Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-25866-01
Page 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Information About Using the Command-Line Interface2-1
Command Modes2-1
Help System2-3
Cisco IE 2000 Switch Software Configuration Guide
iii
Page 4
Contents
Understanding Abbreviated Commands2-4
No and default Forms of Commands2-4
CLI Error Messages2-5
Configuration Logging2-5
How to Use the CLI to Configure Features2-6
Configuring the Command History2-6
Changing the Command History Buffer Size2-6
Recalling Commands2-6
Disabling the Command History Feature2-7
Using Editing Features2-7
Enabling and Disabling Editing Features2-7
Editing Commands Through Keystrokes2-7
Editing Command Lines That Wrap2-9
Searching and Filtering Output of show and more Commands2-10
Accessing the CLI2-10
Accessing the CLI through a Console Connection or through Telnet2-10
CHAPTER
3Configuring Switch Alarms3-1
Finding Feature Information3-1
Information About Switch Alarms3-1
Global Status Monitoring Alarms3-2
FCS Error Hysteresis Threshold3-2
Port Status Monitoring Alarms3-2
Triggering Alarm Options3-3
External Alarms3-4
Default Switch Alarm Settings3-5
How to Configure Switch Alarms3-5
Configuring External Alarms3-5
Configuring the Power Supply Alarms3-6
Configuring the Switch Temperature Alarms3-6
Associating the Temperature Alarms to a Relay3-7
Configuring the FCS Bit Error Rate Alarm3-7
Setting the FCS Error Threshold3-7
Setting the FCS Error Hysteresis Threshold3-8
Configuring Alarm Profiles3-8
Creating an Alarm Profile3-8
Modifying an Alarm Profile3-8
Attaching an Alarm Profile to a Specific Port3-9
Enabling SNMP Traps3-9
iv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 5
Monitoring and Maintaining Switch Alarms Status3-9
Configuration Examples for Switch Alarms3-10
Configuring External Alarms: Example3-10
Associating Temperature Alarms to a Relay: Examples3-10
Creating or Modifying an Alarm Profile: Example3-10
Setting the FCS Error Hysteresis Threshold: Example3-11
Configuring a Dual Power Supply: Examples3-11
Displaying Alarm Settings: Example3-11
Additional References3-12
Related Documents3-12
Standards3-12
MIBs3-12
RFCs3-13
Technical Assistance3-13
Contents
CHAPTER
4Performing Switch Setup Configuration4-1
Restrictions for Performing Switch Setup Configuration4-1
Information About Performing Switch Setup Configuration4-1
DHCP Auto-Image Update4-6
DHCP Server Configuration Guidelines4-7
TFTP Server4-7
DNS Server4-8
Relay Device4-8
How to Obtain Configuration Files4-9
How to Control Environment Variables4-10
Common Environment Variables4-11
Scheduled Reload of the Software Image4-11
Configuring DHCP Auto-Image Update (Configuration File and Image)4-13
Cisco IE 2000 Switch Software Configuration Guide
v
Page 6
Contents
Configuring the Client4-14
Manually Assigning IP Information on a Routed Port4-14
Manually Assigning IP Information to SVIs4-15
Modifying the Startup Configuration4-15
Specifying the Filename to Read and Write the System Configuration4-15
Manually Booting the Switch4-16
Booting a Specific Software Image4-17
Monitoring Switch Setup Configuration4-17
Verifying the Switch Running Configuration4-17
Configuration Examples for Performing Switch Setup Configuration4-18
Retrieving IP Information Using DHCP-Based Autoconfiguration: Example4-18
Scheduling Software Image Reload: Examples4-20
Configuring DHCP Auto-Image Update: Example4-20
Configuring a Switch as a DHCP Server: Example4-20
Configuring Client to Download Files from DHCP Server4-21
CHAPTER
Additional References4-22
Related Documents4-22
Standards4-22
MIBs4-22
RFCs4-22
Technical Assistance4-22
5Configuring Cisco IOS Configuration Engine5-1
Finding Feature Information5-1
Prerequisites for Configuring Cisco IOS Configuration Engine5-1
Information About Configuring Cisco IOS Configuration Engine5-2
Using Hostname, DeviceID, and ConfigID5-5
Cisco IOS Agents5-5
Initial Configuration5-5
Incremental (Partial) Configuration5-6
Synchronized Configuration5-6
vi
How to Configure Cisco IOS Configuration Engine5-7
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 7
Configuring Cisco IOS Agents5-7
Enabling CNS Event Agent5-7
Enabling Cisco IOS CNS Agent and an Initial Configuration5-8
Enabling a Partial Configuration5-10
Monitoring and Maintaining Cisco IOS Configuration Engine5-11
Configuration Examples for Cisco IOS Configuration Engine5-11
Enabling the CNS Event Agent: Example5-11
Configuring an Initial CNS Configuration: Examples5-11
Additional References5-12
Related Documents5-12
Standards5-12
MIBs5-12
RFCs5-12
Technical Assistance5-13
Contents
CHAPTER
6Configuring Switch Clusters6-1
Finding Feature Information6-1
Prerequisites for Configuring Switch Clusters6-1
Cluster Command Switch Characteristics6-1
Standby Cluster Command Switch Characteristics6-2
Candidate Switch and Cluster Member Switch Characteristics6-2
Restrictions for Configuring Switch Clusters6-3
Information About Configuring Switch Clusters6-3
Benefits of Clustering Switches6-3
Eligible Cluster Switches6-3
How to Plan for Switch Clustering6-4
Automatic Discovery of Cluster Candidates and Members6-5
Discovery Through CDP Hops6-5
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices6-7
Discovery Through Different VLANs6-7
Discovery Through Different Management VLANs6-8
Discovery Through Routed Ports6-9
Discovery of Newly Installed Switches6-10
IP Addresses6-11
Hostnames6-11
Passwords6-12
SNMP Community Strings6-12
TACACS+ and RADIUS6-12
LRE Profiles6-13
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
vii
Page 8
Contents
Managing Switch Clusters6-13
Using the CLI to Manage Switch Clusters6-13
Using SNMP to Manage Switch Clusters6-14
Additional References6-15
Related Documents6-15
Standards6-15
MIBs6-15
RFCs6-15
Technical Assistance6-15
CHAPTER
7Performing Switch Administration7-1
Finding Feature Information7-1
Information About Performing Switch Administration7-1
System Time and Date Management7-1
System Clock 7-1
Network Time Protocol7-2
NTP Version 47-3
DNS7-4
Default DNS Configuration7-4
Login Banners7-4
System Name and Prompt7-5
MAC Address Table7-5
Address Table7-5
MAC Addresses and VLANs7-5
Default MAC Address Table Configuration7-6
Address Aging Time for VLANs7-6
MAC Address Change Notification Traps7-6
Static Addresses7-6
Unicast MAC Address Filtering7-7
MAC Address Learning on a VLAN7-8
ARP Table Management7-8
viii
How to Perform Switch Administration7-9
Configuring Time and Date Manually7-9
Setting the System Clock7-9
Configuring the Time Zone 7-9
Configuring Summer Time (Daylight Saving Time)7-10
Configuring Summer Time (Exact Date and Time)7-11
Configuring a System Name7-11
Setting Up DNS7-11
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 9
Configuring Login Banners7-12
Configuring a Message-of-the-Day Login Banner7-12
Configuring a Login Banner7-13
Managing the MAC Address Table7-13
Changing the Address Aging Time7-13
Configuring MAC Address Change Notification Traps7-14
Configuring MAC Address Move Notification Traps7-15
Configuring MAC Threshold Notification Traps7-15
Adding and Removing Static Address Entries7-17
Configuring Unicast MAC Address Filtering7-17
Disabling MAC Address Learning on a VLAN7-17
Monitoring and Maintaining Switch Administration7-18
Configuration Examples for Performing Switch Admininistration7-18
Setting the System Clock: Example7-18
Configuring Summer Time: Examples7-18
Configuring a MOTD Banner: Examples7-19
Configuring a Login Banner: Example7-19
Configuring MAC Address Change Notification Traps: Example7-19
Sending MAC Address Move Notification Traps: Example7-20
Configuring MAC Threshold Notification Traps: Example7-20
Adding the Static Address to the MAC Address Table: Example7-20
Configuring Unicast MAC Address Filtering: Example7-20
Contents
CHAPTER
Additional References7-21
Related Documents7-21
Standards7-21
MIBs7-21
RFCs7-21
Technical Assistance7-21
8Configuring PTP8-1
Finding Feature Information8-1
Prerequisites for Configuring PTP8-1
Restrictions for Configuring PTP8-1
Information About Configuring PTP8-1
Precision Time Protocol8-1
How to Configure PTP8-2
Default PTP Settings8-2
Setting Up PTP8-3
Monitoring and Maintaining the PTP Configuration8-3
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
ix
Page 10
Contents
Troubleshooting the PTP Configuration8-4
Additional References8-4
Related Documents8-4
Standards8-4
MIBs8-4
RFCs8-5
Technical Assistance8-5
CHAPTER
9Configuring PROFINET9-1
Finding Feature Information9-1
Restrictions for Configuring PROFINET9-1
Information About Configuring PROFINET9-1
PROFINET Device Roles9-2
PROFINET Device Data Exchange9-2
SDM Templates11-1
Dual IPv4 and IPv6 SDM Default Template11-3
How to Configure the Switch SDM Templates11-4
Setting the SDM Template11-4
Monitoring and Maintaining SDM Templates11-4
Configuration Examples for Configuring SDM Templates11-5
Configuring the IPv4-and-IPv6 Default Template: Example11-5
Additional References11-6
Related Documents11-6
Standards11-6
MIBs11-6
RFCs11-6
Technical Assistance11-6
CHAPTER
OL-25866-01
12Configuring Switch-Based Authentication12-1
Finding Feature Information12-1
Prerequisites for Configuring Switch-Based Authentication12-1
Restrictions for Configuring Switch-Based Authentication12-1
Information About Configuring Switch-Based Authentication12-2
Prevention for Unauthorized Switch Access12-2
Password Protection12-2
Default Password and Privilege Level Configuration12-2
Enable Secret Passwords with Encryption12-3
Password Recovery12-3
Telnet Password for a Terminal Line12-4
Username and Password Pairs12-4
Multiple Privilege Levels12-4
Switch Access with TACACS+12-5
Cisco IE 2000 Switch Software Configuration Guide
xi
Page 12
Contents
TACACS+12-5
TACACS+ Operation12-6
Default TACACS+ Configuration12-7
TACACS+ Server Host and the Authentication Key12-7
TACACS+ Login Authentication12-7
TACACS+ Authorization for Privileged EXEC Access and Network Services12-7
TACACS+ Accounting12-8
Switch Access with RADIUS12-8
RADIUS12-8
RADIUS Operation12-9
Default RADIUS Configuration12-10
RADIUS Change of Authorization12-10
CoA Request Commands12-12
RADIUS Server Host 12-14
RADIUS Login Authentication12-15
Radius Method List12-15
AAA Server Groups12-15
RADIUS Authorization for User Privileged Access and Network Services12-16
RADIUS Accounting12-16
Establishing a Session with a Router if the AAA Server is Unreachable12-16
Vendor-Specific RADIUS Attributes12-16
Vendor-Proprietary RADIUS Server Communication12-17
Switch Access with Kerberos12-17
Understanding Kerberos12-17
Kerberos Operation12-19
Kerberos Configuration12-20
Local Authentication and Authorization12-20
Secure Shell12-21
SSH12-21
SSH Servers, Integrated Clients, and Supported Versions12-21
Limitations12-22
SSH Configuration Guidelines12-22
Switch for Secure Socket Layer HTTP12-22
Secure HTTP Servers and Clients12-22
Default SSL Settings12-23
Certificate Authority Trustpoints12-23
CipherSuites12-24
Secure Copy Protocol12-24
xii
How to Configure Switch-Based Authentication12-26
Configuring Password Protection12-26
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 13
Setting or Changing a Static Enable Password12-26
Protecting Enable and Enable Secret Passwords with Encryption12-27
Disabling Password Recovery12-27
Setting a Telnet Password for a Terminal Line12-28
Configuring Username and Password Pairs12-28
Setting the Privilege Level for a Command12-29
Changing the Default Privilege Level for Lines12-29
Logging Into and Exiting a Privilege Level12-30
Configuring TACACS+12-30
Identifying the TACACS+ Server Host and Setting the Authentication Key12-30
Configuring TACACS+ Login Authentication12-31
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services12-33
Starting TACACS+ Accounting12-33
Configuring Radius Server Communication12-33
Defining AAA Server Groups12-35
Configuring RADIUS Login Authentication12-36
Configuring RADIUS Authorization for User Privileged Access and Network Services12-37
Starting RADIUS Accounting12-37
Configuring Settings for All RADIUS Servers12-37
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication12-38
Configuring CoA on the Switch12-38
Configuring the Switch for Local Authentication and Authorization12-39
Configuring Secure Shell12-40
Setting Up the Switch to Run SSH12-40
Configuring the SSH Server12-40
Configuring Secure HTTP Servers and Clients12-42
Configuring a CA Trustpoint12-42
Configuring the Secure HTTP Server12-42
Configuring the Secure HTTP Client12-44
Contents
OL-25866-01
Monitoring and Maintaining Switch-Based Authentication12-44
Configuration Examples for Configuring Switch-Based Authentication12-45
Changing the Enable Password: Example12-45
Configuring the Encrypted Password: Example12-45
Setting the Telnet Password for a Terminal Line: Example12-45
Setting the Privilege Level for a Command: Example12-45
Configuring the RADIUS Server: Examples12-45
Defining AAA Server Groups: Example12-46
Configuring Vendor-Specific RADIUS Attributes: Examples12-46
Configuring a Vendor-Proprietary RADIUS Host: Example12-46
Sample Output for a Self-Signed Certificate: Example12-46
Cisco IE 2000 Switch Software Configuration Guide
xiii
Page 14
Contents
Verifying Secure HTTP Connection: Example12-47
Additional References12-47
Related Documents12-47
Standards12-48
MIBs12-48
RFCs12-48
Technical Assistance12-48
802.1x Multiple Authentication Mode13-11
MAC Move13-12
MAC Replace13-12
802.1x Accounting13-13
802.1x Accounting Attribute-Value Pairs13-13
802.1x Readiness Check13-14
802.1x Authentication with VLAN Assignment13-15
Voice Aware 802.1x Security13-16
802.1x Authentication with Per-User ACLs13-17
802.1x Authentication with Downloadable ACLs and Redirect URLs13-18
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL13-19
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs13-19
VLAN ID-Based MAC Authentication13-20
802.1x Authentication with Guest VLAN13-20
802.1x Authentication with Restricted VLAN13-21
xiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 15
Contents
802.1x Authentication with Inaccessible Authentication Bypass13-22
Support on Multiple-Authentication Ports13-22
Authentication Results13-22
Feature Interactions13-23
802.1x Authentication with Voice VLAN Ports13-23
802.1x Authentication with Port Security13-24
802.1x Authentication with Wake-on-LAN13-24
802.1x Authentication with MAC Authentication Bypass13-25
802.1x User Distribution13-26
802.1x User Distribution Configuration Guidelines13-26
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)13-28
802.1x Supplicant and Authenticator Switch Guidelines13-29
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute13-29
Authentication Manager Common Session ID13-30
Default 802.1x Authentication Settings13-30
MAC Authentication Bypass Guidelines13-33
Maximum Number of Allowed Devices Per Port Guidelines13-34
13-33
OL-25866-01
How to Configure IEEE 802.1x Port-Based Authentication13-34
802.1x Authentication Configuration Process13-34
Configuring the Switch-to-RADIUS-Server Communication13-36
Configuring 802.1x Readiness Check13-36
Enabling Voice Aware 802.1x Security13-37
Configuring 802.1x Violation Modes13-37
Configuring the Host Mode13-38
Configuring Periodic Reauthentication13-39
Configuring Optional 802.1x Authentication Features13-40
Configuring 802.1x Accounting13-42
Configuring a Guest VLAN13-42
Configuring a Restricted VLAN13-43
Configuring the Maximum Number of Authentication Attempts13-43
Configuring Inaccessible Authentication Bypass13-44
Configuring 802.1x User Distribution13-46
Configuring NAC Layer 2 802.1x Validation13-46
Cisco IE 2000 Switch Software Configuration Guide
xv
Page 16
Contents
Configuring an Authenticator and Supplicant13-47
Configuring an Authenticator13-47
Configuring a Supplicant Switch with NEAT13-47
