Output for a Self-Signed Certificate: Example 12-46
Cisco IE 2000 Switch Software Configuration Guide
xiii
Contents
Verifying Secure HTTP Connection: Example 12-47
Additional References 12-47
Related Documents 12-47 Standards 12-48 MIBs 12-48 RFCs 12-48 Technical Assistance 12-48
CHAPTER
13 Configuring IEEE 802.1x Port-Based Authentication 13-1
Finding Feature Information 13-1
Restrictions for Configuring IEEE 802.1x Port-Based Authentication 13-1
Information About Configuring IEEE 802.1x Port-Based Authentication 13-1
IEEE 802.1x Port-Based Authentication 13-1 Device Roles 13-2 Authentication Process 13-3 Switch-to-RADIUS-Server Communication 13-4 Authentication Initiation and Message Exchange 13-4 Authentication Manager 13-6
Port-Based Authentication Methods 13-6 Per-User ACLs and Filter-Ids 13-7 Authentication Manager CLI Commands 13-8
Ports in Authorized and Unauthorized States 13-9
802.1x Host Mode 13-9 Multidomain Authentication 13-10
802.1x Multiple Authentication Mode 13-11 MAC Move 13-12 MAC Replace 13-12
802.1x Accounting 13-13
802.1x Accounting Attribute-Value Pairs 13-13
802.1x Readiness Check 13-14
802.1x Authentication with VLAN Assignment 13-15 Voice Aware 802.1x Security 13-16
802.1x Authentication with Per-User ACLs 13-17
802.1x Authentication with Downloadable ACLs and Redirect URLs 13-18 Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL 13-19 Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs 13-19 VLAN ID-Based MAC Authentication 13-20
802.1x Authentication with Guest VLAN 13-20
802.1x Authentication with Restricted VLAN 13-21
xiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Contents
802.1x Authentication with Inaccessible Authentication Bypass 13-22 Support on Multiple-Authentication Ports 13-22 Authentication Results 13-22 Feature Interactions 13-23
802.1x Authentication with Voice VLAN Ports 13-23
802.1x Authentication with Port Security 13-24
802.1x Authentication with Wake-on-LAN 13-24
802.1x Authentication with MAC Authentication Bypass 13-25
802.1x User Distribution 13-26
802.1x User Distribution Configuration Guidelines 13-26
Network Admission Control Layer 2 802.1x Validation 13-27 Flexible Authentication Ordering 13-27 Open1x Authentication 13-28
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) 13-28
802.1x Supplicant and Authenticator Switch Guidelines 13-29
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute 13-29 Authentication Manager Common Session ID 13-30 Default 802.1x Authentication Settings 13-30
802.1x Accounting 13-31
802.1x Authentication Guidelines 13-32
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass Guidelines
MAC Authentication Bypass Guidelines 13-33 Maximum Number of Allowed Devices Per Port Guidelines 13-34
13-33
OL-25866-01
How to Configure IEEE 802.1x Port-Based Authentication 13-34
802.1x Authentication Configuration Process 13-34
Configuring the Switch-to-RADIUS-Server Communication 13-36 Configuring 802.1x Readiness Check 13-36 Enabling Voice Aware 802.1x Security 13-37 Configuring 802.1x Violation Modes 13-37 Configuring the Host Mode 13-38 Configuring Periodic Reauthentication 13-39 Configuring Optional 802.1x Authentication Features 13-40 Configuring 802.1x Accounting 13-42 Configuring a Guest VLAN 13-42 Configuring a Restricted VLAN 13-43 Configuring the Maximum Number of Authentication Attempts 13-43 Configuring Inaccessible Authentication Bypass 13-44 Configuring 802.1x User Distribution 13-46 Configuring NAC Layer 2 802.1x Validation 13-46
Cisco IE 2000 Switch Software Configuration Guide
xv
Contents
Configuring an Authenticator and Supplicant 13-47
