Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-23145-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Understanding DHCP-based Autoconfiguration and Image Update3-5
DHCP Autoconfiguration3-5
DHCP Auto-Image Update3-5
Limitations and Restrictions3-6
Configuring DHCP-Based Autoconfiguration3-6
DHCP Server Configuration Guidelines3-6
Configuring the TFTP Server3-7
Configuring the DNS3-8
Configuring the Relay Device3-8
Obtaining Configuration Files3-9
Example Configuration3-9
Configuring the DHCP Auto Configuration and Image Update Features3-11
Configuring DHCP Autoconfiguration (Only Configuration File)3-11
Configuring DHCP Auto-Image Update (Configuration File and Image)3-12
Configuring the Client3-13
Manually Assigning IP Information3-14
iv
Checking and Saving the Running Configuration3-15
Modifying the Startup Configuration3-16
Default Boot Configuration3-17
Automatically Downloading a Configuration File3-17
Specifying the Filename to Read and Write the System Configuration3-17
Booting Manually3-18
Booting a Specific Software Image3-19
Controlling Environment Variables3-19
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Scheduling a Reload of the Software Image3-21
Configuring a Scheduled Reload3-21
Displaying Scheduled Reload Information3-22
Enabling Automated CNS Configuration4-6
Enabling the CNS Event Agent4-7
Enabling the Cisco IOS CNS Agent4-9
Enabling an Initial Configuration4-9
Enabling a Partial Configuration4-12
CHAPTER
OL-23145-01
Displaying CNS Configuration4-13
5Clustering Switches5-1
Understanding Switch Clusters5-1
Cluster Command Switch Characteristics5-3
Standby Cluster Command Switch Characteristics5-3
Candidate Switch and Cluster Member Switch Characteristics5-3
Planning a Switch Cluster5-4
Automatic Discovery of Cluster Candidates and Members5-4
Discovery Through CDP Hops5-5
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices5-6
Discovery Through Different VLANs5-6
Discovery Through Different Management VLANs5-7
Discovery of Newly Installed Switches5-8
Virtual IP Addresses5-9
Cisco IE 3010 Switch Software Configuration Guide
v
Contents
Other Considerations for Cluster Standby Groups5-9
Automatic Recovery of Cluster Configuration5-10
IP Addresses5-11
Hostnames5-11
Passwords5-12
SNMP Community Strings5-12
TACACS+ and RADIUS5-12
LRE Profiles5-13
Using the CLI to Manage Switch Clusters5-13
Using SNMP to Manage Switch Clusters5-14
CHAPTER
6Administering the Switch6-1
Managing the System Time and Date6-1
Understanding the System Clock 6-1
Understanding Network Time Protocol6-2
Configuring NTP6-4
Default NTP Configuration6-4
Configuring NTP Authentication6-5
Configuring NTP Associations6-6
Configuring NTP Broadcast Service6-7
Configuring NTP Access Restrictions6-8
Configuring the Source IP Address for NTP Packets6-10
Displaying the NTP Configuration6-11
Configuring Time and Date Manually6-11
Setting the System Clock6-11
Displaying the Time and Date Configuration6-12
Configuring the Time Zone 6-12
Configuring Summer Time (Daylight Saving Time)6-13
Configuring a System Name and Prompt6-14
Default System Name and Prompt Configuration6-15
Configuring a System Name6-15
Understanding DNS6-15
Default DNS Configuration6-16
Setting Up DNS6-16
Displaying the DNS Configuration6-17
vi
Creating a Banner6-17
Default Banner Configuration6-17
Configuring a Message-of-the-Day Login Banner6-18
Configuring a Login Banner6-19
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Managing the MAC Address Table6-19
Building the Address Table6-20
MAC Addresses and VLANs6-20
Default MAC Address Table Configuration6-21
Changing the Address Aging Time6-21
Removing Dynamic Address Entries6-22
Configuring MAC Address Change Notification Traps6-22
Configuring MAC Address Move Notification Traps6-24
Configuring MAC Threshold Notification Traps6-25
Adding and Removing Static Address Entries6-26
Configuring Unicast MAC Address Filtering6-27
Disabling MAC Address Learning on a VLAN6-28
Displaying Address Table Entries6-30
Managing the ARP Table6-30
Contents
CHAPTER
7Configuring the Switch Alarms7-1
Understanding IE 3010 Switch Alarms7-1
Global Status Monitoring Alarms7-2
FCS Error Hysteresis Threshold7-2