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs13-48
Configuring Downloadable ACLs13-48
Configuring a Downloadable Policy13-49
Configuring Open1x13-50
Resetting the 802.1x Authentication Configuration to the Default Values13-51
Monitoring and Maintaining IEEE 802.1x Port-Based Authentication13-51
Configuration Examples for Configuring IEEE 802.1x Port-Based Authentication13-51
Enabling a Readiness Check: Example13-51
Enabling 802.1x Authentication: Example13-52
Enabling MDA: Example13-52
Disabling the VLAN Upon Switch Violoation: Example13-52
Configuring the Radius Server Parameters: Example13-52
Configuring 802.1x Accounting: Example13-52
Enabling an 802.1x Guest VLAN: Example13-53
Displaying Authentication Manager Common Session ID: Examples13-53
Configuring Inaccessible Authentication Bypass: Example13-53
Configuring VLAN Groups: Examples13-54
Configuring NAC Layer 2 802.1x Validation: Example13-54
Configuring an 802.1x Authenticator Switch: Example13-54
Configuring an 802.1x Supplicant Switch: Example13-55
Configuring a Downloadable Policy: Example13-55
Configuring Open 1x on a Port: Example13-55
CHAPTER
xvi
Additional References13-56
Related Documents13-56
Standards13-56
MIBs13-56
RFCs13-56
Technical Assistance13-57
14Configuring Web-Based Authentication14-1
Finding Feature Information14-1
Prerequisites for Configuring Web-Based Authentication14-1
Restrictions for Configuring Web-Based Authentication on the IE 2000 Switch14-1
Information About Configuring Web-Based Authentication14-2
Web-Based Authentication14-2
Device Roles14-2
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 17
Host Detection14-3
Session Creation14-3
Authentication Process14-4
Local Web Authentication Banner14-4
Web Authentication Customizable Web Pages14-6
Web Authentication Guidelines14-6
Web-Based Authentication Interactions with Other Features14-8
Port Security14-8
LAN Port IP14-8
Gateway IP14-9
ACLs14-9
Context-Based Access Control14-9
802.1x Authentication14-9
EtherChannel14-9
Default Web-Based Authentication Settings14-10
Configuring Switch-to-RADIUS-Server Communication 14-10
Contents
How to Configure Web-Based Authentication14-11
Configuring the Authentication Rule and Interfaces14-11
Configuring AAA Authentication14-11
Configuring Switch-to-RADIUS-Server Communication 14-12
Configuring the HTTP Server14-12
Customizing the Authentication Proxy Web Pages14-13
Specifying a Redirection URL for Successful Login14-13
Configuring the Web-Based Authentication Parameters14-13
Configuring a Web Authentication Local Banner14-14
Removing Web-Based Authentication Cache Entries14-14
Monitoring and Maintaining Web-Based Authentication14-14
Configuration Examples for Configuring Web-Based Authentication14-14
Enabling and Displaying Web-Based Authentication: Examples14-14
Enabling AAA: Example14-15
Configuring the RADIUS Server Parameters: Example14-15
Configuring a Custom Authentication Proxy Web Page: Example14-15
Verifying a Custom Authentication Proxy Web Page: Example14-15
Configuring a Redirection URL: Example14-16
Verifying a Redirection URL: Example14-16
Configuring a Local Banner: Example14-16
Clearing the Web-Based Authentication Session: Example14-16
Connecting Interfaces15-5
Using Interface Configuration Mode15-6
Default Ethernet Interface Settings15-8
Interface Speed and Duplex Mode15-9
Speed and Duplex Configuration Guidelines15-9
IEEE 802.3x Flow Control15-9
Auto-MDIX on an Interface15-10
SVI Autostate Exclude15-10
System MTU15-10
xviii
How to Configure Interface Characteristics15-11
Configuring Layer 3 Interfaces15-11
Configuring Interfaces15-13
Configuring a Range of Interfaces15-13
Interface Range Restrictions15-13
Configuring and Using Interface Range Macros15-14
Configuring Ethernet Interfaces15-15
Setting the Type of a Dual-Purpose Uplink Port15-15
Setting the Interface Speed and Duplex Parameters15-16
Configuring IEEE 802.3x Flow Control15-16
Configuring Auto-MDIX on an Interface15-17
Adding a Description for an Interface15-17
Configuring SVI Autostate Exclude15-17
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 19
Configuring the System MTU15-18
Monitoring and Maintaining Interface Characteristics15-18
Monitoring Interface Status15-18
Clearing and Resetting Interfaces and Counters15-19
Shutting Down and Restarting the Interface15-19
Configuration Examples for Configuring Interface Characteristics15-20
Configuring the Interface Range: Examples15-20
Configuring Interface Range Macros: Examples15-20
Setting Speed and Duplex Parameters: Example15-21
Enabling auto-MDIX: Example15-21
Adding a Description on a Port: Example15-21
Configuring SVI Autostate Exclude: Example15-22
Additional References15-22
Related Documents15-22
Standards15-22
MIBs15-22
RFCs15-23
Contents
CHAPTER
CHAPTER
16Configuring Smartports Macros16-1
Finding Feature Information16-1
Information About Configuring Smartports Macros16-1
Creating or Modifying an Ethernet VLAN17-17
Deleting a VLAN17-17
Assigning Static-Access Ports to a VLAN17-17
Creating an Extended-Range VLAN17-18
Creating an Extended-Range VLAN with an Internal VLAN ID17-18
Configuring an Ethernet Interface as a Trunk Port17-19
Defining the Allowed VLANs on a Trunk17-19
Changing the Pruning-Eligible List17-19
Configuring the Native VLAN for Untagged Traffic17-20
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 21
Load Sharing Using STP Port Priorities17-21
Configuring Load Sharing Using STP Path Cost17-21
Configuring the VMPS Client17-22
Entering the IP Address of the VMPS17-22
Configuring Dynamic-Access Ports on VMPS Clients17-23
Monitoring and Maintaining VLANs17-23
Configuration Examples for Configuring VLANs17-24
VMPS Network: Example17-24
Configuring a VLAN: Example17-25
Configuring an Access Port in a VLAN: Example17-25
Configuring an Extended-Range VLAN: Example17-25
Configuring a Trunk Port: Example17-25
Removing a VLAN: Example17-25
Show VMPS Output: Example17-25
Additional References17-26
Related Documents17-26
Standards17-26
MIBs17-26
RFCs17-26
Contents
CHAPTER
18Configuring VTP18-1
Finding VTP Feature Information18-1
Prerequisites for Configuring VTP18-1
Restrictions for Configuring VTP18-1
Information About Configuring VTP18-2
VTP18-2
VTP Domain18-2
VTP Modes18-3
VTP Mode Guidelines18-3
VTP Advertisements18-4
VTP Version 218-5
VTP Version 318-5
VTP Version Guidelines18-6
VTP Pruning18-7
Default VTP Settings18-9
VTP Configuration Guidelines18-9
Domain Names18-10
Passwords18-10
Adding a VTP Client Switch to a VTP Domain18-10
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
xxi
Page 22
Contents
How to Configure VTP18-11
Configuring VTP Domain and Parameters18-11
Configuring a VTP Version 3 Password18-12
Enabling the VTP Version18-12
Enabling VTP Pruning18-13
Configuring VTP on a Per-Port Basis18-13
Adding a VTP Client Switch to a VTP Domain18-13
Monitoring and Maintaining VTP18-14
Configuration Examples for Configuring VTP18-14
Configuring a VTP Server: Example18-14
Configuring a Hidden VTP Password: Example18-15
Configuring a VTP Version 3 Primary Server: Example18-15
Additional References for Configuring VTP18-15
Related Documents18-15
Standards18-15
MIBs18-16
RFCs18-16
CHAPTER
19Configuring Voice VLAN19-1
Finding Feature Information19-1
Information About Configuring Voice VLAN19-1
Voice VLAN19-1
Cisco IP Phone Voice Traffic19-2
Cisco IP Phone Data Traffic19-3
Default Voice VLAN Configuration19-3
Voice VLAN Configuration Guidelines19-3
Port Connection to a Cisco 7960 IP Phone19-4
Priority of Incoming Data Frames19-4
How to Configure VTP19-5
Configuring Cisco IP Phone for Voice Traffic19-5
Configuring the Priority of Incoming Data Frames19-5
Monitoring and Maintaining Voice VLAN19-6
Configuration Examples for Configuring Voice VLAN19-6
Configuring a Cisco IP Phone for Voice Traffic: Example19-6
Configuring the Cisco IP Phone Priority of Incoming Data Frames: Example19-6
Additional References for Configuring Voice VLAN19-6
Related Documents19-6
Standards19-7
MIBs19-7
xxii
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 23
RFCs19-7
Contents
CHAPTER
20Configuring STP20-1
Finding Feature Information20-1
Prerequisites for Configuring STP20-1
Restrictions for Configuring STP20-1
Information About Configuring STP20-1
STP20-2
Spanning-Tree Topology and BPDUs20-2
Bridge ID, Switch Priority, and Extended System ID20-3
Spanning-Tree Interface States20-4
Blocking State20-5
Listening State20-6
Learning State20-6
Forwarding State20-6
Disabled State20-6
How a Switch or Port Becomes the Root Switch or Root Port20-7
Spanning Tree and Redundant Connectivity20-7
Spanning-Tree Address Management20-8
Accelerated Aging to Retain Connectivity20-8
Spanning-Tree Modes and Protocols20-9
Supported Spanning-Tree Instances20-9
Spanning-Tree Interoperability and Backward Compatibility20-10
STP and IEEE 802.1Q Trunks20-10
VLAN-Bridge Spanning Tree20-10
Default Spanning-Tree Settings20-11
Disabling Spanning Tree20-11
Root Switch20-11
Secondary Root Switch20-12
Port Priority20-12
Path Cost20-13
Spanning-Tree Timers20-13
Spanning-Tree Configuration Guidelines20-13
OL-25866-01
How to Configure STP20-14
Changing the Spanning-Tree Mode20-14
Configuring the Root Switch20-15
Configuring a Secondary Root Switch20-16
Configuring Port Priority20-16
Configuring Path Cost20-16
Cisco IE 2000 Switch Software Configuration Guide
xxiii
Page 24
Contents
Configuring Optional STP Parameters20-17
Monitoring and Maintaining STP20-17
Additional References20-18
Related Documents20-18
Standards20-18
MIBs20-18
RFCs20-18
CHAPTER
21Configuring MSTP21-1
Finding Feature Information21-1
Information About Configuring MSTP21-1
MSTP21-2
Multiple Spanning-Tree Regions21-2
IST, CIST, and CST21-2
Operations Within an MST Region21-3
Operations Between MST Regions21-3
IEEE 802.1s Terminology21-4
Hop Count21-5
Boundary Ports21-5
IEEE 802.1s Implementation21-6
Port Role Naming Change21-6
Interoperation Between Legacy and Standard Switches21-6
Detecting Unidirectional Link Failure21-7
Interoperability with IEEE 802.1D STP21-8
RSTP21-8
Port Roles and the Active Topology21-8
Rapid Convergence21-9
Synchronization of Port Roles21-10
Bridge Protocol Data Unit Format and Processing21-11
Processing Superior BPDU Information21-12
Processing Inferior BPDU Information21-12
Topology Changes21-12
Default MSTP Settings21-13
MSTP Configuration Guidelines21-13
Root Switch21-14
Secondary Root Switch21-15
Port Priority 21-15
Path Cost21-15
Link Type to Ensure Rapid Transitions21-15
xxiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 25
Neighbor Type21-15
Restarting the Protocol Migration Process21-16
How to Configure MSTP21-16
Specifying the MST Region Configuration and Enabling MSTP21-16
Configuring the Root Switch21-17
Configuring the Optional MSTP Parameters21-18
Monitoring and Maintaining MSTP21-20
Configuration Examples for Configuring MSTP21-20
Configuring the MST Region: Example21-20
Additional References21-21
Related Documents21-21
Standards21-21
MIBs21-21
RFCs21-21
Contents
CHAPTER
22Configuring Optional Spanning-Tree Features22-1
Finding Feature Information22-1
Prerequisites for the Optional Spanning-Tree Features22-1
Restrictions for the Optional Spanning-Tree Features22-1
Information About Configuring the Optional Spanning-Tree Features22-1
Configuring the REP Administrative VLAN23-9
Configuring REP Interfaces23-9
Setting Manual Preemption for VLAN Load Balancing23-12
Configuring SNMP Traps for REP23-12
CHAPTER
Monitoring and Maintaining REP23-12
Configuration Examples for Configuring REP23-13
Configuring the Administrative VLAN: Example23-13
Configuring a Primary Edge Port: Examples23-13
Configuring VLAN Blocking: Example23-14
Additional References23-14
Related Documents23-14
Standards23-14
MIBs23-15
RFCs23-15
24Configuring FlexLinks and the MAC Address-Table Move Update24-1
Finding Feature Information24-1
Restrictions for the FlexLinks and the MAC Address-Table Move Update24-1
Information About Configuring the FlexLinks and the MAC Address-Table Move Update24-1
FlexLinks24-1
VLAN FlexLinks Load Balancing and Support24-2
FlexLinks Multicast Fast Convergence24-3
xxvi
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 27
Learning the Other FlexLinks Port as the mrouter Port24-3
Generating IGMP Reports24-3
Leaking IGMP Reports24-4
MAC Address-Table Move Update24-4
Default Settings for FlexLinks and MAC Address-Table Move Update24-5
Configuration Guidelines for FlexLinks and MAC Address-Table Move Update24-6
How to Configure the FlexLinks and MAC Address-Table Move Update24-6
Configuring FlexLinks24-6
Configuring a Preemption Scheme for FlexLinks24-7
Configuring VLAN Load Balancing on FlexLinks24-7
Configuring the MAC Address-Table Move Update Feature24-8
Configuring the MAC Address-Table Move Update Messages24-8
Maintaining and Monitoring the FlexLinks and MAC Address-Table Move Update24-9
Configuration Examples for the FlexLinks and MAC Address-Table Move Update24-9
Configuring FlexLinks Port: Examples24-9
Configuring a Backup Interface: Example24-11
Configuring a Preemption Scheme: Example24-11
Configuring VLAN Load Balancing on FlexLinks: Examples24-12
Configuring MAC Address-Table Move Update: Example24-13
Contents
CHAPTER
Additional References24-13
Related Documents24-13
Standards24-13
MIBs24-14
RFCs24-14
Configuring the DHCP Relay Agent 25-10
Specifying the Packet Forwarding Address25-10
Enabling DHCP Snooping and Option 8225-11
Enabling the DHCP Snooping Binding Database Agent25-12
Enabling DHCP Server Port-Based Address Allocation25-13
Preassigning an IP Address25-13
Related Documents25-16
Standards25-16
MIBs25-16
RFCs25-16
CHAPTER
26Configuring Dynamic ARP Inspection26-1
Finding Feature Information26-1
Prerequisites for Dynamic ARP Inspection26-1
Restrictions for Dynamic ARP Inspection26-1
Information About Dynamic ARP Inspection26-1
Dynamic ARP Inspection26-1
Interface Trust States and Network Security26-3
Rate Limiting of ARP Packets26-4
Relative Priority of ARP ACLs and DHCP Snooping Entries26-4
Logging of Dropped Packets26-4
Default Dynamic ARP Inspection Settings26-5
Dynamic ARP Inspection Configuration Guidelines26-5
How to Configure Dynamic ARP Inspection26-6
Configuring Dynamic ARP Inspection in DHCP Environments26-6
Configuring ARP ACLs for Non-DHCP Environments26-7
Limiting the Rate of Incoming ARP Packets26-9
Performing Validation Checks26-10
Configuring the Log Buffer26-11
xxviii
Monitoring and Maintaining Dynamic ARP Inspection26-12
Configuration Examples for Dynamic ARP Inspection26-12
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 29
Configuring Dynamic ARP Inspection in DHCP Environments: Example26-12
Configuring ARP ACLs for Non-DHCP Environments: Example26-12
Additional References26-13
Related Documents26-13
Standards26-13
MIBs26-13
RFCs26-13
Technical Assistance26-13
Contents
CHAPTER
27Configuring IP Source Guard27-1
Finding Feature Information27-1
Prerequisites for IP Source Guard27-1
Restrictions for IP Source Guard27-1
Information About IP Source Guard27-1
IP Source Guard27-1
Source IP Address Filtering27-2
Source IP and MAC Address Filtering27-2
IP Source Guard for Static Hosts27-2
IP Source Guard Configuration Guidelines27-3
How to Configure IP Source Guard27-4
Enabling IP Source Guard27-4
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port27-4
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port27-5
Monitoring and Maintaining IP Source Guard27-7
Configuration Examples for IP Source Guard27-7
Enabling IPSG with Source IP and MAC Filtering: Example27-7
Disabling IPSG with Static Hosts: Example27-7
Enabling IPSG for Static Hosts: Examples27-7
Displaying IP or MAC Binding Entries: Examples27-8
Enabling IPSG for Static Hosts: Examples27-9
CHAPTER
OL-25866-01
Additional References27-10