Configuring an Authenticator 13-47 Configuring a Supplicant Switch with NEAT 13-47 Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs 13-48
Configuring Downloadable ACLs 13-48
Configuring a Downloadable Policy 13-49 Configuring Open1x 13-50 Resetting the 802.1x Authentication Configuration to the Default Values 13-51
Monitoring and Maintaining IEEE 802.1x Port-Based Authentication 13-51
Configuration Examples for Configuring IEEE 802.1x Port-Based Authentication 13-51
Enabling a Readiness Check: Example 13-51 Enabling 802.1x Authentication: Example 13-52 Enabling MDA: Example 13-52 Disabling the VLAN Upon Switch Violoation: Example 13-52 Configuring the Radius Server Parameters: Example 13-52 Configuring 802.1x Accounting: Example 13-52 Enabling an 802.1x Guest VLAN: Example 13-53 Displaying Authentication Manager Common Session ID: Examples 13-53 Configuring Inaccessible Authentication Bypass: Example 13-53 Configuring VLAN Groups: Examples 13-54 Configuring NAC Layer 2 802.1x Validation: Example 13-54 Configuring an 802.1x Authenticator Switch: Example 13-54 Configuring an 802.1x Supplicant Switch: Example 13-55 Configuring a Downloadable Policy: Example 13-55 Configuring Open 1x on a Port: Example 13-55
CHAPTER
xvi
Additional References 13-56
Related Documents 13-56 Standards 13-56 MIBs 13-56 RFCs 13-56 Technical Assistance 13-57
14 Configuring Web-Based Authentication 14-1
Finding Feature Information 14-1
Prerequisites for Configuring Web-Based Authentication 14-1
Restrictions for Configuring Web-Based Authentication on the IE 2000 Switch 14-1
Information About Configuring Web-Based Authentication 14-2
Web-Based Authentication 14-2 Device Roles 14-2
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Host Detection 14-3 Session Creation 14-3 Authentication Process 14-4 Local Web Authentication Banner 14-4 Web Authentication Customizable Web Pages 14-6
Web Authentication Guidelines 14-6
Web-Based Authentication Interactions with Other Features 14-8
Port Security 14-8 LAN Port IP 14-8 Gateway IP 14-9 ACLs 14-9 Context-Based Access Control 14-9
802.1x Authentication 14-9
EtherChannel 14-9 Default Web-Based Authentication Settings 14-10 Configuring Switch-to-RADIUS-Server Communication 14-10
Contents
How to Configure Web-Based Authentication 14-11
Configuring the Authentication Rule and Interfaces 14-11 Configuring AAA Authentication 14-11 Configuring Switch-to-RADIUS-Server Communication 14-12 Configuring the HTTP Server 14-12
Customizing the Authentication Proxy Web Pages 14-13
Specifying a Redirection URL for Successful Login 14-13 Configuring the Web-Based Authentication Parameters 14-13 Configuring a Web Authentication Local Banner 14-14 Removing Web-Based Authentication Cache Entries 14-14
Monitoring and Maintaining Web-Based Authentication 14-14
Configuration Examples for Configuring Web-Based Authentication 14-14
Enabling and Displaying Web-Based Authentication: Examples 14-14 Enabling AAA: Example 14-15 Configuring the RADIUS Server Parameters: Example 14-15 Configuring a Custom Authentication Proxy Web Page: Example 14-15 Verifying a Custom Authentication Proxy Web Page: Example 14-15 Configuring a Redirection URL: Example 14-16 Verifying a Redirection URL: Example 14-16 Configuring a Local Banner: Example 14-16 Clearing the Web-Based Authentication Session: Example 14-16
OL-25866-01
Additional References 14-17
Related Documents 14-17
Cisco IE 2000 Switch Software Configuration Guide
xvii
Contents
Standards 14-17 MIBs 14-17 RFCs 14-18 Technical Assistance 14-18
CHAPTER
15 Configuring Interface Characteristics 15-1
Finding Feature Information 15-1