Port Status Monitoring Alarms7-2
Triggering Alarm Options7-3
Configuring IE 3010 External Alarms7-4
Configuring IE 3010 Switch Alarms7-6
Default Switch Alarm Configuration7-6
Configuring the Power Supply Alarms7-6
Configuring the Switch Temperature Alarms7-7
Setting the Primary Temperature Threshold for the Switch7-7
Setting a Secondary Temperature Threshold for the Switch7-8
Associating the Temperature Alarms to a Relay7-9
Configuring the FCS Bit Error Rate Alarm7-10
Setting the FCS Error Threshold7-10
Setting the FCS Error Hysteresis Threshold7-10
Configuring Alarm Profiles7-11
Creating or Modifying an Alarm Profile7-11
Attaching an Alarm Profile to a Specific Port7-12
Enabling SNMP Traps7-13
OL-23145-01
Displaying IE 3010 Switch Alarms Status7-13
Cisco IE 3010 Switch Software Configuration Guide
vii
Contents
CHAPTER
CHAPTER
8Configuring SDM Templates8-1
Understanding the SDM Templates8-1
Configuring the Switch SDM Template8-2
SDM Template Configuration Guidelines8-2
Setting the SDM Template8-3
Displaying the SDM Templates8-4
9Configuring Switch-Based Authentication9-1
Preventing Unauthorized Access to Your Switch9-1
Protecting Access to Privileged EXEC Commands9-2
Default Password and Privilege Level Configuration9-3
Setting or Changing a Static Enable Password9-3
Protecting Enable and Enable Secret Passwords with Encryption9-4
Disabling Password Recovery9-5
Setting a Telnet Password for a Terminal Line9-6
Configuring Username and Password Pairs9-7
Configuring Multiple Privilege Levels9-8
Identifying the TACACS+ Server Host and Setting the Authentication Key9-13
Configuring TACACS+ Login Authentication9-14
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services9-16
Starting TACACS+ Accounting9-17
Establishing a Session with a Router if the AAA Server is Unreachable9-18
Displaying the TACACS+ Configuration9-18
Controlling Switch Access with RADIUS9-18
Understanding RADIUS9-18
RADIUS Operation9-20
RADIUS Change of Authorization9-20
Overview9-21
Change-of-Authorization Requests9-21
CoA Request Response Code9-22
CoA Request Commands9-24
viii
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Configuring RADIUS9-27
Default RADIUS Configuration9-27
Identifying the RADIUS Server Host 9-28
Configuring RADIUS Login Authentication9-30
Defining AAA Server Groups9-32
Configuring RADIUS Authorization for User Privileged Access and Network Services9-34
Starting RADIUS Accounting9-35
Establishing a Session with a Router if the AAA Server is Unreachable9-36
Configuring Settings for All RADIUS Servers9-36
Configuring the Switch to Use Vendor-Specific RADIUS Attributes9-36
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication9-38
Configuring CoA on the Switch9-39
Monitoring and Troubleshooting CoA Functionality9-40
Configuring RADIUS Server Load Balancing9-40
Displaying the RADIUS Configuration9-40
Contents
Controlling Switch Access with Kerberos9-40
Understanding Kerberos9-41
Kerberos Operation9-43
Authenticating to a Boundary Switch9-43
Obtaining a TGT from a KDC9-43
Authenticating to Network Services9-44
Configuring Kerberos9-44
Configuring the Switch for Local Authentication and Authorization9-44
Configuring the Switch for Secure Shell9-45
Understanding SSH9-46
SSH Servers, Integrated Clients, and Supported Versions9-46
Limitations9-46
Configuring SSH9-47
Configuration Guidelines9-47
Setting Up the Switch to Run SSH9-47
Configuring the SSH Server9-48
Displaying the SSH Configuration and Status9-49
Configuring the Switch for Secure Socket Layer HTTP9-50
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass10-36
MAC Authentication Bypass10-37
Maximum Number of Allowed Devices Per Port10-37
Configuring 802.1x Readiness Check10-37
Configuring Voice Aware 802.1x Security10-38
Configuring 802.1x Violation Modes10-39
Configuring 802.1x Authentication10-40
Configuring the Switch-to-RADIUS-Server Communication10-42
Configuring the Host Mode10-43
Configuring Periodic Re-Authentication10-44
Manually Re-Authenticating a Client Connected to a Port10-45
Changing the Quiet Period10-46
Changing the Switch-to-Client Retransmission Time10-46
Setting the Switch-to-Client Frame-Retransmission Number10-47
