Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-25866-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Information About Using the Command-Line Interface2-1
Command Modes2-1
Help System2-3
Cisco IE 2000 Switch Software Configuration Guide
iii
Contents
Understanding Abbreviated Commands2-4
No and default Forms of Commands2-4
CLI Error Messages2-5
Configuration Logging2-5
How to Use the CLI to Configure Features2-6
Configuring the Command History2-6
Changing the Command History Buffer Size2-6
Recalling Commands2-6
Disabling the Command History Feature2-7
Using Editing Features2-7
Enabling and Disabling Editing Features2-7
Editing Commands Through Keystrokes2-7
Editing Command Lines That Wrap2-9
Searching and Filtering Output of show and more Commands2-10
Accessing the CLI2-10
Accessing the CLI through a Console Connection or through Telnet2-10
CHAPTER
3Configuring Switch Alarms3-1
Finding Feature Information3-1
Information About Switch Alarms3-1
Global Status Monitoring Alarms3-2
FCS Error Hysteresis Threshold3-2
Port Status Monitoring Alarms3-2
Triggering Alarm Options3-3
External Alarms3-4
Default Switch Alarm Settings3-5
How to Configure Switch Alarms3-5
Configuring External Alarms3-5
Configuring the Power Supply Alarms3-6
Configuring the Switch Temperature Alarms3-6
Associating the Temperature Alarms to a Relay3-7
Configuring the FCS Bit Error Rate Alarm3-7
Setting the FCS Error Threshold3-7
Setting the FCS Error Hysteresis Threshold3-8
Configuring Alarm Profiles3-8
Creating an Alarm Profile3-8
Modifying an Alarm Profile3-8
Attaching an Alarm Profile to a Specific Port3-9
Enabling SNMP Traps3-9
iv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Monitoring and Maintaining Switch Alarms Status3-9
Configuration Examples for Switch Alarms3-10
Configuring External Alarms: Example3-10
Associating Temperature Alarms to a Relay: Examples3-10
Creating or Modifying an Alarm Profile: Example3-10
Setting the FCS Error Hysteresis Threshold: Example3-11
Configuring a Dual Power Supply: Examples3-11
Displaying Alarm Settings: Example3-11
Additional References3-12
Related Documents3-12
Standards3-12
MIBs3-12
RFCs3-13
Technical Assistance3-13
Contents
CHAPTER
4Performing Switch Setup Configuration4-1
Restrictions for Performing Switch Setup Configuration4-1
Information About Performing Switch Setup Configuration4-1
DHCP Auto-Image Update4-6
DHCP Server Configuration Guidelines4-7
TFTP Server4-7
DNS Server4-8
Relay Device4-8
How to Obtain Configuration Files4-9
How to Control Environment Variables4-10
Common Environment Variables4-11
Scheduled Reload of the Software Image4-11
Configuring DHCP Auto-Image Update (Configuration File and Image)4-13
Cisco IE 2000 Switch Software Configuration Guide
v
Contents
Configuring the Client4-14
Manually Assigning IP Information on a Routed Port4-14
Manually Assigning IP Information to SVIs4-15
Modifying the Startup Configuration4-15
Specifying the Filename to Read and Write the System Configuration4-15
Manually Booting the Switch4-16
Booting a Specific Software Image4-17
Monitoring Switch Setup Configuration4-17
Verifying the Switch Running Configuration4-17
Configuration Examples for Performing Switch Setup Configuration4-18
Retrieving IP Information Using DHCP-Based Autoconfiguration: Example4-18
Scheduling Software Image Reload: Examples4-20
Configuring DHCP Auto-Image Update: Example4-20
Configuring a Switch as a DHCP Server: Example4-20
Configuring Client to Download Files from DHCP Server4-21
CHAPTER
Additional References4-22
Related Documents4-22
Standards4-22
MIBs4-22
RFCs4-22
Technical Assistance4-22
5Configuring Cisco IOS Configuration Engine5-1
Finding Feature Information5-1
Prerequisites for Configuring Cisco IOS Configuration Engine5-1
Information About Configuring Cisco IOS Configuration Engine5-2
Using Hostname, DeviceID, and ConfigID5-5
Cisco IOS Agents5-5
Initial Configuration5-5
Incremental (Partial) Configuration5-6
Synchronized Configuration5-6
vi
How to Configure Cisco IOS Configuration Engine5-7