Restrictions for Configuring Interface Characteristics 15-1
Information About Configuring Interface Characteristics 15-1
Interface Types 15-1
Port-Based VLANs 15-2 Switch Ports 15-2 Routed Ports 15-3 Access Ports 15-3 Trunk Ports 15-4 EtherChannel Port Groups 15-4 Dual-Purpose Uplink Ports 15-4
Connecting Interfaces 15-5 Using Interface Configuration Mode 15-6 Default Ethernet Interface Settings 15-8 Interface Speed and Duplex Mode 15-9
Speed and Duplex Configuration Guidelines 15-9 IEEE 802.3x Flow Control 15-9 Auto-MDIX on an Interface 15-10 SVI Autostate Exclude 15-10 System MTU 15-10
xviii
How to Configure Interface Characteristics 15-11
Configuring Layer 3 Interfaces 15-11 Configuring Interfaces 15-13 Configuring a Range of Interfaces 15-13
Interface Range Restrictions 15-13 Configuring and Using Interface Range Macros 15-14
Configuring Ethernet Interfaces 15-15
Setting the Type of a Dual-Purpose Uplink Port 15-15 Setting the Interface Speed and Duplex Parameters 15-16 Configuring IEEE 802.3x Flow Control 15-16 Configuring Auto-MDIX on an Interface 15-17 Adding a Description for an Interface 15-17 Configuring SVI Autostate Exclude 15-17
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring the System MTU 15-18
Monitoring and Maintaining Interface Characteristics 15-18
Monitoring Interface Status 15-18 Clearing and Resetting Interfaces and Counters 15-19 Shutting Down and Restarting the Interface 15-19
Configuration Examples for Configuring Interface Characteristics 15-20
Configuring the Interface Range: Examples 15-20 Configuring Interface Range Macros: Examples 15-20 Setting Speed and Duplex Parameters: Example 15-21 Enabling auto-MDIX: Example 15-21 Adding a Description on a Port: Example 15-21 Configuring SVI Autostate Exclude: Example 15-22
Additional References 15-22
Related Documents 15-22 Standards 15-22 MIBs 15-22 RFCs 15-23
Contents
CHAPTER
CHAPTER
16 Configuring Smartports Macros 16-1
Finding Feature Information 16-1
Information About Configuring Smartports Macros 16-1
How to Configure Smartports Macros 16-1
Default Smartports Settings 16-1 Smartports Configuration Guidelines 16-2 Applying Smartports Macros 16-3
Monitoring and Maintaining Smartports Macros 16-4
Configuration Examples for Smartports Macros 16-4
Applying the Smartports Macro: Examples 16-4
Additional References 16-5
Related Documents 16-5 Standards 16-5 MIBs 16-5 RFCs 16-6 Technical Assistance 16-6
17 Configuring VLANs 17-1
OL-25866-01
Finding Feature Information 17-1
Information About Configuring VLANs 17-1
Cisco IE 2000 Switch Software Configuration Guide
xix
Contents
VLANs 17-1
Supported VLANs 17-2 VLAN Port Membership Modes 17-3 Normal-Range VLANs 17-4
Token Ring VLANs 17-5
Normal-Range VLAN Configuration Guidelines 17-6
Default Ethernet VLAN Configuration 17-6
Ethernet VLANs 17-7
VLAN Removal 17-7
Static-Access Ports for a VLAN 17-7 Extended-Range VLANs 17-8
Default VLAN Configuration 17-8
Extended-Range VLAN Configuration Guidelines 17-8 VLAN Trunks 17-9
Trunking Overview 17-9
IEEE 802.1Q Configuration Guidelines 17-10
Default Layer 2 Ethernet Interface VLAN Settings 17-11
Ethernet Interface as a Trunk Port 17-11
Trunking Interaction with Other Features 17-11
Allowed VLANs on a Trunk 17-12
Native VLAN for Untagged Traffic 17-12
Load Sharing Using Trunk Ports 17-12
Load Sharing Using STP Port Priorities 17-13
Load Sharing Using STP Path Cost 17-13 VMPS 17-14
Dynamic-Access Port VLAN Membership 17-15
Default VMPS Client Settings 17-15
VMPS Configuration Guidelines 17-15
VMPS Reconfirmation Interval 17-16
Dynamic-Access Port VLAN Membership 17-16
xx
How to Configure VLANs 17-17