Setting the Re-Authentication Number10-48
Enabling MAC Move10-48
Enabling MAC Replace10-49
Configuring 802.1x Accounting10-50
Configuring a Guest VLAN10-51
Configuring a Restricted VLAN10-52
Configuring the Inaccessible Authentication Bypass Feature10-54
Configuring 802.1x Authentication with WoL10-56
Configuring MAC Authentication Bypass10-57
Contents
OL-23145-01
Cisco IE 3010 Switch Software Configuration Guide
xi
Contents
Configuring 802.1x User Distribution10-58
Configuring NAC Layer 2 802.1x Validation10-59
Configuring an Authenticator and a Supplicant Switch with NEAT10-60
Configuring NEAT with Auto Smartports Macros10-61
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs10-61
Configuring Downloadable ACLs10-62
Configuring a Downloadable Policy10-62
Configuring VLAN ID-based MAC Authentication10-64
Configuring Flexible Authentication Ordering10-64
Configuring Open1x10-65
Disabling 802.1x Authentication on the Port10-65
Resetting the 802.1x Authentication Configuration to the Default Values10-66
Displaying 802.1x Statistics and Status10-67
CHAPTER
11Configuring Web-Based Authentication11-1
Understanding Web-Based Authentication11-1
Device Roles11-2
Host Detection11-2
Session Creation11-2
Authentication Process11-3
Local Web Authentication Banner11-3
Web Authentication Customizable Web Pages11-5
Guidelines11-5
Web-based Authentication Interactions with Other Features11-7
Port Security11-7
LAN Port IP11-7
Gateway IP11-7
ACLs11-7
Context-Based Access Control11-8
802.1x Authentication11-8
EtherChannel11-8
Configuring Web-Based Authentication11-9
Default Web-Based Authentication Configuration11-9
Web-Based Authentication Configuration Guidelines and Restrictions11-9
Web-Based Authentication Configuration Task List11-10
Configuring the Authentication Rule and Interfaces11-10
Configuring AAA Authentication11-11
Configuring Switch-to-RADIUS-Server Communication 11-11
Configuring the HTTP Server11-13
xii
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Customizing the Authentication Proxy Web Pages11-13
Specifying a Redirection URL for Successful Login11-15
Configuring an AAA Fail Policy11-15
Configuring the Web-Based Authentication Parameters11-16
Configuring a Web Authentication Local Banner11-16
Removing Web-Based Authentication Cache Entries11-17
Displaying Web-Based Authentication Status11-17
Contents
CHAPTER
12Configuring Interface Characteristics12-1
Understanding Interface Types12-1
Port-Based VLANs12-2
Switch Ports12-2
Access Ports12-2
Trunk Ports12-3
EtherChannel Port Groups12-3
Dual-Purpose Uplink Ports12-4
Power over Ethernet Ports12-4
Supported Protocols and Standards12-4
Powered-Device Detection and Initial Power Allocation12-5
Power Management Modes12-6
Power Monitoring and Power Policing12-7
Connecting Interfaces12-9
Using Interface Configuration Mode12-9
Procedures for Configuring Interfaces12-10
Configuring a Range of Interfaces12-10
Configuring and Using Interface Range Macros12-12
OL-23145-01
Configuring Ethernet Interfaces12-14
Default Ethernet Interface Configuration12-14
Setting the Type of a Dual-Purpose Uplink Port12-15
Configuring Interface Speed and Duplex Mode12-16
Speed and Duplex Configuration Guidelines12-17
Setting the Interface Speed and Duplex Parameters12-17
Configuring IEEE 802.3x Flow Control12-18
Configuring Auto-MDIX on an Interface12-19
Configuring a Power Management Mode on a PoE Port12-20
Budgeting Power for Devices Connected to a PoE Port12-22
Adding a Description for an Interface12-23
Configuring Layer 3 Interfaces12-24
Configuring the System MTU12-24
Cisco IE 3010 Switch Software Configuration Guide
xiii
Contents
Monitoring and Maintaining the Interfaces12-26
Monitoring Interface Status12-26
Clearing and Resetting Interfaces and Counters12-27
Shutting Down and Restarting the Interface12-27
Supported VLANs14-2
VLAN Port Membership Modes14-3
Configuring Normal-Range VLANs14-4
Token Ring VLANs14-5
Normal-Range VLAN Configuration Guidelines14-5
Configuring Normal-Range VLANs14-6
Default Ethernet VLAN Configuration14-6
Creating or Modifying an Ethernet VLAN14-7
Deleting a VLAN14-8
Assigning Static-Access Ports to a VLAN14-9
xiv
Configuring Extended-Range VLANs14-10