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring Cisco IOS Agents5-7
Enabling CNS Event Agent5-7
Enabling Cisco IOS CNS Agent and an Initial Configuration5-8
Enabling a Partial Configuration5-10
Monitoring and Maintaining Cisco IOS Configuration Engine5-11
Configuration Examples for Cisco IOS Configuration Engine5-11
Enabling the CNS Event Agent: Example5-11
Configuring an Initial CNS Configuration: Examples5-11
Additional References5-12
Related Documents5-12
Standards5-12
MIBs5-12
RFCs5-12
Technical Assistance5-13
Contents
CHAPTER
6Configuring Switch Clusters6-1
Finding Feature Information6-1
Prerequisites for Configuring Switch Clusters6-1
Cluster Command Switch Characteristics6-1
Standby Cluster Command Switch Characteristics6-2
Candidate Switch and Cluster Member Switch Characteristics6-2
Restrictions for Configuring Switch Clusters6-3
Information About Configuring Switch Clusters6-3
Benefits of Clustering Switches6-3
Eligible Cluster Switches6-3
How to Plan for Switch Clustering6-4
Automatic Discovery of Cluster Candidates and Members6-5
Discovery Through CDP Hops6-5
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices6-7
Discovery Through Different VLANs6-7
Discovery Through Different Management VLANs6-8
Discovery Through Routed Ports6-9
Discovery of Newly Installed Switches6-10
IP Addresses6-11
Hostnames6-11
Passwords6-12
SNMP Community Strings6-12
TACACS+ and RADIUS6-12
LRE Profiles6-13
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
vii
Contents
Managing Switch Clusters6-13
Using the CLI to Manage Switch Clusters6-13
Using SNMP to Manage Switch Clusters6-14
Additional References6-15
Related Documents6-15
Standards6-15
MIBs6-15
RFCs6-15
Technical Assistance6-15
CHAPTER
7Performing Switch Administration7-1
Finding Feature Information7-1
Information About Performing Switch Administration7-1
System Time and Date Management7-1
System Clock 7-1
Network Time Protocol7-2
NTP Version 47-3
DNS7-4
Default DNS Configuration7-4
Login Banners7-4
System Name and Prompt7-5
MAC Address Table7-5
Address Table7-5
MAC Addresses and VLANs7-5
Default MAC Address Table Configuration7-6
Address Aging Time for VLANs7-6
MAC Address Change Notification Traps7-6
Static Addresses7-6
Unicast MAC Address Filtering7-7
MAC Address Learning on a VLAN7-8
ARP Table Management7-8
viii
How to Perform Switch Administration7-9
Configuring Time and Date Manually7-9
Setting the System Clock7-9
Configuring the Time Zone 7-9
Configuring Summer Time (Daylight Saving Time)7-10
Configuring Summer Time (Exact Date and Time)7-11
Configuring a System Name7-11
Setting Up DNS7-11
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring Login Banners7-12
Configuring a Message-of-the-Day Login Banner7-12
Configuring a Login Banner7-13
Managing the MAC Address Table7-13
Changing the Address Aging Time7-13
Configuring MAC Address Change Notification Traps7-14
Configuring MAC Address Move Notification Traps7-15
Configuring MAC Threshold Notification Traps7-15
Adding and Removing Static Address Entries7-17
Configuring Unicast MAC Address Filtering7-17
Disabling MAC Address Learning on a VLAN7-17
Monitoring and Maintaining Switch Administration7-18
Configuration Examples for Performing Switch Admininistration7-18
Setting the System Clock: Example7-18
Configuring Summer Time: Examples7-18
Configuring a MOTD Banner: Examples7-19
Configuring a Login Banner: Example7-19
Configuring MAC Address Change Notification Traps: Example7-19
Sending MAC Address Move Notification Traps: Example7-20
Configuring MAC Threshold Notification Traps: Example7-20
Adding the Static Address to the MAC Address Table: Example7-20
Configuring Unicast MAC Address Filtering: Example7-20
Contents
CHAPTER
Additional References7-21
Related Documents7-21
Standards7-21
MIBs7-21
RFCs7-21
Technical Assistance7-21
8Configuring PTP8-1
Finding Feature Information8-1
Prerequisites for Configuring PTP8-1
Restrictions for Configuring PTP8-1
Information About Configuring PTP8-1
Precision Time Protocol8-1
How to Configure PTP8-2
