Cisco IE 2000 Switch Software
Configuration Guide
Cisco IOS Release 15.0(1)EY
July 2012
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive
San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883
Text Part Number: OL-25866-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
Cisco IE 2000 Switch Software Configuration Guide
© 2012 Cisco Systems, Inc. All rights reserved.
|
|
|
|
|
|
|
|
|
C O N T E N T S |
||||
|
|
Preface li |
|
|
|
|
|
|
|
|
|
|
|
|
|
Audience |
li |
|
|
|
|
|
|
|
|
|
|
|
|
Purpose |
li |
|
|
|
|
|
|
|
|
|
|
|
|
Conventions li |
|
|
|
|
|
|
|
|
|
|
|
|
|
Related Publications |
lii |
|
|
|
|
|
|
|
|
||
|
|
Obtaining Documentation, Obtaining Support, and Security Guidelines liii |
|||||||||||
|
Configuration Overview |
|
|
|
|
|
|
|
|
||||
C H A P T E R 1 |
1-1 |
|
|
|
|
|
|
|
|||||
|
|
Features |
1-1 |
|
|
|
|
|
|
|
|
|
|
|
|
Feature Software Licensing |
|
1-1 |
|
|
|
|
|
|
|||
|
|
Ease-of-Deployment and Ease-of-Use Features |
1-2 |
|
|
|
|||||||
|
|
Performance Features |
|
1-2 |
|
|
|
|
|
|
|||
|
|
Management Options |
1-3 |
|
|
|
|
|
|
||||
|
|
Industrial Application |
1-4 |
|
|
|
|
|
|
||||
|
|
Manageability Features |
1-4 |
|
|
|
|
|
|
||||
|
|
Availability and Redundancy Features |
1-5 |
|
|
|
|
||||||
|
|
VLAN Features |
|
1-6 |
|
|
|
|
|
|
|
|
|
|
|
Security Features |
1-7 |
|
|
|
|
|
|
|
|
||
|
|
QoS and CoS Features |
|
1-10 |
|
|
|
|
|
|
|||
|
|
Monitoring Features |
1-11 |
|
|
|
|
|
|
||||
|
|
Default Settings After Initial Switch Configuration |
1-11 |
|
|
|
|||||||
|
|
Network Configuration Examples |
1-14 |
|
|
|
|
|
|||||
|
|
Design Concepts for Using the Switch |
1-14 |
|
|
|
|
||||||
|
|
Ethernet-to-the-Factory Architecture |
1-15 |
|
|
|
|
||||||
|
|
Enterprise Zone |
1-15 |
|
|
|
|
|
|
||||
|
|
Demilitarized Zone |
|
1-16 |
|
|
|
|
|
|
|||
|
|
Manufacturing Zone |
1-16 |
|
|
|
|
|
|||||
|
|
Topology Options |
|
1-18 |
|
|
|
|
|
|
|||
|
|
Where to Go Next |
1-21 |
|
|
|
|
|
|
|
|
||
|
Using the Command-Line Interface |
|
|
|
|
|
|
||||||
C H A P T E R 2 |
2-1 |
|
|
|
|
|
|||||||
|
|
Information About Using the Command-Line Interface 2-1 |
|||||||||||
|
|
Command Modes |
2-1 |
|
|
|
|
|
|
|
|||
|
|
Help System |
2-3 |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
iii |
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
|
|
|
Understanding Abbreviated Commands |
2-4 |
|
|
|
|||||
|
|
|
|
|
No and default Forms of Commands |
2-4 |
|
|
|
|||||
|
|
|
|
|
CLI Error Messages |
2-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuration Logging |
2-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
How to Use the CLI to Configure Features |
2-6 |
|
|
|
|||||
|
|
|
|
|
Configuring the Command History |
2-6 |
|
|
|
|
||||
|
|
|
|
|
Changing the Command History Buffer Size |
2-6 |
|
|||||||
|
|
|
|
|
Recalling Commands |
2-6 |
|
|
|
|
|
|||
|
|
|
|
|
Disabling the Command History Feature |
2-7 |
|
|
||||||
|
|
|
|
|
Using Editing Features |
2-7 |
|
|
|
|
|
|
||
|
|
|
|
|
Enabling and Disabling Editing Features |
2-7 |
|
|
||||||
|
|
|
|
|
Editing Commands Through Keystrokes |
2-7 |
|
|
||||||
|
|
|
|
|
Editing Command Lines That Wrap |
2-9 |
|
|
|
|||||
|
|
|
|
|
Searching and Filtering Output of show and more Commands 2-10 |
|||||||||
|
|
|
|
|
Accessing the CLI |
2-10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Accessing the CLI through a Console Connection or through Telnet 2-10 |
|||||||||
|
|
Configuring Switch Alarms |
|
|
|
|
|
|
|
|
||||
C H A P T E R 3 |
|
3-1 |
|
|
|
|
|
|
|
|||||
|
|
|
|
|
Finding Feature Information |
3-1 |
|
|
|
|
|
|
||
|
|
|
|
|
Information About Switch Alarms |
3-1 |
|
|
|
|
|
|||
|
|
|
|
|
Global Status Monitoring Alarms |
3-2 |
|
|
|
|
||||
|
|
|
|
|
FCS Error Hysteresis Threshold |
3-2 |
|
|
|
|
||||
|
|
|
|
|
Port Status Monitoring Alarms |
3-2 |
|
|
|
|
||||
|
|
|
|
|
Triggering Alarm Options |
3-3 |
|
|
|
|
|
|
||
|
|
|
|
|
External Alarms |
3-4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default Switch Alarm Settings |
3-5 |
|
|
|
|
||||
|
|
|
|
|
How to Configure Switch Alarms |
3-5 |
|
|
|
|
|
|||
|
|
|
|
|
Configuring External Alarms |
|
3-5 |
|
|
|
|
|
||
|
|
|
|
|
Configuring the Power Supply Alarms |
3-6 |
|
|
|
|||||
|
|
|
|
|
Configuring the Switch Temperature Alarms |
3-6 |
|
|
||||||
|
|
|
|
|
Associating the Temperature Alarms to a Relay |
3-7 |
|
|||||||
|
|
|
|
|
Configuring the FCS Bit Error Rate Alarm 3-7 |
|
|
|
||||||
|
|
|
|
|
Setting the FCS Error Threshold |
3-7 |
|
|
|
|||||
|
|
|
|
|
Setting the FCS Error Hysteresis Threshold |
3-8 |
|
|||||||
|
|
|
|
|
Configuring Alarm Profiles |
3-8 |
|
|
|
|
|
|||
|
|
|
|
|
Creating an Alarm Profile |
3-8 |
|
|
|
|
|
|||
|
|
|
|
|
Modifying an Alarm Profile 3-8 |
|
|
|
|
|||||
|
|
|
|
|
Attaching an Alarm Profile to a Specific Port |
3-9 |
|
|||||||
|
|
|
|
|
Enabling SNMP Traps |
3-9 |
|
|
|
|
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|||
|
iv |
|
|
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Monitoring and Maintaining Switch Alarms Status |
3-9 |
|
|||
Configuration Examples for Switch Alarms |
3-10 |
|
|
||
Configuring External Alarms: Example |
3-10 |
|
|
||
Associating Temperature Alarms to a Relay: Examples |
3-10 |
||||
Creating or Modifying an Alarm Profile: Example 3-10 |
|
||||
Setting the FCS Error Hysteresis Threshold: Example |
3-11 |
||||
Configuring a Dual Power Supply: Examples |
3-11 |
|
|||
Displaying Alarm Settings: Example |
3-11 |
|
|
||
Additional References |
3-12 |
|
|
|
|
Related Documents |
3-12 |
|
|
|
|
Standards 3-12 |
|
|
|
|
|
MIBs |
3-12 |
|
|
|
|
RFCs |
3-13 |
|
|
|
|
|
Technical Assistance |
3-13 |
|
|
|
|
||
|
Performing Switch Setup Configuration |
|
|
|
||||
C H A P T E R 4 |
4-1 |
|
|
|||||
|
Restrictions for Performing Switch Setup Configuration |
4-1 |
||||||
|
Information About Performing Switch Setup Configuration 4-1 |
|||||||
|
Switch Boot Process |
4-1 |
|
|
|
|
|
|
|
Default Switch Boot Settings |
4-3 |
|
|
|
|||
|
Switch Boot Optimization |
4-3 |
|
|
|
|
||
|
Switch Information Assignment |
4-4 |
|
|
||||
|
Switch Default Settings |
4-4 |
|
|
|
|
||
|
DHCP-Based Autoconfiguration Overview |
4-4 |
|
|||||
|
DHCP Client Request Process |
4-5 |
|
|
||||
|
DHCP-Based Autoconfiguration and Image Update |
4-6 |
||||||
|
DHCP Autoconfiguration |
4-6 |
|
|
|
|||
|
DHCP Auto-Image Update |
4-6 |
|
|
|
|||
|
DHCP Server Configuration Guidelines |
4-7 |
|
|||||
|
TFTP Server |
4-7 |
|
|
|
|
|
|
|
DNS Server |
4-8 |
|
|
|
|
|
|
|
Relay Device |
4-8 |
|
|
|
|
|
|
|
How to Obtain Configuration Files |
4-9 |
|
|
|
|
|
How to Control Environment Variables |
4-10 |
|
|
|
|
|
Common Environment Variables |
4-11 |
|
|
|
|
|
Scheduled Reload of the Software Image |
4-11 |
|
|
|
|
|
How to Perform Switch Setup Configuration |
4-12 |
|
|
|
|
|
Configuring DHCP Autoconfiguration (Only Configuration File) 4-12 |
|||||
|
Configuring DHCP Auto-Image Update (Configuration File and Image) 4-13 |
|||||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|||
|
OL-25866-01 |
|
|
|
v |
|
|
|
|
|
|
Contents
Configuring the Client 4-14 |
|
|
Manually Assigning IP Information on a Routed Port 4-14 |
||
Manually Assigning IP Information to SVIs |
4-15 |
|
Modifying the Startup Configuration |
4-15 |
|
Specifying the Filename to Read and Write the System Configuration 4-15 |
||
Manually Booting the Switch |
4-16 |
|
Booting a Specific Software Image |
4-17 |
|
Monitoring Switch Setup Configuration |
4-17 |
|
|
|
||||
|
Verifying the Switch Running Configuration 4-17 |
|
|||||||
|
Configuration Examples for Performing Switch Setup Configuration 4-18 |
||||||||
|
Retrieving IP Information Using DHCP-Based Autoconfiguration: Example 4-18 |
||||||||
|
Scheduling Software Image Reload: Examples |
4-20 |
|
||||||
|
Configuring DHCP Auto-Image Update: Example |
4-20 |
|
||||||
|
Configuring a Switch as a DHCP Server: Example 4-20 |
|
|||||||
|
Configuring Client to Download Files from DHCP Server |
4-21 |
|||||||
|
Additional References |
4-22 |
|
|
|
|
|||
|
Related Documents |
4-22 |
|
|
|
|
|||
|
Standards 4-22 |