Default VLAN Configuration14-10
Extended-Range VLAN Configuration Guidelines14-10
Creating an Extended-Range VLAN14-11
Creating an Extended-Range VLAN with an Internal VLAN ID14-12
Displaying VLANs14-13
Configuring VLAN Trunks14-14
Trunking Overview14-14
IEEE 802.1Q Configuration Considerations14-15
Default Layer 2 Ethernet Interface VLAN Configuration14-16
Configuring an Ethernet Interface as a Trunk Port14-16
Interaction with Other Features14-16
Configuring a Trunk Port14-17
Defining the Allowed VLANs on a Trunk14-18
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Changing the Pruning-Eligible List14-19
Configuring the Native VLAN for Untagged Traffic14-19
Configuring Trunk Ports for Load Sharing14-20
Load Sharing Using STP Port Priorities14-20
Load Sharing Using STP Path Cost14-22
Configuring VMPS14-23
Understanding VMPS14-24
Dynamic-Access Port VLAN Membership14-24
Default VMPS Client Configuration14-25
VMPS Configuration Guidelines14-25
Configuring the VMPS Client14-26
Entering the IP Address of the VMPS14-26
Configuring Dynamic-Access Ports on VMPS Clients14-26
Reconfirming VLAN Memberships14-27
Changing the Reconfirmation Interval14-27
Changing the Retry Count14-28
Monitoring the VMPS14-28
Troubleshooting Dynamic-Access Port VLAN Membership14-29
VMPS Configuration Example14-29
Contents
CHAPTER
15Configuring VTP15-1
Understanding VTP15-1
The VTP Domain15-2
VTP Modes15-3
VTP Advertisements15-3
VTP Version 215-4
VTP Version 315-4
VTP Pruning15-5
Disabled State17-7
How a Switch or Port Becomes the Root Switch or Root Port17-7
Spanning Tree and Redundant Connectivity17-8
Spanning-Tree Address Management17-8
Accelerated Aging to Retain Connectivity17-8
Spanning-Tree Modes and Protocols17-9
Supported Spanning-Tree Instances17-9
Spanning-Tree Interoperability and Backward Compatibility17-10
STP and IEEE 802.1Q Trunks17-10
VLAN-Bridge Spanning Tree17-10
xvi
Configuring Spanning-Tree Features17-11
Default Spanning-Tree Configuration17-11
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Spanning-Tree Configuration Guidelines17-12
Changing the Spanning-Tree Mode.17-13
Disabling Spanning Tree17-14
Configuring the Root Switch17-14
Configuring a Secondary Root Switch17-16
Configuring Port Priority17-16
Configuring Path Cost17-18
Configuring the Switch Priority of a VLAN17-19
Configuring Spanning-Tree Timers17-20
Configuring the Hello Time17-20
Configuring the Forwarding-Delay Time for a VLAN17-21
Configuring the Maximum-Aging Time for a VLAN17-21
Configuring the Transmit Hold-Count 17-22
Displaying the Spanning-Tree Status17-22
Contents
CHAPTER
18Configuring MSTP18-1
Understanding MSTP18-2
Multiple Spanning-Tree Regions18-2
IST, CIST, and CST18-2
Operations Within an MST Region18-3
Operations Between MST Regions18-3
IEEE 802.1s Terminology18-5
Hop Count18-5
Boundary Ports18-6
IEEE 802.1s Implementation18-6
Port Role Naming Change18-6
Interoperation Between Legacy and Standard Switches18-7
Detecting Unidirectional Link Failure18-7
Interoperability with IEEE 802.1D STP18-8
Understanding RSTP18-8
Port Roles and the Active Topology18-9
Rapid Convergence18-9
Synchronization of Port Roles18-11
Bridge Protocol Data Unit Format and Processing18-12
MSTP Configuration Guidelines18-14
Specifying the MST Region Configuration and Enabling MSTP18-15
Configuring the Root Switch18-17
Configuring a Secondary Root Switch18-18
Configuring Port Priority 18-19
Configuring Path Cost18-20
Configuring the Switch Priority18-21
Configuring the Hello Time18-22
Configuring the Forwarding-Delay Time18-23
Configuring the Maximum-Aging Time18-23
Configuring the Maximum-Hop Count18-24
Specifying the Link Type to Ensure Rapid Transitions18-24
Designating the Neighbor Type18-25
Restarting the Protocol Migration Process18-25
Default Optional Spanning-Tree Configuration19-9
Optional Spanning-Tree Configuration Guidelines19-10
Enabling Port Fast19-10
Enabling BPDU Guard19-11
Enabling BPDU Filtering19-12
Enabling UplinkFast for Use with Redundant Links19-13
Enabling BackboneFast19-13
Enabling EtherChannel Guard19-14
Enabling Root Guard19-15
Enabling Loop Guard19-15
xviii
Displaying the Spanning-Tree Status19-16
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Contents