Default PTP Settings8-2
Setting Up PTP8-3
Monitoring and Maintaining the PTP Configuration8-3
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
ix
Contents
Troubleshooting the PTP Configuration8-4
Additional References8-4
Related Documents8-4
Standards8-4
MIBs8-4
RFCs8-5
Technical Assistance8-5
CHAPTER
9Configuring PROFINET9-1
Finding Feature Information9-1
Restrictions for Configuring PROFINET9-1
Information About Configuring PROFINET9-1
PROFINET Device Roles9-2
PROFINET Device Data Exchange9-2
SDM Templates11-1
Dual IPv4 and IPv6 SDM Default Template11-3
How to Configure the Switch SDM Templates11-4
Setting the SDM Template11-4
Monitoring and Maintaining SDM Templates11-4
Configuration Examples for Configuring SDM Templates11-5
Configuring the IPv4-and-IPv6 Default Template: Example11-5
Additional References11-6
Related Documents11-6
Standards11-6
MIBs11-6
RFCs11-6
Technical Assistance11-6
CHAPTER
OL-25866-01
12Configuring Switch-Based Authentication12-1
Finding Feature Information12-1
Prerequisites for Configuring Switch-Based Authentication12-1
Restrictions for Configuring Switch-Based Authentication12-1
Information About Configuring Switch-Based Authentication12-2
Prevention for Unauthorized Switch Access12-2
Password Protection12-2
Default Password and Privilege Level Configuration12-2
Enable Secret Passwords with Encryption12-3
Password Recovery12-3
Telnet Password for a Terminal Line12-4
Username and Password Pairs12-4
Multiple Privilege Levels12-4
Switch Access with TACACS+12-5
Cisco IE 2000 Switch Software Configuration Guide
xi
Contents
TACACS+12-5
TACACS+ Operation12-6
Default TACACS+ Configuration12-7
TACACS+ Server Host and the Authentication Key12-7
TACACS+ Login Authentication12-7
TACACS+ Authorization for Privileged EXEC Access and Network Services12-7
TACACS+ Accounting12-8
Switch Access with RADIUS12-8
RADIUS12-8
RADIUS Operation12-9
Default RADIUS Configuration12-10
RADIUS Change of Authorization12-10
CoA Request Commands12-12
RADIUS Server Host 12-14
RADIUS Login Authentication12-15
Radius Method List12-15
AAA Server Groups12-15
RADIUS Authorization for User Privileged Access and Network Services12-16
RADIUS Accounting12-16
Establishing a Session with a Router if the AAA Server is Unreachable12-16
Vendor-Specific RADIUS Attributes12-16
Vendor-Proprietary RADIUS Server Communication12-17
Switch Access with Kerberos12-17
Understanding Kerberos12-17
Kerberos Operation12-19
Kerberos Configuration12-20
Local Authentication and Authorization12-20
Secure Shell12-21
SSH12-21
SSH Servers, Integrated Clients, and Supported Versions12-21
Limitations12-22
SSH Configuration Guidelines12-22
Switch for Secure Socket Layer HTTP12-22
Secure HTTP Servers and Clients12-22
Default SSL Settings12-23
Certificate Authority Trustpoints12-23
CipherSuites12-24
Secure Copy Protocol12-24
xii
How to Configure Switch-Based Authentication12-26
Configuring Password Protection12-26
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Setting or Changing a Static Enable Password12-26
Protecting Enable and Enable Secret Passwords with Encryption12-27
Disabling Password Recovery12-27
Setting a Telnet Password for a Terminal Line12-28
Configuring Username and Password Pairs12-28
Setting the Privilege Level for a Command12-29
Changing the Default Privilege Level for Lines12-29
Logging Into and Exiting a Privilege Level12-30
Configuring TACACS+12-30
Identifying the TACACS+ Server Host and Setting the Authentication Key12-30
Configuring TACACS+ Login Authentication12-31
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services12-33
Starting TACACS+ Accounting12-33
Configuring Radius Server Communication12-33
Defining AAA Server Groups12-35
Configuring RADIUS Login Authentication12-36
Configuring RADIUS Authorization for User Privileged Access and Network Services12-37
Starting RADIUS Accounting12-37
Configuring Settings for All RADIUS Servers12-37
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication12-38
Configuring CoA on the Switch12-38