Creating or Modifying an Ethernet VLAN 17-17 Deleting a VLAN 17-17 Assigning Static-Access Ports to a VLAN 17-17 Creating an Extended-Range VLAN 17-18 Creating an Extended-Range VLAN with an Internal VLAN ID 17-18 Configuring an Ethernet Interface as a Trunk Port 17-19
Defining the Allowed VLANs on a Trunk 17-19
Changing the Pruning-Eligible List 17-19
Configuring the Native VLAN for Untagged Traffic 17-20
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Load Sharing Using STP Port Priorities 17-21 Configuring Load Sharing Using STP Path Cost 17-21
Configuring the VMPS Client 17-22
Entering the IP Address of the VMPS 17-22 Configuring Dynamic-Access Ports on VMPS Clients 17-23
Monitoring and Maintaining VLANs 17-23
Configuration Examples for Configuring VLANs 17-24
VMPS Network: Example 17-24 Configuring a VLAN: Example 17-25 Configuring an Access Port in a VLAN: Example 17-25 Configuring an Extended-Range VLAN: Example 17-25 Configuring a Trunk Port: Example 17-25 Removing a VLAN: Example 17-25 Show VMPS Output: Example 17-25
Additional References 17-26
Related Documents 17-26 Standards 17-26 MIBs 17-26 RFCs 17-26
Contents
CHAPTER
18 Configuring VTP 18-1
Finding VTP Feature Information 18-1
Prerequisites for Configuring VTP 18-1
Restrictions for Configuring VTP 18-1
Information About Configuring VTP 18-2
VTP 18-2
VTP Domain 18-2
VTP Modes 18-3
VTP Mode Guidelines 18-3 VTP Advertisements 18-4 VTP Version 2 18-5 VTP Version 3 18-5
VTP Version Guidelines 18-6 VTP Pruning 18-7 Default VTP Settings 18-9 VTP Configuration Guidelines 18-9 Domain Names 18-10 Passwords 18-10 Adding a VTP Client Switch to a VTP Domain 18-10
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
xxi
Contents
How to Configure VTP 18-11
Configuring VTP Domain and Parameters 18-11 Configuring a VTP Version 3 Password 18-12 Enabling the VTP Version 18-12 Enabling VTP Pruning 18-13 Configuring VTP on a Per-Port Basis 18-13 Adding a VTP Client Switch to a VTP Domain 18-13
Monitoring and Maintaining VTP 18-14
Configuration Examples for Configuring VTP 18-14
Configuring a VTP Server: Example 18-14 Configuring a Hidden VTP Password: Example 18-15 Configuring a VTP Version 3 Primary Server: Example 18-15
Additional References for Configuring VTP 18-15
Related Documents 18-15 Standards 18-15 MIBs 18-16 RFCs 18-16
CHAPTER
19 Configuring Voice VLAN 19-1
Finding Feature Information 19-1
Information About Configuring Voice VLAN 19-1
Voice VLAN 19-1 Cisco IP Phone Voice Traffic 19-2 Cisco IP Phone Data Traffic 19-3 Default Voice VLAN Configuration 19-3 Voice VLAN Configuration Guidelines 19-3 Port Connection to a Cisco 7960 IP Phone 19-4 Priority of Incoming Data Frames 19-4
How to Configure VTP 19-5
Configuring Cisco IP Phone for Voice Traffic 19-5 Configuring the Priority of Incoming Data Frames 19-5
Monitoring and Maintaining Voice VLAN 19-6
Configuration Examples for Configuring Voice VLAN 19-6
Configuring a Cisco IP Phone for Voice Traffic: Example 19-6 Configuring the Cisco IP Phone Priority of Incoming Data Frames: Example 19-6
Additional References for Configuring Voice VLAN 19-6
Related Documents 19-6 Standards 19-7 MIBs 19-7
xxii
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
RFCs 19-7
Contents
CHAPTER
20 Configuring STP 20-1
Finding Feature Information 20-1
Prerequisites for Configuring STP 20-1
Restrictions for Configuring STP 20-1
Information About Configuring STP 20-1
STP 20-2 Spanning-Tree Topology and BPDUs 20-2 Bridge ID, Switch Priority, and Extended System ID 20-3 Spanning-Tree Interface States 20-4
Blocking State 20-5
Listening State 20-6
Learning State 20-6