CHAPTER
20Configuring Flex Links and the MAC Address-Table Move Update Feature20-1
Understanding Flex Links and the MAC Address-Table Move Update20-1
Flex Links20-1
VLAN Flex Link Load Balancing and Support20-2
Flex Link Multicast Fast Convergence20-3
Learning the Other Flex Link Port as the mrouter Port20-3
Generating IGMP Reports20-3
Leaking IGMP Reports20-4
Configuration Examples20-4
MAC Address-Table Move Update20-6
Configuring Flex Links and the MAC Address-Table Move Update20-7
Default Configuration20-7
Configuration Guidelines20-8
Configuring Flex Links20-8
Configuring VLAN Load Balancing on Flex Links20-10
Configuring the MAC Address-Table Move Update Feature20-12
Monitoring Flex Links and the MAC Address-Table Move Update20-14
CHAPTER
21Configuring DHCP Features and IP Source Guard Features21-1
Understanding DHCP Snooping21-1
DHCP Server21-2
DHCP Relay Agent21-2
DHCP Snooping21-2
Option-82 Data Insertion21-4
Cisco IOS DHCP Server Database21-7
DHCP Snooping Binding Database21-7
Configuring DHCP Snooping21-8
Default DHCP Snooping Configuration21-9
DHCP Snooping Configuration Guidelines21-9
Configuring the DHCP Relay Agent 21-11
Specifying the Packet Forwarding Address21-11
Enabling DHCP Snooping and Option 8221-12
Enabling the Cisco IOS DHCP Server Database21-14
Enabling the DHCP Snooping Binding Database Agent21-14
Displaying DHCP Snooping Information21-15
Understanding IP Source Guard21-15
Source IP Address Filtering21-16
Source IP and MAC Address Filtering21-16
IP Source Guard for Static Hosts21-16
OL-23145-01
Cisco IE 3010 Switch Software Configuration Guide
xix
Contents
Configuring IP Source Guard21-17
Default IP Source Guard Configuration21-17
IP Source Guard Configuration Guidelines21-17
Enabling IP Source Guard21-18
Configuring IP Source Guard for Static Hosts21-19
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port21-19
Configuring IP Source Guard for Static Hosts on a Private VLAN Host Port21-24
Displaying IP Source Guard Information21-26
Understanding DHCP Server Port-Based Address Allocation21-26
Configuring DHCP Server Port-Based Address Allocation21-26
Displaying DHCP Server Port-Based Address Allocation21-29
CHAPTER
CHAPTER
22Configuring Dynamic ARP Inspection22-1
Understanding Dynamic ARP Inspection22-1
Interface Trust States and Network Security22-3
Rate Limiting of ARP Packets22-4
Relative Priority of ARP ACLs and DHCP Snooping Entries22-4
Logging of Dropped Packets22-4
Configuring Dynamic ARP Inspection22-5
Default Dynamic ARP Inspection Configuration22-5
Dynamic ARP Inspection Configuration Guidelines22-5
Configuring Dynamic ARP Inspection in DHCP Environments22-7
Configuring ARP ACLs for Non-DHCP Environments22-8
Limiting the Rate of Incoming ARP Packets22-10
Performing Validation Checks22-11
Configuring the Log Buffer22-12
IGMP Versions23-2
Joining a Multicast Group23-3
Leaving a Multicast Group23-5
Immediate Leave 23-5
IGMP Configurable-Leave Timer23-5
IGMP Report Suppression23-5
xx
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Configuring IGMP Snooping23-6
Default IGMP Snooping Configuration23-6
Enabling or Disabling IGMP Snooping23-7
Setting the Snooping Method23-8
Configuring a Multicast Router Port23-9
Configuring a Host Statically to Join a Group23-10
Enabling IGMP Immediate Leave23-10
Configuring the IGMP Leave Timer23-11
Configuring TCN-Related Commands23-12
Controlling the Multicast Flooding Time After a TCN Event23-12
Recovering from Flood Mode23-12
Disabling Multicast Flooding During a TCN Event23-13
Configuring the IGMP Snooping Querier23-14
Disabling IGMP Report Suppression23-15
Displaying IGMP Snooping Information23-15
Contents
CHAPTER
Understanding Multicast VLAN Registration23-17
Using MVR in a Multicast Television Application23-17
Configuring MVR23-19
Default MVR Configuration23-19
MVR Configuration Guidelines and Limitations23-19
Configuring MVR Global Parameters23-20
Configuring MVR Interfaces23-21
Displaying MVR Information23-23
Configuring IGMP Filtering and Throttling23-23
Default IGMP Filtering and Throttling Configuration23-24
Configuring IGMP Profiles23-24
Applying IGMP Profiles23-26
Setting the Maximum Number of IGMP Groups23-26