|
|
|
|
|
|
||
|
MIBs |
4-22 |
|
|
|
|
|
|
|
|
RFCs |
4-22 |
|
|
|
|
|
|
|
|
Technical Assistance |
4-22 |
|
|
|
|
|||
|
Configuring Cisco IOS Configuration Engine |
|
|
|
|||||
C H A P T E R 5 |
5-1 |
|
|
||||||
|
Finding Feature Information |
5-1 |
|
|
|
|
|||
|
Prerequisites for Configuring Cisco IOS Configuration Engine |
5-1 |
|||||||
|
Information About Configuring Cisco IOS Configuration Engine |
5-2 |
|||||||
|
Configuration Service |
5-3 |
|
|
|
|
|||
|
Event Service |
5-3 |
|
|
|
|
|
|
|
|
NameSpace Mapper |
5-4 |
|
|
|
|
|||
|
CNS IDs and Device Hostnames |
5-4 |
|
|
|
||||
|
ConfigID |
5-4 |
|
|
|
|
|
|
|
|
DeviceID |
5-4 |
|
|
|
|
|
|
|
|
Hostname and DeviceID Interaction |
5-5 |
|
|
|||||
|
Using Hostname, DeviceID, and ConfigID |
5-5 |
|
||||||
|
Cisco IOS Agents |
5-5 |
|
|
|
|
|
||
|
Initial Configuration 5-5 |
|
|
|
|
||||
|
Incremental (Partial) Configuration |
5-6 |
|
|
|||||
|
Synchronized Configuration |
5-6 |
|
|
|
|
|
|
How to Configure Cisco IOS Configuration Engine |
5-7 |
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
vi |
|
|
OL-25866-01 |
|
|
|
|
|
Contents
|
|
Configuring Cisco IOS Agents |
5-7 |
|
|
|
|
|
|
|
|
||||
|
|
Enabling CNS Event Agent |
5-7 |
|
|
|
|
|
|
|
|
||||
|
|
Enabling Cisco IOS CNS Agent and an Initial Configuration |
5-8 |
|
|
|
|||||||||
|
|
Enabling a Partial Configuration |
5-10 |
|
|
|
|
|
|
|
|||||
|
|
Monitoring and Maintaining Cisco IOS Configuration Engine |
|
5-11 |
|
|
|
||||||||
|
|
Configuration Examples for Cisco IOS Configuration Engine |
5-11 |
|
|
|
|||||||||
|
|
Enabling the CNS Event Agent: Example |
5-11 |
|
|
|
|
|
|
||||||
|
|
Configuring an Initial CNS Configuration: Examples |
5-11 |
|
|
|
|
||||||||
|
|
Additional References 5-12 |
|
|
|
|
|
|
|
|
|
|
|||
|
|
Related Documents |
5-12 |
|
|
|
|
|
|
|
|
|
|||
|
|
Standards |
5-12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
MIBs |
5-12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RFCs |
5-12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Technical Assistance |
5-13 |
|
|
|
|
|
|
|
|
|
|||
|
Configuring Switch Clusters |
|
|
|
|
|
|
|
|
|
|
|
|||
C H A P T E R 6 |
|
6-1 |
|
|
|
|
|
|
|
|
|
||||
|
|
Finding Feature Information |
6-1 |
|
|
|
|
|
|
|
|
|
|||
|
|
Prerequisites for Configuring Switch Clusters |
6-1 |
|
|
|
|
|
|
||||||
|
|
Cluster Command Switch Characteristics |
6-1 |
|
|
|
|
|
|
||||||
|
|
Standby Cluster Command Switch Characteristics |
6-2 |
|
|
|
|
|
|||||||
|
|
Candidate Switch and Cluster Member Switch Characteristics 6-2 |
|||||||||||||
|
|
Restrictions for Configuring Switch Clusters |
6-3 |
|
|
|
|
|
|
||||||
|
|
Information About Configuring Switch Clusters |
6-3 |
|
|
|
|
|
|
||||||
|
|
Benefits of Clustering Switches |
6-3 |
|
|
|
|
|
|
|
|||||
|
|
Eligible Cluster Switches |
6-3 |
|
|
|
|
|
|
|
|
||||
|
|
How to Plan for Switch Clustering |
6-4 |
|
|
|
|
|
|
|
|||||
|
|
Automatic Discovery of Cluster Candidates and Members |
6-5 |
|
|
|
|||||||||
|
|
Discovery Through CDP Hops |
6-5 |
|
|
|
|
|
|
|
|||||
|
|
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices 6-7 |
|||||||||||||
|
|
Discovery Through Different VLANs |
6-7 |
|
|
|
|
|
|
||||||
|
|
Discovery Through Different Management VLANs |
6-8 |
|
|
|
|||||||||
|
|
Discovery Through Routed Ports 6-9 |
|
|
|
|
|
|
|
||||||
|
|
Discovery of Newly Installed Switches 6-10 |
|
|
|
|
|
|
|||||||
|
|
IP Addresses |
6-11 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Hostnames |
6-11 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Passwords |
6-12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SNMP Community Strings 6-12 |
|
|
|
|
|
|
|
|
|||||
|
|
TACACS+ and RADIUS |
|
6-12 |
|
|
|
|
|
|
|
|
|
||
|
|
LRE Profiles |
6-13 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
||||||
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
vii |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Managing Switch Clusters 6-13 |
|
||
Using the CLI to Manage Switch Clusters |
6-13 |
||
Using SNMP to Manage Switch Clusters |
6-14 |
||
Additional References |
6-15 |
|
|
Related Documents |
6-15 |
|
|
Standards 6-15 |
|
|
|
MIBs |
6-15 |
|
|
RFCs |
6-15 |
|
|
|
|
|
|
|
Technical Assistance |
6-15 |
|
|
|
|
|
|
||
|
|
Performing Switch Administration |
|
|
|
|
|
|||||||
C H A P T E R 7 |
|
7-1 |
|
|
|
|
||||||||
|
|
|
|
|
Finding Feature Information |
7-1 |
|
|
|
|
|
|
||
|
|
|
|
|
Information About Performing Switch Administration |
7-1 |
|
|
||||||
|
|
|
|
|
System Time and Date Management |
7-1 |
|
|
|
|||||
|
|
|
|
|
System Clock |
7-1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Network Time Protocol |
7-2 |
|
|
|
|
||||
|
|
|
|
|
NTP Version 4 |
7-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
DNS 7-4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Default DNS Configuration |
7-4 |
|
|
|
|
||||
|
|
|
|
|
Login Banners |
7-4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
System Name and Prompt |
|
7-5 |
|
|
|
|
|
||
|
|
|
|
|
MAC Address Table |
7-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Address Table |
7-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
MAC Addresses and VLANs 7-5 |
|
|
|
||||||
|
|
|
|
|
Default MAC Address Table Configuration |
7-6 |
|
|
||||||
|
|
|
|
|
Address Aging Time for VLANs |
7-6 |
|
|
|
|||||
|
|
|
|
|
MAC Address Change Notification Traps |
7-6 |
|
|
||||||
|
|
|
|
|
Static Addresses |
7-6 |
|
|
|
|
|
|
||
|
|
|
|
|
Unicast MAC Address Filtering |
7-7 |
|
|
|
|||||
|
|
|
|
|
MAC Address Learning on a VLAN 7-8 |
|
|
|
||||||
|
|
|
|
|
ARP Table Management |
7-8 |
|
|
|
|
|
|||
|
|
|
|
|
How to Perform Switch Administration |
7-9 |
|
|
|
|||||
|
|
|
|
|
Configuring Time and Date Manually |
7-9 |
|
|
|
|||||
|
|
|
|
|
Setting the System Clock |
7-9 |
|
|
|
|
||||
|
|
|
|
|
Configuring the Time Zone |
7-9 |
|
|
|
|||||
|
|
|
|
|
Configuring Summer Time (Daylight Saving Time) |
7-10 |
|
|||||||
|
|
|
|
|
Configuring Summer Time (Exact Date and Time) |
7-11 |
|
|||||||
|
|
|
|
|
Configuring a System Name |
7-11 |
|
|
|
|
||||
|
|
|
|
|
Setting Up DNS |
7-11 |
|
|
|
|
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
|
||||
|
viii |
|
|
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
Configuring Login Banners 7-12 |
|
|
|
|
|
|
|||||
|
Configuring a Message-of-the-Day Login Banner |
7-12 |
|
|||||||||
|
Configuring a Login Banner 7-13 |
|
|
|
|
|
||||||
|
Managing the MAC Address Table |
7-13 |
|
|
|
|
||||||
|
Changing the Address Aging Time |
7-13 |
|
|
|
|
||||||
|
Configuring MAC Address Change Notification Traps |
7-14 |
|
|||||||||
|
Configuring MAC Address Move Notification Traps |
7-15 |
|
|||||||||
|
Configuring MAC Threshold Notification Traps |
7-15 |
|
|
||||||||
|
Adding and Removing Static Address Entries |
7-17 |
|
|
||||||||
|
Configuring Unicast MAC Address Filtering |
7-17 |
|
|
||||||||
|
Disabling MAC Address Learning on a VLAN |
7-17 |
|
|
||||||||
|
Monitoring and Maintaining Switch Administration |
7-18 |
|
|
|
|||||||
|
Configuration Examples for Performing Switch Admininistration 7-18 |
|||||||||||
|
Setting the System Clock: Example |
7-18 |
|
|
|
|
||||||
|
Configuring Summer Time: Examples |
|
7-18 |
|
|
|
|
|||||
|
Configuring a MOTD Banner: Examples |
7-19 |
|
|
|
|
||||||
|
Configuring a Login Banner: Example |
|
7-19 |
|
|
|
|
|||||
|
Configuring MAC Address Change Notification Traps: Example |
7-19 |
||||||||||
|
Sending MAC Address Move Notification Traps: Example |
7-20 |
|
|||||||||
|
Configuring MAC Threshold Notification Traps: Example |
7-20 |
|
|||||||||
|
Adding the Static Address to the MAC Address Table: Example |
7-20 |
||||||||||
|
Configuring Unicast MAC Address Filtering: Example |
7-20 |
|
|||||||||
|
Additional References |
7-21 |
|
|
|
|
|
|
|
|||
|
Related Documents |
7-21 |
|
|
|
|
|
|
|
|||
|
Standards |
7-21 |
|
|
|
|
|
|
|
|
|
|
|
MIBs |
7-21 |
|
|
|
|
|
|
|
|
|
|
|
RFCs |
7-21 |
|
|
|
|
|
|
|
|
|
|
|
Technical Assistance |
7-21 |
|
|
|
|
|
|
|
|||
|
Configuring PTP |
|
|
|
|
|
|
|
|
|
|
|
C H A P T E R 8 |
8-1 |
|
|
|
|
|
|
|
|
|
||
|