Forwarding State 20-6
Disabled State 20-6 How a Switch or Port Becomes the Root Switch or Root Port 20-7 Spanning Tree and Redundant Connectivity 20-7 Spanning-Tree Address Management 20-8 Accelerated Aging to Retain Connectivity 20-8 Spanning-Tree Modes and Protocols 20-9 Supported Spanning-Tree Instances 20-9 Spanning-Tree Interoperability and Backward Compatibility 20-10 STP and IEEE 802.1Q Trunks 20-10 VLAN-Bridge Spanning Tree 20-10 Default Spanning-Tree Settings 20-11 Disabling Spanning Tree 20-11 Root Switch 20-11 Secondary Root Switch 20-12 Port Priority 20-12 Path Cost 20-13 Spanning-Tree Timers 20-13 Spanning-Tree Configuration Guidelines 20-13
OL-25866-01
How to Configure STP 20-14
Changing the Spanning-Tree Mode 20-14 Configuring the Root Switch 20-15 Configuring a Secondary Root Switch 20-16 Configuring Port Priority 20-16 Configuring Path Cost 20-16
Cisco IE 2000 Switch Software Configuration Guide
xxiii
Contents
Configuring Optional STP Parameters 20-17
Monitoring and Maintaining STP 20-17
Additional References 20-18
Related Documents 20-18 Standards 20-18 MIBs 20-18 RFCs 20-18
CHAPTER
21 Configuring MSTP 21-1
Finding Feature Information 21-1
Information About Configuring MSTP 21-1
MSTP 21-2 Multiple Spanning-Tree Regions 21-2 IST, CIST, and CST 21-2
Operations Within an MST Region 21-3 Operations Between MST Regions 21-3
IEEE 802.1s Terminology 21-4 Hop Count 21-5 Boundary Ports 21-5 IEEE 802.1s Implementation 21-6
Port Role Naming Change 21-6
Interoperation Between Legacy and Standard Switches 21-6
Detecting Unidirectional Link Failure 21-7 Interoperability with IEEE 802.1D STP 21-8 RSTP 21-8
Port Roles and the Active Topology 21-8
Rapid Convergence 21-9
Synchronization of Port Roles 21-10
Bridge Protocol Data Unit Format and Processing 21-11
Processing Superior BPDU Information 21-12
Processing Inferior BPDU Information 21-12
Topology Changes 21-12 Default MSTP Settings 21-13 MSTP Configuration Guidelines 21-13 Root Switch 21-14 Secondary Root Switch 21-15 Port Priority 21-15 Path Cost 21-15 Link Type to Ensure Rapid Transitions 21-15
xxiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Neighbor Type 21-15 Restarting the Protocol Migration Process 21-16
How to Configure MSTP 21-16
Specifying the MST Region Configuration and Enabling MSTP 21-16 Configuring the Root Switch 21-17 Configuring the Optional MSTP Parameters 21-18
Monitoring and Maintaining MSTP 21-20
Configuration Examples for Configuring MSTP 21-20
Configuring the MST Region: Example 21-20
Additional References 21-21
Related Documents 21-21 Standards 21-21 MIBs 21-21 RFCs 21-21
Contents
CHAPTER
22 Configuring Optional Spanning-Tree Features 22-1
Finding Feature Information 22-1
Prerequisites for the Optional Spanning-Tree Features 22-1
Restrictions for the Optional Spanning-Tree Features 22-1
Information About Configuring the Optional Spanning-Tree Features 22-1
PortFast 22-1 BPDU Guard 22-2 BPDU Filtering 22-3 UplinkFast 22-3 BackboneFast 22-5 EtherChannel Guard 22-7 Root Guard 22-7 Loop Guard 22-8 Default Optional Spanning-Tree Settings 22-9
How to Configure the Optional Spanning-Tree Features 22-9
Enabling Optional SPT Features 22-9
Maintaining and Monitoring Optional Spanning-Tree Features 22-10
Additional References 22-11
Related Documents 22-11 Standards 22-11 MIBs 22-11 RFCs 22-12
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
xxv
Contents
CHAPTER
23 Configuring Resilient Ethernet Protocol 23-1
Finding Feature Information 23-1
Prerequisites for REP 23-1
Restrictions for REP 23-1
Information About Configuring REP 23-1