Related Documents27-10
Standards27-11
MIBs27-11
RFCs27-11
28Configuring IGMP Snooping and MVR28-1
Finding Feature Information28-1
Cisco IE 2000 Switch Software Configuration Guide
xxix
Page 30
Contents
Restrictions for IGMP Snooping and MVR28-1
Information About IGMP Snooping and MVR28-1
IGMP Snooping28-2
IGMP Versions28-2
Joining a Multicast Group28-3
Leaving a Multicast Group28-5
Immediate Leave 28-5
IGMP Configurable-Leave Timer28-5
IGMP Report Suppression28-6
Default IGMP Snooping Configuration28-6
Snooping Methods28-6
Multicast Flooding Time After a TCN Event28-7
Flood Mode for TCN28-7
Multicast Flooding During a TCN Event28-7
IGMP Snooping Querier Guidelines28-7
IGMP Report Suppression28-8
Multicast VLAN Registration28-8
MVR in a Multicast Television Application28-9
Default MVR Settings28-11
MVR Configuration Guidelines and Limitations28-11
Monitoring and Maintaining IGMP Snooping and MVR28-19
Configuration Examples for IGMP Snooping28-21
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 31
Configuring IGMP Snooping: Example28-21
Disabling a Multicast Router Port: Example28-21
Statically Configuring a Host on a Port: Example28-21
Enabling IGMP Immediate Leave: Example28-21
Setting the IGMP Snoopng Querier Parameters: Examples28-21
Enabling MVR: Examples28-22
Creating an IGMP Profile: Example28-22
Applying an IGMP Profile: Example28-23
Limiting IGMP Groups: Example28-23
Additional References28-23
Related Documents28-23
Standards28-23
MIBs28-23
RFCs28-24
Technical Assistance28-24
Contents
CHAPTER
29Configuring Port-Based Traffic Control29-1
Finding Feature Information29-1
Restrictions for Port-Based Traffic Control29-1
Information About Port-Based Traffic Control29-1
Storm Control29-1
Default Storm Control Configuration29-2
Storm Control and Threshold Levels29-3
Small-Frame Arrival Rate29-3
Protected Ports29-3
Protected Port Configuration Guidelines29-3
Port Blocking29-4
Port Security29-4
Secure MAC Addresses29-4
Security Violations29-5
Default Port Security Configuration29-6
Port Security Configuration Guidelines29-6
Port Security Aging29-8
Port Security and Private VLANs29-8
Protocol Storm Protection29-8
OL-25866-01
How to Configure Port-Based Traffic Control29-9
Configuring Storm Control29-9
Configuring Storm Control and Threshold Levels29-9
Configuring Small-Frame Arrival Rate29-10
Cisco IE 2000 Switch Software Configuration Guide
xxxi
Page 32
Contents
Configuring Protected Ports29-10
Configuring Port Blocking29-11
Blocking Flooded Traffic on an Interface29-11
Configuring Port Security29-11
Enabling and Configuring Port Security29-11
Enabling and Configuring Port Security Aging29-15
Configuring Protocol Storm Protection29-15
Enabling Protocol Storm Protection29-15
Monitoring and Maintaining Port-Based Traffic Control29-16
Configuration Examples for Port-Based Traffic Control29-16
Enabling Unicast Storm Control: Example29-16
Enabling Broadcast Address Storm Control on a Port: Example29-17
Enabling Small-Frame Arrival Rate: Example29-17
Configuring a Protected Port: Example29-17
Blocking Flooding on a Port: Example29-17
Configuring Port Security: Examples29-17
Configuring Port Security Aging: Examples29-18
Configuring Protocol Storm Protection: Example29-18
CHAPTER
Additional References29-19
Related Documents29-19
Standards29-19
MIBs29-19
RFCs29-19
Technical Assistance29-19
30Configuring SPAN and RSPAN30-1
Finding Feature Information30-1
Prerequisites for SPAN and RSPAN30-1
Restrictions for SPAN and RSPAN30-1
Information About SPAN and RSPAN30-1
SPAN and RSPAN30-1
Local SPAN30-2
Remote SPAN30-2
SPAN Sessions30-3
Monitored Traffic Types for SPAN Sessions30-4
Source Ports30-5
Source VLANs30-6
VLAN Filtering30-6
Destination Port30-6
xxxii
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 33
RSPAN VLAN30-7
SPAN and RSPAN Interaction with Other Features30-8
Local SPAN Configuration Guidelines30-9
RSPAN Configuration Guidelines30-9
Default SPAN and RSPAN Settings30-10
How to Configure SPAN and RSPAN30-10
Creating a Local SPAN Session30-10
Creating a Local SPAN Session and Configuring Incoming Traffic30-12
Specifying VLANs to Filter30-13
Configuring a VLAN as an RSPAN VLAN30-14
Creating an RSPAN Source Session30-15
Creating an RSPAN Destination Session30-16
Creating an RSPAN Destination Session and Configuring Incoming Traffic30-16
Specifying VLANs to Filter30-17
Monitoring and Maintaining SPAN and RSPAN30-18
Contents
CHAPTER
Configuration Examples for SPAN and RSPAN30-18
Configuring a Local SPAN Session: Example30-18
Modifying Local SPAN Sessions: Examples30-18
Configuring an RSPAN: Example30-19
Configuring a VLAN for a SPAN Session: Example30-20
Modifying RSPAN Sessions: Examples30-20
Additional References30-20
Related Documents30-20
Standards30-21
MIBs30-21
RFCs30-21
31Configuring LLDP, LLDP-MED, and Wired Location Service31-1
Finding Feature Information31-1
Restrictions for LLDP, LLDP-MED, and Wired Location Service31-1
Information About LLDP, LLDP-MED, and Wired Location Service31-1
LLDP-MED31-2
Wired Location Service31-3
Default LLDP Configuration31-4
LLDP, LLDP-MED, and Wired Location Service Configuration Guidelines31-4
LLDP-MED TLVs31-5
OL-25866-01
How to Configure LLDP, LLDP-MED, and Wired Location Service31-5
Related Documents32-4
Standards32-5
MIBs32-5
RFCs32-5
xxxiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 35
Contents
CHAPTER
33Configuring UDLD33-1
Finding Feature Information33-1
Prerequisites for UDLD33-1
Restrictions for UDLD33-1
Information About UDLD33-1
UDLD33-1
Modes of Operation33-2
Methods to Detect Unidirectional Links33-2
Default UDLD Settings33-4
How to Configure UDLD33-4
Enabling UDLD Globally33-4
Enabling UDLD on an Interface33-5
Setting and Resetting UDLD Parameters33-5
Maintaining and Monitoring UDLD33-6
Additional References33-6
Related Documents33-6
Standards33-6
MIBs33-6
RFCs33-6
Technical Assistance33-7
CHAPTER
34Configuring RMON34-1
Finding Feature Information34-1
Prerequisites for RMON34-1
Restrictions for RMON34-1
Information About RMON34-1
RMON34-1
How to Configure RMON34-3
Configuring RMON Alarms and Events34-3
Collecting Group History Statistics on an Interface34-4
Collecting Group Ethernet Statistics on an Interface34-4
Monitoring and Maintaining RMON34-5
Configuration Examples for RMON34-5
Configuring an RMON Alarm Number: Example34-5
Creating an RMON Event Number: Example34-5
Configuring RMON Statistics: Example34-5
System Message Logging35-1
System Log Message Format35-2
Log Messages35-2
Message Severity Levels35-3
Configuring UNIX Syslog Servers35-3
Logging Messages to a UNIX Syslog Daemon35-4
Default System Message Logging Configuration35-5
How to Configure System Message Logging35-5
Disabling Message Logging35-5
Setting the Message Display Destination Device35-6
Synchronizing Log Messages35-7
Enabling and Disabling Time Stamps on Log Messages35-8
Enabling and Disabling Sequence Numbers in Log Messages35-8
Defining the Message Severity Level35-8
Limiting Syslog Messages Sent to the History Table and to SNMP35-9
Enabling the Configuration-Change Logger35-9
Configuring the UNIX System Logging Facility35-10
xxxvi
Monitoring and Maintaining the System Message Log35-10
Configuration Examples for the System Message Log35-10
System Message: Example35-10
Logging Display: Examples35-11
Enabling the Logger: Example35-11
Configuration Log Output: Example35-11
Additional References35-12
Related Documents35-12
Standards35-12
MIBs35-12
RFCs35-12
Technical Assistance35-13
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 37
Contents
CHAPTER
36Configuring SNMP36-1
Finding Feature Information36-1
Prerequisites for SNMP36-1
Restrictions for SNMP36-1
Information About SNMP36-2
SNMP36-2
SNMP Versions36-2
SNMP Manager Functions36-4
SNMP Agent Functions36-4
SNMP Community Strings36-4
Using SNMP to Access MIB Variables 36-5
SNMP Notifications36-5
SNMP ifIndex MIB Object Values36-6
Community Strings36-6
SNMP Notifications36-6
Default SNMP Settings36-8
How to Configure SNMP36-8
Disabling the SNMP Agent36-8
Configuring Community Strings36-9
Configuring SNMP Groups and Users36-10
Configuring SNMP Notifications36-12
Setting the CPU Threshold Notification Types and Values36-14
Setting the Agent Contact and Location Information36-14
Limiting TFTP Servers Used Through SNMP36-15
OL-25866-01
Monitoring and Maintaining SNMP36-15
Configuration Examples for SNMP36-16
Enabling SNMP Versions: Example36-16
Permit SNMP Manager Access: Example36-16
Allow Read-Only Access: Example36-16
Configure SNMP Traps: Examples36-16
Associating a User with a Remote Host: Example36-17
Assigning a String to SNMP: Example36-17
Additional References36-17
Related Documents36-17
Standards36-17
MIBs36-18
RFCs36-18
Technical Assistance36-18
Cisco IE 2000 Switch Software Configuration Guide
xxxvii
Page 38
Contents
CHAPTER
37Configuring Network Security with ACLs37-1
Finding Feature Information37-1
Restrictions for Network Security with ACLs37-1
Information About Network Security with ACLs37-1
ACLs37-1
Supported ACLs37-2
Port ACLs37-2
Handling Fragmented and Unfragmented Traffic37-3
IPv4 ACLs37-4
Standard and Extended IPv4 ACLs37-5
Access List Numbers37-5
ACL Logging37-6
Numbered Extended ACL37-6
Resequencing ACEs in an ACL37-7
Named Standard and Extended ACLs37-7
Time Ranges with ACLs37-8
Comments in ACLs37-8
IPv4 ACL to a Terminal Line37-9
IPv4 ACL Application to an Interface Guidelines37-9
Hardware and Software Handling of IP ACLs37-10
Troubleshooting ACLs37-10
Named MAC Extended ACLs37-11
MAC ACL to a Layer 2 Interface37-11
xxxviii
How to Configure Network Security with ACLs37-11
Creating a Numbered Standard ACL37-11
Creating a Numbered Extended ACL37-13
Creating Named Standard and Extended ACLs37-15
Using Time Ranges with ACLs37-16
Applying an IPv4 ACL to a Terminal Line37-17
Applying an IPv4 ACL to an Interface37-17
Creating Named MAC Extended ACLs37-17
Applying a MAC ACL to a Layer 2 Interface37-18
Monitoring and Maintaining Network Security with ACLs37-19
Configuration Examples for Network Security with ACLs37-19
Creating a Standard ACL: Example37-19
Creating an Extended ACL: Example37-19
Configuring Time Ranges: Examples37-20
Using Named ACLs: Example37-20
Including Comments in ACLs: Examples37-21
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 39
Applying ACL to a Port: Example37-21
Applying an ACL to an Interface: Example37-21
Routed ACLs: Examples37-22
Configuring Numbered ACLs: Example37-23
Configuring Extended ACLs: Examples37-23
Creating Named ACLs: Example37-24
Applying Time Range to an IP ACL: Example37-24
Creating Commented IP ACL Entries: Examples37-25
Configuring ACL Logging: Examples37-25
Applying a MAC ACL to a Layer 2 Interface: Examples37-26
Additional References37-27
Related Documents37-27
Standards37-27
MIBs37-27
RFCs37-27
Technical Assistance37-28
Contents
CHAPTER
38Configuring Standard QoS38-1
Finding Feature Information38-1
Prerequisites for Standard QoS38-1
Restrictions for Standard QoS38-1
Information About Standard QoS38-2
Standard QoS Model38-4
Standard QoS Configuration Guidelines38-5
Configuring the Policed-DSCP Map38-48
Configuring the DSCP-to-CoS Map38-48
Configuring the DSCP-to-DSCP-Mutation Map38-49
Configuring Ingress Queue Characteristics38-49
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds38-49
Allocating Buffer Space Between the Ingress Queues38-50
Allocating Bandwidth Between the Ingress Queues38-51
Configuring the Ingress Priority Queue38-51
Configuring Egress Queue Characteristics38-52
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set38-52
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID38-53
Configuring SRR Shaped Weights on Egress Queues38-54
Configuring SRR Shared Weights on Egress Queues38-55
Configuring the Egress Expedite Queue38-56
Limiting the Bandwidth on an Egress Interface38-56
Contents
Monitoring and Maintaining Standard QoS38-56
Configuration Examples for Standard QoS38-57
Configuring the SRR Scheduler: Example38-57
Configuring DSCP-Trusted State on a Port: Example38-58
Allowing ACL Permission for IP Traffic: Examples38-58
Configuring a Class Map: Examples38-58
Creating a Policy Map: Example38-59
Creating a Layer 2 MAC ACL: Example38-59
Creating an Aggregate Policer: Example38-60
Configuring COS-to-DSCP Map: Example38-60
Configuring DSCP Maps: Examples38-61
Configuring an Ingress Queue: Example38-62
Configuring the Egress Queue: Examples38-63
Creating a Layer 2 MAC ACL: Example38-63
Additional References38-64
Related Documents38-64
Standards38-64
MIBs38-64
RFCs38-64
Technical Assistance38-65
CHAPTER
OL-25866-01
39Configuring Auto-QoS39-1
Finding Feature Information39-1
Prerequisites for Auto-QoS39-1
Cisco IE 2000 Switch Software Configuration Guide
xli
Page 42
Contents
Restrictions for Auto-QoS39-1
Information About Auto-QoS39-2
Auto-QoS39-2
Generated Auto-QoS Configuration39-3
Effects of Auto-QoS on the Configuration39-7
How to Configure Auto-QoS39-8
Enabling Auto-QoS for VoIP39-8
Configuring QoS to Prioritize VoIP Traffic39-9
Monitoring and Maintaining Auto-QoS39-9
Configuration Examples for Auto-QoS39-10
Auto-QoS Network: Example39-10
Enabling Auto-QoS VOIP Trust: Example39-11
Additional References39-11
Related Documents39-11
Standards39-11
MIBs39-11
RFCs39-11
Technical Assistance39-12
CHAPTER
39-12
40Configuring EtherChannels40-1
Finding Feature Information40-1
Restrictions for Configuring EtherChannels40-1
Information About Configuring EtherChannels40-1
EtherChannels40-2
Port-Channel Interfaces40-3
Port Aggregation Protocol40-4
PAgP Modes40-4
PAgP Learn Method and Priority40-5
PAgP Interaction with Virtual Switches and Dual-Active Detection40-5
PAgP Interaction with Other Features40-6
Link Aggregation Control Protocol40-6
LACP Modes40-6
LACP Hot-Standby Ports40-7
LACP Interaction with Other Features40-7
EtherChannel On Mode40-8
Load Balancing and Forwarding Methods40-8
Default EtherChannel Settings40-10
EtherChannel Configuration Guidelines40-10
xlii
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 43
How to Configure EtherChannels40-11
Configuring Layer 2 EtherChannels40-11
Configuring EtherChannel Load Balancing40-14
Configuring the PAgP Learn Method and Priority40-14
Configuring the LACP Hot-Standby Ports40-15
Monitoring and Maintaining EtherChannels on the IE 2000 Switch40-15
Configuration Examples for Configuring EtherChannels40-16
Configuring EtherChannels: Examples40-16
Additional References40-16
Related Documents40-16
Standards40-16
MIBs40-17
RFCs40-17
Technical Assistance40-17
Contents
CHAPTER
41Configuring Static IP Unicast Routing41-1
Finding Feature Information41-1
Restrictions for Static IP Unicast Routing41-1
Information About Configuring Static IP Unicast Routing41-1
IP Routing41-2
Types of Routing41-2
How to Configure Static IP Unicast Routing41-3
Steps for Configuring Routing41-3
Enabling IP Unicast Routing41-3
Assigning IP Addresses to SVIs41-3
Configuring Static Unicast Routes41-4
Monitoring and Maintaining the IP Network41-4
Additional References for Configuring IP Unicast Routing41-5
Related Documents41-5
Standards41-5
MIBs41-5
RFCs41-6
Technical Assistance41-6
CHAPTER
OL-25866-01
42Configuring IPv6 Host Functions42-1
Finding Feature Information42-1
Prerequisites Configuring IPv6 Host Functions42-1
Information About Configuring IPv6 Host Functions42-1
Enabling or Disabling MLD Snooping44-6
Configuring a Static Multicast Group44-7
Configuring a Multicast Router Port44-7
Enabling MLD Immediate Leave44-8
Configuring MLD Snooping Queries44-8
Disabling MLD Listener Message Suppression44-9
Monitoring and Maintaining IPv6 MLD Snooping44-9
Cisco IE 2000 Switch Software Configuration Guide
xlv
Page 46
Contents
Configuration Examples for Configuring IPv6 MLD Snooping44-10
Statically Configure an IPv6 Multicast Group: Example44-10
