Cisco IOS Release 12.2(25)SEF
June 2006
Corporate Headquarters
Cisco Systems, Inc. 170 West Tasman Drive
San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 526-4100
Text Part Number: OL-8915-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Copyright © 2006 Cisco Systems, Inc. All rights reserved.
C O N T E N T S
|
Preface xxvii |
|
|
|
|
|
|
|
|
|
Audience xxvii |
|
|
|
|
|
|
||
|
Purpose |
xxvii |
|
|
|
|
|
|
|
|
Conventions |
xxviii |
|
|
|
|
|
|
|
|
Related Publications |
xxviii |
|
|
|
|
|||
|
Obtaining Documentation |
xxix |
|
|
|
||||
|
Cisco.com |
xxix |
|
|
|
|
|
|
|
|
Product Documentation DVD |
xxix |
|
|
|||||
|
Ordering Documentation |
xxx |
|
|
|||||
|
Documentation Feedback |
xxx |
|
|
|
||||
|
Cisco Product Security Overview |
xxx |
|
|
|||||
|
Reporting Security Problems in Cisco Products |
xxxi |
|||||||
|
Obtaining Technical Assistance |
xxxi |
|
|
|||||
|
Cisco Technical Support & Documentation Website xxxii |
||||||||
|
Submitting a Service Request |
xxxii |
|
|
|||||
|
Definitions of Service Request Severity |
xxxiii |
|
||||||
|
Obtaining Additional Publications and Information |
xxxiii |
|||||||
|
Overview |
|
|
|
|
|
|
|
|
C H A P T E R 1 |
1-1 |
|
|
|
|
|
|
|
|
|
Features |
1-1 |
|
|
|
|
|
|
|
|
Ease-of-Deployment and Ease-of-Use Features |
1-2 |
|||||||
|
Performance Features |
|
1-2 |
|
|
|
|||
|
Management Options |
|
1-3 |
|
|
|
|||
|
Manageability Features |
1-3 |
|
|
|
||||
|
Availability and Redundancy Features |
1-4 |
|
||||||
|
VLAN Features |
1-5 |
|
|
|
|
|
||
|
Security Features |
1-5 |
|
|
|
|
|
||
|
QoS and CoS Features |
|
1-7 |
|
|
|
|||
|
Monitoring Features |
1-8 |
|
|
|
||||
|
Default Settings After Initial Switch Configuration |
1-8 |
|||||||
|
Design Concepts for Using the Switch 1-10 |
|
|
||||||
|
Where to Go Next 1-13 |
|
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
iii |
|
Contents
C H A P T E R 2 |
|
Using the Command-Line Interface |
2-1 |
|
|
|
|
|
||||||
|
|
|
|
|
Understanding Command Modes |
2-1 |
|
|
|
|
|
|
||
|
|
|
|
|
Understanding the Help System |
2-3 |
|
|
|
|
|
|
||
|
|
|
|
|
Understanding Abbreviated Commands |
2-4 |
|
|
|
|
|
|||
|
|
|
|
|
Understanding no and default Forms of Commands |
2-4 |
|
|
||||||
|
|
|
|
|
Understanding CLI Error Messages |
2-5 |
|
|
|
|
|
|||
|
|
|
|
|
Using Configuration Logging |
2-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Using Command History |
2-6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Changing the Command History Buffer Size |
2-6 |
|
|
|
|||||
|
|
|
|
|
Recalling Commands |
2-6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Disabling the Command History Feature |
2-7 |
|
|
|
|
||||
|
|
|
|
|
Using Editing Features |
2-7 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Enabling and Disabling Editing Features |
2-7 |
|
|
|
|
||||
|
|
|
|
|
Editing Commands through Keystrokes |
2-7 |
|
|
|
|
||||
|
|
|
|
|
Editing Command Lines that Wrap |
2-9 |
|
|
|
|
|
|||
|
|
|
|
|
Searching and Filtering Output of show and more Commands 2-10 |
|
|
|||||||
|
|
|
|
|
Accessing the CLI 2-10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Accessing the CLI through a Console Connection or through Telnet |
2-10 |
|
|||||||
|
|
Assigning the Switch IP Address and Default Gateway 3-1 |
|
|
||||||||||
C H A P T E R 3 |
|
|
|
|||||||||||
|
|
|
|
|
Understanding the Boot Process |
3-1 |
|
|
|
|
|
|
||
|
|
|
|
|
Assigning Switch Information |
3-2 |
|
|
|
|
|
|
||
|
|
|
|
|
Default Switch Information |
3-3 |
|
|
|
|
|
|
||
|
|
|
|
|
Understanding DHCP-Based Autoconfiguration |
3-3 |
|
|
||||||
|
|
|
|
|
DHCP Client Request Process |
3-4 |
|
|
|
|
|
|||
|
|
|
|
|
Configuring DHCP-Based Autoconfiguration |
3-5 |
|
|
||||||
|
|
|
|
|
DHCP Server Configuration Guidelines |
3-5 |
|
|
|
|||||
|
|
|
|
|
Configuring the TFTP Server |
3-6 |
|
|
|
|
|
|||
|
|
|
|
|
Configuring the DNS |
3-6 |
|
|
|
|
|
|
||
|
|
|
|
|
Configuring the Relay Device |
3-6 |
|
|
|
|
|
|||
|
|
|
|
|
Obtaining Configuration Files |
3-7 |
|
|
|
|
|
|||
|
|
|
|
|
Example Configuration |
3-8 |
|
|
|
|
|
|
||
|
|
|
|
|
Manually Assigning IP Information |