REP 23-1 Link Integrity 23-4 Fast Convergence 23-4 VLAN Load Balancing 23-4 Spanning Tree Interaction 23-6 REP Ports 23-6
REP Segments 23-7
Default REP Configuration 23-7 REP Configuration Guidelines 23-7 REP Administrative VLAN 23-8
How to Configure REP 23-9
Configuring the REP Administrative VLAN 23-9 Configuring REP Interfaces 23-9 Setting Manual Preemption for VLAN Load Balancing 23-12 Configuring SNMP Traps for REP 23-12
CHAPTER
Monitoring and Maintaining REP 23-12
Configuration Examples for Configuring REP 23-13
Configuring the Administrative VLAN: Example 23-13 Configuring a Primary Edge Port: Examples 23-13 Configuring VLAN Blocking: Example 23-14
Additional References 23-14
Related Documents 23-14 Standards 23-14 MIBs 23-15 RFCs 23-15
24 Configuring FlexLinks and the MAC Address-Table Move Update 24-1
Finding Feature Information 24-1
Restrictions for the FlexLinks and the MAC Address-Table Move Update 24-1
Information About Configuring the FlexLinks and the MAC Address-Table Move Update 24-1
FlexLinks 24-1 VLAN FlexLinks Load Balancing and Support 24-2 FlexLinks Multicast Fast Convergence 24-3
xxvi
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Learning the Other FlexLinks Port as the mrouter Port 24-3 Generating IGMP Reports 24-3
Leaking IGMP Reports 24-4 MAC Address-Table Move Update 24-4 Default Settings for FlexLinks and MAC Address-Table Move Update 24-5 Configuration Guidelines for FlexLinks and MAC Address-Table Move Update 24-6
How to Configure the FlexLinks and MAC Address-Table Move Update 24-6
Configuring FlexLinks 24-6 Configuring a Preemption Scheme for FlexLinks 24-7 Configuring VLAN Load Balancing on FlexLinks 24-7 Configuring the MAC Address-Table Move Update Feature 24-8 Configuring the MAC Address-Table Move Update Messages 24-8
Maintaining and Monitoring the FlexLinks and MAC Address-Table Move Update 24-9
Configuration Examples for the FlexLinks and MAC Address-Table Move Update 24-9
Configuring FlexLinks Port: Examples 24-9 Configuring a Backup Interface: Example 24-11 Configuring a Preemption Scheme: Example 24-11 Configuring VLAN Load Balancing on FlexLinks: Examples 24-12 Configuring MAC Address-Table Move Update: Example 24-13
Contents
CHAPTER
Additional References 24-13
Related Documents 24-13 Standards 24-13 MIBs 24-14 RFCs 24-14
25 Configuring DHCP 25-1
Finding Feature Information 25-1
Information About Configuring DHCP 25-1
DHCP Snooping 25-1 DHCP Server 25-1 DHCP Relay Agent 25-2 DHCP Snooping 25-2 Option-82 Data Insertion 25-3 Cisco IOS DHCP Server Database 25-6 DHCP Snooping Binding Database 25-6 Default DHCP Snooping Settings 25-7 DHCP Snooping Configuration Guidelines 25-8 DHCP Snooping Binding Database Guidelines 25-9 Packet Forwarding Address 25-9
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
xxvii
Contents
DHCP Server Port-Based Address Allocation 25-9
How to Configure DHCP 25-10
Configuring the DHCP Relay Agent 25-10 Specifying the Packet Forwarding Address 25-10 Enabling DHCP Snooping and Option 82 25-11 Enabling the DHCP Snooping Binding Database Agent 25-12 Enabling DHCP Server Port-Based Address Allocation 25-13 Preassigning an IP Address 25-13
Monitoring and Maintaining DHCP 25-14
Configuration Examples for Configuring DHCP 25-15
Enabling DHCP Server Port-Based Address Allocation: Examples 25-15 Enabling DHCP Snooping: Example 25-15
Additional References 25-16
Related Documents 25-16 Standards 25-16 MIBs 25-16 RFCs 25-16
CHAPTER
26 Configuring Dynamic ARP Inspection 26-1
Finding Feature Information 26-1
Prerequisites for Dynamic ARP Inspection 26-1
Restrictions for Dynamic ARP Inspection 26-1
Information About Dynamic ARP Inspection 26-1