Adding a Multicast Router Port to a VLAN: Example44-10
Enabling MLD Immediate Leave on a VLAN: Example44-10
Setting MLD Snooping Global Robustness: Example44-10
Setting MLD Snooping Last-Listener Query Parameters: Examples44-10
Additional References44-12
Related Documents44-12
Standards44-12
MIBs44-12
RFCs44-12
Technical Assistance44-12
CHAPTER
45Configuring Cisco IOS IP SLAs Operations45-1
Finding Feature Information45-1
Prerequisites for Configuring Cisco IOS IP SLAs Operations45-1
Restrictions for Configuring Cisco IOS IP SLAs Operations45-1
Information About Configuring Cisco IOS IP SLAs Operations45-1
Cisco IOS IP SLAs45-2
Cisco IOS IP SLAs to Measure Network Performance45-3
IP SLAs Responder and IP SLAs Control Protocol45-3
Response Time Computation for IP SLAs45-4
IP SLAs Operation Scheduling45-4
IP SLAs Operation Threshold Monitoring45-5
IP Service Levels by Using the UDP Jitter Operation45-5
IP Service Levels by Using the ICMP Echo Operation45-6
How to Configure Cisco IOS IP SLAs Operations45-6
Configuring the IP SLAs Responder45-7
Configuring UDP Jitter Operation45-7
Analyzing IP Service Levels by Using the ICMP Echo Operation45-9
Monitoring and Maintaining Cisco IP SLAs Operations45-10
xlvi
Configuration Examples for Configuring Cisco IP SLAs Operations45-11
Configuring an ICMP Echo IP SLAs Operation: Example45-11
Sample Output for Show IP SLA Command: Example45-12
Configuring a Responder UDP Jitter IP SLAs Operation: Example45-12
Configuring a UDP Jitter IP SLAs Operation: Example45-12
Recovering from Software Failures46-7
Recovering from a Lost or Forgotten Password46-8
Recovering from Lost Cluster Member Connectivity46-9
Executing Ping46-9
Executing IP Traceroute46-10
Running TDR and Displaying the Results46-11
Enabling Debugging on a Specific Feature46-12
Enabling All-System Diagnostics46-12
Redirecting Debug and Error Message Output46-13
OL-25866-01
Monitoring Information46-13
Physical Path46-13
SFP Module Status46-13
Troubleshooting Examples46-14
show platform forward Command46-14
Additional References46-16
Related Documents46-16
Standards46-16
MIBs46-16
RFCs46-17
Cisco IE 2000 Switch Software Configuration Guide
xlvii
Page 48
Contents
Technical Assistance46-17
APPENDIX
AWorking with the Cisco IOS File System, Configuration Files, and Software ImagesA-1
Working with the Flash File SystemA-1
Displaying Available File SystemsA-1
Detecting an Unsupported SD Flash Memory CardA-2
SD Flash Memory Card LEDA-3
Setting the Default File SystemA-3
Displaying Information About Files on a File SystemA-4
Changing Directories and Displaying the Working DirectoryA-5
Creating and Removing DirectoriesA-5
Copying FilesA-6
Deleting FilesA-6
Creating, Displaying, and Extracting tar FilesA-7
Creating a tar FileA-7
Displaying the Contents of a tar FileA-7
Extracting a tar FileA-8
Displaying the Contents of a FileA-9
Working with Configuration FilesA-9
Guidelines for Creating and Using Configuration FilesA-9
Configuration File Types and LocationA-10
Creating a Configuration File By Using a Text EditorA-10
Copying Configuration Files By Using TFTPA-11
Preparing to Download or Upload a Configuration File By Using TFTPA-11
Downloading the Configuration File By Using TFTPA-11
Uploading the Configuration File By Using TFTPA-12
Copying Configuration Files By Using FTPA-13
Preparing to Download or Upload a Configuration File By Using FTPA-13
Downloading a Configuration File By Using FTPA-14
Uploading a Configuration File By Using FTPA-15
Copying Configuration Files By Using RCPA-16
Preparing to Download or Upload a Configuration File By Using RCPA-16
Downloading a Configuration File By Using RCPA-17
Uploading a Configuration File By Using RCPA-18
Clearing Configuration InformationA-19
Clearing the Startup Configuration FileA-19
Deleting a Stored Configuration FileA-19
Replacing and Rolling Back ConfigurationsA-19
Understanding Configuration Replacement and RollbackA-19
xlviii
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 49
Configuration GuidelinesA-20
Configuring the Configuration ArchiveA-21
Performing a Configuration Replacement or Rollback OperationA-21
Working with Software ImagesA-22
Image Location on the SwitchA-23
tar File Format of Images on a Server or Cisco.comA-23
Copying Image Files By Using TFTPA-24
Preparing to Download or Upload an Image File By Using TFTPA-25
Downloading an Image File By Using TFTPA-25
Uploading an Image File By Using TFTPA-27
Copying Image Files By Using FTPA-27
Preparing to Download or Upload an Image File By Using FTPA-28
Downloading an Image File By Using FTPA-29
Uploading an Image File By Using FTPA-30
Copying Image Files By Using RCPA-31
Preparing to Download or Upload an Image File By Using RCPA-32
Downloading an Image File By Using RCPA-33
Uploading an Image File By Using RCPA-34
Contents
I
NDEX
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
xlix
Page 50
Contents
Cisco IE 2000 Switch Software Configuration Guide
l
OL-25866-01
Page 51
Audience
Purpose
Preface
This guide is for the networking professional managing your switch. Before using this guide, you should
have experience working with the Cisco IOS software and be familiar with the concepts and terminology
of Ethernet and local area networking.
This guide provides the information that you need to configure Cisco IOS software features on your
switch.
This guide provides procedures for using the commands that have been created or changed for use with
the switch. It does not provide detailed information about these commands. For detailed information
about these commands, see the Cisco IE
For information about the standard Cisco IOS commands, see the Cisco IOS 15.0 documentation set
available from the Cisco.com home page.
This guide does not provide detailed information on the graphical user interfaces (GUIs) for the
embedded Device Manager. However, the concepts in this guide are applicable to the GUI user. For
information about Device Manager, see the switch online help.
For documentation updates, see the release notes for this release.
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
•Commands and keywords are in boldface text.
•Arguments for which you supply values are in italic.
•Square brackets ([ ]) mean optional elements.
2000 Switch Command Reference for this release.
OL-25866-01
•Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
•Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
Interactive examples use these conventions:
Cisco IE 2000 Switch Software Configuration Guide
li
Page 52
•Terminal sessions and system displays are in screen font.
•Information you enter is in boldface screen font.
•Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
Notes, cautions, and timesavers use these conventions and symbols:
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Publications
These documents provide complete information about the switch and are available from this Cisco.com
site:
Preface
http://www.cisco.com/go/ie2000_docs
NoteBefore installing, configuring, or upgrading the switch, see these documents:
•For initial configuration information, see the “Using Express Setup” section in the getting started
guide or the “Configuring the Switch with the CLI-Based Setup Program” appendix in the hardware
installation guide.
•For Device Manager requirements, see the “System Requirements” section in the release notes (not
orderable but available on Cisco.com).
•For upgrading information, see the “Downloading Software” section in the release notes.
See these documents for other information about the switch:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free
service and Cisco currently supports RSS version 2.0.
technical documentation, at:
New in Cisco Product Documentation, which also lists all new and
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
liii
Page 54
Preface
liv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 55
Configuration Overview
Features
Your switch uses the Cisco IOS software licensing (CISL) architecture to support a single universal
cryptographic image (supports encryption). This image implements the LAN Base or LAN Lite features
depending on your switch model:r
•The LAN Base image provides quality of service (QoS), port security, 1588v2 PTP, and static
routing features.
•The LAN Lite image provides reduced Layer 2 functionality without the loss of critical security
features such as SSH and SNMPv3.
Feature Software Licensing
CHA PTER
1
A feature license is supported on a single universal image that implements the LAN Base or LAN Lite
features depending on your software license:
•The LAN Base features include quality of service (QoS), port security, PTP, and static routing.
•The LAN Lite features provide Layer 2 functionality without losing critical security features such
as SSH and SNMPv3.
Cryptographic functionality is included on the universal image.
These guidelines can help you determine what image is running on your switch:
•Enter the show version privileged EXEC command. For example, IE-2000-8TC-G-E runs the LAN
Base image by default and the IE-2000-4T-G-L runs the LAN Lite image by default.
•Enter the show license privileged EXEC command, to see which is the active image:
Switch# show license
Index 1 Feature: lanbase
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Priority: Medium
License Count: Non-Counted
Index 2 Feature: lanlite
Period left: 0 minute 0 second
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
1-1
Page 56
Feature Software Licensing
Ease-of-Deployment and Ease-of-Use Features
•Express Setup for quickly configuring a switch for the first time with basic IP information, contact
information, switch and Telnet passwords, and Simple Network Management Protocol (SNMP)
information through a browser-based program. For more information about Express Setup, see the
getting started guide.
•User-defined and Cisco-default Smartports macros for creating custom switch configurations for
simplified deployment across the network.
•A removable SD flash card that stores the Cisco IOS software image and configuration files for the
switch. You can replace and upgrade the switch without reconfiguring the software features.
•An embedded Device Manager GUI for configuring and monitoring a single switch through a web
browser. For information about launching Device Manager, see the getting started guide. For more
information about Device Manager, see the switch online help.
Performance Features
•Autosensing of port speed and autonegotiation of duplex mode on all switch ports for optimizing
bandwidth
Chapter 1 Configuration Overview
•Automatic medium-dependent interface crossover (auto-MDIX) capability on 10/100 and
10/100/1000 Mb/s interfaces and on 10/100/1000 BASE-TX SFP module interfaces that enables the
interface to automatically detect the required cable connection type (straight-through or crossover)
and to configure the connection appropriately
•Support for up to 1546 bytes routed frames, up to 9000 bytes for frames that are bridged in hardware,
and up to 2000 bytes for frames that are bridged by software
•IEEE 802.3x flow control on all ports (the switch does not send pause frames)
•Support for up to 6 EtherChannel groups
•Port Aggregation Protocol (PAgP) and Link Aggregation Control Protocol (LACP) for automatic
creation of EtherChannel links
•Per-port storm control for preventing broadcast, multicast, and unicast storms
•Port blocking on forwarding unknown Layer 2 unknown unicast, multicast, and bridged broadcast
traffic
•Cisco Group Management Protocol (CGMP) server support and Internet Group Management
Protocol (IGMP) snooping for IGMP Versions
–
(For CGMP devices) CGMP for limiting multicast traffic to specified end stations and reducing
1, 2, and 3:
overall network traffic
–
(For IGMP devices) IGMP snooping for forwarding multimedia and multicast traffic
•IGMP report suppression for sending only one IGMP report per multicast router query to the
multicast devices (supported only for IGMPv1 or IGMPv2 queries)
•IGMP snooping querier support to configure switch to generate periodic IGMP general query
messages
1-2
•IGMP helper to allow the switch to forward a host request to join a multicast stream to a specific IP
destination address
•IGMP filtering for controlling the set of multicast groups to which hosts on a switch port can belong
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 57
Chapter 1 Configuration Overview
•IGMP throttling for configuring the action when the maximum number of entries is in the IGMP
forwarding table
•IGMP leave timer for configuring the leave latency for the network
•Switch Database Management (SDM) templates for allocating system resources to maximize
support for user-selected features
•Cisco IOS IP Service Level Agreements (SLAs), a part of Cisco IOS software that uses active traffic
monitoring for measuring network performance
•Configurable small-frame arrival threshold to prevent storm control when small frames (64 bytes or
less) arrive on an interface at a specified rate (the threshold)
•FlexLink Multicast Fast Convergence to reduce the multicast traffic convergence time after a
FlexLink failure
•RADIUS server load balancing to allow access and authentication requests to be distributed evenly
across a server group
•Support for QoS marking of CPU-generated traffic and queue CPU-generated traffic on the egress
network ports
Feature Software Licensing
Management Options
•An embedded Device Manager—Device Manager is a GUI application that is integrated in the
software image. You use it to configure and to monitor a single switch. For information about
launching Device Manager, see the getting started guide. For more information about Device Manager,
see the switch online help.
•Network Assistant—Network Assistant is a network management application that can be
downloaded from Cisco.com. You use it to manage a single switch, a cluster of switches, or a
community of devices. For more information about Network Assistant, see Getting Started with Cisco Network Assistant, available on Cisco.com.
•CLI—The Cisco IOS software supports desktop- and multilayer-switching features. You can access
the CLI either by connecting your management station directly to the switch console port or by using
Telnet from a remote management station. For more information about the CLI, see
“Using the Command-Line Interface.”
•SNMP—SNMP management applications such as CiscoWorks2000 LAN Management Suite (LMS)
and HP OpenView. You can manage from an SNMP-compatible management station that is running
platforms such as HP OpenView or SunNet Manager. The switch supports a comprehensive set of
MIB extensions and four remote monitoring (RMON) groups. For more information about using
SNMP, see
•Cisco IOS Configuration Engine (previously known as the Cisco IOS CNS agent)—Configuration
service automates the deployment and management of network devices and services. You can
automate initial configurations and configuration updates by generating switch-specific
configuration changes, sending them to the switch, executing the configuration change, and logging
the results.
Chapter 2,
Chapter 36, “Configuring SNMP.”
OL-25866-01
For more information about CNS, see Chapter 5, “Configuring Cisco IOS Configuration Engine.”
Cisco IE 2000 Switch Software Configuration Guide
1-3
Page 58
Feature Software Licensing
Industrial Application
•CIP—Common Industrial Protocol (CIP) is a peer-to-peer application protocol that provides
application level connections between the switch and industrial devices such as I/O controllers,
sensors, relays, and so forth.You can manage the switch using CIP-based management tools, such
as RSLogix. For more information about the CIP commands that the switch supports, see the
command reference.