Configuring the Switch for Local Authentication and Authorization12-39
Configuring Secure Shell12-40
Setting Up the Switch to Run SSH12-40
Configuring the SSH Server12-40
Configuring Secure HTTP Servers and Clients12-42
Configuring a CA Trustpoint12-42
Configuring the Secure HTTP Server12-42
Configuring the Secure HTTP Client12-44
Contents
OL-25866-01
Monitoring and Maintaining Switch-Based Authentication12-44
Configuration Examples for Configuring Switch-Based Authentication12-45
Changing the Enable Password: Example12-45
Configuring the Encrypted Password: Example12-45
Setting the Telnet Password for a Terminal Line: Example12-45
Setting the Privilege Level for a Command: Example12-45
Configuring the RADIUS Server: Examples12-45
Defining AAA Server Groups: Example12-46
Configuring Vendor-Specific RADIUS Attributes: Examples12-46
Configuring a Vendor-Proprietary RADIUS Host: Example12-46
Sample Output for a Self-Signed Certificate: Example12-46
Cisco IE 2000 Switch Software Configuration Guide
xiii
Contents
Verifying Secure HTTP Connection: Example12-47
Additional References12-47
Related Documents12-47
Standards12-48
MIBs12-48
RFCs12-48
Technical Assistance12-48
802.1x Multiple Authentication Mode13-11
MAC Move13-12
MAC Replace13-12
802.1x Accounting13-13
802.1x Accounting Attribute-Value Pairs13-13
802.1x Readiness Check13-14
802.1x Authentication with VLAN Assignment13-15
Voice Aware 802.1x Security13-16
802.1x Authentication with Per-User ACLs13-17
802.1x Authentication with Downloadable ACLs and Redirect URLs13-18
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL13-19
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs13-19
VLAN ID-Based MAC Authentication13-20
802.1x Authentication with Guest VLAN13-20
802.1x Authentication with Restricted VLAN13-21
xiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Contents
802.1x Authentication with Inaccessible Authentication Bypass13-22
Support on Multiple-Authentication Ports13-22
Authentication Results13-22
Feature Interactions13-23
802.1x Authentication with Voice VLAN Ports13-23
802.1x Authentication with Port Security13-24
802.1x Authentication with Wake-on-LAN13-24
802.1x Authentication with MAC Authentication Bypass13-25
802.1x User Distribution13-26
802.1x User Distribution Configuration Guidelines13-26
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)13-28
802.1x Supplicant and Authenticator Switch Guidelines13-29
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute13-29
Authentication Manager Common Session ID13-30
Default 802.1x Authentication Settings13-30
MAC Authentication Bypass Guidelines13-33
Maximum Number of Allowed Devices Per Port Guidelines13-34
13-33
OL-25866-01
How to Configure IEEE 802.1x Port-Based Authentication13-34
802.1x Authentication Configuration Process13-34
Configuring the Switch-to-RADIUS-Server Communication13-36
Configuring 802.1x Readiness Check13-36
Enabling Voice Aware 802.1x Security13-37
Configuring 802.1x Violation Modes13-37
Configuring the Host Mode13-38
Configuring Periodic Reauthentication13-39
Configuring Optional 802.1x Authentication Features13-40
Configuring 802.1x Accounting13-42
Configuring a Guest VLAN13-42
Configuring a Restricted VLAN13-43
Configuring the Maximum Number of Authentication Attempts13-43
Configuring Inaccessible Authentication Bypass13-44
Configuring 802.1x User Distribution13-46
Configuring NAC Layer 2 802.1x Validation13-46
Cisco IE 2000 Switch Software Configuration Guide
xv
Contents
Configuring an Authenticator and Supplicant13-47
Configuring an Authenticator13-47
Configuring a Supplicant Switch with NEAT13-47
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs13-48
Configuring Downloadable ACLs13-48
Configuring a Downloadable Policy13-49
Configuring Open1x13-50
Resetting the 802.1x Authentication Configuration to the Default Values13-51
Monitoring and Maintaining IEEE 802.1x Port-Based Authentication13-51
Configuration Examples for Configuring IEEE 802.1x Port-Based Authentication13-51
Enabling a Readiness Check: Example13-51