Finding Feature Information |
8-1 |
|
|
|
|
|
|
|
|||
|
Prerequisites for Configuring PTP |
8-1 |
|
|
|
|
|
|
||||
|
Restrictions for Configuring PTP |
8-1 |
|
|
|
|
|
|
||||
|
Information About Configuring PTP |
8-1 |
|
|
|
|
|
|
||||
|
Precision Time Protocol |
8-1 |
|
|
|
|
|
|
|
|||
|
How to Configure PTP |
8-2 |
|
|
|
|
|
|
|
|
||
|
Default PTP Settings |
8-2 |
|
|
|
|
|
|
|
|||
|
Setting Up PTP 8-3 |
|
|
|
|
|
|
|
|
|
Monitoring and Maintaining the PTP Configuration |
8-3 |
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|||||
|
OL-25866-01 |
|
|
ix |
|
|
|
|
|
Contents
|
|
|
|
Troubleshooting the PTP Configuration |
8-4 |
|
||||||
|
|
|
|
Additional References |
|
8-4 |
|
|
|
|
||
|
|
|
|
Related Documents |
8-4 |
|
|
|
||||
|
|
|
|
Standards |
8-4 |
|
|
|
|
|
|
|
|
|
|
|
MIBs |
8-4 |
|
|
|
|
|
|
|
|
|
|
|
RFCs |
8-5 |
|
|
|
|
|
|
|
|
|
|
|
Technical Assistance |
8-5 |
|
|
|
||||
|
Configuring PROFINET |
|
|
|
|
|
||||||
C H A P T E R 9 |
9-1 |
|
|
|
|
|||||||
|
|
|
|
Finding Feature Information |
9-1 |
|
|
|
||||
|
|
|
|
Restrictions for Configuring PROFINET |
9-1 |
|
||||||
|
|
|
|
Information About Configuring PROFINET |
9-1 |
|
||||||
|
|
|
|
PROFINET Device Roles |
9-2 |
|
|
|
||||
|
|
|
|
PROFINET Device Data Exchange 9-2 |
||||||||
|
|
|
|
How to Configure PROFINET |
9-4 |
|
|
|
||||
|
|
|
|
Configuring PROFINET |
9-4 |
|
|
|
||||
|
|
|
|
Default Configuration |
9-4 |
|
|
|
||||
|
|
|
|
Enabling PROFINET |
9-4 |
|
|
|
||||
|
|
|
|
Monitoring and Maintaining PROFINET |
9-5 |
|
||||||
|
|
|
|
Troubleshooting PROFINET |
9-5 |
|
|
|
||||
|
|
|
|
Additional References |
|
9-6 |
|
|
|
|
||
|
|
|
|
Related Documents |
9-6 |
|
|
|
||||
|
|
|
|
Standards |
9-6 |
|
|
|
|
|
|
|
|
|
|
|
MIBs |
9-6 |
|
|
|
|
|
|
|
|
|
|
|
RFCs |
9-6 |
|
|
|
|
|
|
|
|
|
|
|
Technical Assistance |
9-6 |
|
|
|
||||
|
Configuring CIP |
|
|
|
|
|
|
|
||||
C H A P T E R 10 |
10-1 |
|
|
|
|
|
|
|||||
|
|
|
|
Finding Feature Information |
10-1 |
|
|
|||||
|
|
|
|
Restrictions for Configuring CIP |
10-1 |
|
|
|||||
|
|
|
|
Information About Configuring CIP |
10-1 |
|
|
|||||
|
|
|
|
How to Configure CIP |
|
10-1 |
|
|
|
|
||
|
|
|
|
Default Configuration |
10-1 |
|
|
|
||||
|
|
|
|
Enabling CIP 10-2 |
|
|
|
|
|
|||
|
|
|
|
Monitoring CIP |
10-2 |
|
|
|
|
|
|
|
|
|
|
|
Troubleshooting CIP |
10-2 |
|
|
|
|
|||
|
|
|
|
Additional References |
|
10-3 |
|
|
|
|||
|
|
|
|
Related Documents |
10-3 |
|
|
|
||||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|||||
|
|
|
|
|
|
|
||||||
|
x |
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Standards 10-3
MIBs 10-3
RFCs 10-3
|
Technical Assistance |
10-3 |
|
||
|
Configuring SDM Templates |
|
|
||
C H A P T E R 11 |
11-1 |
|
|||
|
Finding Feature Information |
11-1 |
|
||
|
Prerequisites for Configuring SDM Templates |
11-1 |
|||
|
Restrictions for Configuring SDM Templates |
11-1 |
|||
|
Information About Configuring SDM Templates |
11-1 |
|||
|
SDM Templates |
11-1 |
|
|
|
|
Dual IPv4 and IPv6 SDM Default Template |
11-3 |
|||
|
How to Configure the Switch SDM Templates |
11-4 |
|||
|
Setting the SDM Template 11-4 |
|
|||
|
Monitoring and Maintaining SDM Templates |
11-4 |
|||
|
Configuration Examples for Configuring SDM Templates 11-5 |
||||
|
Configuring the IPv4-and-IPv6 Default Template: Example 11-5 |
||||
|
Additional References |
11-6 |
|
||
|
Related Documents 11-6 |
|
|||
|
Standards 11-6 |
|
|
|
|
|
MIBs |
11-6 |
|
|
|
|
RFCs |
11-6 |
|
|
|
|
Technical Assistance |
11-6 |
|
|
Configuring Switch-Based Authentication 12-1 |
|
|
C H A P T E R 12 |
|
||
|
Finding Feature Information |
12-1 |
|
|
Prerequisites for Configuring Switch-Based Authentication |
12-1 |
|
|
Restrictions for Configuring Switch-Based Authentication |
12-1 |
|
|
Information About Configuring Switch-Based Authentication |
12-2 |
|
|
Prevention for Unauthorized Switch Access 12-2 |
|
|
|
Password Protection |
12-2 |
|
Default Password and Privilege Level Configuration 12-2
Enable Secret Passwords with Encryption
Password Recovery 12-3
Telnet Password for a Terminal Line
Username and Password Pairs
Multiple Privilege Levels
Switch Access with TACACS+
|
|
|
|
|
OL-25866-01 |
xi |
|
|
Contents
|
|
|
TACACS+ |
12-5 |
|
|
|
|
|
|
|
|
|
|
|
TACACS+ Operation |
12-6 |
|
|
|
|
|
|
||
|
|
|
Default TACACS+ Configuration |
12-7 |
|
|
|
|||||
|
|
|
TACACS+ Server Host and the Authentication Key |
12-7 |
|
|
||||||
|
|
|
TACACS+ Login Authentication |
|
12-7 |
|
|
|
||||
|
|
|
TACACS+ Authorization for Privileged EXEC Access and Network Services 12-7 |
|||||||||
|
|
|
TACACS+ Accounting |
12-8 |
|
|
|
|
|
|
||
|
|
|
Switch Access with RADIUS |
12-8 |
|
|
|
|
|
|
||
|
|
|
RADIUS |
12-8 |
|
|
|
|
|
|
|
|
|
|
|
RADIUS Operation |
12-9 |
|
|
|
|
|
|
|
|
|
|
|
Default RADIUS Configuration |
|
12-10 |
|
|
|
||||
|
|
|
RADIUS Change of Authorization |
|
12-10 |
|
|
|
||||
|
|
|
CoA Request Commands |
12-12 |
|
|
|
|
|
|||
|
|
|
RADIUS Server Host |
12-14 |
|
|
|
|
|
|
||
|
|
|
RADIUS Login Authentication |
12-15 |
|
|
|
|||||
|
|
|
Radius Method List |
12-15 |
|
|
|
|
|
|
||
|
|
|
AAA Server Groups |
12-15 |
|
|
|
|
|
|
||
|
|
|
RADIUS Authorization for User Privileged Access and Network Services |
12-16 |
|
|||||||
|
|
|
RADIUS Accounting |
12-16 |
|
|
|
|
|
|
||
|
|
|
Establishing a Session with a Router if the AAA Server is Unreachable |
12-16 |
|
|||||||
|
|
|
Vendor-Specific RADIUS Attributes |
12-16 |
|
|
|
|||||
|
|
|
Vendor-Proprietary RADIUS Server Communication |
12-17 |
|
|
||||||
|
|
|
Switch Access with Kerberos |
12-17 |
|
|
|
|
|
|||
|
|
|
Understanding Kerberos |
12-17 |
|
|
|
|
|
|||
|
|
|
Kerberos Operation |
12-19 |
|
|
|
|
|
|
||
|
|
|
Kerberos Configuration |
12-20 |
|
|
|
|
|
|
||
|
|
|
Local Authentication and Authorization |
12-20 |
|
|
|
|||||
|
|
|
Secure Shell |
12-21 |
|
|
|
|
|
|
|
|
|
|
|
SSH 12-21 |
|
|
|
|
|
|
|
|
|
|
|
|
SSH Servers, Integrated Clients, and Supported Versions 12-21 |
|
|
|||||||
|
|
|
Limitations |
12-22 |
|
|
|
|
|
|
|
|
|
|
|
SSH Configuration Guidelines |
|
12-22 |
|
|
|
||||
|
|
|
Switch for Secure Socket Layer HTTP |
|
12-22 |
|
|
|
||||
|
|
|
Secure HTTP Servers and Clients |
|
12-22 |
|
|
|
||||
|
|
|
Default SSL Settings |
12-23 |
|
|
|
|
|
|
||
|
|
|
Certificate Authority Trustpoints |
|
12-23 |
|
|
|
||||
|
|
|
CipherSuites 12-24 |
|
|
|
|
|
|
|
|
|
|
|
|
Secure Copy Protocol 12-24 |
|
|
|
|
|
|
|
||
|
|
|
How to Configure Switch-Based Authentication 12-26 |
|
|
|
||||||
|
|
|
Configuring Password Protection |
12-26 |
|
|
|
|||||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
xii |
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
Setting or Changing a Static Enable Password |
12-26 |
|
|
|
|
|
|
||||||
|
Protecting Enable and Enable Secret Passwords with Encryption 12-27 |
|
|
|||||||||||
|
Disabling Password Recovery |
12-27 |
|
|
|
|
|
|
|
|
|
|
||
|
Setting a Telnet Password for a Terminal Line |
12-28 |
|
|
|
|
|
|
||||||
|
Configuring Username and Password Pairs |
12-28 |
|
|
|
|
|
|
|
|||||
|
Setting the Privilege Level for a Command |
12-29 |
|
|
|
|
|
|
|
|||||
|
Changing the Default Privilege Level for Lines |
12-29 |
|
|
|
|
|
|
||||||
|
Logging Into and Exiting a Privilege Level |
12-30 |
|
|
|
|
|
|
|
|||||
|
Configuring TACACS+ |
12-30 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Identifying the TACACS+ Server Host and Setting the Authentication Key 12-30 |
|
|
|||||||||||
|
Configuring TACACS+ Login Authentication |
12-31 |
|
|
|
|
|
|
|
|||||
|
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services |
12-33 |
|
|||||||||||
|
Starting TACACS+ Accounting |
12-33 |
|
|
|
|
|
|
|
|
|
|
||
|
Configuring Radius Server Communication |
12-33 |
|
|
|
|
|
|
|
|
||||
|
Defining AAA Server Groups |
12-35 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring RADIUS Login Authentication |
12-36 |
|
|
|
|
|
|
|
|||||
|
Configuring RADIUS Authorization for User Privileged Access and Network Services |
12-37 |
|
|||||||||||
|
Starting RADIUS Accounting |
12-37 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring Settings for All RADIUS Servers |