3-10 |
|
|
|
|
|
|||
|
|
|
|
|
Checking and Saving the Running Configuration |
3-10 |
|
|
||||||
|
|
|
|
|
Modifying the Startup Configuration |
3-13 |
|
|
|
|
|
|||
|
|
|
|
|
Default Boot Configuration |
3-14 |
|
|
|
|
|
|
||
|
|
|
|
|
Automatically Downloading a Configuration File |
3-14 |
|
|
||||||
|
|
|
|
|
Specifying the Filename to Read and Write the System Configuration |
3-14 |
|
|||||||
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
|
|||||
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
iv |
|
|
|
|
|
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
Booting Manually |
3-15 |
|
|
|
|
|
|
|
|
|
||
|
|
Booting a Specific Software Image |
3-16 |
|
|
|
|
|||||||
|
|
Controlling Environment Variables |
3-16 |
|
|
|
|
|
||||||
|
|
Scheduling a Reload of the Software Image |
3-18 |
|
|
|
|
|||||||
|
|
Configuring a Scheduled Reload |
3-18 |
|
|
|
|
|
||||||
|
|
Displaying Scheduled Reload Information |
3-19 |
|
|
|
|
|||||||
|
Configuring Cisco IOS CNS Agents |
|
|
|
|
|
|
|
||||||
C H A P T E R 4 |
4-1 |
|
|
|
|
|
|
|||||||
|
|
Understanding Cisco Configuration Engine Software |
4-1 |
|
|
|
||||||||
|
|
Configuration Service |
4-2 |
|
|
|
|
|
|
|
|
|
||
|
|
Event Service |
4-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
NameSpace Mapper |
4-3 |
|
|
|
|
|
|
|
|
|||
|
|
What You Should Know About the CNS IDs and Device Hostnames 4-3 |
||||||||||||
|
|
ConfigID |
4-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
DeviceID |
4-4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Hostname and DeviceID |
4-4 |
|
|
|
|
|
|
|||||
|
|
Using Hostname, DeviceID, and ConfigID |
4-4 |
|
|
|
||||||||
|
|
Understanding Cisco IOS Agents |
|
4-5 |
|
|
|
|
|
|
||||
|
|
Initial Configuration |
4-5 |
|
|
|
|
|
|
|
|
|
||
|
|
Incremental (Partial) Configuration |
4-6 |
|
|
|
|
|
||||||
|
|
Synchronized Configuration |
4-6 |
|
|
|
|
|
|
|
||||
|
|
Configuring Cisco IOS Agents |
4-6 |
|
|
|
|
|
|
|
|
|||
|
|
Enabling Automated CNS Configuration |
4-6 |
|
|
|
|
|||||||
|
|
Enabling the CNS Event Agent |
|
4-8 |
|
|
|
|
|
|
||||
|
|
Enabling the Cisco IOS CNS Agent |
4-9 |
|
|
|
|
|
||||||
|
|
Enabling an Initial Configuration |
4-9 |
|
|
|
|
|||||||
|
|
Enabling a Partial Configuration |
4-11 |
|
|
|
|
|||||||
|
|
Displaying CNS Configuration |
4-12 |
|
|
|
|
|
|
|
||||
|
Administering the Switch |
|
|
|
|
|
|
|
|
|
|
|||
C H A P T E R 5 |
5-1 |
|
|
|
|
|
|
|
|
|
||||
|
|
Managing the System Time and Date |
5-1 |
|
|
|
|
|
||||||
|
|
Understanding the System Clock |
5-1 |
|
|
|
|
|
||||||
|
|
Understanding Network Time Protocol |
5-2 |
|
|
|
|
|||||||
|
|
Configuring NTP |
5-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default NTP Configuration |
|
5-4 |
|
|
|
|
|
|
||||
|
|
Configuring NTP Authentication |
5-4 |
|
|
|
|
|||||||
|
|
Configuring NTP Associations |
5-5 |
|
|
|
|
|
||||||
|
|
Configuring NTP Broadcast Service |
5-6 |
|
|
|
|
|||||||
|
|
Configuring NTP Access Restrictions |
5-8 |
|
|
|
|
|||||||
|
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
||||||
|
|
|
|
|
|
|||||||||
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
v |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
|
|
|
Configuring the Source IP Address for NTP Packets |
5-10 |
|
||||||
|
|
|
|
|
Displaying the NTP Configuration |
5-11 |
|
|
|
|
|||
|
|
|
|
|
Configuring Time and Date Manually |
5-11 |
|
|
|
|
|||
|
|
|
|
|
Setting the System Clock |
5-11 |
|
|
|
|
|
||
|
|
|
|
|
Displaying the Time and Date Configuration |
5-12 |
|
|
|||||
|
|
|
|
|
Configuring the Time Zone |
5-12 |
|
|
|
|
|
||
|
|
|
|
|
Configuring Summer Time (Daylight Saving Time) |
5-13 |
|
||||||
|
|
|
|
|
Configuring a System Name and Prompt |
5-14 |
|
|
|
|
|||
|
|
|
|
|
Default System Name and Prompt Configuration |
5-15 |
|
|
|||||
|
|
|
|
|
Configuring a System Name |
5-15 |
|
|
|
|
|
||
|
|
|
|
|
Understanding DNS |
5-15 |
|
|
|
|
|
|
|
|
|
|
|
|
Default DNS Configuration |
5-16 |
|
|
|
|
|
||
|
|
|
|
|
Setting Up DNS |
5-16 |
|
|
|
|
|
|
|
|
|
|
|
|
Displaying the DNS Configuration |
5-17 |
|
|
|
|
|||
|
|
|
|
|