Enabling 802.1x Authentication: Example13-52
Enabling MDA: Example13-52
Disabling the VLAN Upon Switch Violoation: Example13-52
Configuring the Radius Server Parameters: Example13-52
Configuring 802.1x Accounting: Example13-52
Enabling an 802.1x Guest VLAN: Example13-53
Displaying Authentication Manager Common Session ID: Examples13-53
Configuring Inaccessible Authentication Bypass: Example13-53
Configuring VLAN Groups: Examples13-54
Configuring NAC Layer 2 802.1x Validation: Example13-54
Configuring an 802.1x Authenticator Switch: Example13-54
Configuring an 802.1x Supplicant Switch: Example13-55
Configuring a Downloadable Policy: Example13-55
Configuring Open 1x on a Port: Example13-55
CHAPTER
xvi
Additional References13-56
Related Documents13-56
Standards13-56
MIBs13-56
RFCs13-56
Technical Assistance13-57
14Configuring Web-Based Authentication14-1
Finding Feature Information14-1
Prerequisites for Configuring Web-Based Authentication14-1
Restrictions for Configuring Web-Based Authentication on the IE 2000 Switch14-1
Information About Configuring Web-Based Authentication14-2
Web-Based Authentication14-2
Device Roles14-2
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Host Detection14-3
Session Creation14-3
Authentication Process14-4
Local Web Authentication Banner14-4
Web Authentication Customizable Web Pages14-6
Web Authentication Guidelines14-6
Web-Based Authentication Interactions with Other Features14-8
Port Security14-8
LAN Port IP14-8
Gateway IP14-9
ACLs14-9
Context-Based Access Control14-9
802.1x Authentication14-9
EtherChannel14-9
Default Web-Based Authentication Settings14-10
Configuring Switch-to-RADIUS-Server Communication 14-10
Contents
How to Configure Web-Based Authentication14-11
Configuring the Authentication Rule and Interfaces14-11
Configuring AAA Authentication14-11
Configuring Switch-to-RADIUS-Server Communication 14-12
Configuring the HTTP Server14-12
Customizing the Authentication Proxy Web Pages14-13
Specifying a Redirection URL for Successful Login14-13
Configuring the Web-Based Authentication Parameters14-13
Configuring a Web Authentication Local Banner14-14
Removing Web-Based Authentication Cache Entries14-14
Monitoring and Maintaining Web-Based Authentication14-14
Configuration Examples for Configuring Web-Based Authentication14-14
Enabling and Displaying Web-Based Authentication: Examples14-14
Enabling AAA: Example14-15
Configuring the RADIUS Server Parameters: Example14-15
Configuring a Custom Authentication Proxy Web Page: Example14-15
Verifying a Custom Authentication Proxy Web Page: Example14-15
Configuring a Redirection URL: Example14-16
Verifying a Redirection URL: Example14-16
Configuring a Local Banner: Example14-16
Clearing the Web-Based Authentication Session: Example14-16
Connecting Interfaces15-5
Using Interface Configuration Mode15-6
Default Ethernet Interface Settings15-8
Interface Speed and Duplex Mode15-9
Speed and Duplex Configuration Guidelines15-9
IEEE 802.3x Flow Control15-9
Auto-MDIX on an Interface15-10
SVI Autostate Exclude15-10
System MTU15-10
xviii
How to Configure Interface Characteristics15-11
Configuring Layer 3 Interfaces15-11
Configuring Interfaces15-13
Configuring a Range of Interfaces15-13
Interface Range Restrictions15-13
Configuring and Using Interface Range Macros15-14
Configuring Ethernet Interfaces15-15
Setting the Type of a Dual-Purpose Uplink Port15-15
Setting the Interface Speed and Duplex Parameters15-16
Configuring IEEE 802.3x Flow Control15-16
Configuring Auto-MDIX on an Interface15-17
Adding a Description for an Interface15-17
Configuring SVI Autostate Exclude15-17
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring the System MTU15-18
Monitoring and Maintaining Interface Characteristics15-18
Monitoring Interface Status15-18
Clearing and Resetting Interfaces and Counters15-19
Shutting Down and Restarting the Interface15-19
Configuration Examples for Configuring Interface Characteristics15-20
Configuring the Interface Range: Examples15-20
Configuring Interface Range Macros: Examples15-20