•Profinet Version 2—Support for PROFINET IO, a modular communication framework for
distributed automation applications. The switch provides a PROFINET management connection to
the I/O controllers.
Manageability Features
•CNS embedded agents for automating switch management, configuration storage, and delivery.
•DHCP for automating configuration of switch information (such as IP address, default gateway,
hostname, and Domain Name System [DNS] and TFTP server names).
•DHCP relay for forwarding User Datagram Protocol (UDP) broadcasts, including IP address
requests, from DHCP clients.
Chapter 1 Configuration Overview
•DHCP server for automatic assignment of IP addresses and other DHCP options to IP hosts.
•DHCP-based autoconfiguration and image update to download a specified configuration of a new
image to a large number of switches.
•DHCPv6 bulk-lease query to support new bulk lease query type (as defined in RFC5460).
•DHCPv6 Relay Source Configuration feature to configure a source address for DHCPv6 relay agent.
•DHCP server port-based address allocation for the preassignment of an IP address to a switch port.
•Directed unicast requests to a DNS server for identifying a switch through its IP address and its
corresponding hostname and to a TFTP server for administering software upgrades from a TFTP
server.
•Address Resolution Protocol (ARP) for identifying a switch through its IP address and its
corresponding MAC address.
•Unicast MAC address filtering to drop packets with specific source or destination MAC addresses.
•Configurable MAC address scaling that allows disabling MAC address learning on a VLAN to limit
the size of the MAC address table.
•Cisco Discovery Protocol (CDP) Versions 1 and 2 for network topology discovery and mapping
between the switch and other Cisco devices on the network.
•Link Layer Discovery Protocol (LLDP) and LLDP Media Endpoint Discovery (LLDP-MED) for
interoperability with third-party IP phones.
•LLDP media extensions (LLDP-MED) location TLV that provides location information from the
switch to the endpoint device.
1-4
•Network Time Protocol (NTP) for providing a consistent time stamp to all switches from an external
source.
•Network Time Protocol version 4 (NTPv4) to support both IPv4 and IPv6 and compatibility with
NTPv3.
•Precision Time Protocol (PTP) as defined in the IEEE 1588 standard to synchronize with
nanosecond accuracy the real-time clocks of the devices in a network.
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 59
Chapter 1 Configuration Overview
–
•Cisco IOS File System (IFS) for providing a single interface to all file systems that the switch uses.
•Support for the SSM PIM protocol to optimize multicast applications, such as video.
•Configuration logging to log and to view changes to the switch configuration.
•Unique device identifier to provide product identification information through a show inventory
user EXEC command display.
•In-band management access through Device Manager over a Netscape Navigator or Microsoft
Internet Explorer browser session.
•In-band management access for up to 16 simultaneous Telnet connections for multiple CLI-based
sessions over the network.
•In-band management access for up to five simultaneous, encrypted Secure Shell (SSH) connections
for multiple CLI-based sessions over the network.
•In-band management access through SNMP Versions 1, 2c, and 3 get and set requests.
•Out-of-band management access through the switch console port to a directly attached terminal or
to a remote terminal through a serial connection or a modem.
•Secure Copy Protocol (SCP) feature to provide a secure and authenticated method for copying
switch configuration or switch image files (requires the cryptographic version of the software).
Feature Software Licensing
PTP enhancement to support PTP messages on the expansion module ports.
•Configuration replacement and rollback to replace the running configuration on a switch with any
saved Cisco IOS configuration file.
•The HTTP client in Cisco IOS can send requests to both IPv4 and IPv6 HTTP server, and the HTTP
server in Cisco IOS can service HTTP requests from both IPv4 and IPv6 HTTP clients.
•Simple Network and Management Protocol (SNMP) can be configured over IPv6 transport so that
an IPv6 host can send SNMP queries and receive SNMP notifications from a device running IPv6.
•IPv6 stateless autoconfiguration to manage link, subnet, and site addressing changes, such as
management of host and mobile IP addresses.
•Disabling MAC address learning on a VLAN.
•DHCP server port-based address allocation for the preassignment of an IP address to a switch port.
•CPU utilization threshold trap monitors CPU utilization.
•LLDP-MED network-policy profile time, length, value (TLV) for creating a profile for voice and
voice-signaling by specifying the values for VLAN, class of service (CoS), differentiated services
code point (DSCP), and tagging mode.
•Support for including a hostname in the option 12 field of DHCPDISCOVER packets. This provides
identical configuration files to be sent by using the DHCP protocol.
•DHCP Snooping enhancement to support the selection of a fixed string-based format for the
circuit-id sub-option of the Option 82 DHCP field.
•Support for PROFINET IO, a modular communication framework for distributed automation
applications. The switch provides a PROFINET management connection to the I/O controllers.
Availability and Redundancy Features
•UniDirectional Link Detection (UDLD) and aggressive UDLD for detecting and disabling
unidirectional links on fiber-optic interfaces caused by incorrect fiber-optic wiring or port faults
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
1-5
Page 60
Feature Software Licensing
•IEEE 802.1D Spanning Tree Protocol (STP) for redundant backbone connections and loop-free
•IEEE 802.1s Multiple Spanning Tree Protocol (MSTP) for grouping VLANs into a spanning-tree
•Optional spanning-tree features available in PVST+, rapid-PVST+, and MSTP mode:
Chapter 1 Configuration Overview
networks. STP has these features:
–
Up to 128 spanning-tree instances supported
–
Per-VLAN spanning-tree plus (PVST+) for load balancing across VLANs
–
Rapid PVST+ for load balancing across VLANs and providing rapid convergence of
spanning-tree instances
instance and for providing multiple forwarding paths for data traffic and load balancing and rapid
per-VLAN Spanning-Tree plus (rapid-PVST+) based on the IEEE
Protocol (RSTP) for rapid convergence of the spanning tree by immediately changing root and
designated ports to the forwarding state
–
Port Fast for eliminating the forwarding delay by enabling a port to immediately change from
the blocking state to the forwarding state
–
BPDU guard for shutting down Port Fast-enabled ports that receive bridge protocol data units
(BPDUs)
802.1w Rapid Spanning Tree
VLAN Features
–
BPDU filtering for preventing a Port Fast-enabled port from sending or receiving BPDUs
–
Root guard for preventing switches outside the network core from becoming the spanning-tree
root
–
Loop guard for preventing alternate or root ports from becoming designated ports because of a
failure that leads to a unidirectional link
•FlexLink Layer 2 interfaces to back up one another as an alternative to STP for basic link
redundancy (requires the LAN Base image)
•Link-state tracking to mirror the state of the ports that carry upstream traffic from connected hosts
and servers, and to allow the failover of the server traffic to an operational link on another Cisco
Ethernet switch.
•Support for up to 255 VLANs for assigning users to VLANs associated with appropriate network
resources, traffic patterns, and bandwidth.
•Support for VLAN IDs in the 1 to 4096 range as allowed by the IEEE 802.1Q standard.
•VLAN Query Protocol (VQP) for dynamic VLAN membership.
•IEEE 802.1Q trunking encapsulation on all ports for network moves, adds, and changes;
management and control of broadcast and multicast traffic; and network security by establishing
VLAN groups for high-security users and network resources.
•Dynamic Trunking Protocol (DTP) for negotiating trunking on a link between two devices and for
negotiating the type of trunking encapsulation (IEEE 802.1Q) to be used.
1-6
•VLAN Trunking Protocol (VTP) and VTP pruning for reducing network traffic by restricting
flooded traffic to links destined for stations receiving the traffic.
•Voice VLAN for creating subnets for voice traffic from Cisco IP phones.
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 61
Chapter 1 Configuration Overview
•VLAN 1 minimization for reducing the risk of spanning-tree loops or storms by allowing VLAN 1
•VLAN FlexLink load balancing to provide Layer 2 redundancy without requiring Spanning Tree
•Support for 802.1x authentication with restricted VLANs (also known as authentication failed
•Support for VTP version 3 that includes support for configuring extended range VLANs (VLANs
Security Features
•IP Service Level Agreements (IP SLAs) support to measure network performance by using active
•IP SLAs EOT to use the output from IP SLAs tracking operations triggered by an action such as
Feature Software Licensing
to be disabled on any individual VLAN trunk link. With this feature enabled, no user traffic is sent
or received on the trunk. The switch CPU continues to send and receive control protocol frames.
Protocol (STP). A pair of interfaces configured as primary and backup links can load balance traffic
based on VLAN.
VLANs).
1006 to 4096) in any VTP mode, enhanced authentication (hidden or secret passwords), propagation
of other databases in addition to VTP, VTP primary and secondary servers, and the option to turn
VTP on or off by port.
traffic monitoring
latency, jitter, or packet loss for a standby router failover takeover (requires the LAN Base image)
•Web authentication to allow a supplicant (client) that does not support IEEE 802.1x functionality to
be authenticated using a web browser
•Local web authentication banner so that a custom banner or an image file can be displayed at a web
authentication login screen
•MAC authentication bypass (MAB) aging timer to detect inactive hosts that have authenticated after
they have authenticated by using MAB
•Password-protected access (read-only and read-write access) to management interfaces (Device
Manager, Network Assistant, and the CLI) for protection against unauthorized configuration
changes
•Multilevel security for a choice of security level, notification, and resulting actions
•Static MAC addressing for ensuring security
•Protected port option for restricting the forwarding of traffic to designated ports on the same switch
•Port security option for limiting and identifying MAC addresses of the stations allowed to access
the port
•VLAN-aware port security option to shut down the VLAN on the port when a violation occurs,
instead of shutting down the entire port
•Port security aging to set the aging time for secure addresses on a port
•Protocol storm protection to control the rate of incoming protocol traffic to a switch by dropping
packets that exceed a specified ingress rate
•BPDU guard for shutting down a Port Fast-configured port when an invalid configuration occurs
OL-25866-01
•Standard and extended IP access control lists (ACLs) for defining security policies in both directions
on routed interfaces (router ACLs) and VLANs and inbound on Layer 2 interfaces (port ACLs)
•Extended MAC access control lists for defining security policies in the inbound direction on Layer 2
interfaces
•Source and destination MAC-based ACLs for filtering non-IP traffic
Cisco IE 2000 Switch Software Configuration Guide
1-7
Page 62
Feature Software Licensing
•DHCP snooping to filter untrusted DHCP messages between untrusted hosts and DHCP servers
•IP source guard to restrict traffic on nonrouted interfaces by filtering traffic based on the DHCP
•Dynamic ARP inspection to prevent malicious attacks on the switch by not relaying invalid ARP
•Layer 2 protocol tunneling bypass feature to provide interoperability with third-party vendors
•IEEE 802.1x port-based authentication to prevent unauthorized devices (clients) from gaining
Chapter 1 Configuration Overview
snooping database and IP source bindings
requests and responses to other ports in the same VLAN
access to the network. These features are supported:
–
Multidomain authentication (MDA) to allow both a data device and a voice device, such as an
IP phone (Cisco or non-Cisco), to independently authenticate on the same IEEE 802.1x-enabled
switch port
–
Dynamic voice virtual LAN (VLAN) for MDA to allow a dynamic voice VLAN on an
MDA-enabled port
–
VLAN assignment for restricting 802.1x-authenticated users to a specified VLAN
–
Port security for controlling access to 802.1x ports
–
Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless of the authorized
or unauthorized state of the port
–
IP phone detection enhancement to detect and recognize a Cisco IP phone
–
Guest VLAN to provide limited services to non-802.1x-compliant users
–
Restricted VLAN to provide limited services to users who are 802.1x compliant, but do not have
the credentials to authenticate via the standard 802.1x processes
–
802.1x accounting to track network usage
–
802.1x with wake-on-LAN to allow dormant PCs to be powered on based on the receipt of a
specific Ethernet frame
–
802.1x readiness check to determine the readiness of connected end hosts before configuring
IEEE 802.1x on the switch
–
Voice-aware 802.1x security to apply traffic violation actions only on the VLAN on which a
security violation occurs
–
MAC authentication bypass to authorize clients based on the client MAC address
–
Network Edge Access Topology (NEAT) with 802.1X switch supplicant, host authorization
with CISP, and auto enablement to authenticate a switch outside a wiring closet as a supplicant
to another switch
–
IEEE 802.1x with open access to allow a host to access the network before being authenticated
–
IEEE 802.1x authentication with downloadable ACLs and redirect URLs to allow per-user ACL
downloads from a Cisco Secure ACS server to an authenticated switch
–
Flexible-authentication sequencing to configure the order of the authentication methods that a
port tries when authenticating a new host
–
Multiple-user authentication to allow more than one host to authenticate on an 802.1x-enabled
port
1-8
•Network Admission Control (NAC) features:
–
NAC Layer 2 802.1x validation of the antivirus condition or posture of endpoint systems or
clients before granting the devices network access
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 63
Chapter 1 Configuration Overview
–
–
–
•TACACS+, a proprietary feature for managing network security through a TACACS server
•RADIUS for verifying the identity of, granting access to, and tracking the actions of remote users
through AAA services
Feature Software Licensing
For information about configuring NAC Layer 2 802.1x validation, see the “Configuring NAC
Layer 2 802.1x Validation” section on page 13-46
NAC Layer 2 IP validation of the posture of endpoint systems or clients before granting the
devices network access
For information about configuring NAC Layer 2 IP validation, see the Network Admission Control Software Configuration Guide
IEEE 802.1x inaccessible authentication bypass
For information about configuring this feature, see the “Configuring Inaccessible
Authentication Bypass” section on page 13-44
Authentication, authorization, and accounting (AAA) down policy for a NAC Layer 2 IP
validation of a host if the AAA server is not available when the posture validation occurs
For information about this feature, see the Network Admission Control Software Configuration Guide.
•Enhancements to RADIUS, TACACS+, and SSH to function over IPv6
•Kerberos security system to authenticate requests for network resources by using a trusted third
party (requires the cryptographic versions of the software)
•Secure Socket Layer (SSL) Version 3.0 support for the HTTP 1.1 server authentication, encryption,
and message integrity and HTTP client authentication to allow secure HTTP communications
(requires the cryptographic version of the software)
•Voice-aware IEEE 802.1x and MAC authentication bypass (MAB) security violation to shut down
only the data VLAN on a port when a security violation occurs
•Support for IP source guard on static hosts
•RADIUS change of authorization (CoA) to change the attributes of a certain session after it is
authenticated. When there is a change in policy for a user or user group in AAA, administrators can
send the RADIUS CoA packets from the AAA server, such as Cisco Secure ACS to reinitialize
authentication, and apply to the new policies.
•IEEE 802.1x User Distribution to allow deployments with multiple VLANs (for a group of users) to
improve scalability of the network by load balancing users across different VLANs. Authorized
users are assigned to the least populated VLAN in the group, assigned by RADIUS server.
•Support for critical VLAN with multiple-host authentication so that when a port is configured for
multi-authentication, and an AAA server becomes unreachable, the port is placed in a critical VLAN
in order to still permit access to critical resources
•Customizable web authentication enhancement to allow the creation of user-defined login, success,
failure and expire web pages for local web authentication
OL-25866-01
•Support for Network Edge Access Topology (NEAT) to change the port host mode and to apply a
standard port configuration on the authenticator switch port
•VLAN-ID based MAC authentication to use the combined VLAN and MAC address information for
user authentication to prevent network access from unauthorized VLANs
•MAC move to allow hosts (including the hosts connected behind an IP phone) to move across ports
within the same switch without any restrictions to enable mobility. With MAC move, the switch
treats the reappearance of the same MAC address on another port in the same way as a completely
new MAC address.
Cisco IE 2000 Switch Software Configuration Guide
1-9
Page 64
Feature Software Licensing
•Support for 3DES and AES with version 3 of the Simple Network Management Protocol (SNMPv3).
This release adds support for the 168-bit Triple Data Encryption Standard (3DES) and the 128-bit,
192-bit, and 256-bit Advanced Encryption Standard (AES) encryption algorithms to SNMPv3.
QoS and CoS Features
NoteThese features require the LAN Base image.