Creating a Banner 5-17 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default Banner Configuration |
5-17 |
|
|
|
|
|
||
|
|
|
|
|
Configuring a Message-of-the-Day Login Banner |
5-18 |
|
|
|||||
|
|
|
|
|
Configuring a Login Banner |
5-19 |
|
|
|
|
|
|
|
|
|
|
|
|
Managing the MAC Address Table 5-19 |
|
|
|
|
|
|||
|
|
|
|
|
Building the Address Table |
5-20 |
|
|
|
|
|
|
|
|
|
|
|
|
MAC Addresses and VLANs |
5-20 |
|
|
|
|
|
||
|
|
|
|
|
Default MAC Address Table Configuration |
5-21 |
|
|
|||||
|
|
|
|
|
Changing the Address Aging Time |
5-21 |
|
|
|
|
|||
|
|
|
|
|
Removing Dynamic Address Entries |
5-22 |
|
|
|
|
|||
|
|
|
|
|
Configuring MAC Address Notification Traps |
5-22 |
|
|
|||||
|
|
|
|
|
Adding and Removing Static Address Entries |
5-24 |
|
|
|||||
|
|
|
|
|
Configuring Unicast MAC Address Filtering |
5-25 |
|
|
|||||
|
|
|
|
|
Displaying Address Table Entries |
5-26 |
|
|
|
|
|||
|
|
|
|
|
Managing the ARP Table |
5-26 |
|
|
|
|
|
|
|
|
|
Configuring Switch-Based Authentication |
|
|
|
|
|
||||||
C H A P T E R 6 |
|
6-1 |
|
|
|
|
|||||||
|
|
|
|
|
Preventing Unauthorized Access to Your Switch |
6-1 |
|
|
|||||
|
|
|
|
|
Protecting Access to Privileged EXEC Commands |
6-2 |
|
|
|||||
|
|
|
|
|
Default Password and Privilege Level Configuration 6-2 |
||||||||
|
|
|
|
|
Setting or Changing a Static Enable Password |
6-3 |
|
|
|||||
|
|
|
|
|
Protecting Enable and Enable Secret Passwords with Encryption 6-3 |
||||||||
|
|
|
|
|
Disabling Password Recovery |
6-5 |
|
|
|
|
|
||
|
|
|
|
|
Setting a Telnet Password for a Terminal Line |
6-6 |
|
|
|||||
|
|
|
|
|
Configuring Username and Password Pairs |
6-6 |
|
|
|
||||
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
|||||
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
vi |
|
|
|
|
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Configuring Multiple Privilege Levels |
6-7 |
|
|
||||
Setting the Privilege Level for a Command |
6-8 |
|
|||||
Changing the Default Privilege Level for Lines 6-9 |
|
||||||
Logging into and Exiting a Privilege Level |
6-9 |
|
|||||
Controlling Switch Access with TACACS+ |
6-10 |
|
|
||||
Understanding TACACS+ |
6-10 |
|
|
|
|
|
|
TACACS+ Operation |
6-12 |
|
|
|
|
|
|
Configuring TACACS+ |
6-12 |
|
|
|
|
|
|
Default TACACS+ Configuration |
6-13 |
|
|
||||
Identifying the TACACS+ Server Host and Setting the Authentication Key 6-13 |
|
||||||
Configuring TACACS+ Login Authentication |
6-14 |
|
|||||
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services |
6-16 |
||||||
Starting TACACS+ Accounting |
|
6-17 |
|
|
|
||
Displaying the TACACS+ Configuration |
6-17 |
|
|
||||
Controlling Switch Access with RADIUS |
|
6-17 |
|
|
|||
Understanding RADIUS |
6-18 |
|
|
|
|
|
|
RADIUS Operation |
6-19 |
|
|
|
|
|
|
Configuring RADIUS |
6-20 |
|
|
|
|
|
|
Default RADIUS Configuration |
|
6-20 |
|
|
|
||
Identifying the RADIUS Server Host |
6-20 |
|
|
||||
Configuring RADIUS Login Authentication |
6-23 |
|
|||||
Defining AAA Server Groups |
6-25 |
|
|
|
|||
Configuring RADIUS Authorization for User Privileged Access and Network Services |
6-27 |
||||||
Starting RADIUS Accounting |
6-28 |
|
|
|
|||
Configuring Settings for All RADIUS Servers |
6-29 |
|
|||||
Configuring the Switch to Use Vendor-Specific RADIUS Attributes 6-29 |
|
||||||
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 6-31 |
|
||||||
Displaying the RADIUS Configuration |
6-31 |
|
|
||||
Controlling Switch Access with Kerberos |
6-32 |
|
|
||||
Understanding Kerberos |
6-32 |
|
|
|
|
|
|
Kerberos Operation |
6-34 |
|
|
|
|
|
|
Authenticating to a Boundary Switch |
6-34 |
|
|
||||
Obtaining a TGT from a KDC |
6-35 |
|
|
|
|||
Authenticating to Network Services |
6-35 |
|
|
||||
Configuring Kerberos |
6-35 |
|
|
|
|
|
|
Configuring the Switch for Local Authentication and Authorization 6-36 |
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
vii |
|
Contents
|
|
|
|
|
Configuring the Switch for Secure Shell |
6-37 |
|
|
|
|
|
|||||
|
|
|
|
|
Understanding SSH |
6-38 |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
SSH Servers, Integrated Clients, and Supported Versions 6-38 |