12-37 |
|
|
|
|
|
|
||||||
|
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 12-38 |
|
|
|||||||||||
|
Configuring CoA on the Switch 12-38 |
|
|
|
|
|
|
|
|
|
||||
|
Configuring the Switch for Local Authentication and Authorization |
12-39 |
|
|
|
|
||||||||
|
Configuring Secure Shell |
12-40 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Setting Up the Switch to Run SSH |
12-40 |
|
|
|
|
|
|
|
|
|
|||
|
Configuring the SSH Server |
12-40 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring Secure HTTP Servers and Clients 12-42 |
|
|
|
|
|
|
|
|
|||||
|
Configuring a CA Trustpoint |
12-42 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring the Secure HTTP Server |
|
12-42 |
|
|
|
|
|
|
|
|
|
||
|
Configuring the Secure HTTP Client |
|
12-44 |
|
|
|
|
|
|
|
|
|
||
|
Monitoring and Maintaining Switch-Based Authentication |
12-44 |
|
|
|
|
|
|||||||
|
Configuration Examples for Configuring Switch-Based Authentication |
12-45 |
|
|
|
|
||||||||
|
Changing the Enable Password: Example |
|
12-45 |
|
|
|
|
|
|
|
|
|
||
|
Configuring the Encrypted Password: Example |
12-45 |
|
|
|
|
|
|
|
|||||
|
Setting the Telnet Password for a Terminal Line: Example |
12-45 |
|
|
|
|
|
|||||||
|
Setting the Privilege Level for a Command: Example |
12-45 |
|
|
|
|
|
|||||||
|
Configuring the RADIUS Server: Examples |
12-45 |
|
|
|
|
|
|
|
|
||||
|
Defining AAA Server Groups: Example |
12-46 |
|
|
|
|
|
|
|
|
|
|||
|
Configuring Vendor-Specific RADIUS Attributes: Examples |
12-46 |
|
|
|
|
|
|||||||
|
Configuring a Vendor-Proprietary RADIUS Host: Example |
|
12-46 |
|
|
|
|
|
||||||
|
Sample Output for a Self-Signed Certificate: Example |
12-46 |
|
|
|
|
|
|||||||
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|||||||
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
xiii |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Verifying Secure HTTP Connection: Example 12-47 |
||
Additional References |
12-47 |
|
Related Documents |
12-47 |
|
Standards 12-48 |
|
|
MIBs |
12-48 |
|
RFCs |
12-48 |
|
|
Technical Assistance |
12-48 |
|
|
|
|
|
|
|||
|
Configuring IEEE 802.1x Port-Based Authentication |
|
|
||||||||
C H A P T E R 13 |
13-1 |
|
|||||||||
|
Finding Feature Information |
13-1 |
|
|
|
|
|
|
|||
|
Restrictions for Configuring IEEE 802.1x Port-Based Authentication 13-1 |
||||||||||
|
Information About Configuring IEEE 802.1x Port-Based Authentication |
13-1 |
|||||||||
|
IEEE 802.1x Port-Based Authentication |
13-1 |
|
|
|
||||||
|
Device Roles |
13-2 |
|
|
|
|
|
|
|
|
|
|
Authentication Process |
13-3 |
|
|
|
|
|
|
|||
|
Switch-to-RADIUS-Server Communication |
13-4 |
|
|
|||||||
|
Authentication Initiation and Message Exchange |
13-4 |
|
||||||||
|
Authentication Manager |
13-6 |
|
|
|
|
|
||||
|
Port-Based Authentication Methods |
|
13-6 |
|
|
|
|||||
|
Per-User ACLs and Filter-Ids 13-7 |
|
|
|
|
|
|||||
|
Authentication Manager CLI Commands |
13-8 |
|
||||||||
|
Ports in Authorized and Unauthorized States |
13-9 |
|
||||||||
|
802.1x |
Host Mode |
13-9 |
|
|
|
|
|
|
|
|
|
Multidomain Authentication |
13-10 |
|
|
|
|
|
||||
|
802.1x |
Multiple Authentication Mode |
13-11 |
|
|
|
|||||
|
MAC Move |
13-12 |
|
|
|
|
|
|
|
|
|
|
MAC Replace |
13-12 |
|
|
|
|
|
|
|
||
|
802.1x |
Accounting |
13-13 |
|
|
|
|
|
|
||
|
802.1x |
Accounting Attribute-Value Pairs |
|
13-13 |
|
|
|||||
|
802.1x |
Readiness Check |
13-14 |
|
|
|
|
|
|||
|
802.1x |
Authentication with VLAN Assignment |
|
13-15 |
|
||||||
|
Voice Aware 802.1x Security |
13-16 |
|
|
|
|
|
||||
|
802.1x |
Authentication with Per-User ACLs |
13-17 |
|
|||||||
|
802.1x |
Authentication with Downloadable ACLs and Redirect URLs |
13-18 |
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL 13-19
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs 13-19
|
|
|
VLAN ID-Based MAC Authentication |
13-20 |
|
|
|
|
|
802.1x |
Authentication with Guest VLAN |
13-20 |
|
|
|
|
802.1x |
Authentication with Restricted VLAN 13-21 |
||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
||
|
xiv |
|
|
|
OL-25866-01 |
|
|
|
|
|
|
Contents
802.1x |
Authentication with Inaccessible Authentication Bypass 13-22 |
|||
Support on Multiple-Authentication Ports |
13-22 |
|||
Authentication Results 13-22 |
|
|
||
Feature Interactions |
13-23 |
|
|
|
802.1x |
Authentication with Voice VLAN Ports |
13-23 |
||
802.1x |
Authentication with Port Security |
13-24 |
|
|
802.1x Authentication with Wake-on-LAN |
13-24 |
|||
802.1x |
Authentication with MAC Authentication Bypass 13-25 |
|||
802.1x |
User Distribution |
13-26 |
|
|
802.1x User Distribution Configuration Guidelines |
13-26 |
Network Admission Control Layer 2 802.1x Validation |
13-27 |
Flexible Authentication Ordering 13-27 |
|
Open1x Authentication 13-28
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) 13-28
|
802.1x Supplicant and Authenticator Switch Guidelines |
13-29 |
|
|
|
|||||
|
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute 13-29 |
|||||||||
|
Authentication Manager Common Session ID |
13-30 |
|
|
|
|
|
|||
|
Default 802.1x Authentication Settings |
13-30 |
|
|
|
|
|
|
||
|
802.1x Accounting 13-31 |
|
|
|
|
|
|
|
|
|
|
802.1x Authentication Guidelines |
13-32 |
|
|
|
|
|
|
||
|
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass |
|||||||||
|
Guidelines 13-33 |
|
|
|
|
|
|
|
|
|
|
MAC Authentication Bypass Guidelines 13-33 |
|
|
|
|
|
|
|||
|
Maximum Number of Allowed Devices Per Port Guidelines |
13-34 |
|
|
|
|||||
|
How to Configure IEEE 802.1x Port-Based Authentication |
13-34 |
|
|
|
|
||||
|
802.1x Authentication Configuration Process |
13-34 |
|
|
|
|
|
|||
|
Configuring the Switch-to-RADIUS-Server Communication |
13-36 |
|
|
|
|||||
|
Configuring 802.1x Readiness Check |
13-36 |
|
|
|
|
|
|
||
|
Enabling Voice Aware 802.1x Security |
13-37 |
|
|
|
|
|
|
||
|
Configuring 802.1x Violation Modes |
13-37 |
|
|
|
|
|
|
||
|
Configuring the Host Mode |
13-38 |
|
|
|
|
|
|
|
|
|
Configuring Periodic Reauthentication |
13-39 |
|
|
|
|
|
|
||
|
Configuring Optional 802.1x Authentication Features |
13-40 |
|
|
|
|
||||
|
Configuring 802.1x Accounting |
13-42 |
|
|
|
|
|
|
|
|
|
Configuring a Guest VLAN |
13-42 |
|
|
|
|
|
|
|
|
|
Configuring a Restricted VLAN |
13-43 |
|
|
|
|
|
|
|
|
|
Configuring the Maximum Number of Authentication Attempts 13-43 |
|||||||||
|
Configuring Inaccessible Authentication Bypass |
13-44 |
|
|
|
|
||||
|
Configuring 802.1x User Distribution |
13-46 |
|
|
|
|
|
|
||
|
Configuring NAC Layer 2 802.1x Validation 13-46 |
|
|
|
|
|
||||
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|||
|
|
|
|
|
||||||
|
OL-25866-01 |
|
|
|
|
|
|
|
xv |
|
|
|
|
|
|
|
|
|
|
Contents
Configuring an Authenticator and Supplicant |
13-47 |
|
|
||||
Configuring an Authenticator 13-47 |
|
|
|
|
|||
Configuring a Supplicant Switch with NEAT |
13-47 |
|
|
||||
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs 13-48 |
|||||||
Configuring Downloadable ACLs |
13-48 |
|
|
|
|||
Configuring a Downloadable Policy |
13-49 |
|
|
||||
Configuring Open1x |
13-50 |
|
|
|
|
|
|
Resetting the 802.1x Authentication Configuration to the Default Values |
13-51 |
||||||
Monitoring and Maintaining IEEE 802.1x Port-Based Authentication 13-51 |
|
||||||
Configuration Examples for Configuring IEEE 802.1x Port-Based Authentication |
13-51 |
||||||
Enabling a Readiness Check: Example |
13-51 |
|
|
|
|||
Enabling 802.1x Authentication: Example |
13-52 |
|
|
||||
Enabling MDA: Example 13-52 |
|
|
|
|
|
||
Disabling the VLAN Upon Switch Violoation: Example |
13-52 |
|
|||||
Configuring the Radius Server Parameters: Example |
13-52 |
|
|||||
Configuring 802.1x Accounting: Example |
13-52 |
|
|
||||
Enabling an 802.1x Guest VLAN: Example |
13-53 |
|
|
||||
Displaying Authentication Manager Common Session ID: Examples 13-53 |
|
||||||
Configuring Inaccessible Authentication Bypass: Example 13-53 |
|
||||||
Configuring VLAN Groups: Examples |
13-54 |
|
|
|
|||
Configuring NAC Layer 2 802.1x Validation: Example |
13-54 |
|
|||||
Configuring an 802.1x Authenticator Switch: Example |