Configuring the IGMP Throttling Action23-27
Displaying IGMP Filtering and Throttling Configuration23-28
24Configuring Port-Based Traffic Control24-1
Configuring Storm Control24-1
Understanding Storm Control24-1
Default Storm Control Configuration24-3
Configuring Storm Control and Threshold Levels24-3
OL-23145-01
Configuring Protected Ports24-5
Default Protected Port Configuration24-5
Protected Port Configuration Guidelines24-5
Cisco IE 3010 Switch Software Configuration Guide
xxi
Contents
Configuring a Protected Port24-6
Configuring Port Blocking24-6
Default Port Blocking Configuration24-7
Blocking Flooded Traffic on an Interface24-7
Configuring Port Security24-7
Understanding Port Security24-8
Secure MAC Addresses24-8
Security Violations24-9
Default Port Security Configuration24-10
Port Security Configuration Guidelines24-10
Enabling and Configuring Port Security24-12
Enabling and Configuring Port Security Aging24-16
Port Security and Private VLANs24-17
Displaying Port-Based Traffic Control Settings24-18
CHAPTER
CHAPTER
25Configuring CDP25-1
Understanding CDP25-1
Configuring CDP25-2
Default CDP Configuration25-2
Configuring the CDP Characteristics25-3
Disabling and Enabling CDP25-3
Disabling and Enabling CDP on an Interface25-4
Monitoring and Maintaining CDP25-5
26Configuring LLDP, LLDP-MED, and Wired Location Service26-1
Understanding LLDP, LLDP-MED, and Wired Location Service26-1
LLDP-MED26-2
Wired Location Service26-3
Configuring LLDP, LLDP-MED, and Wired Location Service26-4
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service26-10
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Contents
CHAPTER
CHAPTER
27Configuring UDLD27-1
Understanding UDLD27-1
Modes of Operation27-1
Methods to Detect Unidirectional Links27-2
Configuring UDLD27-3
Default UDLD Configuration27-4
Configuration Guidelines27-4
Enabling UDLD Globally27-5
Enabling UDLD on an Interface27-5
Resetting an Interface Disabled by UDLD27-6
Displaying UDLD Status27-6
28Configuring SPAN and RSPAN28-1
Understanding SPAN and RSPAN28-1
Local SPAN28-2
Remote SPAN28-2
SPAN and RSPAN Concepts and Terminology28-3
SPAN and RSPAN Interaction with Other Features28-8
OL-23145-01
Configuring SPAN and RSPAN28-9
Default SPAN and RSPAN Configuration28-9
Configuring Local SPAN28-10
SPAN Configuration Guidelines28-10
Creating a Local SPAN Session28-11
Creating a Local SPAN Session and Configuring Incoming Traffic28-13
Specifying VLANs to Filter28-14
Configuring RSPAN28-15
RSPAN Configuration Guidelines28-15
Configuring a VLAN as an RSPAN VLAN28-16
Creating an RSPAN Source Session28-17
Creating an RSPAN Destination Session28-18
Creating an RSPAN Destination Session and Configuring Incoming Traffic28-19
Specifying VLANs to Filter28-21
Cisco IE 3010 Switch Software Configuration Guide
xxiii
Contents
Displaying SPAN and RSPAN Status28-22
CHAPTER
CHAPTER
29Configuring RMON29-1
Understanding RMON29-1
Configuring RMON29-2
Default RMON Configuration29-3
Configuring RMON Alarms and Events29-3
Collecting Group History Statistics on an Interface29-5
Collecting Group Ethernet Statistics on an Interface29-5
Displaying RMON Status29-6
30Configuring System Message Logging30-1
Understanding System Message Logging30-1
Configuring System Message Logging30-2
System Log Message Format30-2
Default System Message Logging Configuration30-3
Disabling Message Logging30-4
Setting the Message Display Destination Device30-5
Synchronizing Log Messages30-6
Enabling and Disabling Time Stamps on Log Messages30-7
Enabling and Disabling Sequence Numbers in Log Messages30-8
Defining the Message Severity Level30-8
Limiting Syslog Messages Sent to the History Table and to SNMP30-10
Enabling the Configuration-Change Logger30-10
Configuring UNIX Syslog Servers30-11
Logging Messages to a UNIX Syslog Daemon30-12
Configuring the UNIX System Logging Facility30-12
CHAPTER
xxiv
Displaying the Logging Configuration30-13
31Configuring SNMP31-1
Understanding SNMP31-1
SNMP Versions31-2
SNMP Manager Functions31-3
SNMP Agent Functions31-4
SNMP Community Strings31-4
Using SNMP to Access MIB Variables 31-4
SNMP Notifications31-5
SNMP ifIndex MIB Object Values31-5