|||||||||||
|
|
|
|
|
Limitations |
6-39 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring SSH |
6-39 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuration Guidelines |
6-39 |
|
|
|
|
|
|
|
|||
|
|
|
|
|
Setting Up the Switch to Run SSH |
6-39 |
|
|
|
|
|
|||||
|
|
|
|
|
Configuring the SSH Server |
6-41 |
|
|
|
|
|
|
||||
|
|
|
|
|
Displaying the SSH Configuration and Status |
6-41 |
|
|
|
|||||||
|
|
|
|
|
Configuring the Switch for Secure Socket Layer HTTP |
6-42 |
|
|
||||||||
|
|
|
|
|
Understanding Secure HTTP Servers and Clients |
6-42 |
|
|
||||||||
|
|
|
|
|
Certificate Authority Trustpoints |
6-42 |
|
|
|
|
|
|||||
|
|
|
|
|
CipherSuites |
6-44 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring Secure HTTP Servers and Clients |
6-44 |
|
|
|
|||||||
|
|
|
|
|
Default SSL Configuration |
6-44 |
|
|
|
|
|
|
||||
|
|
|
|
|
SSL Configuration Guidelines |
6-45 |
|
|
|
|
|
|
||||
|
|
|
|
|
Configuring a CA Trustpoint |
6-45 |
|
|
|
|
|
|
||||
|
|
|
|
|
Configuring the Secure HTTP Server |
6-46 |
|
|
|
|
||||||
|
|
|
|
|
Configuring the Secure HTTP Client |
6-47 |
|
|
|
|
|
|||||
|
|
|
|
|
Displaying Secure HTTP Server and Client Status |
6-48 |
|
|
||||||||
|
|
|
|
|
Configuring the Switch for Secure Copy Protocol |
6-48 |
|
|
|
|
||||||
|
|
|
|
|
Information About Secure Copy |
6-49 |
|
|
|
|
|
|||||
|
|
Configuring IEEE 802.1x Port-Based Authentication 7-1 |
|
|
|
|||||||||||
C H A P T E R 7 |
|
|
|
|
||||||||||||
|
|
|
|
|
Understanding IEEE 802.1x Port-Based Authentication |
7-1 |
|
|
||||||||
|
|
|
|
|
Device Roles |
7-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authentication Process |
7-3 |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
Authentication Initiation and Message Exchange |
7-5 |
|
|
||||||||
|
|
|
|
|
Ports in Authorized and Unauthorized States |
7-7 |
|
|
|
|
||||||
|
|
|
|
|
IEEE 802.1x Host Mode |
7-8 |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
IEEE 802.1x Accounting |
7-9 |
|
|
|
|
|
|
|
|
||
|
|
|
|
|
IEEE 802.1x Accounting Attribute-Value Pairs |
7-9 |
|
|
|
|
||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with VLAN Assignment |
7-10 |
|
|||||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with Per-User ACLs |
7-11 |
|
|||||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with Guest VLAN |
|
7-12 |
|
|
|||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with Restricted VLAN |
7-13 |
|
|||||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 7-14 |
|||||||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with Voice VLAN Ports |
7-15 |
|
|||||||||
|
|
|
|
|
Using IEEE 802.1x Authentication with Port Security |
7-15 |
|
|||||||||
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
viii |
|
|
|
|
|
|
|
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
Using IEEE 802.1x Authentication with Wake-on-LAN |
7-16 |
||||||||
|
Using IEEE 802.1x Authentication with MAC Authentication Bypass 7-17 |
|||||||||
|
Configuring IEEE 802.1x Authentication |
7-18 |
|
|
|
|
||||
|
Default IEEE 802.1x Authentication Configuration |
7-19 |
|
|||||||
|
IEEE 802.1x Authentication Configuration Guidelines |
7-20 |
|
|||||||
|
IEEE 802.1x Authentication |
7-20 |
|
|
|
|
||||
|
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication |
|||||||||
|
Bypass |
7-21 |
|
|
|
|
|
|
|
|
|
MAC Authentication Bypass |
|
7-22 |
|
|
|
|
|||
|
Configuring IEEE 802.1x Authentication |
7-22 |
|
|
|
|||||
|
Configuring the Switch-to-RADIUS-Server Communication |
7-23 |
||||||||
|
Configuring the Host Mode |
7-25 |
|
|
|
|
|
|||
|
Configuring Periodic Re-Authentication |
7-25 |
|
|
|
|||||
|
Manually Re-Authenticating a Client Connected to a Port |
7-26 |
||||||||
|
Changing the Quiet Period |
7-26 |
|
|
|
|
|
|
||
|
Changing the Switch-to-Client Retransmission Time |
7-27 |
|
|||||||
|
Setting the Switch-to-Client Frame-Retransmission Number |
7-28 |
||||||||
|
Setting the Re-Authentication Number |
7-29 |
|
|
|
|||||
|
Configuring IEEE 802.1x Accounting |
7-29 |
|
|
|
|||||
|
Configuring a Guest VLAN |
7-30 |
|
|
|
|
|
|
||
|
Configuring a Restricted VLAN |
7-31 |
|