13-54 |
|
|||||
Configuring an 802.1x Supplicant Switch: Example |
13-55 |
|
|||||
Configuring a Downloadable Policy: Example |
13-55 |
|
|
||||
Configuring Open 1x on a Port: Example |
13-55 |
|
|
||||
Additional References |
13-56 |
|
|
|
|
|
|
Related Documents |
13-56 |
|
|
|
|
|
|
Standards 13-56 |
|
|
|
|
|
|
|
MIBs |
13-56 |
|
|
|
|
|
|
RFCs |
13-56 |
|
|
|
|
|
|
|
|
|
|
Technical Assistance |
13-57 |
|
|
|
Configuring Web-Based Authentication 14-1 |
|
|
||||
C H A P T E R 14 |
|
|
|||||
|
|
|
|
Finding Feature Information |
14-1 |
|
|
|
|
|
|
Prerequisites for Configuring Web-Based Authentication |
14-1 |
|
|
|
|
|
|
Restrictions for Configuring Web-Based Authentication on the IE 2000 Switch 14-1 |
|||
|
|
|
|
Information About Configuring Web-Based Authentication |
14-2 |
|
|
|
|
|
|
Web-Based Authentication 14-2 |
|
|
|
|
|
|
|
Device Roles 14-2 |
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
||
|
xvi |
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
Contents
|
Host Detection |
14-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Session Creation |
14-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Authentication Process |
14-4 |
|
|
|
|
|
|
|
|
|
|
||
|
Local Web Authentication Banner |
14-4 |
|
|
|
|
|
|
|
|
||||
|
Web Authentication Customizable Web Pages |
14-6 |
|
|
|
|
|
|
||||||
|
Web Authentication Guidelines |
14-6 |
|
|
|
|
|
|
|
|
||||
|
Web-Based Authentication Interactions with Other Features |
14-8 |
|
|
|
|||||||||
|
Port Security |
14-8 |
|
|
|
|
|
|
|
|
|
|
|
|
|
LAN Port IP |
14-8 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Gateway IP |
14-9 |
|
|
|
|
|
|
|
|
|
|
|
|
|
ACLs 14-9 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Context-Based Access Control |
|
14-9 |
|
|
|
|
|
|
|
|
|||
|
802.1x Authentication |
14-9 |
|
|
|
|
|
|
|
|
|
|
||
|
EtherChannel |
14-9 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default Web-Based Authentication Settings 14-10 |
|
|
|
|
|
|
|||||||
|
Configuring Switch-to-RADIUS-Server Communication |
14-10 |
|
|
|
|
||||||||
|
How to Configure Web-Based Authentication |
14-11 |
|
|
|
|
|
|
|
|||||
|
Configuring the Authentication Rule and Interfaces 14-11 |
|
|
|
|
|
||||||||
|
Configuring AAA Authentication |
14-11 |
|
|
|
|
|
|
|
|
||||
|
Configuring Switch-to-RADIUS-Server Communication |
14-12 |
|
|
|
|
||||||||
|
Configuring the HTTP Server |
14-12 |
|
|
|
|
|
|
|
|
|
|||
|
Customizing the Authentication Proxy Web Pages |
14-13 |
|
|
|
|
||||||||
|
Specifying a Redirection URL for Successful Login |
14-13 |
|
|
|
|
||||||||
|
Configuring the Web-Based Authentication Parameters 14-13 |
|
|
|
|
|||||||||
|
Configuring a Web Authentication Local Banner |
14-14 |
|
|
|
|
|
|||||||
|
Removing Web-Based Authentication Cache Entries |
14-14 |
|
|
|
|
|
|||||||
|
Monitoring and Maintaining Web-Based Authentication |
14-14 |
|
|
|
|
|
|||||||
|
Configuration Examples for Configuring Web-Based Authentication |
14-14 |
|
|
|
|||||||||
|
Enabling and Displaying Web-Based Authentication: Examples |
14-14 |
|
|
|
|||||||||
|
Enabling AAA: Example |
14-15 |
|
|
|
|
|
|
|
|
|
|
||
|
Configuring the RADIUS Server Parameters: Example |
14-15 |
|
|
|
|
|
|||||||
|
Configuring a Custom Authentication Proxy Web Page: Example |
14-15 |
|
|
|
|||||||||
|
Verifying a Custom Authentication Proxy Web Page: Example |
|
14-15 |
|
|
|
||||||||
|
Configuring a Redirection URL: Example |
14-16 |
|
|
|
|
|
|
|
|||||
|
Verifying a Redirection URL: Example |
14-16 |
|
|
|
|
|
|
|
|||||
|
Configuring a Local Banner: Example |
14-16 |
|
|
|
|
|
|
|
|||||
|
Clearing the Web-Based Authentication Session: Example |
14-16 |
|
|
|
|||||||||
|
Additional References |
14-17 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Related Documents 14-17 |
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
||||
|
|
|
|
|
|
|
|
|||||||
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
xvii |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Standards 14-17
MIBs 14-17
RFCs 14-18
|
Technical Assistance |
14-18 |
|
|
|
|
Configuring Interface Characteristics |
|
|
||
C H A P T E R 15 |
15-1 |
|
|||
|
Finding Feature Information |
15-1 |
|
|
|
|
Restrictions for Configuring Interface Characteristics |
15-1 |
|||
|
Information About Configuring Interface Characteristics |
15-1 |
|||
|
Interface Types |
15-1 |
|
|
|
|
Port-Based VLANs |
15-2 |
|
|
|
|
Switch Ports |
15-2 |
|
|
|
|
Routed Ports |
15-3 |
|
|
|
|
Access Ports |
15-3 |
|
|
|
|
Trunk Ports |
15-4 |
|
|
|
|
EtherChannel Port Groups |
15-4 |
|
||
|
Dual-Purpose Uplink Ports |
15-4 |
|
||
|
Connecting Interfaces 15-5 |
|
|
|
|
|
Using Interface Configuration Mode |
|
15-6 |
|
|
|||
|
|
|
Default Ethernet Interface Settings |
|
15-8 |
|
|
|||
|
|
|
Interface Speed and Duplex Mode |
|
15-9 |
|
|
|||
|
|
|
Speed and Duplex Configuration Guidelines |
15-9 |
|
|||||
|
|
|
IEEE 802.3x Flow Control |
|
15-9 |
|
|
|
|
|
|
|
|
Auto-MDIX on an Interface |
15-10 |
|
|
|
|
|
|
|
|
|
SVI Autostate Exclude |
15-10 |
|
|
|
|
|
|
|
|
|
System MTU 15-10 |
|
|
|
|
|
|
|
|
|
|
How to Configure Interface Characteristics |
15-11 |
|
|
||||
|
|
|
Configuring Layer 3 Interfaces 15-11 |
|
|
|
||||
|
|
|
Configuring Interfaces |
15-13 |
|
|
|
|
|
|
|
|
|
Configuring a Range of Interfaces |
15-13 |
|
|
||||
|
|
|
Interface Range Restrictions |
15-13 |
|
|
||||
|
|
|
Configuring and Using Interface Range Macros |
15-14 |
|
|||||
|
|
|
Configuring Ethernet Interfaces |
15-15 |
|
|
|
|
|
|
|
|
|
Setting the Type of a Dual-Purpose Uplink Port |
15-15 |
|
|||||
|
|
|
Setting the Interface Speed and Duplex Parameters 15-16 |
|||||||
|
|
|
Configuring IEEE 802.3x Flow Control |
|
15-16 |
|
|
|||
|
|
|
Configuring Auto-MDIX on an Interface |
15-17 |
|
|
||||
|
|
|
Adding a Description for an Interface |
|
15-17 |
|
|
|||
|
|
|
Configuring SVI Autostate Exclude |
|
15-17 |
|
|
|||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xviii |
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
Contents
|
|
Configuring the System MTU |
15-18 |
|
|
|
|
|
|||||
|
|
Monitoring and Maintaining Interface Characteristics |
15-18 |
|
|
|
|||||||
|
|
Monitoring Interface Status |
15-18 |
|
|
|
|
|
|
||||
|
|
Clearing and Resetting Interfaces and Counters |
15-19 |
|
|
|
|||||||
|
|
Shutting Down and Restarting the Interface |
15-19 |
|
|
|
|||||||
|
|
Configuration Examples for Configuring Interface Characteristics 15-20 |
|||||||||||
|
|
Configuring the Interface Range: Examples |
15-20 |
|
|
|
|||||||
|
|
Configuring Interface Range Macros: Examples |
15-20 |
|
|
|
|||||||
|
|
Setting Speed and Duplex Parameters: Example |
15-21 |
|
|
|
|||||||
|
|
Enabling auto-MDIX: Example |
15-21 |
|
|
|
|
|
|||||
|
|
Adding a Description on a Port: Example 15-21 |
|
|
|
|
|||||||
|
|
Configuring SVI Autostate Exclude: Example |
15-22 |
|
|
|
|||||||
|
|
Additional References |
15-22 |
|
|
|
|
|
|
|
|||
|
|
Related Documents |
15-22 |
|
|
|
|
|
|
|
|||
|
|
Standards |
15-22 |
|
|
|
|
|
|
|
|
|
|
|
|
MIBs |
15-22 |
|
|
|
|
|
|
|
|
|
|
|
|
RFCs |
15-23 |
|
|
|
|
|
|
|
|
|
|
|
Configuring Smartports Macros 16-1 |
|
|
|
|
|
|
||||||
C H A P T E R 16 |
|
|
|
|
|
|
|||||||
|
|
Finding Feature Information |
16-1 |
|
|
|
|
|
|
|
|||
|
|
Information About Configuring Smartports Macros |
16-1 |
|
|
|
|||||||
|
|
How to Configure Smartports Macros |
16-1 |
|
|
|
|
|
|||||
|
|
Default Smartports Settings |
16-1 |
|
|
|
|
|
|
||||
|
|
Smartports Configuration Guidelines 16-2 |
|
|
|
|
|
||||||
|
|
Applying Smartports Macros |
16-3 |
|
|
|
|
|
|
||||
|
|
Monitoring and Maintaining Smartports Macros |
16-4 |
|
|
|
|||||||
|
|
Configuration Examples for Smartports Macros |
16-4 |
|
|
|
|||||||
|
|
Applying the Smartports Macro: Examples |
16-4 |
|
|
|
|||||||
|
|
Additional References |
16-5 |
|
|
|
|
|
|
|
|||
|
|
Related Documents |
16-5 |
|
|
|
|
|
|
|
|||
|
|
Standards |
16-5 |
|
|
|
|
|
|
|
|
|
|
|
|
MIBs |
16-5 |
|
|
|
|
|
|
|
|
|
|
|
|
RFCs |
16-6 |
|
|
|
|
|
|
|
|
|
|
|
|
Technical Assistance |
16-6 |
|
|
|
|
|
|
|
|||
|
Configuring VLANs |