Setting Speed and Duplex Parameters: Example15-21
Enabling auto-MDIX: Example15-21
Adding a Description on a Port: Example15-21
Configuring SVI Autostate Exclude: Example15-22
Additional References15-22
Related Documents15-22
Standards15-22
MIBs15-22
RFCs15-23
Contents
CHAPTER
CHAPTER
16Configuring Smartports Macros16-1
Finding Feature Information16-1
Information About Configuring Smartports Macros16-1
Creating or Modifying an Ethernet VLAN17-17
Deleting a VLAN17-17
Assigning Static-Access Ports to a VLAN17-17
Creating an Extended-Range VLAN17-18
Creating an Extended-Range VLAN with an Internal VLAN ID17-18
Configuring an Ethernet Interface as a Trunk Port17-19
Defining the Allowed VLANs on a Trunk17-19
Changing the Pruning-Eligible List17-19
Configuring the Native VLAN for Untagged Traffic17-20
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Load Sharing Using STP Port Priorities17-21
Configuring Load Sharing Using STP Path Cost17-21
Configuring the VMPS Client17-22
Entering the IP Address of the VMPS17-22
Configuring Dynamic-Access Ports on VMPS Clients17-23
Monitoring and Maintaining VLANs17-23
Configuration Examples for Configuring VLANs17-24
VMPS Network: Example17-24
Configuring a VLAN: Example17-25
Configuring an Access Port in a VLAN: Example17-25
Configuring an Extended-Range VLAN: Example17-25
Configuring a Trunk Port: Example17-25
Removing a VLAN: Example17-25
Show VMPS Output: Example17-25
Additional References17-26
Related Documents17-26
Standards17-26
MIBs17-26
RFCs17-26
Contents
CHAPTER
18Configuring VTP18-1
Finding VTP Feature Information18-1
Prerequisites for Configuring VTP18-1
Restrictions for Configuring VTP18-1
Information About Configuring VTP18-2
VTP18-2
VTP Domain18-2
VTP Modes18-3
VTP Mode Guidelines18-3
VTP Advertisements18-4
VTP Version 218-5
VTP Version 318-5
VTP Version Guidelines18-6
VTP Pruning18-7
Default VTP Settings18-9
VTP Configuration Guidelines18-9
Domain Names18-10
Passwords18-10
Adding a VTP Client Switch to a VTP Domain18-10
OL-25866-01
Cisco IE 2000 Switch Software Configuration Guide
xxi
Contents
How to Configure VTP18-11
Configuring VTP Domain and Parameters18-11
Configuring a VTP Version 3 Password18-12
Enabling the VTP Version18-12
Enabling VTP Pruning18-13
Configuring VTP on a Per-Port Basis18-13
Adding a VTP Client Switch to a VTP Domain18-13
Monitoring and Maintaining VTP18-14
Configuration Examples for Configuring VTP18-14
Configuring a VTP Server: Example18-14
Configuring a Hidden VTP Password: Example18-15
Configuring a VTP Version 3 Primary Server: Example18-15
Additional References for Configuring VTP18-15
Related Documents18-15
Standards18-15
MIBs18-16
RFCs18-16
CHAPTER
19Configuring Voice VLAN19-1
Finding Feature Information19-1
Information About Configuring Voice VLAN19-1
Voice VLAN19-1
Cisco IP Phone Voice Traffic19-2
Cisco IP Phone Data Traffic19-3
Default Voice VLAN Configuration19-3
Voice VLAN Configuration Guidelines19-3
Port Connection to a Cisco 7960 IP Phone19-4
Priority of Incoming Data Frames19-4
How to Configure VTP19-5
Configuring Cisco IP Phone for Voice Traffic19-5
Configuring the Priority of Incoming Data Frames19-5
Monitoring and Maintaining Voice VLAN19-6
Configuration Examples for Configuring Voice VLAN19-6
Configuring a Cisco IP Phone for Voice Traffic: Example19-6
Configuring the Cisco IP Phone Priority of Incoming Data Frames: Example19-6
Additional References for Configuring Voice VLAN19-6
Related Documents19-6
Standards19-7
MIBs19-7
xxii
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
RFCs19-7
Contents
CHAPTER
20Configuring STP20-1
Finding Feature Information20-1
Prerequisites for Configuring STP20-1
Restrictions for Configuring STP20-1
Information About Configuring STP20-1
STP20-2
Spanning-Tree Topology and BPDUs20-2
Bridge ID, Switch Priority, and Extended System ID20-3
Spanning-Tree Interface States20-4
Blocking State20-5
Listening State20-6
Learning State20-6
Forwarding State20-6
Disabled State20-6
How a Switch or Port Becomes the Root Switch or Root Port20-7