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Configuring SNMP31-6
Default SNMP Configuration31-6
SNMP Configuration Guidelines31-6
Disabling the SNMP Agent31-7
Configuring Community Strings31-8
Configuring SNMP Groups and Users31-9
Configuring SNMP Notifications31-11
Setting the CPU Threshold Notification Types and Values31-15
Setting the Agent Contact and Location Information31-16
Limiting TFTP Servers Used Through SNMP31-16
SNMP Examples31-17
Displaying SNMP Status31-18
Contents
CHAPTER
32Configuring Network Security with ACLs32-1
Understanding ACLs32-1
Supported ACLs32-2
Handling Fragmented and Unfragmented Traffic32-3
Configuring IPv4 ACLs32-4
Creating Standard and Extended IPv4 ACLs32-5
Access List Numbers32-6
ACL Logging32-6
Creating a Numbered Standard ACL32-7
Creating a Numbered Extended ACL32-8
Resequencing ACEs in an ACL32-12
Creating Named Standard and Extended ACLs32-12
Using Time Ranges with ACLs32-14
Including Comments in ACLs32-16
Applying an IPv4 ACL to a Terminal Line32-17
Applying an IPv4 ACL to an Interface32-17
Hardware and Software Treatment of IP ACLs32-19
Troubleshooting ACLs32-19
IPv4 ACL Configuration Examples32-20
Numbered ACLs32-22
Extended ACLs32-22
Named ACLs32-22
Time Range Applied to an IP ACL32-23
Commented IP ACL Entries32-23
ACL Logging32-24
OL-23145-01
Creating Named MAC Extended ACLs32-25
Cisco IE 3010 Switch Software Configuration Guide
xxv
Contents
Applying a MAC ACL to a Layer 2 Interface32-26
Displaying IPv4 ACL Configuration32-28
CHAPTER
33Configuring QoS33-1
Understanding QoS33-1
Basic QoS Model33-3
Classification33-4
Classification Based on QoS ACLs33-7
Classification Based on Class Maps and Policy Maps33-7
Policing and Marking33-8
Policing on Physical Ports33-9
Policing on SVIs33-10
Mapping Tables33-12
Queueing and Scheduling Overview33-13
Weighted Tail Drop33-13
SRR Shaping and Sharing33-14
Queueing and Scheduling on Ingress Queues33-14
Queueing and Scheduling on Egress Queues33-16
Packet Modification33-18
Configuring Auto-QoS33-18
Generated Auto-QoS Configuration33-19
Effects of Auto-QoS on the Configuration33-24
Auto-QoS Configuration Guidelines33-24
Enabling Auto-QoS for VoIP33-25
Auto-QoS Configuration Example33-27
xxvi
Displaying Auto-QoS Information33-28
Configuring Standard QoS33-29
Default Standard QoS Configuration33-29
Default Ingress Queue Configuration33-30
Default Egress Queue Configuration33-30
Default Mapping Table Configuration33-31
Standard QoS Configuration Guidelines33-32
QoS ACL Guidelines33-32
Applying QoS on Interfaces33-32
Policing Guidelines33-33
General QoS Guidelines33-33
Enabling QoS Globally33-34
Enabling VLAN-Based QoS on Physical Ports33-34
Configuring Classification Using Port Trust States33-35
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Configuring the Trust State on Ports within the QoS Domain33-35
Configuring the CoS Value for an Interface33-37
Configuring a Trusted Boundary to Ensure Port Security33-37
Enabling DSCP Transparency Mode33-39
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain33-39
Configuring a QoS Policy33-41
Classifying Traffic by Using ACLs33-42
Classifying Traffic by Using Class Maps33-45
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps33-47
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps 33-51
Classifying, Policing, and Marking Traffic by Using Aggregate Policers33-57
Configuring DSCP Maps33-59
Configuring the CoS-to-DSCP Map33-59
Configuring the IP-Precedence-to-DSCP Map33-60
Configuring the Policed-DSCP Map33-61
Configuring the DSCP-to-CoS Map33-62
Configuring the DSCP-to-DSCP-Mutation Map33-63
Configuring Ingress Queue Characteristics33-65
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds33-65
Allocating Buffer Space Between the Ingress Queues33-67
Allocating Bandwidth Between the Ingress Queues33-67
Configuring the Ingress Priority Queue33-68
Configuring Egress Queue Characteristics33-69
Configuration Guidelines33-70
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set33-70
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID33-72
Configuring SRR Shaped Weights on Egress Queues33-73
Configuring SRR Shared Weights on Egress Queues33-74
Configuring the Egress Expedite Queue33-75