|
|
|
||||
|
Configuring the Inaccessible Authentication Bypass Feature |
7-33 |
||||||||
|
Configuring IEEE 802.1x Authentication with WoL |
7-35 |
|
|||||||
|
Configuring MAC Authentication Bypass |
7-36 |
|
|
|
|||||
|
Configuring IEEE 802.1x Authentication Using a RADIUS Server 7-37 |
|||||||||
|
Disabling IEEE 802.1x Authentication on the Port |
7-38 |
|
|||||||
|
Resetting the IEEE 802.1x Authentication Configuration to the Default Values 7-38 |
|||||||||
|
Displaying IEEE 802.1x Statistics and Status |
7-39 |
|
|
|
|||||
|
Configuring Interface Characteristics |
|
|
|
|
|
|
|||
C H A P T E R 8 |
|
8-1 |
|
|
|
|
||||
|
Understanding Interface Types |
8-1 |
|
|
|
|
|
|
||
|
Port-Based VLANs |
8-2 |
|
|
|
|
|
|
|
|
|
Switch Ports |
8-2 |
|
|
|
|
|
|
|
|
|
Internal Gigabit Ethernet Ports |
8-2 |
|
|
|
|
||||
|
Access Ports |
8-3 |
|
|
|
|
|
|
|
|
|
Trunk Ports |
8-3 |
|
|
|
|
|
|
|
|
|
EtherChannel Port Groups |
8-4 |
|
|
|
|
|
|
||
|
Dual-Purpose Uplink Ports |
8-4 |
|
|
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
ix |
|
Contents
|
|
|
|
Connecting Interfaces |
8-5 |
|
|
|
|
|
|
|
|
|
|
|
Management-Only Interface |
8-5 |
|
|
|
|
|||
|
|
|
|
Using Interface Configuration Mode |
8-6 |
|
|
|
|
|||
|
|
|
|
Procedures for Configuring Interfaces |
8-6 |
|
|
|
||||
|
|
|
|
Configuring a Range of Interfaces 8-7 |
|
|
|
|
||||
|
|
|
|
Configuring and Using Interface Range Macros |
8-8 |
|
||||||
|
|
|
|
Configuring Ethernet Interfaces |
8-10 |
|
|
|
|
|||
|
|
|
|
Default Ethernet Interface Configuration |
8-10 |
|
|
|||||
|
|
|
|
Configuring Interface Speed and Duplex Mode |
8-11 |
|
||||||
|
|
|
|
Speed and Duplex Configuration Guidelines |
8-11 |
|
||||||
|
|
|
|
Setting the Type of a Dual-Purpose Uplink Port 8-12 |
||||||||
|
|
|
|
Setting the Interface Speed and Duplex Parameters 8-14 |
||||||||
|
|
|
|
Configuring IEEE 802.3x Flow Control 8-15 |
|
|
|
|||||
|
|
|
|
Configuring Auto-MDIX on an Interface |
8-16 |
|
|
|||||
|
|
|
|
Adding a Description for an Interface |
8-17 |
|
|
|
||||
|
|
|
|
Configuring the System MTU |
8-18 |
|
|
|
|
|
||
|
|
|
|
Monitoring and Maintaining the Interfaces |
8-19 |
|
|
|
||||
|
|
|
|
Monitoring Interface Status |
8-19 |
|
|
|
|
|||
|
|
|
|
Clearing and Resetting Interfaces and Counters |
8-20 |
|
||||||
|
|
|
|
Shutting Down and Restarting the Interface |
8-20 |
|
||||||
|
Configuring Smartports Macros |
|
|
|
|
|
||||||
C H A P T E R 9 |
9-1 |
|
|
|
|
|||||||
|
|
|
|
Understanding Smartports Macros |
9-1 |
|
|
|
|
|||
|
|
|
|
Configuring Smartports Macros |
9-2 |
|
|
|
|
|||
|
|
|
|
Default Smartports Macro Configuration |
9-2 |
|
|
|||||
|
|
|
|
Smartports Macro Configuration Guidelines |
9-3 |
|
||||||
|
|
|
|
Creating Smartports Macros |
|
9-4 |
|
|
|
|
||
|
|
|
|
Applying Smartports Macros |
|
9-5 |
|
|
|
|
||
|
|
|
|
Applying Cisco-Default Smartports Macros |
9-6 |
|
|
|||||
|
|
|
|
Displaying Smartports Macros |
9-8 |
|
|
|
|
|||
|
Configuring VLANs 10-1 |
|
|
|
|
|
|
|
|
|||
C H A P T E R 10 |
|
|
|
|
|
|
|
|
||||
|
|
|
|
Understanding VLANs |
10-1 |
|
|
|
|
|
|
|
|
|
|
|
Supported VLANs |
10-2 |
|
|
|
|
|
|
|
|
|
|
|
VLAN Port Membership Modes |
10-3 |
|
|
|
|
|||
|
|
|
|
Configuring Normal-Range VLANs |
10-4 |
|
|
|
|
|||
|
|
|
|
Token Ring VLANs |
10-5 |
|
|
|
|
|
|
|
|
|
|
|
Normal-Range VLAN Configuration Guidelines |
10-5 |
|
||||||
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
|||||
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
x |
|
|
|
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
VLAN Configuration Mode Options |
10-6 |
|
|
|
|
|
|
|
|||||
|
VLAN Configuration in config-vlan Mode |
10-6 |
|
|
|
|
||||||||
|
VLAN Configuration in VLAN Database Configuration Mode 10-6 |
|||||||||||||
|
Saving VLAN Configuration |
10-6 |
|
|
|
|
|
|
|
|
|
|||
|
Default Ethernet VLAN Configuration |
10-7 |
|
|
|
|
|
|
||||||
|
Creating or Modifying an Ethernet VLAN |
|
10-8 |
|
|
|
|
|
|
|||||
|
Deleting a VLAN 10-9 |
|
|
|
|
|
|
|
|
|
|
|
||
|
Assigning Static-Access Ports to a VLAN |
|
10-10 |
|
|
|
|
|
||||||
|
Configuring Extended-Range VLANs |
10-11 |
|
|
|
|
|