Spanning Tree and Redundant Connectivity20-7
Spanning-Tree Address Management20-8
Accelerated Aging to Retain Connectivity20-8
Spanning-Tree Modes and Protocols20-9
Supported Spanning-Tree Instances20-9
Spanning-Tree Interoperability and Backward Compatibility20-10
STP and IEEE 802.1Q Trunks20-10
VLAN-Bridge Spanning Tree20-10
Default Spanning-Tree Settings20-11
Disabling Spanning Tree20-11
Root Switch20-11
Secondary Root Switch20-12
Port Priority20-12
Path Cost20-13
Spanning-Tree Timers20-13
Spanning-Tree Configuration Guidelines20-13
OL-25866-01
How to Configure STP20-14
Changing the Spanning-Tree Mode20-14
Configuring the Root Switch20-15
Configuring a Secondary Root Switch20-16
Configuring Port Priority20-16
Configuring Path Cost20-16
Cisco IE 2000 Switch Software Configuration Guide
xxiii
Contents
Configuring Optional STP Parameters20-17
Monitoring and Maintaining STP20-17
Additional References20-18
Related Documents20-18
Standards20-18
MIBs20-18
RFCs20-18
CHAPTER
21Configuring MSTP21-1
Finding Feature Information21-1
Information About Configuring MSTP21-1
MSTP21-2
Multiple Spanning-Tree Regions21-2
IST, CIST, and CST21-2
Operations Within an MST Region21-3
Operations Between MST Regions21-3
IEEE 802.1s Terminology21-4
Hop Count21-5
Boundary Ports21-5
IEEE 802.1s Implementation21-6
Port Role Naming Change21-6
Interoperation Between Legacy and Standard Switches21-6
Detecting Unidirectional Link Failure21-7
Interoperability with IEEE 802.1D STP21-8
RSTP21-8
Port Roles and the Active Topology21-8
Rapid Convergence21-9
Synchronization of Port Roles21-10
Bridge Protocol Data Unit Format and Processing21-11
Processing Superior BPDU Information21-12
Processing Inferior BPDU Information21-12
Topology Changes21-12
Default MSTP Settings21-13
MSTP Configuration Guidelines21-13
Root Switch21-14
Secondary Root Switch21-15
Port Priority 21-15
Path Cost21-15
Link Type to Ensure Rapid Transitions21-15
xxiv
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Neighbor Type21-15
Restarting the Protocol Migration Process21-16
How to Configure MSTP21-16
Specifying the MST Region Configuration and Enabling MSTP21-16
Configuring the Root Switch21-17
Configuring the Optional MSTP Parameters21-18
Monitoring and Maintaining MSTP21-20
Configuration Examples for Configuring MSTP21-20
Configuring the MST Region: Example21-20
Additional References21-21
Related Documents21-21
Standards21-21
MIBs21-21
RFCs21-21
Contents
CHAPTER
22Configuring Optional Spanning-Tree Features22-1
Finding Feature Information22-1
Prerequisites for the Optional Spanning-Tree Features22-1
Restrictions for the Optional Spanning-Tree Features22-1
Information About Configuring the Optional Spanning-Tree Features22-1
Configuring the REP Administrative VLAN23-9
Configuring REP Interfaces23-9
Setting Manual Preemption for VLAN Load Balancing23-12
Configuring SNMP Traps for REP23-12
CHAPTER
Monitoring and Maintaining REP23-12
Configuration Examples for Configuring REP23-13
Configuring the Administrative VLAN: Example23-13
Configuring a Primary Edge Port: Examples23-13
Configuring VLAN Blocking: Example23-14
Additional References23-14
Related Documents23-14
Standards23-14
MIBs23-15
RFCs23-15
24Configuring FlexLinks and the MAC Address-Table Move Update24-1
Finding Feature Information24-1
Restrictions for the FlexLinks and the MAC Address-Table Move Update24-1
Information About Configuring the FlexLinks and the MAC Address-Table Move Update24-1
FlexLinks24-1
VLAN FlexLinks Load Balancing and Support24-2
FlexLinks Multicast Fast Convergence24-3
xxvi
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Learning the Other FlexLinks Port as the mrouter Port24-3
Generating IGMP Reports24-3
Leaking IGMP Reports24-4
MAC Address-Table Move Update24-4
Default Settings for FlexLinks and MAC Address-Table Move Update24-5
Configuration Guidelines for FlexLinks and MAC Address-Table Move Update24-6
How to Configure the FlexLinks and MAC Address-Table Move Update24-6
Configuring FlexLinks24-6