|
|
|
|
|
|
|
|
|
|
||
C H A P T E R 17 |
17-1 |
|
|
|
|
|
|
|
|
|
|||
|
|
Finding Feature Information |
17-1 |
|
|
|
|
|
|
|
|||
|
|
Information About Configuring VLANs |
17-1 |
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
||
|
|
|
|
|
|
|
|
|
|||||
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
xix |
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
|
VLANs 17-1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Supported VLANs |
17-2 |
|
|
|
|
|
|
|
|
|
|
|
|
VLAN Port Membership Modes |
17-3 |
|
|
|
|
|
|
|||
|
|
|
Normal-Range VLANs |
17-4 |
|
|
|
|
|
|
|
|
|
|
|
|
Token Ring VLANs |
17-5 |
|
|
|
|
|
|
|
|
|
|
|
|
Normal-Range VLAN Configuration Guidelines |
17-6 |
|
||||||||
|
|
|
Default Ethernet VLAN Configuration |
17-6 |
|
|
|
||||||
|
|
|
Ethernet VLANs |
17-7 |
|
|
|
|
|
|
|
|
|
|
|
|
VLAN Removal |
17-7 |
|
|
|
|
|
|
|
|
|
|
|
|
Static-Access Ports for a VLAN |
|
17-7 |
|
|
|
|
|
|||
|
|
|
Extended-Range VLANs 17-8 |
|
|
|
|
|
|
|
|
||
|
|
|
Default VLAN Configuration |
|
17-8 |
|
|
|
|
|
|||
|
|
|
Extended-Range VLAN Configuration Guidelines |
17-8 |
|
||||||||
|
|
|
VLAN Trunks 17-9 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Trunking Overview |
17-9 |
|
|
|
|
|
|
|
|
|
|
|
|
IEEE 802.1Q Configuration Guidelines |
17-10 |
|
|
|
||||||
|
|
|
Default Layer 2 Ethernet Interface VLAN Settings |
17-11 |
|
||||||||
|
|
|
Ethernet Interface as a Trunk Port |
17-11 |
|
|
|
||||||
|
|
|
Trunking Interaction with Other Features |
17-11 |
|
|
|||||||
|
|
|
Allowed VLANs on a Trunk |
17-12 |
|
|
|
|
|
||||
|
|
|
Native VLAN for Untagged Traffic |
17-12 |
|
|
|
||||||
|
|
|
Load Sharing Using Trunk Ports |
17-12 |
|
|
|
|
|||||
|
|
|
Load Sharing Using STP Port Priorities |
|
17-13 |
|
|
|
|||||
|
|
|
Load Sharing Using STP Path Cost |
17-13 |
|
|
|
||||||
|
|
|
VMPS 17-14 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Dynamic-Access Port VLAN Membership |
17-15 |
|
|
|||||||
|
|
|
Default VMPS Client Settings |
|
17-15 |
|
|
|
|
|
|||
|
|
|
VMPS Configuration Guidelines |
17-15 |
|
|
|
|
|||||
|
|
|
VMPS Reconfirmation Interval |
17-16 |
|
|
|
|
|
||||
|
|
|
Dynamic-Access Port VLAN Membership |
17-16 |
|
|
|||||||
|
|
|
How to Configure VLANs |
17-17 |
|
|
|
|
|
|
|
|
|
|
|
|
Creating or Modifying an Ethernet VLAN |
17-17 |
|
|
|
||||||
|
|
|
Deleting a VLAN |
17-17 |
|
|
|
|
|
|
|
|
|
|
|
|
Assigning Static-Access Ports to a VLAN |
17-17 |
|
|
|
||||||
|
|
|
Creating an Extended-Range VLAN |
17-18 |
|
|
|
|
|
||||
|
|
|
Creating an Extended-Range VLAN with an Internal VLAN ID 17-18 |
||||||||||
|
|
|
Configuring an Ethernet Interface as a Trunk Port |
17-19 |
|
||||||||
|
|
|
Defining the Allowed VLANs on a Trunk |
17-19 |
|
|
|||||||
|
|
|
Changing the Pruning-Eligible List |
17-19 |
|
|
|
||||||
|
|
|
Configuring the Native VLAN for Untagged Traffic |
17-20 |
|
||||||||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|||
|
xx |
|
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
Load Sharing Using STP Port Priorities |
17-21 |
|||||||
|
Configuring Load Sharing Using STP Path Cost 17-21 |
||||||||
|
Configuring the VMPS Client |
17-22 |
|
|
|||||
|
Entering the IP Address of the VMPS |
17-22 |
|
||||||
|
Configuring Dynamic-Access Ports on VMPS Clients 17-23 |
||||||||
|
Monitoring and Maintaining VLANs |
17-23 |
|
|
|||||
|
Configuration Examples for Configuring VLANs |
17-24 |
|
||||||
|
VMPS Network: Example |
17-24 |
|
|
|
||||
|
Configuring a VLAN: Example |
17-25 |
|
|
|||||
|
Configuring an Access Port in a VLAN: Example |
17-25 |
|||||||
|
Configuring an Extended-Range VLAN: Example |
17-25 |
|||||||
|
Configuring a Trunk Port: Example |
17-25 |
|
|
|||||
|
Removing a VLAN: Example |
|
17-25 |
|
|
||||
|
Show VMPS Output: Example |
17-25 |
|
|
|||||
|
Additional References |
17-26 |
|
|
|
|
|
||
|
Related Documents |
17-26 |
|
|
|
|
|
||
|
Standards |
17-26 |
|
|
|
|
|
|
|
|
MIBs |
17-26 |
|
|
|
|
|
|
|
|
RFCs |
17-26 |
|
|
|
|
|
|
|
|
Configuring VTP |
|
|
|
|
|
|
|
|
C H A P T E R 18 |
18-1 |
|
|
|
|
|
|
||
|
Finding VTP Feature Information |
|
18-1 |
|
|
||||
|
Prerequisites for Configuring VTP |
18-1 |
|
|
|||||
|
Restrictions for Configuring VTP |
|
18-1 |
|
|
||||
|
Information About Configuring VTP |
18-2 |
|
|
|||||
|
VTP |
18-2 |
|
|
|
|
|
|
|
|
VTP Domain |
18-2 |
|
|
|
|
|
||
|
VTP Modes |
18-3 |
|
|
|
|
|
|
|
|
VTP Mode Guidelines |
18-3 |
|
|
|
||||
|
VTP Advertisements |
18-4 |
|
|
|
||||
|
VTP Version 2 |
18-5 |
|
|
|
|
|
||
|
VTP Version 3 |
18-5 |
|
|
|
|
|
||
|
VTP Version Guidelines |
|
18-6 |
|
|
||||
|
VTP Pruning |
18-7 |
|
|
|
|
|
|
|
|
Default VTP Settings 18-9 |
|
|
|
|
|
|||
|
VTP Configuration Guidelines |
18-9 |
|
|
|||||
|
Domain Names 18-10 |
|
|
|
|
|
|||
|
Passwords |
18-10 |
|
|
|
|
|
|
|
Adding a VTP Client Switch to a VTP Domain |
18-10 |
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|||||
|
OL-25866-01 |
|
|
xxi |
|
|
|
|
|
Contents
How to Configure VTP 18-11
Configuring VTP Domain and Parameters
Configuring a VTP Version 3 Password
Enabling the VTP Version
Enabling VTP Pruning 18-13
|
|
|
|
Configuring VTP on a Per-Port Basis |
|
18-13 |
|
|
|
|||||
|
|
|
|
Adding a VTP Client Switch to a VTP Domain 18-13 |
|
|
||||||||
|
|
|
|
Monitoring and Maintaining VTP |
18-14 |
|
|
|
|
|
||||
|
|
|
|
Configuration Examples for Configuring VTP |
18-14 |
|
|
|
||||||
|
|
|
|
Configuring a VTP Server: Example |
18-14 |
|
|
|
||||||
|
|
|
|
Configuring a Hidden VTP Password: Example |
18-15 |
|
|
|||||||
|
|
|
|
Configuring a VTP Version 3 Primary Server: Example |
18-15 |
|
||||||||
|
|
|
|
Additional References for Configuring VTP |
18-15 |
|
|
|
||||||
|
|
|
|
Related Documents |
18-15 |
|
|
|
|
|
|
|
||
|
|
|
|
Standards |
18-15 |
|
|
|
|
|
|
|
|
|
|
|
|
|
MIBs |
18-16 |
|
|
|
|
|
|
|
|
|
|
|
|
|
RFCs |
18-16 |
|
|
|
|
|
|
|
|
|
|
Configuring Voice VLAN |
|
|
|
|
|
|
|
|
|||||
C H A P T E R 19 |
19-1 |
|
|
|
|
|
|
|
||||||
|
|
|
|
Finding Feature Information 19-1 |
|
|
|
|
|
|
|
|||
|
|
|
|
Information About Configuring Voice VLAN |
|
19-1 |
|
|
|
|||||
|
|
|
|
Voice VLAN |
19-1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Cisco IP Phone Voice Traffic |
19-2 |
|
|
|
|
|
|
|||
|
|
|
|
Cisco IP Phone Data Traffic |
19-3 |
|
|
|
|
|
|
|||
|
|
|
|
Default Voice VLAN Configuration |
19-3 |
|
|
|
|
|||||
|
|
|
|
Voice VLAN Configuration Guidelines |
19-3 |
|
|
|
||||||
|
|
|
|
Port Connection to a Cisco 7960 IP Phone |
19-4 |
|
|
|
||||||
|
|
|
|
Priority of Incoming Data Frames |
19-4 |
|
|
|
|
|||||
|
|
|
|
How to Configure VTP |
19-5 |
|
|
|
|
|
|
|
||
|
|
|
|
Configuring Cisco IP Phone for Voice Traffic |
19-5 |
|
|
|||||||
|
|
|
|
Configuring the Priority of Incoming Data Frames |
19-5 |
|
||||||||
|
|
|
|
Monitoring and Maintaining Voice VLAN |
19-6 |
|
|
|
||||||
|
|
|
|
Configuration Examples for Configuring Voice VLAN |
19-6 |
|
|
|||||||
|
|
|
|
Configuring a Cisco IP Phone for Voice Traffic: Example |
19-6 |
|
||||||||
|
|
|
|
Configuring the Cisco IP Phone Priority of Incoming Data Frames: Example 19-6 |
||||||||||
|
|
|
|
Additional References for Configuring Voice VLAN |
19-6 |
|
|
|||||||
|
|
|
|
Related Documents |
19-6 |
|
|
|
|
|
|
|
||
|
|
|
|
Standards |
19-7 |
|
|
|
|
|
|
|
|
|
|
|
|
|
MIBs |
19-7 |
|
|
|
|
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|||||
|
xxii |
|
|
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
RFCs |
19-7 |
|
|
|
|
|
|
|
|
|
|
|
|
Configuring STP |
|
|
|
|
|
|
|
|
|
|
|
||
C H A P T E R 20 |
20-1 |
|
|
|
|
|
|
|
|
|
|
|||
|
|
Finding Feature Information |
20-1 |
|
|
|
|
|
|
|
|
|||
|
|
Prerequisites for Configuring STP |
20-1 |
|
|
|
|
|
|
|||||
|
|
Restrictions for Configuring STP |
20-1 |
|
|
|
|
|
|
|||||
|
|
Information About Configuring STP |
|
20-1 |
|
|
|
|
|
|
||||
|
|
STP |
20-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Spanning-Tree Topology and BPDUs |
20-2 |
|
|
|
|
|
||||||
|
|
Bridge ID, Switch Priority, and Extended System ID 20-3 |
|
|
|
|
||||||||
|
|
Spanning-Tree Interface States |
20-4 |
|
|
|
|
|
||||||
|
|
Blocking State |