|
|
|
||||
|
Default VLAN Configuration |
10-11 |
|
|
|
|
|
|
|
|
|
|||
|
Extended-Range VLAN Configuration Guidelines |
10-12 |
|
|
|
|
||||||||
|
Creating an Extended-Range VLAN |
10-12 |
|
|
|
|
|
|
|
|||||
|
Displaying VLANs |
10-13 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Configuring VLAN Trunks |
10-14 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Trunking Overview |
10-14 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Encapsulation Types 10-16 |
|
|
|
|
|
|
|
|
|
||||
|
IEEE 802.1Q Configuration Considerations |
10-16 |
|
|
|
|
||||||||
|
Default Layer 2 Ethernet Interface VLAN Configuration |
10-17 |
|
|
|
|||||||||
|
Configuring an Ethernet Interface as a Trunk Port |
10-17 |
|
|
|
|
||||||||
|
Interaction with Other Features |
10-17 |
|
|
|
|
|
|
||||||
|
Configuring a Trunk Port |
|
10-18 |
|
|
|
|
|
|
|
|
|
||
|
Defining the Allowed VLANs on a Trunk |
10-19 |
|
|
|
|
||||||||
|
Changing the Pruning-Eligible List |
10-20 |
|
|
|
|
|
|
||||||
|
Configuring the Native VLAN for Untagged Traffic |
10-21 |
|
|
|
|||||||||
|
Configuring Trunk Ports for Load Sharing |
|
10-21 |
|
|
|
|
|
||||||
|
Load Sharing Using STP Port Priorities |
10-22 |
|
|
|
|
|
|||||||
|
Load Sharing Using STP Path Cost |
10-23 |
|
|
|
|
|
|
||||||
|
Configuring VMPS |
10-25 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Understanding VMPS |
10-25 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Dynamic-Access Port VLAN Membership |
10-26 |
|
|
|
|
||||||||
|
Default VMPS Client Configuration |
10-26 |
|
|
|
|
|
|
|
|||||
|
VMPS Configuration Guidelines |
10-26 |
|
|
|
|
|
|
|
|
||||
|
Configuring the VMPS Client |
|
10-27 |
|
|
|
|
|
|
|
|
|
||
|
Entering the IP Address of the VMPS |
|
10-27 |
|
|
|
|
|
||||||
|
Configuring Dynamic-Access Ports on VMPS Clients |
10-27 |
|
|
|
|||||||||
|
Reconfirming VLAN Memberships |
10-28 |
|
|
|
|
|
|
||||||
|
Changing the Reconfirmation Interval |
10-28 |
|
|
|
|
|
|||||||
|
Changing the Retry Count |
|
10-29 |
|
|
|
|
|
|
|
|
|||
|
Monitoring the VMPS |
10-29 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
||||||||
|
|
|
|
|||||||||||
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
xi |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
|
|
Troubleshooting Dynamic-Access Port VLAN Membership 10-30 |
|||||||||||
|
|
|
|
VMPS Configuration Example |
10-30 |
|
|
|
|
||||||
|
Configuring VTP |
|
|
|
|
|
|
|
|
|
|
|
|||
C H A P T E R 11 |
11-1 |
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
Understanding VTP |
11-1 |
|
|
|
|
|
|
|
|
||
|
|
|
|
The VTP Domain |
|
11-2 |
|
|
|
|
|
|
|
||
|
|
|
|
VTP Modes |
11-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
VTP Advertisements |
11-3 |
|
|
|
|
|
|
||||
|
|
|
|
VTP Version 2 |
11-4 |
|
|
|
|
|
|
|
|
||
|
|
|
|
VTP Pruning |
11-4 |
|
|
|
|
|
|
|
|
||
|
|
|
|
Configuring VTP |
11-6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Default VTP Configuration |
11-6 |
|
|
|
|
|
|||||
|
|
|
|
VTP Configuration Options |
11-7 |
|
|
|
|
|
|||||
|
|
|
|
VTP Configuration in Global Configuration Mode |
11-7 |
|
|||||||||
|
|
|
|
VTP Configuration in VLAN Database Configuration Mode 11-7 |
|||||||||||
|
|
|
|
VTP Configuration Guidelines |
11-8 |
|
|
|
|
||||||
|
|
|
|
Domain Names |
11-8 |
|
|
|
|
|
|
||||
|
|
|
|
Passwords |
|
11-8 |
|
|
|
|
|
|
|
|
|
|
|
|
|
VTP Version |
|
11-8 |
|
|
|
|
|
|
|
||
|
|
|
|
Configuration Requirements |
11-9 |
|
|
|
|
||||||
|
|
|
|
Configuring a VTP Server |
11-9 |
|
|
|
|
|
|||||
|
|
|
|
Configuring a VTP Client |
11-11 |
|
|
|
|
|
|||||
|
|
|
|
Disabling VTP (VTP Transparent Mode) |
11-12 |
|
|
|
|||||||
|
|
|
|
Enabling VTP Version 2 |
11-13 |
|
|
|
|
|
|||||
|
|
|
|
Enabling VTP Pruning |
11-14 |
|
|
|
|
|
|
||||
|
|
|
|
Adding a VTP Client Switch to a VTP Domain |
11-14 |
|
|
||||||||
|
|
|
|
Monitoring VTP |
11-16 |
|
|
|
|
|
|
|
|
||
|
Configuring Voice VLAN |
|
|
|
|
|
|
|
|
||||||
C H A P T E R 12 |
12-1 |
|
|
|
|
|
|
|
|||||||
|
|
|
|
Understanding Voice VLAN |
12-1 |
|
|
|
|
|
|
||||
|
|
|
|
Cisco IP Phone Voice Traffic |
12-2 |
|
|
|
|
|
|||||
|
|
|
|
Cisco IP Phone Data Traffic |