Configuring a Preemption Scheme for FlexLinks24-7
Configuring VLAN Load Balancing on FlexLinks24-7
Configuring the MAC Address-Table Move Update Feature24-8
Configuring the MAC Address-Table Move Update Messages24-8
Maintaining and Monitoring the FlexLinks and MAC Address-Table Move Update24-9
Configuration Examples for the FlexLinks and MAC Address-Table Move Update24-9
Configuring FlexLinks Port: Examples24-9
Configuring a Backup Interface: Example24-11
Configuring a Preemption Scheme: Example24-11
Configuring VLAN Load Balancing on FlexLinks: Examples24-12
Configuring MAC Address-Table Move Update: Example24-13
Contents
CHAPTER
Additional References24-13
Related Documents24-13
Standards24-13
MIBs24-14
RFCs24-14
Configuring the DHCP Relay Agent 25-10
Specifying the Packet Forwarding Address25-10
Enabling DHCP Snooping and Option 8225-11
Enabling the DHCP Snooping Binding Database Agent25-12
Enabling DHCP Server Port-Based Address Allocation25-13
Preassigning an IP Address25-13
Related Documents25-16
Standards25-16
MIBs25-16
RFCs25-16
CHAPTER
26Configuring Dynamic ARP Inspection26-1
Finding Feature Information26-1
Prerequisites for Dynamic ARP Inspection26-1
Restrictions for Dynamic ARP Inspection26-1
Information About Dynamic ARP Inspection26-1
Dynamic ARP Inspection26-1
Interface Trust States and Network Security26-3
Rate Limiting of ARP Packets26-4
Relative Priority of ARP ACLs and DHCP Snooping Entries26-4
Logging of Dropped Packets26-4
Default Dynamic ARP Inspection Settings26-5
Dynamic ARP Inspection Configuration Guidelines26-5
How to Configure Dynamic ARP Inspection26-6
Configuring Dynamic ARP Inspection in DHCP Environments26-6
Configuring ARP ACLs for Non-DHCP Environments26-7
Limiting the Rate of Incoming ARP Packets26-9
Performing Validation Checks26-10
Configuring the Log Buffer26-11
xxviii
Monitoring and Maintaining Dynamic ARP Inspection26-12
Configuration Examples for Dynamic ARP Inspection26-12
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Configuring Dynamic ARP Inspection in DHCP Environments: Example26-12
Configuring ARP ACLs for Non-DHCP Environments: Example26-12
Additional References26-13
Related Documents26-13
Standards26-13
MIBs26-13
RFCs26-13
Technical Assistance26-13
Contents
CHAPTER
27Configuring IP Source Guard27-1
Finding Feature Information27-1
Prerequisites for IP Source Guard27-1
Restrictions for IP Source Guard27-1
Information About IP Source Guard27-1
IP Source Guard27-1
Source IP Address Filtering27-2
Source IP and MAC Address Filtering27-2
IP Source Guard for Static Hosts27-2
IP Source Guard Configuration Guidelines27-3
How to Configure IP Source Guard27-4
Enabling IP Source Guard27-4
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port27-4
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port27-5
Monitoring and Maintaining IP Source Guard27-7
Configuration Examples for IP Source Guard27-7
Enabling IPSG with Source IP and MAC Filtering: Example27-7
Disabling IPSG with Static Hosts: Example27-7
Enabling IPSG for Static Hosts: Examples27-7
Displaying IP or MAC Binding Entries: Examples27-8
Enabling IPSG for Static Hosts: Examples27-9
CHAPTER
OL-25866-01
Additional References27-10
Related Documents27-10
Standards27-11
MIBs27-11
RFCs27-11
28Configuring IGMP Snooping and MVR28-1
Finding Feature Information28-1
Cisco IE 2000 Switch Software Configuration Guide
xxix
Contents
Restrictions for IGMP Snooping and MVR28-1
Information About IGMP Snooping and MVR28-1
IGMP Snooping28-2
IGMP Versions28-2
Joining a Multicast Group28-3
Leaving a Multicast Group28-5
Immediate Leave 28-5
IGMP Configurable-Leave Timer28-5
IGMP Report Suppression28-6
Default IGMP Snooping Configuration28-6
Snooping Methods28-6
Multicast Flooding Time After a TCN Event28-7
Flood Mode for TCN28-7
Multicast Flooding During a TCN Event28-7
IGMP Snooping Querier Guidelines28-7
IGMP Report Suppression28-8
Multicast VLAN Registration28-8
MVR in a Multicast Television Application28-9
Default MVR Settings28-11
MVR Configuration Guidelines and Limitations28-11