Dynamic ARP Inspection 26-1 Interface Trust States and Network Security 26-3 Rate Limiting of ARP Packets 26-4 Relative Priority of ARP ACLs and DHCP Snooping Entries 26-4 Logging of Dropped Packets 26-4 Default Dynamic ARP Inspection Settings 26-5 Dynamic ARP Inspection Configuration Guidelines 26-5
How to Configure Dynamic ARP Inspection 26-6
Configuring Dynamic ARP Inspection in DHCP Environments 26-6 Configuring ARP ACLs for Non-DHCP Environments 26-7 Limiting the Rate of Incoming ARP Packets 26-9 Performing Validation Checks 26-10 Configuring the Log Buffer 26-11
xxviii
Monitoring and Maintaining Dynamic ARP Inspection 26-12
Configuration Examples for Dynamic ARP Inspection 26-12
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring Dynamic ARP Inspection in DHCP Environments: Example 26-12 Configuring ARP ACLs for Non-DHCP Environments: Example 26-12
Additional References 26-13
Related Documents 26-13 Standards 26-13 MIBs 26-13 RFCs 26-13 Technical Assistance 26-13
Contents
CHAPTER
27 Configuring IP Source Guard 27-1
Finding Feature Information 27-1
Prerequisites for IP Source Guard 27-1
Restrictions for IP Source Guard 27-1
Information About IP Source Guard 27-1
IP Source Guard 27-1 Source IP Address Filtering 27-2 Source IP and MAC Address Filtering 27-2 IP Source Guard for Static Hosts 27-2 IP Source Guard Configuration Guidelines 27-3
How to Configure IP Source Guard 27-4
Enabling IP Source Guard 27-4
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port 27-4
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port 27-5
Monitoring and Maintaining IP Source Guard 27-7
Configuration Examples for IP Source Guard 27-7
Enabling IPSG with Source IP and MAC Filtering: Example 27-7 Disabling IPSG with Static Hosts: Example 27-7 Enabling IPSG for Static Hosts: Examples 27-7 Displaying IP or MAC Binding Entries: Examples 27-8 Enabling IPSG for Static Hosts: Examples 27-9
CHAPTER
OL-25866-01
Additional References 27-10
Related Documents 27-10 Standards 27-11 MIBs 27-11 RFCs 27-11
28 Configuring IGMP Snooping and MVR 28-1
Finding Feature Information 28-1
Cisco IE 2000 Switch Software Configuration Guide
xxix
Contents
Restrictions for IGMP Snooping and MVR 28-1
Information About IGMP Snooping and MVR 28-1
IGMP Snooping 28-2
IGMP Versions 28-2 Joining a Multicast Group 28-3 Leaving a Multicast Group 28-5 Immediate Leave 28-5 IGMP Configurable-Leave Timer 28-5 IGMP Report Suppression 28-6 Default IGMP Snooping Configuration 28-6 Snooping Methods 28-6 Multicast Flooding Time After a TCN Event 28-7 Flood Mode for TCN 28-7 Multicast Flooding During a TCN Event 28-7 IGMP Snooping Querier Guidelines 28-7 IGMP Report Suppression 28-8
Multicast VLAN Registration 28-8
MVR in a Multicast Television Application 28-9 Default MVR Settings 28-11 MVR Configuration Guidelines and Limitations 28-11
IGMP Filtering and Throttling 28-12
Default IGMP Filtering and Throttling Configuration 28-12 IGMP Profiles 28-13 IGMP Throttling Action 28-13
xxx
How to Configure IGMP Snooping and MVR 28-14
Configuring IGMP Snooping 28-14
Enabling or Disabling IGMP Snooping 28-14 Setting IGMP Snooping Parameters 28-14 Configuring TCN 28-15 Configuring the IGMP Snooping Querier 28-16 Disabling IGMP Report Suppression 28-16
Configuring MVR 28-16
Configuring MVR Global Parameters 28-16 Configuring MVR Interfaces 28-17
Configuring IGMP 28-18
Configuring IGMP Profiles 28-18 Configuring IGMP Interfaces 28-18
Monitoring and Maintaining IGMP Snooping and MVR 28-19
Configuration Examples for IGMP Snooping 28-21
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Loading...
+ 894 hidden pages