12-2 |
|
|
|
|
|
|||||
|
|
|
|
Configuring Voice VLAN |
12-3 |
|
|
|
|
|
|
||||
|
|
|
|
Default Voice VLAN Configuration |
12-3 |
|
|
|
|||||||
|
|
|
|
Voice VLAN Configuration Guidelines |
12-3 |
|
|
|
|||||||
|
|
|
|
Configuring a Port Connected to a Cisco 7960 IP Phone |
12-4 |
|
|||||||||
|
|
|
|
Configuring Cisco IP Phone Voice Traffic |
12-4 |
|
|
||||||||
|
|
|
|
Configuring the Priority of Incoming Data Frames |
12-6 |
|
|||||||||
|
|
|
|
Displaying Voice VLAN |
12-6 |
|
|
|
|
|
|
|
|||
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
||||||||
|
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xii |
|
|
|
|
|
|
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
C H A P T E R 13 |
Configuring STP 13-1 |
|
|
|
Understanding Spanning-Tree Features |
13-1 |
|
|
STP Overview 13-2 |
|
|
|
Spanning-Tree Topology and BPDUs |
13-3 |
|
|
Bridge ID, Switch Priority, and Extended System ID 13-4 |
||
|
Spanning-Tree Interface States 13-4 |
||
|
Blocking State |
13-6 |
|
|
Listening State |
13-6 |
|
|
Learning State |
13-6 |
|
|
Forwarding State |
13-6 |
|
|
Disabled State |
13-7 |
|
How a Switch or Port Becomes the Root Switch or Root Port |
13-7 |
||||||
Spanning Tree and Redundant Connectivity |
13-8 |
|
|
||||
Spanning-Tree Address Management |
13-8 |
|
|
||||
Accelerated Aging to Retain Connectivity |
13-8 |
|
|
||||
Spanning-Tree Modes and Protocols |
13-9 |
|
|
||||
Supported Spanning-Tree Instances |
13-9 |
|
|
|
|||
Spanning-Tree Interoperability and Backward Compatibility |
13-10 |
||||||
STP and IEEE 802.1Q Trunks |
13-10 |
|
|
|
|
||
Configuring Spanning-Tree Features |
13-10 |
|
|
|
|||
Default Spanning-Tree Configuration |
13-11 |
|
|
||||
Spanning-Tree Configuration Guidelines |
13-12 |
|
|
||||
Changing the Spanning-Tree Mode. |
13-13 |
|
|
||||
Disabling Spanning Tree |
13-14 |
|
|
|
|
|
|
Configuring the Root Switch |
13-14 |
|
|
|
|
||
Configuring a Secondary Root Switch |
13-16 |
|
|
||||
Configuring Port Priority |
13-16 |
|
|
|
|
|
|
Configuring Path Cost |
13-18 |
|
|
|
|
|
|
Configuring the Switch Priority of a VLAN |
13-19 |
|
|
||||
Configuring Spanning-Tree Timers |
13-20 |
|
|
|
|||
Configuring the Hello Time |
13-20 |
|
|
|
|||
Configuring the Forwarding-Delay Time for a VLAN |
13-21 |
||||||
Configuring the Maximum-Aging Time for a VLAN |
13-21 |
|
|||||
Configuring the Transmit Hold-Count |
13-22 |
|
|
||||
Displaying the Spanning-Tree Status |
13-22 |
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
xiii |
|
Contents
C H A P T E R 14 |
Configuring MSTP |
14-1 |
|
|
|
|
|
Understanding MSTP |
14-2 |
|
|
|
|
|
Multiple Spanning-Tree Regions 14-2 |
|
||||
|
IST, CIST, and CST |
14-3 |
|
|
|
|
|
Operations Within an MST Region |
14-3 |
||||
|
Operations Between MST Regions |
14-4 |
||||
|
IEEE 802.1s Terminology |
14-5 |
|
|
||
|
Hop Count |
14-5 |
|
|
|
|
|
Boundary Ports 14-6 |
|
|
|
||
|
IEEE 802.1s Implementation |
14-6 |
|
|
||
|
Port Role Naming Change |
14-7 |
|
|
||
|
Interoperation Between Legacy and Standard Switches 14-7 |
|||||
|
Detecting Unidirectional Link Failure |
14-8 |
||||
|
Interoperability with IEEE 802.1D STP |
14-8 |
||||
|
Understanding RSTP |
14-8 |
|
|
|
|
|
Port Roles and the Active Topology |
14-9 |
|
|||
|
Rapid Convergence 14-10 |
|
|
|
||
|
Synchronization of Port Roles |
14-11 |
|
|
Bridge Protocol Data Unit Format and Processing 14-12
Processing Superior BPDU Information |
14-13 |
Processing Inferior BPDU Information |
14-13 |
Topology Changes 14-13 |
|
Configuring MSTP Features 14-14 |
|
Default MSTP Configuration 14-14 |
|
|
|
|
MSTP Configuration Guidelines |
14-15 |
|
|
|
||
|
|
|
Specifying the MST Region Configuration and Enabling MSTP 14-16 |
||||||
|
|
|
Configuring the Root Switch |
14-17 |
|
|
|
||
|
|
|
Configuring a Secondary Root Switch |
14-18 |
|
||||
|
|
|
Configuring Port Priority |
14-19 |
|
|
|
|
|
|
|
|
Configuring Path Cost |
14-20 |
|
|
|
|
|
|
|
|
Configuring the Switch Priority |
14-21 |
|
|
|
||
|
|
|
Configuring the Hello Time |
14-22 |
|
|
|
||
|
|
|
Configuring the Forwarding-Delay Time |
|
14-23 |
|
|||
|
|
|