Limiting the Bandwidth on an Egress Interface33-76
Contents
CHAPTER
OL-23145-01
Displaying Standard QoS Information33-77
34Configuring EtherChannels and Link-State Tracking34-1
Understanding EtherChannels34-1
EtherChannel Overview34-2
Port-Channel Interfaces34-3
Port Aggregation Protocol34-4
PAgP Modes34-4
PAgP Interaction with Virtual Switches and Dual-Active Detection34-5
Cisco IE 3010 Switch Software Configuration Guide
xxvii
Contents
PAgP Interaction with Other Features34-5
Link Aggregation Control Protocol34-5
LACP Modes34-6
LACP Interaction with Other Features34-6
EtherChannel On Mode34-6
Load Balancing and Forwarding Methods34-7
Using Cisco IOS IP SLAs to Measure Network Performance35-3
IP SLAs Responder and IP SLAs Control Protocol35-4
Response Time Computation for IP SLAs35-4
IP SLAs Operation Scheduling35-5
IP SLAs Operation Threshold Monitoring35-5
Configuring IP SLAs Operations35-6
Default Configuration35-6
Configuration Guidelines35-6
Configuring the IP SLAs Responder35-7
Analyzing IP Service Levels by Using the UDP Jitter Operation35-8
Analyzing IP Service Levels by Using the ICMP Echo Operation35-11
xxviii
Monitoring IP SLAs Operations35-13
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Contents
CHAPTER
36Troubleshooting36-1
Recovering from a Software Failure36-2
Recovering from a Lost or Forgotten Password36-3
Recovering from Lost Cluster Member Connectivity36-4
Preventing Autonegotiation Mismatches36-4
Troubleshooting Power over Ethernet Switch Ports36-5
Disabled Port Caused by Power Loss36-5
Disabled Port Caused by False Link Up36-5
SFP Module Security and Identification36-5
Monitoring SFP Module Status36-6
Using Ping36-6
Understanding Ping 36-6
Using Layer 2 Traceroute36-6
Understanding Layer 2 Traceroute36-7
Usage Guidelines36-7
Displaying the Physical Path36-8
Using IP Traceroute36-8
Understanding IP Traceroute 36-8
Executing IP Traceroute36-9
Using TDR36-10
Understanding TDR36-10
Running TDR and Displaying the Results36-10
Using Debug Commands36-11
Enabling Debugging on a Specific Feature36-11
Enabling All-System Diagnostics36-12
Redirecting Debug and Error Message Output36-12
Possible Symptoms of High CPU Utilization36-15
Verifying the Problem and Cause36-15
Troubleshooting Power over Ethernet (PoE)36-17
OL-23145-01
Cisco IE 3010 Switch Software Configuration Guide
xxix
Contents
APPENDIX
APPENDIX
ASupported MIBsA-1
MIB ListA-1
Using FTP to Access the MIB FilesA-3
BWorking with the Cisco IOS File System, Configuration Files, and Software ImagesB-1
Working with the Flash File SystemB-1
Displaying Available File SystemsB-1
Detecting an Unsupported SD Flash Memory CardB-2
SD Flash Memory Card LEDB-3
Setting the Default File SystemB-3
Displaying Information about Files on a File SystemB-4
Changing Directories and Displaying the Working DirectoryB-4
Creating and Removing DirectoriesB-5
Copying FilesB-5
Deleting FilesB-6
Creating, Displaying, and Extracting tar FilesB-6
Creating a tar FileB-7
Displaying the Contents of a tar FileB-7
Extracting a tar FileB-8
Displaying the Contents of a FileB-8
Working with Configuration FilesB-9
Guidelines for Creating and Using Configuration FilesB-9
Configuration File Types and Location nB-10
Creating a Configuration File By Using a Text EditorB-10
Copying Configuration Files By Using TFTPB-10
Preparing to Download or Upload a Configuration File B y Using TFTPB-10
Downloading the Configuration File By Using TFTPB-11
Uploading the Configuration File By Using TFTPB-12
Copying Configuration Files By Using FTPB-12
Preparing to Download or Upload a Configuration File By Using FTPB-13
Downloading a Configuration File By Using FTPB-13
Uploading a Configuration File By Using FTPB-14
Copying Configuration Files By Using RCPB-15
Preparing to Download or Upload a Configuration File By Using RCPB-16
Downloading a Configuration File By Using RCPB-17
Uploading a Configuration File By Using RCPB-18
Clearing Configuration InformationB-18
Clearing the Startup Configuration FileB-19
Deleting a Stored Configuration FileB-19
xxx
Cisco IE 3010 Switch Software Configuration Guide
OL-23145-01
Loading...
+ 862 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.