•Automatic QoS (auto-QoS) to simplify the deployment of existing QoS features by classifying
traffic and configuring egress queues
•Automatic quality of service (QoS) Voice over IP (VoIP) enhancement for port-based trust of DSCP
and priority queuing for egress traffic
•Classification
–
IP type-of-service/Differentiated Services Code Point (IP ToS/DSCP) and IEEE 802.1p CoS
marking priorities on a per-port basis for protecting the performance of mission-critical
applications
Chapter 1 Configuration Overview
–
IP ToS/DSCP and IEEE 802.1p CoS marking based on flow-based packet classification
(classification based on information in the MAC, IP, and TCP/UDP headers) for
high-performance quality of service at the network edge, allowing for differentiated service
levels for different types of network traffic and for prioritizing mission-critical traffic in the
network
–
Trusted port states (CoS, DSCP, and IP precedence) within a QoS domain and with a port
bordering another QoS domain
–
Trusted boundary for detecting the presence of a Cisco IP Phone, trusting the CoS value
received, and ensuring port security
•Policing
–
Traffic-policing policies on the switch port for managing how much of the port bandwidth
should be allocated to a specific traffic flow.
–
If you configure multiple class maps for a hierarchical policy map, each class map can be
associated with its own port-level (second-level) policy map. Each second-level policy map can
have a different policer.
–
Aggregate policing for policing traffic flows in aggregate to restrict specific applications or
traffic flows to metered, predefined rates.
•Out-of-profile
–
Out-of-profile markdown for packets that exceed bandwidth utilization limits
•Ingress queueing and scheduling
1-10
–
Two configurable ingress queues for user traffic (one queue can be the priority queue)
–
Weighted tail drop (WTD) as the congestion-avoidance mechanism for managing the queue
lengths and providing drop precedences for different traffic classifications
–
Shaped round robin (SRR) as the scheduling service for specifying the rate at which packets are
sent to the ring (sharing is the only supported mode on ingress queues)
•Egress queues and scheduling
–
Four egress queues per port.
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 65
Chapter 1 Configuration Overview
–
–
Monitoring Features
•EOT and IP SLAs EOT static route support identify when a preconfigured static route or a DHCP
route goes down
•MAC address notification traps and RADIUS accounting for tracking users on a network by storing
the MAC addresses that the switch has learned or removed
•Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) for traffic monitoring on any port or
VLAN (RSPAN requires LAN Base image)
•SPAN and RSPAN support of Intrusion Detection Systems (IDS) to monitor, repel, and report
network security violations (RSPAN requires LAN Base image)
Default Settings After Initial Switch Configuration
WTD as the congestion-avoidance mechanism for managing the queue lengths and providing
drop precedences for different traffic classifications.
SRR as the scheduling service for specifying the rate at which packets are dequeued to the
egress interface (shaping or sharing is supported on egress queues). Shaped egress queues are
guaranteed but limited to using a share of port bandwidth. Shared egress queues are also
guaranteed a configured share of bandwidth, but can use more than the guarantee if other queues
become empty and do not use their share of the bandwidth.
•Four groups (history, statistics, alarms, and events) of embedded RMON agents for network
monitoring and traffic analysis
•Syslog facility for logging system messages about authentication or authorization errors, resource
issues, and time-out events
•Layer 2 traceroute to identify the physical path that a packet takes from a source device to a
destination device
•Time Domain Reflector (TDR) to diagnose and resolve cabling problems on 10/100 and
10/100/1000 copper Ethernet ports
•SFP module diagnostic management interface to monitor physical or operational status of an SFP
module
•Facilities for processing alarms related to temperature, power-supply conditions, and the status of
the Ethernet ports
•Alarm relay contacts that can be used for an external relay system
•Digital optical monitoring (DOM) to check status of X2 small form-factor pluggable (SFP) modules
Default Settings After Initial Switch Configuration
The switch is designed for plug-and-play operation, requiring only that you assign basic IP information
to the switch and connect it to the other devices in your network. If you have specific network needs,
you can change the interface-specific and system-wide settings.
OL-25866-01
NoteFor information about assigning an IP address by using the browser-based Express Setup program, see
the getting started guide. For information about assigning an IP address by using the CLI-based setup
program, see the hardware installation guide.
Cisco IE 2000 Switch Software Configuration Guide
1-11
Page 66
Default Settings After Initial Switch Configuration
If you do not configure the switch at all, the switch operates with these default settings:
•Default switch IP address, subnet mask, and default gateway is 0.0.0.0. For more information, see
•Default domain name is not configured. For more information, see Chapter 4, “Performing Switch
Setup Configuration.”
•DHCP client is enabled, the DHCP server is enabled (only if the device acting as a DHCP server is
configured and is enabled), and the DHCP relay agent is enabled (only if the device is acting as a
DHCP relay agent is configured and is enabled). For more information, see
Switch Setup Configuration,” and Chapter 25, “Configuring DHCP.”
•Switch cluster is disabled. For more information about switch clusters, see Chapter 6, “Configuring
Switch Clusters,” and the Getting Started with Cisco Network Assistant, available on Cisco.com.
•No passwords are defined. For more information, see Chapter 7, “Performing Switch
Administration.”
•System name and prompt is Switch. For more information, see Chapter 7, “Performing Switch
Administration.”
•NTP is enabled. For more information, see Chapter 7, “Performing Switch Administration.”
•DNS is enabled. For more information, see Chapter 7, “Performing Switch Administration.”
•TACACS+ is disabled. For more information, see Chapter 12, “Configuring Switch-Based
Authentication.”
Chapter 1 Configuration Overview
Chapter 4, “Performing
•RADIUS is disabled. For more information, see Chapter 12, “Configuring Switch-Based
Authentication.”
•The standard HTTP server and Secure Socket Layer (SSL) HTTPS server are both enabled. For more
information, see
•IEEE 802.1x is disabled. For more information, see Chapter 13, “Configuring IEEE 802.1x
No protected ports are defined. For more information, see Chapter 29, “Configuring Port-Based
Traffic Control.”
–
Unicast and multicast traffic flooding is not blocked. For more information, see Chapter 29,
“Configuring Port-Based Traffic Control.”
–
No secure ports are configured. For more information, see Chapter 29, “Configuring Port-Based
Traffic Control.”
•CDP is enabled. For more information, see Chapter 32, “Configuring CDP.”
•UDLD is disabled. For more information, see Chapter 33, “Configuring UDLD.”
•SPAN and RSPAN are disabled. For more information, see Chapter 30, “Configuring SPAN and
RSPAN.”
•RMON is disabled. For more information, see Chapter 34, “Configuring RMON.”
•Syslog messages are enabled and appear on the console. For more information, see Chapter 35,
“Configuring System Message Logging.”
•SNMP is enabled (Version 1). For more information, see Chapter 36, “Configuring SNMP.”
•No ACLs are configured. For more information, see Chapter 37, “Configuring Network Security
with ACLs.”
OL-25866-01
•QoS is disabled. For more information, see Chapter 38, “Configuring Standard QoS.”
•No EtherChannels are configured. For more information, see Chapter 40, “Configuring
EtherChannels.”
•IP unicast routing is disabled. For more information, see Chapter 41, “Configuring IP Unicast
Routing.”
Cisco IE 2000 Switch Software Configuration Guide
1-13
Page 68
Network Configuration Examples
Network Configuration Examples
This section provides network configuration concepts and includes examples of using the switch to
create dedicated network segments and interconnecting the segments through Fast Ethernet and Gigabit
Ethernet connections.
•Design Concepts for Using the Switch, page 1-14
•Ethernet-to-the-Factory Architecture, page 1-15
Design Concepts for Using the Switch
As your network users compete for network bandwidth, it takes longer to send and receive data. When
you configure your network, consider the bandwidth required by your network users and the relative
priority of the network applications that they use.
Table 1-1 describes what can cause network performance to degrade and how you can configure your
network to increase the bandwidth available to your network users.
Ta b l e 1-1Increasing Network Performance
Chapter 1 Configuration Overview
Network DemandsSuggested Design Methods
Too many users on a single network
segment and a growing number of
users accessing the Internet
•Increased power of new PCs,
workstations, and servers
•High bandwidth demand from
networked applications (such as
e-mail with large attached files)
and from bandwidth-intensive
applications (such as
multimedia)
Bandwidth alone is not the only consideration when designing your network. As your network traffic
profiles evolve, consider providing network services that can support applications for voice and data
integration, multimedia integration, application prioritization, and security.
network demands and how you can meet them.
•Create smaller network segments so that fewer users share the bandwidth, and use
VLANs and IP subnets to place the network resources in the same logical network
as the users who access those resources most.
•Use full-duplex operation between the switch and its connected workstations.
•Connect global resources, such as servers and routers to which the network users
require equal access, directly to the high-speed switch ports so that they have their
own high-speed segment.
•Use the EtherChannel feature between the switch and its connected servers and
routers.
Table 1-2 describes some
1-14
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 69
Chapter 1 Configuration Overview
Network Configuration Examples
Ta b l e 1-2Providing Network Services
Network DemandsSuggested Design Methods
Efficient bandwidth usage for
multimedia applications and
guaranteed bandwidth for critical
applications
High demand on network redundancy
and availability to provide always on
mission-critical applications
An evolving demand for IP telephony •Use QoS to prioritize applications such as IP telephony during congestion and to
•Use IGMP snooping to efficiently forward multimedia and multicast traffic.
•Use other QoS mechanisms such as packet classification, marking, scheduling,
and congestion avoidance to classify traffic with the appropriate priority level,
which provides maximum flexibility and support for mission-critical, unicast, and
multicast and multimedia applications.
•Use MVR to continuously send multicast streams in a multicast VLAN but to
isolate the streams from subscriber VLANs for bandwidth and security reasons.
•Use VLAN trunks and BackboneFast for traffic-load balancing on the uplink ports
so that the uplink port with a lower relative port cost is selected to carry the VLAN
traffic.
help control both delay and jitter within the network.
•Use switches that support at least two queues per port to prioritize voice and data
traffic as either high- or low-priority, based on IEEE 802.1p/Q. The switch
supports at least four queues per port.
•Use voice VLAN IDs (VVIDs) to provide separate VLANs for voice traffic.
Ethernet-to-the-Factory Architecture
This section is an overview of the Ethernet-to-the-Factory (EttF) architecture that provides network and
security services to the devices and applications in automation and control systems. It then integrates
those into the wider enterprise network.
EttF architecture applies to many types of manufacturing environments, but it must be tailored to the
industry type, the manufacturing type, and the production-facility size. Deployments can range from
small networks (less than 50 devices), to medium-sized networks (less than 200 devices), and to large
networks (up to and more than 1000 devices).
Within the EttF architecture are conceptual structures called zones that separate the various functions,
from the highest-level enterprise switches and processes to the smallest devices that control more
detailed processes and devices on the factory floor. See
For more information about EttF architecture, see this URL:
The enterprise zone comprises the centralized IT systems and functions. Wired and wireless access is
available to enterprise network services, such as enterprise resource management, business-to-business,
and business-to-customer services.The basic business administration tasks, such as site business
planning and logistics, are performed here and rely on standard IT services. Guest access systems are
often located here, although it is not uncommon to find them in lower levels of the framework to gain
flexibility that might be difficult to achieve at the enterprise level.
Figure 1-1.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
1-15
Page 70
Network Configuration Examples
Demilitarized Zone
The demilitarized zone (DMZ) provides a buffer for sharing of data and services between the enterprise
and manufacturing zones. The DMZ maintains availability, addresses security vulnerabilities, and
abiding by regulatory compliance mandates. The DMZ provides segmentation of organizational control,
for example, between the IT and production organizations. Different policies for each organization can
be applied and contained. For example, the production organization might apply security policies to the
manufacturing zone that are different than those applied to the IT organization.
Manufacturing Zone
The manufacturing zone comprises the cell networks and site-level activities. All the systems, devices,
and controllers that monitor the plant operations are in this zone. The cell zone is a functional area within
a production facility.
The cell zone is a set of devices, controllers, and so on, that provide the real-time control of a functional
aspect of the automation process. They are all in real-time communication with each other. This zone
requires clear isolation and protection from the other levels of plant or enterprise operations.
Chapter 1 Configuration Overview
1-16
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 71
Chapter 1 Configuration Overview
LAN
GE Link for
Failover
Detection
Servers
Management
tools
Servers
Catalyst
3750 switch
Catalyst
3750 switch
stack
Catalyst
4500 switch
204322
Figure 1-1 shows the EttF architecture.
Figure 1-1Ethernet-to-the-Factory Architecture
Network Configuration Examples
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
1-17
Page 72
Network Configuration Examples
Topology Options
Chapter 1 Configuration Overview
Topology design starts with considering how devices are connected to the network. The cell network also
requires physical topologies that meet the physical constraints of the production floor. This section
provides guidelines for topology designs and describes the trunk-drop, ring, and redundant-star
topologies.
•Physical layout—The layout of the production environment drives the topology design. For
example, a trunk-drop or ring topology is a good choice for a long conveyor-belt system, but a
redundant-star configuration is not a good choice.
•Real-time communications—Latency and jitter are primarily caused by the amount of traffic and
number of hops a packet must make to reach its destination. The amount of traffic in a Layer
network is driven by various factors, but the number of devices is important. Follow these guidelines
for real-time communications:
–
The amount of latency introduced per Layer 2 hop should be considered. For instance, there is
a higher latency with 100 Mb interfaces than there is with 1 Gigabit interfaces.
–
Bandwidth should not consistently exceed 50 percent of the interface capacity on any switch.
–
The CPU should not consistently exceed 50 to 70 percent utilization. Above this level, the
switch might not properly process control packets and might behave abnormally.
2
These are the key connectivity considerations:
•Devices are connected to a switch through a single network connection or an IP-enabled I/O block
or linking device if they do not support Ethernet. Most devices have no or limited failover
capabilities and therefore cannot effectively use redundant network connections.
•Redundant connections can be used in certain industries and applications, such as process-related
industries that are applied to critical infrastructure.
Cell Network—Trunk-Drop Topology
Switches are connected to each other to form a chain of switches in a trunk-drop topology (also known
as a cascaded topology). See
•The connection between the Layer 3 switch and the first Layer 2 switch is very susceptible to
oversubscription, which can degrade network performance.
•There is no redundancy to the loss of a connection.
Figure 1-2.
1-18
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 73
Chapter 1 Configuration Overview
285192
Human
Machine
Interface
(HMI)
IE2000
Controllers
Cell Zone
Catalyst 3750
Stackwise
Switch
Stack
Controllers, Drives,
and Remote I/Os
Figure 1-2Cell Network–Trunk-Drop Topology
Network Configuration Examples
Cell Network—Ring Topology
A ring topology is similar to a trunk-drop topology except that the last switch in the chain is connected
to the Layer 3 switch that forms a network ring. If a connection is lost in a ring, each switch maintains
connectivity to the other switches. See
•The network can only recover from the loss of a single connection.
•It is more difficult to implement because it requires additional protocol implementation and Rapid
Spanning Tree Protocol (RSTP).
•Although better than the trunk-drop, the top of the ring (connections to the Layer 3 switches) can
become a bottleneck and is susceptible to oversubscription, which can degrade network
performance.
OL-25866-01
Figure 1-3.
Cisco IE 2000 Switch Software Configuration Guide
1-19
Page 74
Network Configuration Examples
285193
Human
Machine
Interface
(HMI)
IE2000
Cell Zone
Catalyst 3750
Stackwise
Switch
Stack
Controllers
Controllers, Drives,
and Remote I/O
Figure 1-3Cell Network–Ring Topology
Chapter 1 Configuration Overview
Cell Network—Redundant-Star Topology
In a redundant-star topology, every Layer 2 access switch has dual connections to a Layer 3 distribution
switch. Devices are connected to the Layer 2 switches. See
•Any Layer 2 switch is always only two hops to another Layer 2 switch.
•In the Layer 2 network, each switch has dual connections to the Layer 3 devices.
Cisco IE 2000 Switch Software Configuration Guide
•The Layer 2 network is maintained even if multiple connections are lost.
1-20
Figure 1-4.
OL-25866-01
Page 75
Chapter 1 Configuration Overview
Figure 1-4Cell Network–Redundant Star Topology
IE2000
Machine
Interface
Where to Go Next
Catalyst 3750
Stackwise
Switch
Stack
Human
(HMI)
Cell Zone
Where to Go Next
Before configuring the switch, review these sections for startup information:
Information About Using the Command-Line Interface
This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your
switch.