20-5 |
|
|
|
|
|
|
|
|
|||
|
|
Listening State |
20-6 |
|
|
|
|
|
|
|
|
|||
|
|
Learning State |
20-6 |
|
|
|
|
|
|
|
|
|||
|
|
Forwarding State |
20-6 |
|
|
|
|
|
|
|
|
|||
|
|
Disabled State |
20-6 |
|
|
|
|
|
|
|
|
|||
|
|
How a Switch or Port Becomes the Root Switch or Root Port |
20-7 |
|
|
|
||||||||
|
|
Spanning Tree and Redundant Connectivity |
20-7 |
|
|
|
|
|||||||
|
|
Spanning-Tree Address Management |
20-8 |
|
|
|
|
|||||||
|
|
Accelerated Aging to Retain Connectivity |
20-8 |
|
|
|
|
|||||||
|
|
Spanning-Tree Modes and Protocols |
20-9 |
|
|
|
|
|||||||
|
|
Supported Spanning-Tree Instances |
20-9 |
|
|
|
|
|
||||||
|
|
Spanning-Tree Interoperability and Backward Compatibility |
20-10 |
|
|
|
||||||||
|
|
STP and IEEE 802.1Q Trunks |
20-10 |
|
|
|
|
|
|
|||||
|
|
VLAN-Bridge Spanning Tree |
20-10 |
|
|
|
|
|
|
|||||
|
|
Default Spanning-Tree Settings |
20-11 |
|
|
|
|
|
||||||
|
|
Disabling Spanning Tree |
20-11 |
|
|
|
|
|
|
|
||||
|
|
Root Switch |
20-11 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Secondary Root Switch |
20-12 |
|
|
|
|
|
|
|
||||
|
|
Port Priority |
20-12 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Path Cost |
20-13 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Spanning-Tree Timers |
20-13 |
|
|
|
|
|
|
|
|
|||
|
|
Spanning-Tree Configuration Guidelines |
20-13 |
|
|
|
|
|||||||
|
|
How to Configure STP |
20-14 |
|
|
|
|
|
|
|
|
|||
|
|
Changing the Spanning-Tree Mode |
20-14 |
|
|
|
|
|
||||||
|
|
Configuring the Root Switch |
20-15 |
|
|
|
|
|
|
|||||
|
|
Configuring a Secondary Root Switch |
20-16 |
|
|
|
|
|||||||
|
|
Configuring Port Priority |
20-16 |
|
|
|
|
|
|
|
||||
|
|
Configuring Path Cost |
20-16 |
|
|
|
|
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
xxiii |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Configuring Optional STP Parameters 20-17 |
||
Monitoring and Maintaining STP 20-17 |
||
Additional References |
20-18 |
|
Related Documents |
20-18 |
|
Standards 20-18 |
|
|
MIBs |
20-18 |
|
RFCs |
20-18 |
|
C H A P T E R 21 |
Configuring MSTP |
21-1 |
|
|
|
|
|
|
Finding Feature Information |
21-1 |
|
|
|
||
|
Information About Configuring MSTP |
21-1 |
|
||||
|
MSTP |
21-2 |
|
|
|
|
|
|
Multiple Spanning-Tree Regions |
21-2 |
|
||||
|
IST, CIST, and CST 21-2 |
|
|
|
|
||
|
Operations Within an MST Region |
21-3 |
|||||
|
Operations Between MST Regions |
21-3 |
|||||
|
IEEE 802.1s Terminology |
21-4 |
|
||||
|
Hop Count |
21-5 |
|
|
|
|
|
|
Boundary Ports 21-5 |
|
|
|
|
||
|
IEEE 802.1s Implementation |
21-6 |
|
||||
|
Port Role Naming Change |
|
21-6 |
|
|||
|
Interoperation Between Legacy and Standard Switches 21-6 |
||||||
|
Detecting Unidirectional Link Failure |
21-7 |
|||||
|
Interoperability with IEEE 802.1D STP 21-8 |
||||||
|
RSTP |
21-8 |
|
|
|
|
|
|
Port Roles and the Active Topology |
21-8 |
|||||
|
Rapid Convergence |
21-9 |
|
|
|
||
|
Synchronization of Port Roles 21-10 |
|
|||||
|
Bridge Protocol Data Unit Format and Processing 21-11 |
||||||
|
Processing Superior BPDU Information 21-12 |
||||||
|
Processing Inferior BPDU Information |
21-12 |
|||||
|
Topology Changes |
21-12 |
|
|
|
||
|
Default MSTP Settings |
21-13 |
|
|
|
||
|
MSTP Configuration Guidelines |
21-13 |
|
||||
|
Root Switch |
21-14 |
|
|
|
|
|
|
Secondary Root Switch |
21-15 |
|
|
|||
|
Port Priority |
21-15 |
|
|
|
|
|
|
Path Cost |
21-15 |
|
|
|
|
|
|
|
Link Type to Ensure Rapid Transitions |
21-15 |
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
xxiv |
|
|
OL-25866-01 |
|
|
|
|
|
Contents
|
Neighbor Type |
21-15 |
|
|
|
|
|||
|
Restarting the Protocol Migration Process |
21-16 |
|
|
|||||
|
How to Configure MSTP |
21-16 |
|
|
|
|
|||
|
Specifying the MST Region Configuration and Enabling MSTP |
21-16 |
|||||||
|
Configuring the Root Switch |
21-17 |
|
|
|
||||
|
Configuring the Optional MSTP Parameters |
21-18 |
|
|
|||||
|
Monitoring and Maintaining MSTP |
21-20 |
|
|
|
||||
|
Configuration Examples for Configuring MSTP |
21-20 |
|
|
|||||
|
Configuring the MST Region: Example 21-20 |
|
|
||||||
|
Additional References |
21-21 |
|
|
|
|
|||
|
Related Documents |
21-21 |
|
|
|
|
|||
|
Standards |
21-21 |
|
|
|
|
|
||
|
MIBs |
21-21 |
|
|
|
|
|
|
|
|
RFCs 21-21 |
|
|
|
|
|
|
|
|
|
Configuring Optional Spanning-Tree Features |
|
|
|
|||||
C H A P T E R 22 |
22-1 |
|
|
||||||
|
Finding Feature Information 22-1 |
|
|
|
|
||||
|
Prerequisites for the Optional Spanning-Tree Features |
22-1 |
|
||||||
|
Restrictions for the Optional Spanning-Tree Features |
22-1 |
|
||||||
|
Information About Configuring the Optional Spanning-Tree Features |
22-1 |
|||||||
|
PortFast |
22-1 |
|
|
|
|
|
|
|
|
BPDU Guard |
|
22-2 |
|
|
|
|
|
|
|
BPDU Filtering |
22-3 |
|
|
|
|
|||
|
UplinkFast |
22-3 |
|
|
|
|
|
||
|
BackboneFast |
22-5 |
|
|
|
|
|
||
|
EtherChannel Guard |
22-7 |
|
|
|
|
|||
|
Root Guard |
22-7 |
|
|
|
|
|
||
|
Loop Guard |
22-8 |
|
|
|
|
|
||
|
Default Optional Spanning-Tree Settings |
22-9 |
|
|
How to Configure the Optional Spanning-Tree Features 22-9
Enabling Optional SPT Features 22-9
Maintaining and Monitoring Optional Spanning-Tree Features 22-10
|
Additional References |
22-11 |
|
|
|
|
|
Related Documents |
22-11 |
|
|
|
|
|
Standards 22-11 |
|
|
|
|
|
|
MIBs |
22-11 |
|
|
|
|
|
RFCs |
22-12 |
|
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|||
|
OL-25866-01 |
|
|
|
xxv |
|
|
|
|
|
|
Contents
C H A P T E R 23 |
Configuring Resilient Ethernet Protocol |
23-1 |
|
|
||||||||||
|
|
|
|
Finding Feature Information |
23-1 |
|
|
|
|
|
||||
|
|
|
|
Prerequisites for REP |
23-1 |
|
|
|
|
|
|
|
||
|
|
|
|
Restrictions for REP |
23-1 |
|
|
|
|
|
|
|
||
|
|
|
|
Information About Configuring REP |
23-1 |
|
|
|
||||||
|
|
|
|
REP |
23-1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Link Integrity 23-4 |
|
|
|
|
|
|
|
|||
|
|
|
|
Fast Convergence |
23-4 |
|
|
|
|
|
|
|
||
|
|
|
|
VLAN Load Balancing |
23-4 |
|
|
|
|
|
|
|||
|
|
|
|
Spanning Tree Interaction |
23-6 |
|
|
|
|
|||||
|
|
|
|
REP Ports |
23-6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
REP Segments |
23-7 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default REP Configuration |
23-7 |
|
|
|
|
|||||
|
|
|
|
REP Configuration Guidelines |
23-7 |
|
|
|
||||||
|
|
|
|
REP Administrative VLAN |
23-8 |
|
|
|
|
|||||
|
|
|
|
How to Configure REP |
23-9 |
|
|
|
|
|
|
|
||
|
|
|
|
Configuring the REP Administrative VLAN |
23-9 |
|
||||||||
|
|
|
|
Configuring REP Interfaces |
23-9 |
|
|
|
|
|||||
|
|
|
|
Setting Manual Preemption for VLAN Load Balancing 23-12 |
||||||||||
|
|
|
|
Configuring SNMP Traps for REP |
23-12 |
|
|
|||||||
|
|
|
|
Monitoring and Maintaining REP |
|
23-12 |
|
|
|
|||||
|
|
|
|
Configuration Examples for Configuring REP |
23-13 |
|
||||||||
|
|
|
|
Configuring the Administrative VLAN: Example 23-13 |
||||||||||
|
|
|
|
Configuring a Primary Edge Port: Examples |
23-13 |
|
||||||||
|
|
|
|
Configuring VLAN Blocking: Example |
23-14 |
|
||||||||
|
|
|
|
Additional References |
23-14 |
|
|
|
|
|
|
|||
|
|
|
|
Related Documents 23-14 |
|
|
|
|
|
|
||||
|
|
|
|
Standards |
23-14 |
|
|
|
|
|
|
|
|
|
|
|
|
|
MIBs |
23-15 |
|
|
|
|
|
|
|
|
|
|
|
|
|
RFCs |
23-15 |
|
|
|
|
|
|
|
|
|
|
Configuring FlexLinks and the MAC Address-Table Move Update 24-1 |
|||||||||||||
C H A P T E R 24 |
||||||||||||||
|
|
|
|
Finding Feature Information |
24-1 |
|
|
|
|
|
||||
|
|
|
|
Restrictions for the FlexLinks and the MAC Address-Table Move Update 24-1 |
||||||||||
|
|
|
|
Information About Configuring the FlexLinks and the MAC Address-Table Move Update 24-1 |
||||||||||
|
|
|
|
FlexLinks |
24-1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
VLAN FlexLinks Load Balancing and Support |
24-2 |
|
||||||||
|
|
|
|
FlexLinks Multicast Fast Convergence |
24-3 |
|
|
|||||||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|||||
|
xxvi |
|
|
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Learning the Other FlexLinks Port as the mrouter Port
Generating IGMP Reports
Leaking IGMP Reports 24-4
MAC Address-Table Move Update 24-4