Command Modes
The Cisco IOS user interface is divided into many different modes. The commands available to you
depend on which mode you are currently in. Enter a question mark (?) at the system prompt to obtain a
list of commands available for each command mode.
When you start a session on the switch, you begin in user mode, often called user EXEC mode. Only a
limited subset of the commands are available in user EXEC mode. For example, most of the user EXEC
commands are one-time commands, such as show commands, which show the current configuration
status, and clear commands, which clear counters or interfaces. The user EXEC commands are not saved
when the switch reboots.
OL-25866-01
To have access to all commands, you must enter privileged EXEC mode. You must enter a password to
enter privileged EXEC mode. From this mode, you can enter any privileged EXEC command or enter
global configuration mode.
Using the configuration modes (global, interface, and line), you can make changes to the running
configuration. If you save the configuration, these commands are stored and used when the switch
reboots. To access the various configuration modes, you must start at global configuration mode. From
global configuration mode, you can enter interface configuration mode and line configuration mode.
Cisco IE 2000 Switch Software Configuration Guide
2-1
Page 78
Chapter 2 Using the Command-Line Interface
Information About Using the Command-Line Interface
Table 2-1 describes the main command modes, how to access each one, the prompt you see in that mode,
and how to exit the mode. The examples in the table use the hostname Switch.
Ta b l e 2-1Command Mode Summary
ModeAccess MethodPromptExit MethodAbout This Mode
User EXECBegin a session with
your switch.
Privileged EXECWhile in user EXEC
mode, enter the
enable command.
Global configurationWhile in privileged
EXEC mode, enter
the configure
command.
Config-vlanWhile in global
configuration mode,
enter the
vlan
vlan-id
command.
VLAN configurationWhile in privileged
EXEC mode, enter
the vlan database
command.
Switch>
Switch#
Switch(config)#
Switch(config-vlan)#
Switch(vlan)#
Enter logout or
quit.
Enter disable to
exit.
To exit to privileged
EXEC mode, enter
exit or end, or press
Ctrl-Z.
To exit to global
configuration mode,
enter the exit
command.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
To exit to privileged
EXEC mode, enter
exit.
Use this mode to
•Change terminal settings.
•Perform basic tests.
•Display system
information.
Use this mode to verify
commands that you have
entered. Use a password to
protect access to this mode.
Use this mode to configure
parameters that apply to the
entire switch.
Use this mode to configure
VLAN parameters. When VTP
mode is transparent, you can
create extended-range VLANs
(VLAN IDs greater than 1005)
and save configurations in the
switch startup configuration
file.
Use this mode to configure
VLAN parameters for VLANs
1 to 1005 in the VLAN
database.
2-2
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 79
Chapter 2 Using the Command-Line Interface
Information About Using the Command-Line Interface
Table 2-1Command Mode Summary (continued)
ModeAccess MethodPromptExit MethodAbout This Mode
Interface
configuration
While in global
configuration mode,
enter the interface
command (with a
specific interface).
Line configurationWhile in global
configuration mode,
specify a line with
the line
vty or line
console command.
Switch(config-if)#
Switch(config-line)#
To exit to global
configuration mode,
enter exit.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
To exit to global
configuration mode,
enter exit.
To return to
privileged EXEC
mode, press Ctrl-Z
or enter end.
Use this mode to configure
parameters for the Ethernet
ports.
For information about defining
interfaces, see the
Interface Configuration Mode”
section on page 15-6.
To configure multiple
interfaces with the same
parameters, see the
“Configuring a Range of
Interfaces” section on
page 15-13.
Use this mode to configure
parameters for the terminal
line.
“Using
For more detailed information on the command modes, see the command reference guide for this release.
Help System
You can enter a question mark (?) at the system prompt to display a list of commands available for each
command mode. You can also obtain a list of associated keywords and arguments for any command, as
shown in
Ta b l e 2-2Help Summary
CommandPurpose
helpObtain a brief description of the help system in any command mode.
abbreviated-command-entry?Obtain a list of commands that begin with a particular character string.
abbreviated-command-entry<Ta b>Complete a partial command name.
Table 2-2.
For example:
Switch# di?
dir disable disconnect
For example:
Switch# sh conf<tab>
Switch# show configuration
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
2-3
Page 80
Chapter 2 Using the Command-Line Interface
Information About Using the Command-Line Interface
Table 2-2Help Summary (continued)
CommandPurpose
?List all commands available for a particular command mode.
For example:
Switch> ?
command?List the associated keywords for a command.
For example:
Switch> show ?
command keyword?List the associated arguments for a keyword.
For example:
Switch(config)# cdp holdtime ?
<10-255> Length of time (in sec) that receiver must keep this packet
Understanding Abbreviated Commands
You need to enter only enough characters for the switch to recognize the command as unique.
This example shows how to enter the show configuration privileged EXEC command in an abbreviated
form:
Switch# show conf
No and default Forms of Commands
Almost every configuration command also has a no form. In general, use the no form to disable a feature
or function or reverse the action of a command. For example, the no shutdown interface configuration
command reverses the shutdown of an interface. Use the command without the keyword no to reenable
a disabled feature or to enable a feature that is disabled by default.
Configuration commands can also have a default form. The default form of a command returns the
command setting to its default. Most commands are disabled by default, so the default form is the same
as the no form. However, some commands are enabled by default and have variables set to certain default
values. In these cases, the default command enables the command and sets variables to their default
values.
2-4
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 81
Chapter 2 Using the Command-Line Interface
CLI Error Messages
Table 2-3 lists some error messages that you might encounter while using the CLI to configure your
switch.
Ta b l e 2-3Common CLI Error Messages
Error MessageMeaningHow to Get Help
% Ambiguous command:
"show con"
% Incomplete command.
% Invalid input detected
at ‘^’ marker.
You did not enter enough characters
for your switch to recognize the
command.
You did not enter all the keywords or
values required by this command.
You entered the command
incorrectly. The caret (^) marks the
point of the error.
Reenter the command followed by a question mark (?)
with a space between the command and the question
mark.
The possible keywords that you can enter with the
command appear.
Reenter the command followed by a question mark (?)
with a space between the command and the question
mark.
The possible keywords that you can enter with the
command appear.
Enter a question mark (?) to display all the commands
that are available in this command mode.
The possible keywords that you can enter with the
command appear.
CLI Error Messages
Configuration Logging
You can log and view changes to the switch configuration. You can use the Configuration Change
Logging and Notification feature to track changes on a per-session and per-user basis. The logger tracks
each configuration command that is applied, the user who entered the command, the time that the
command was entered, and the parser return code for the command. This feature includes a mechanism
for asynchronous notification to registered applications whenever the configuration changes. You can
choose to have the notifications sent to the syslog.
NoteOnly CLI or HTTP changes are logged.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
2-5
Page 82
How to Use the CLI to Configure Features
How to Use the CLI to Configure Features
Configuring the Command History
The software provides a history or record of commands that you have entered. The command history
feature is particularly useful for recalling long or complex commands or entries, including access lists.
You can customize this feature to suit your needs as described in these sections:
•Changing the Command History Buffer Size, page 2-6 (optional)
•Recalling Commands, page 2-6 (optional)
•Disabling the Command History Feature, page 2-7 (optional)
Changing the Command History Buffer Size
By default, the switch records ten command lines in its history buffer. You can alter this number for a
current terminal session or for all sessions on a particular line. These procedures are optional.
Chapter 2 Using the Command-Line Interface
Beginning in privileged EXEC mode, enter this command to change the number of command lines that
the switch records during the current terminal session:
Switch# terminal history [sizenumber-of-lines]
The range is from 0 to 256.
Beginning in line configuration mode, enter this command to configure the number of command lines
the switch records for all sessions on a particular line:
Switch(config-line)# history[sizenumber-of-lines]
The range is from 0 to 256.
Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in Tabl e 2-4. These actions
are optional.
Ta b l e 2-4Recalling Commands
1
Action
Press Ctrl-P or the up arrow key.Recall commands in the history buffer, beginning with the most recent command.
Press Ctrl-N or the down arrow key.Return to more recent commands in the history buffer after recalling commands
show historyWhile in privileged EXEC mode, list the last several commands that you just
1. The arrow keys function only on ANSI-compatible terminals such as VT100s.
Result
Repeat the key sequence to recall successively older commands.
with Ctrl-P or the up arrow key. Repeat the key sequence to recall successively
more recent commands.
entered. The number of commands that appear is controlled by the setting of the
terminal history global configuration command and the history line configuration
command.
2-6
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 83
Chapter 2 Using the Command-Line Interface
Disabling the Command History Feature
The command history feature is automatically enabled. You can disable it for the current terminal session
or for the command line. These procedures are optional.
To disable the feature during the current terminal session, enter the terminal no history privileged
EXEC command.
To disable command history for the line, enter the no history line configuration command.
Using Editing Features
This section describes the editing features that can help you manipulate the command line. It contains
these sections:
•Enabling and Disabling Editing Features, page 2-7 (optional)
•Editing Commands Through Keystrokes, page 2-7 (optional)
•Editing Command Lines That Wrap, page 2-9 (optional)
How to Use the CLI to Configure Features
Enabling and Disabling Editing Features
Although enhanced editing mode is automatically enabled, you can disable it, reenable it, or configure
a specific line to have enhanced editing. These procedures are optional.
To globally disable enhanced editing mode, enter this command in line configuration mode:
Switch (config-line)# no editing
To reenable the enhanced editing mode for the current terminal session, enter this command in privileged
EXEC mode:
Switch# terminal editing
To reconfigure a specific line to have enhanced editing mode, enter this command in line configuration
mode:
Switch(config-line)# editing
Editing Commands Through Keystrokes
Table 2-5 shows the keystrokes that you need to edit command lines. These keystrokes are optional.
Ta b l e 2-5Editing Commands through Keystrokes
CapabilityKeystroke
Move around the command line to
make changes or corrections.
Press Ctrl-B, or press the
left arrow key.
1
Purpose
Move the cursor back one character.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
2-7
Page 84
How to Use the CLI to Configure Features
Table 2-5Editing Commands through Keystrokes (continued)
Chapter 2 Using the Command-Line Interface
CapabilityKeystroke
Press Ctrl-F, or press the
right arrow key.
Press Ctrl-A.Move the cursor to the beginning of the command line.
Press Ctrl-E.Move the cursor to the end of the command line.
Press Esc B.Move the cursor back one word.
Press Esc F.Move the cursor forward one word.
Press Ctrl-T.Transpose the character to the left of the cursor with the
Recall commands from the buffer
Press Ctrl-Y.Recall the most recent entry in the buffer.
and paste them in the command line.
The switch provides a buffer with the
last ten items that you deleted.
Press Esc Y.Recall the next buffer entry.
Delete entries if you make a mistake
or change your mind.
Press the Delete or
Backspace key.
Press Ctrl-D.Delete the character at the cursor.
Press Ctrl-K.Delete all characters from the cursor to the end of the
Press Ctrl-U or Ctrl-X.Delete all characters from the cursor to the beginning of
Press Ctrl-W.Delete the word to the left of the cursor.
Press Esc D.Delete from the cursor to the end of the word.
Capitalize or lowercase words or
Press Esc C.Capitalize at the cursor.
capitalize a set of letters.
Press Esc L.Change the word at the cursor to lowercase.
Press Esc U.Capitalize letters from the cursor to the end of the word.
Designate a particular keystroke as
Press Ctrl-V or Esc Q.
an executable command, perhaps as a
shortcut.
1
Purpose
Move the cursor forward one character.
character located at the cursor.
The buffer contains only the last 10 items that you have
deleted or cut. If you press Esc Y more than ten times, you
cycle to the first buffer entry.
Erase the character to the left of the cursor.
command line.
the command line.
2-8
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 85
Chapter 2 Using the Command-Line Interface
Table 2-5Editing Commands through Keystrokes (continued)
How to Use the CLI to Configure Features
CapabilityKeystroke
Scroll down a line or screen on
Press the Return key.Scroll down one line.
1
displays that are longer than the
terminal screen can display.
NoteThe More prompt is used for
any output that has more
lines than can be displayed
on the terminal screen,
including show command
output. You can use the
Return and Space bar
keystrokes whenever you see
the More prompt.
Press the Space bar.Scroll down one screen.
Redisplay the current command line
Press Ctrl-L or Ctrl-R.Redisplay the current command line.
if the switch suddenly sends a
message to your screen.
1. The arrow keys function only on ANSI-compatible terminals such as VT100s.
Editing Command Lines That Wrap
You can use a wraparound feature for commands that extend beyond a single line on the screen. When
the cursor reaches the right margin, the command line shifts ten spaces to the left. You cannot see the
first ten characters of the line, but you can scroll back and check the syntax at the beginning of the
command. The keystroke actions are optional.
Purpose
To scroll back to the beginning of the command entry, press Ctrl-B or the left arrow key repeatedly. You
can also press Ctrl-A to immediately move to the beginning of the line.
The arrow keys function only on ANSI-compatible terminals such as VT100s.
In this example, the access-list global configuration command entry extends beyond one line. When the
cursor first reaches the end of the line, the line is shifted ten spaces to the left and redisplayed. The dollar
sign ($) shows that the line has been scrolled to the left. Each time the cursor reaches the end of the line,
the line is again shifted ten spaces to the left.
After you complete the entry, press Ctrl-A to check the complete syntax before pressing the Return key
to execute the command. The dollar sign ($) appears at the end of the line to show that the line has been
scrolled to the right:
The software assumes you have a terminal screen that is 80 columns wide. If you have a different width,
use the terminal width privileged EXEC command to set the width of your terminal.
Use line wrapping with the command history feature to recall and modify previous complex command
entries. For information about recalling previous command entries, see the
“Editing Commands Through
Keystrokes” section on page 2-7.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
2-9
Page 86
Chapter 2 Using the Command-Line Interface
How to Use the CLI to Configure Features
Searching and Filtering Output of show and more Commands
You can search and filter the output for show and more commands. This is useful when you need to sort
through large amounts of output or if you want to exclude output that you do not need to see. Using these
commands is optional.
To use this functionality, enter a show or more command followed by the pipe character (|), one of the
keywords begin, include, or exclude, and an expression that you want to search for or filter out:
command| {begin | include | exclude} regular-expression
Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output
are not displayed, but the lines that contain Output appear.
This example shows how to include in the output display only lines where the expression protocol
appears:
Switch# show interfaces | include protocol
Vlan1 is up, line protocol is up
Vlan10 is up, line protocol is down
Accessing the CLI
You can access the CLI through a console connection, through Telnet, or by using the browser.
Accessing the CLI through a Console Connection or through Telnet
Before you can access the CLI, you must connect a terminal or PC to the switch console port and power
on the switch, as described in the getting started guide that shipped with your switch. Then, to understand
the boot process and the options available for assigning IP information, see
Switch Setup Configuration.”
If your switch is already configured, you can access the CLI through a local console connection or
through a remote Telnet session, but your switch must first be configured for this type of access. For
more information, see the
You can use one of these methods to establish a connection with the switch:
•Connect the switch console port to a management station or dial-up modem. For information about
connecting to the console port, see the switch getting started guide or hardware installation guide.
•Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management
station. The switch must have network connectivity with the Telnet or SSH client, and the switch
must have an enable secret password configured.
For information about configuring the switch for Telnet access, see the “Setting a Telnet Password
for a Terminal Line” section on page 12-28. The switch supports up to 16 simultaneous Telnet
sessions. Changes made by one Telnet user are reflected in all other Telnet sessions.
For information about configuring the switch for SSH, see the “Configuring the SSH Server” section
on page 12-40. The switch supports up to five simultaneous secure SSH sessions.
After you connect through the console port, through a Telnet session or through an SSH session, the
user
EXEC prompt appears on the management station.
“Setting a Telnet Password for a Terminal Line” section on page 12-28.
Chapter 4, “Performing
2-10
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 87
Configuring Switch Alarms
Finding Feature Information
Your software release may not support all the features documented in this chapter. For the latest feature
information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image
support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on
Cisco.com is not required.
Information About Switch Alarms
The switch software monitors switch conditions on a per-port or a switch basis. If the conditions present
on the switch or a port do not match the set parameters, the switch software triggers an alarm or a system
message. By default, the switch software sends the system messages to a system message logging
facility, or a syslog
Protocol (SNMP) traps to an SNMP server. You can configure the switch to trigger an external alarm
device by using the alarm relay.
facility. You can also configure the switch to send Simple Network Management
CHA PTER
3
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
3-1
Page 88
Chapter 3 Configuring Switch Alarms
Information About Switch Alarms
Global Status Monitoring Alarms
The switch processes alarms related to temperature and power supply conditions, referred to as global
or facility alarms.
Ta b l e 3-1Global Status Monitoring Alarms
AlarmDescription
Power supply alarmBy default, the switch monitors a single power supply. If you configure a dual power supply, an
alarm triggers if one power supply fails. You can configure the power supply alarm to be connected
to the hardware relays. For more information, see the
section on page 3-6.
Temperature alarmsThe switch contains one temperature sensor with a primary and secondary temperature setting. The
sensor monitors the environmental conditions inside the switch.
The primary and secondary temperature alarms can be set as follows:
•The primary alarm is enabled automatically to trigger both at a low temperature, –4°F (–20°C)
and a high temperature, 203°F (95°C). It cannot be disabled. By default, the primary
temperature alarm is associated with the major relay.
“Configuring the Power Supply Alarms”
•The secondary alarm triggers when the system temperature is higher or lower than the
configured high and low temperature thresholds. The secondary alarm is disabled by default.
For more information, see the “Configuring the Switch Temperature Alarms” section on page 3-6.
SD-CardBy default the alarm is disabled.
FCS Error Hysteresis Threshold
The Ethernet standard calls for a maximum bit-error rate of 10-8. The bit error-rate range is from 10-6 to
-11
10
. The bit error-rate input to the switch is a positive exponent. If you want to configure the bit
error-rate of 10
You can set the FCS error hysteresis threshold to prevent the toggle of the alarm when the actual bit-error
rate fluctuates near the configured rate. The hysteresis threshold is defined as the ratio between the alarm
clear threshold to the alarm set threshold, expressed as a percentage value.
For example, if the FCS bit error-rate alarm value is configured to 10–8, that value is the alarm set
threshold. To set the alarm clear threshold at 5*10
h = alarm clear threshold / alarm set threshold
h = 5*10
The FCS hysteresis threshold is applied to all ports on the switch. The allowable range is from 1 to 10
percent. The default value is 10 percent. See the
page 3-7 for more information.
-9
, enter the value 9 for the exponent. By default, the FCS bit error-rate is 10-8.
-10
/ 10-8 = 5*10-2 = 0.05 = 5 percent
-10
, the hysteresis, value h, is determined as follows:
“Configuring the FCS Bit Error Rate Alarm” section on
Port Status Monitoring Alarms
The switch can also monitor the status of the Ethernet ports and generate alarm messages based on the
alarms listed in
using alarm profiles. You can create a number of profiles and assign one of these profiles to each Ethernet
port.
Cisco IE 2000 Switch Software Configuration Guide
3-2
Tabl e 3-2. To save user time and effort, it supports changeable alarm configurations by
OL-25866-01
Page 89
Chapter 3 Configuring Switch Alarms
Information About Switch Alarms
Alarm profiles provide a mechanism for you to enable or disable alarm conditions for a port and
associate the alarm conditions with one or both alarm relays. You can also use alarm profiles to set alarm
conditions to send alarm traps to an SNMP server and system messages to a syslog server. The alarm
profile defaultPort is applied to all interfaces in the factory configuration (by default).
NoteYou can associate multiple alarms to one relay or one alarm to both relays.
Table 3-2 lists the port status monitoring alarms and their descriptions and functions. Each fault
condition is assigned a severity level based on the Cisco IOS System Error Message Severity Level.
Ta b l e 3-2Port Status Monitoring Alarms
Alarm List IDAlarmDescription
1Link Fault alarmThe switch generates a link fault alarm when problems with a port physical
layer cause unreliable data transmission. A typical link fault condition is loss
of signal or clock. The link fault alarm is cleared automatically when the link
fault condition is cleared. The severity for this alarm is error condition, level
3.
2Port not Forwarding alarmThe switch generates a port not-forwarding alarm when a port is not
forwarding packets. This alarm is cleared automatically when the port begins
to forward packets. The severity for this alarm is warning, level 4.
3Port not Operating alarmThe switch generates a port not-operating alarm when a port fails during the
startup self-test. When triggered, the port not-operating alarm is only cleared
when the switch is restarted and the port is operational. The severity for this
alarm is error condition, level 3.
4FCS Bit Error Rate alarmThe switch generates an FCS bit error-rate alarm when the actual FCS bit
error-rate is close to the configured rate. You can set the FCS bit error-rate by
using the interface configuration CLI for each of the ports. See the
“Configuring the FCS Bit Error Rate Alarm” section on page 3-7 for more
information. The severity for this alarm is error condition, level 3.
Triggering Alarm Options
The switch supports these methods for triggering alarms:
•Configurable Relay
The switch is equipped with one independent alarm relay that can be triggered by alarms for global,
port status and SD flash card conditions. You can configure the relay to send a fault signal to an
external alarm device, such as a bell, light, or other signaling device. You can associate any alarm
condition with the alarm relay. Each fault condition is assigned a severity level based on the
Cisco
IOS System Error Message Severity Level.
See the “Configuring the Power Supply Alarms” section on page 3-6 for more information on
configuring the relay.
•SNMP Traps
SNMP is an application-layer protocol that provides a message format for communication between
managers and agents. The SNMP system consists of an SNMP manager, an SNMP agent, and a
management information base (MIB).
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
3-3
Page 90
Information About Switch Alarms
•Syslog Messages
External Alarms
The switch supports two alarm inputs and one alarm output. The alarm input circuit is designed to sense
if a dry contact is open or closed relative to the Alarm-In reference pin. The Alarm_Out is a relay with
Normally Open and Normally Closed contacts. The switch software is configured to detect faults which
are used to energize the relay coil and change the state on both of the relay contacts. Normally open
contacts close and normally closed contacts open.
•Open means that the normal condition has current flowing through the contact (normally closed
•Closed means that no current flows through the contact (normally open contact). The alarm is
Chapter 3 Configuring Switch Alarms
The snmp-server enable traps command can be changed so that the user can send alarm traps to
an SNMP server. You can use alarm profiles to set environmental or port status alarm conditions to
send SNMP alarm traps. See the
You can use alarm profiles to send system messages to a syslog server. See the “Configuring the
Power Supply Alarms” section on page 3-6 for more information.
contact). The alarm is generated when the current stops flowing.
generated when current does flow.
“Enabling SNMP Traps” section on page 3-9 for more information.
NoteSoftware can program the Alarm_In to trigger an alarm with either Open or Closed setting.
The alarm connector is a 6-pin screw terminal. This table lists pinouts for the alarm ports.
Pin #Signal NameDescription
6Alarm_Out_NOAlarm output relay normally open contact
You can set the alarm severity to major, minor, or none. The severity is included in the alarm message
and also sets the LED color when the alarm is triggered. The LED is red for a minor alarm and blinking
red for a major alarm. If not set, the default alarm severity is minor.
For detailed information about the alarm connector, LEDs, alarm circuit and wiring installation, alarm
ratings and ports, see the Cisco IE
2000 Switch Hardware Installation Guide.
3-4
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 91
Chapter 3 Configuring Switch Alarms
Default Switch Alarm Settings
Ta b l e 3-3Default Switch Alarm Settings
AlarmDefault Setting
GlobalPower supply alarmEnabled in switch single power mode. No alarm.
In dual-power supply mode, the default alarm notification is a system
message to the console.
Primary temperature alarmEnabled for switch temperature range of 203oF (95oC) maximum to –4°F
Secondary temperature alarmDisabled.
Output relay mode alarmNormally deenergized. The alarm output has switched off or is in an off
PortLink fault alarmDisabled on all interfaces.
Port not forwarding alarmDisabled on all interfaces.
Port not operating alarmEnabled on all interfaces.
FCS bit error rate alarmDisabled on all interfaces.
o
(–20
C) minimum.
The primary switch temperature alarm is associated with the major relay.
state.
How to Configure Switch Alarms
How to Configure Switch Alarms
Configuring External Alarms
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnters global configuration mode.
alarm contact contact-number
description string
alarm contact {contact-number | all} {severity { major | minor | none} |
trigger {closed | open}}
alarm relay-mode energized(Optional) Configures the output relay mode to energized.
endReturns to privileged EXEC mode.
(Optional) Configures a description for the alarm contact number.
•The contact-number value is from 1 to 4.
•The description string is up to 80 alphanumeric characters in length
and is included in any generated system messages.
Configures the trigger and severity for an alarm contact number or for all
contact numbers.
•Enter a contact number (1 to 4) or specify that you are configuring all
alarms.
•For severity, enter major, minor or none. If you do not configure a
severity, the default is minor.
•For trigger, enter open or closed. If you do not configure a trigger,
the alarm is triggered when the circuit is closed.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
3-5
Page 92
How to Configure Switch Alarms
CommandPurpose
Step 6
Step 7
show env alarm-contactShows the configured alarm contacts.
copy running-config startup-config(Optional) Saves your entries in the configuration file.
Configuring the Power Supply Alarms
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
Step 9
Step 10
Step 11
configure terminalEnters global configuration mode.
power-supply dualConfigures dual power supplies.
alarm facility power-supply disable Disables the power supply alarm.
alarm facility power-supply relay
Associates the power supply alarm to the relay.
major
alarm facility power-supply notifies Sends power supply alarm traps to an SNMP server.
alarm facility power-supply syslogSends power supply alarm traps to a syslog server.
endReturns to privileged EXEC mode.
show env powerDisplays the switch power status.
show facility-alarm statusDisplays all generated alarms for the switch.
show alarm settingsVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
Chapter 3 Configuring Switch Alarms
Configuring the Switch Temperature Alarms
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
configure terminalEnters global configuration mode.
alarm facility temperature
{primary | secondary} high
Sets the high temperature threshold value. Set the threshold from –238°F
(–150°C) to 572°F (300°C).
threshold
alarm facility temperature primary
low threshold
Sets the low temperature threshold value. Set the threshold from –328°F
(–200°C) to 482°F (250°C).
endReturns to privileged EXEC mode.
show alarm settingsVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
3-6
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Page 93
Chapter 3 Configuring Switch Alarms
Associating the Temperature Alarms to a Relay
By default, the primary temperature alarm is associated to the relay. You can use the alarm facility
temperature global configuration command to associate the primary temperature alarm to an SNMP trap, or
a syslog message, or to associate the secondary temperature alarm to the relay, an SNMP trap, or a syslog
message.
NoteThe single relay on the switch is called the major relay.
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
configure terminalEnters global configuration mode.
alarm facility temperature
Associates the primary or secondary temperature alarm to the relay.
{primary | secondary} relay major
alarm facility temperature
Sends primary or secondary temperature alarm traps to an SNMP server.
{primary | secondary} notifies
alarm facility temperature
{primary | secondary} syslog
Sends primary or secondary temperature alarm traps to a syslog server.
Uses the no alarm facility temperature secondary command to disable the
secondary temperature alarm.
endReturns to privileged EXEC mode.
show alarm settingsVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
How to Configure Switch Alarms
Configuring the FCS Bit Error Rate Alarm
Setting the FCS Error Threshold
The switch generates an FCS bit error-rate alarm when the actual rate is close to the configured rate.
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
configure terminalEnters global configuration mode.
interface interface-idEnters the interface to be configured, and enters interface configuration
mode.
fcs-threshold valueSets the FCS error rate.
For value, the range is 6 to 11 to set a maximum bit error rate of 10
By default, the FCS bit error rate is 10-8.
endReturns to privileged EXEC mode.
show fcs-thresholdVerifies the setting.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
-6
to 10
-11
.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
3-7
Page 94
How to Configure Switch Alarms
Setting the FCS Error Hysteresis Threshold
The hysteresis setting prevents the toggle of an alarm when the actual bit error-rate fluctuates near the
configured rate. The FCS hysteresis threshold is applied to all ports of a switch.
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnters global configuration mode.
alarm facility fcs-hysteresis
percentage
endReturns to privileged EXEC mode.
show running configVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
Sets the hysteresis percentage for the switch.
For percentage, the range is 1 to 10. The default value is 10 percent.
Configuring Alarm Profiles
Chapter 3 Configuring Switch Alarms
Creating an Alarm Profile
You can use the alarm profile global configuration command to create an alarm profile or to modify an
existing profile. When you create a new alarm profile, none of the alarms are enabled.
NoteThe only alarm enabled in the defaultPort profile is the Port not operating alarm.
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnters global configuration mode.
alarm profile nameCreates the new profile or identifies an existing profile, and enters alarm
endReturns to privileged EXEC mode.
show alarm profile nameVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
Modifying an Alarm Profile
You can modify an alarm profile from alarm profile configuration mode.
You can enter more than one alarm type separated by a space.
(Optional) Configures the alarm to send an alarm
trap to the relay.
(Optional) Configures the alarm to send an alarm
trap to a syslog server.
Attaching an Alarm Profile to a Specific Port
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
configure terminalEnters global configuration mode.
interface port interfaceEnters interface configuration mode.
alarm-profile nameAttaches the specified profile to the interface.
endReturns to privileged EXEC mode.
show alarm profileVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
Monitoring and Maintaining Switch Alarms Status
Enabling SNMP Traps
CommandPurpose
Step 1
Step 2
Step 3
Step 4
Step 5
configure terminalEnters global configuration mode.
snmp-server enable traps alarms Enables the switch to send SNMP traps.
endReturns to privileged EXEC mode.
show alarm settingsVerifies the configuration.
copy running-config startup-config (Optional) Saves your entries in the configuration file.
Monitoring and Maintaining Switch Alarms Status
Ta b l e 3-4Commands for Displaying Global and Port Alarm Status
CommandPurpose
show alarm description portsDisplays an alarm number and its text description.
show alarm profile [name]Displays all alarm profiles in the system or a specified profile.
show alarm settingsDisplays all global alarm settings on the switch.
show env {alarm-contact | all | power |
temperature}
show facility-alarm status [critical | info |
major | minor]
Displays the status of environmental facilities on the switch.
Displays generated alarms on the switch.
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
3-9
Page 96
Configuration Examples for Switch Alarms
Configuration Examples for Switch Alarms
Configuring External Alarms: Example
This example configures alarm input 1 named door sensor to assert a major alarm when the door circuit
is closed and then displays the status and configuration for all alarms:
Switch(config)# alarm contact 1 description door sensor
Switch(config)# alarm contact 1 severity major
Switch(config)# alarm contact 1 trigger closed
Switch(config)# end
Switch(config)# show env alarm-contact
Switch# show env alarm-contact
ALARM CONTACT 1
Status: not asserted
Description: door sensor
Severity: major
Trigger: closed
ALARM CONTACT 2
Status: not asserted
Description: external alarm contact 2
Severity: minor
Trigger: closed
Chapter 3 Configuring Switch Alarms
Associating Temperature Alarms to a Relay: Examples
This example sets the secondary temperature alarm to the major relay, with a high temperature threshold
value of 113
SNMP server.
Switch(config) # alarm facility temperature secondary high 45
Switch(config) # alarm facility temperature secondary relay major
Switch(config) # alarm facility temperature secondary syslog
Switch(config) # alarm facility temperature secondary notifies
This example sets the first (primary) temperature alarm to the major relay. All alarms and traps
associated with this alarm are sent to a syslog server.
Switch(config) # alarm facility temperature primary syslog
Switch(config) # alarm facility temperature primary relay major
o
F (45oC). All alarms and traps associated with this alarm are sent to a syslog server and an
Creating or Modifying an Alarm Profile: Example
This example creates or modifies the alarm profile fastE for the Fast Ethernet port with link-down
(alarmList ID 3) alarm enabled. The link-down alarm is connected to the major relay. This alarm also
send notifications to an SNMP server and sends system messages to a syslog server.
No new or modified RFCs are supported by this
feature, and support for existing RFCs has not been
modified by this feature.
—
Technical Assistance
DescriptionLink
The Cisco Technical Support website contains
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
http://www.cisco.com/techsupport
Additional References
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
3-13
Page 100
Additional References
Chapter 3 Configuring Switch Alarms
3-14
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.