Default Settings for FlexLinks and MAC Address-Table Move Update 24-5
Configuration Guidelines for FlexLinks and MAC Address-Table Move Update 24-6
How to Configure the FlexLinks and MAC Address-Table Move Update
Configuring FlexLinks 24-6
Configuring a Preemption Scheme for FlexLinks
Configuring VLAN Load Balancing on FlexLinks 24-7
Configuring the MAC Address-Table Move Update Feature |
24-8 |
|
||
Configuring the MAC Address-Table Move Update Messages 24-8 |
|
|||
Maintaining and Monitoring the FlexLinks and MAC Address-Table Move Update |
24-9 |
|||
Configuration Examples for the FlexLinks and MAC Address-Table Move Update |
24-9 |
|||
Configuring FlexLinks Port: Examples 24-9 |
|
|
||
Configuring a Backup Interface: Example 24-11 |
|
|
||
Configuring a Preemption Scheme: Example 24-11 |
|
|
||
Configuring VLAN Load Balancing on FlexLinks: Examples |
24-12 |
|
||
Configuring MAC Address-Table Move Update: Example |
24-13 |
|
||
Additional References |
24-13 |
|
|
|
Related Documents |
24-13 |
|
|
|
Standards 24-13 |
|
|
|
|
MIBs |
24-14 |
|
|
|
RFCs |
24-14 |
|
|
|
C H A P T E R 25 |
Configuring DHCP |
25-1 |
|
|
|
|
|
|
|
|
|
Finding Feature Information |
25-1 |
|
|
|
|
||
|
|
Information About Configuring DHCP |
25-1 |
|
|
|
|||
|
|
DHCP Snooping |
25-1 |
|
|
|
|
|
|
|
|
DHCP Server |
25-1 |
|
|
|
|
|
|
|
|
DHCP Relay Agent |
25-2 |
|
|
|
|
|
|
|
|
DHCP Snooping |
25-2 |
|
|
|
|
|
|
|
|
Option-82 Data Insertion |
25-3 |
|
|
|
|
||
|
|
Cisco IOS DHCP Server Database |
25-6 |
|
|
|
|||
|
|
DHCP Snooping Binding Database |
25-6 |
|
|
|
|||
|
|
Default DHCP Snooping Settings |
25-7 |
|
|
|
|||
|
|
DHCP Snooping Configuration Guidelines 25-8 |
|||||||
|
|
DHCP Snooping Binding Database Guidelines 25-9 |
|||||||
|
|
Packet Forwarding Address 25-9 |
|
|
|
|
|||
|
|
|
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|||
|
OL-25866-01 |
|
|
|
|
|
|
xxvii |
|
|
|
|
|
|
|
|
|
Contents
DHCP Server Port-Based Address Allocation |
25-9 |
|
|
How to Configure DHCP 25-10 |
|
|
|
Configuring the DHCP Relay Agent |
25-10 |
|
|
Specifying the Packet Forwarding Address |
25-10 |
|
|
Enabling DHCP Snooping and Option 82 25-11 |
|
||
Enabling the DHCP Snooping Binding Database Agent |
25-12 |
||
Enabling DHCP Server Port-Based Address Allocation |
25-13 |
||
Preassigning an IP Address 25-13 |
|
|
|
Monitoring and Maintaining DHCP 25-14 |
||
Configuration Examples for Configuring DHCP 25-15 |
||
Enabling DHCP Server Port-Based Address Allocation: Examples 25-15 |
||
Enabling DHCP Snooping: Example 25-15 |
||
Additional References |
25-16 |
|
Related Documents |
25-16 |
|
Standards 25-16 |
|
|
MIBs |
25-16 |
|
RFCs |
25-16 |
|
C H A P T E R 26 |
Configuring Dynamic ARP Inspection 26-1 |
|
|
Finding Feature Information 26-1 |
|
|
Prerequisites for Dynamic ARP Inspection |
26-1 |
|
Restrictions for Dynamic ARP Inspection |
26-1 |
|
Information About Dynamic ARP Inspection |
26-1 |
|
|
|
Dynamic ARP Inspection 26-1 |
|
|
|
|
|
|
|
|
Interface Trust States and Network Security |
26-3 |
|
|
|
|
|
|
|
Rate Limiting of ARP Packets |
26-4 |
|
|
|
|
|
|
|
Relative Priority of ARP ACLs and DHCP Snooping Entries |
26-4 |
|
|||
|
|
|
Logging of Dropped Packets |
26-4 |
|
|
|
|
|
|
|
Default Dynamic ARP Inspection Settings |
26-5 |
|
|
|
|
|
|
|
Dynamic ARP Inspection Configuration Guidelines |
26-5 |
|
|
||
|
|
|
How to Configure Dynamic ARP Inspection 26-6 |
|
|
|
||
|
|
|
Configuring Dynamic ARP Inspection in DHCP Environments |
26-6 |
|
|||
|
|
|
Configuring ARP ACLs for Non-DHCP Environments |
26-7 |
|
|
||
|
|
|
Limiting the Rate of Incoming ARP Packets |
26-9 |
|
|
|
|
|
|
|
Performing Validation Checks |
26-10 |
|
|
|
|
|
|
|
Configuring the Log Buffer |
26-11 |
|
|
|
|
|
|
|
Monitoring and Maintaining Dynamic ARP Inspection |
26-12 |
|
|
||
|
|
|
Configuration Examples for Dynamic ARP Inspection 26-12 |
|
|
|||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xxviii |
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
Contents
Configuring Dynamic ARP Inspection in DHCP Environments: Example 26-12
Configuring ARP ACLs for Non-DHCP Environments: Example
Additional References
Related Documents
Standards
MIBs
RFCs 26-13
Technical Assistance
C H A P T E R 27 |
Configuring IP Source Guard |
27-1 |
|
|
Finding Feature Information |
27-1 |
|
|
Prerequisites for IP Source Guard |
27-1 |
|
|
Restrictions for IP Source Guard |
27-1 |
|
|
Information About IP Source Guard |
27-1 |
IP Source Guard 27-1 |
|
|
|
Source IP Address Filtering |
27-2 |
|
|
Source IP and MAC Address Filtering 27-2 |
|||
IP Source Guard for Static Hosts |
27-2 |
|
|
IP Source Guard Configuration Guidelines |
27-3 |
||
How to Configure IP Source Guard |
27-4 |
|
|
Enabling IP Source Guard |
27-4 |
|
|
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port 27-4 |
|||
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port 27-5 |
|||
Monitoring and Maintaining IP Source Guard |
27-7 |
||
Configuration Examples for IP Source Guard |
27-7 |
|
Enabling IPSG with Source IP and MAC Filtering: Example 27-7 |
|||
|
Disabling IPSG with Static Hosts: Example |
27-7 |
||
|
Enabling IPSG for Static Hosts: Examples |
27-7 |
||
|
Displaying IP or MAC Binding Entries: Examples 27-8 |
|||
|
Enabling IPSG for Static Hosts: Examples |
27-9 |
||
|
Additional References |
27-10 |
|
|
|
Related Documents |
27-10 |
|
|
|
Standards 27-11 |
|
|
|
|
MIBs |
27-11 |
|
|
|
RFCs |
27-11 |
|
|
|
Configuring IGMP Snooping and MVR 28-1 |
|
||
C H A P T E R 28 |
|
|||
|
Finding Feature Information 28-1 |
|
|
|
|
|
|
OL-25866-01 |
xxix |
|
|
Contents
|
|
|
Restrictions for IGMP Snooping and MVR |
28-1 |
|
|
|
||||||
|
|
|
Information About IGMP Snooping and MVR |
28-1 |
|
|
|||||||
|
|
|
IGMP Snooping 28-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
IGMP Versions |
28-2 |
|
|
|
|
|
|
|
|
|
|
|
|
Joining a Multicast Group |
|
28-3 |
|
|
|
|
|
|||
|
|
|
Leaving a Multicast Group |
28-5 |
|
|
|
|
|
||||
|
|
|
Immediate Leave |
28-5 |
|
|
|
|
|
|
|
||
|
|
|
IGMP Configurable-Leave Timer |
28-5 |
|
|
|
||||||
|
|
|
IGMP Report Suppression |
|
28-6 |
|
|
|
|
|
|||
|
|
|
Default IGMP Snooping Configuration |
28-6 |
|
|
|||||||
|
|
|
Snooping Methods |
|
28-6 |
|
|
|
|
|
|
|
|
|
|
|
Multicast Flooding Time After a TCN Event |
28-7 |
|
||||||||
|
|
|
Flood Mode for TCN |
28-7 |
|
|
|
|
|
|
|||
|
|
|
Multicast Flooding During a TCN Event |
28-7 |
|
||||||||
|
|
|
IGMP Snooping Querier Guidelines |
|
28-7 |
|
|
||||||
|
|
|
IGMP Report Suppression |
|
28-8 |
|
|
|
|
|
|||
|
|
|
Multicast VLAN Registration |
28-8 |
|
|
|
|
|
||||
|
|
|
MVR in a Multicast Television Application |
28-9 |
|
||||||||
|
|
|
Default MVR Settings |
28-11 |
|
|
|
|
|
||||
|
|
|
MVR Configuration Guidelines and Limitations 28-11 |
||||||||||
|
|
|
IGMP Filtering and Throttling |
28-12 |
|
|
|
|
|
||||
|
|
|
Default IGMP Filtering and Throttling Configuration 28-12 |
||||||||||
|
|
|
IGMP Profiles |
28-13 |
|
|
|
|
|
|
|
|
|
|
|
|
IGMP Throttling Action |
28-13 |
|
|
|
|
|
||||
|
|
|
How to Configure IGMP Snooping and MVR |
|
28-14 |
|
|
||||||
|
|
|
Configuring IGMP Snooping |
28-14 |
|
|
|
|
|
||||
|
|
|
Enabling or Disabling IGMP Snooping |
28-14 |
|
|
|||||||
|
|
|
Setting IGMP Snooping Parameters |
28-14 |
|
|
|||||||
|
|
|
Configuring TCN |
28-15 |
|
|
|
|
|
|
|
||
|
|
|
Configuring the IGMP Snooping Querier |
28-16 |
|
||||||||
|
|
|
Disabling IGMP Report Suppression |
28-16 |
|
|
|||||||
|
|
|
Configuring MVR |
28-16 |
|
|
|
|
|
|
|
|
|
|
|
|
Configuring MVR Global Parameters |
28-16 |
|
|
|||||||
|
|
|
Configuring MVR Interfaces |
28-17 |
|
|
|
|
|||||
|
|
|
Configuring IGMP |
28-18 |
|
|
|
|
|
|
|
|
|
|
|
|
Configuring IGMP Profiles |
|
28-18 |
|
|
|
|
|
|||
|
|
|
Configuring IGMP Interfaces |
28-18 |
|
|
|
|
|||||
|
|
|
Monitoring and Maintaining IGMP Snooping and MVR |
28-19 |
|
||||||||
|
|
|
Configuration Examples for IGMP Snooping |
|
28-21 |
|
|
||||||
|
|
|
Cisco IE 2000 Switch Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
xxx |
|
|
|
|
|
|
|
|
|
|
OL-25866-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|