Configuring the Maximum-Aging Time |
14-23 |
|
||||
|
|
|
Configuring the Maximum-Hop Count |
14-24 |
|
||||
|
|
|
Specifying the Link Type to Ensure Rapid Transitions 14-24 |
||||||
|
|
|
Designating the Neighbor Type |
14-25 |
|
|
|
||
|
|
|
Restarting the Protocol Migration Process |
14-25 |
|
||||
|
|
|
Displaying the MST Configuration and Status |
14-26 |
|
||||
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|||
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|
xiv |
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
Contents
C H A P T E R 15 |
Configuring Optional Spanning-Tree Features |
15-1 |
||
|
Understanding Optional Spanning-Tree Features |
15-1 |
||
|
Understanding Port Fast |
15-2 |
|
|
|
Understanding BPDU Guard |
15-2 |
|
|
|
Understanding BPDU Filtering |
15-3 |
|
|
|
Understanding UplinkFast |
15-3 |
|
|
|
Understanding BackboneFast |
15-5 |
|
|
|
Understanding EtherChannel Guard 15-7 |
|
||
|
Understanding Root Guard |
15-8 |
|
|
|
Understanding Loop Guard |
|
15-9 |
|
Configuring Optional Spanning-Tree Features 15-9 |
|
|
Default Optional Spanning-Tree Configuration 15-9 |
||
Optional Spanning-Tree Configuration Guidelines |
15-10 |
|
Enabling Port Fast 15-10 |
|
|
Enabling BPDU Guard |
15-11 |
|
Enabling BPDU Filtering 15-12 |
|
|
Enabling UplinkFast for Use with Redundant Links |
15-13 |
|
Enabling BackboneFast |
15-13 |
|
Enabling EtherChannel Guard 15-14 |
|
|
Enabling Root Guard |
15-15 |
|
Enabling Loop Guard |
15-15 |
|
|
Displaying the Spanning-Tree Status |
15-16 |
|
|
|
Configuring Flex Links and the MAC Address-Table Move Update Feature 16-1 |
|||
C H A P T E R 16 |
||||
|
Understanding Flex Links and the MAC Address-Table Move Update 16-1 |
|||
|
Flex Links 16-1 |
|
|
|
|
MAC Address-Table Move Update |
16-2 |
|
|
|
Configuring Flex Links and MAC Address-Table Move Update |
16-4 |
||
|
Configuration Guidelines 16-4 |
|
|
|
|
Default Configuration |
16-4 |
|
|
|
Configuring Flex Links and MAC Address-Table Move Update |
16-5 |
||
|
Configuring Flex Links |
16-5 |
|
|
|
Configuring the MAC Address-Table Move Update Feature |
16-6 |
||
|
Monitoring Flex Links and the MAC Address-Table Move Update 16-8 |
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
xv |
|
Contents
C H A P T E R 17 |
Configuring DHCP Features |
17-1 |
|
|
|
|
|
||
|
Understanding DHCP Features |
|
17-1 |
|
|
|
|
||
|
DHCP Server 17-2 |
|
|
|
|
|
|
|
|
|
DHCP Relay Agent |
17-2 |
|
|
|
|
|
|
|
|
DHCP Snooping |
17-2 |
|
|
|
|
|
|
|
|
Option-82 Data Insertion |
17-3 |
|
|
|
|
|||
|
Configuring DHCP Features |
17-6 |
|
|
|
|
|||
|
Default DHCP Configuration |
17-6 |
|
|
|
||||
|
DHCP Snooping Configuration Guidelines 17-7 |
|
|||||||
|
Configuring the DHCP Relay Agent |
17-8 |
|
||||||
|
Enabling DHCP Snooping and Option 82 |
17-8 |
|
||||||
|
Enabling the Cisco IOS DHCP Server Database 17-10 |
|
|||||||
|
Displaying DHCP Snooping Information |
17-10 |
|
||||||
|
Configuring IGMP Snooping and MVR |
|
|
||||||
C H A P T E R 18 |
18-1 |
|
|||||||
|
Understanding IGMP Snooping |
18-1 |
|
|
|
||||
|
IGMP Versions |
18-2 |
|
|
|
|
|
|
|
|
Joining a Multicast Group |
18-3 |
|
|
|
||||
|
Leaving a Multicast Group |
18-5 |
|
|
|
||||
|
Immediate Leave |
18-5 |
|
|
|
|
|
|
|
|
IGMP Configurable-Leave Timer |
18-5 |
|
|
|||||
|
IGMP Report Suppression |
18-6 |
|
|
|
|
|||
|
Configuring IGMP Snooping |
18-6 |
|
|
|
|
|||
|
Default IGMP Snooping Configuration |
18-6 |
|
||||||
|
Enabling or Disabling IGMP Snooping |
18-7 |
|
||||||
|
Setting the Snooping Method |
18-8 |
|
|
|||||
|
Configuring a Multicast Router Port |
18-9 |
|
||||||
|
Configuring a Blade Server Statically to Join a Group |
18-9 |
|||||||
|
Enabling IGMP Immediate Leave |
18-10 |
|
||||||
|
Configuring the IGMP Leave Timer |
18-11 |
|
||||||
|
Configuring TCN-Related Commands |
18-11 |
|
||||||
|
Controlling the Multicast Flooding Time After a TCN Event 18-12 |
||||||||
|
Recovering from Flood Mode |
18-12 |
|
||||||
|
Disabling Multicast Flooding During a TCN Event |
18-13 |
|||||||
|
Configuring the IGMP Snooping Querier |
18-13 |
|
||||||
|
Disabling IGMP Report Suppression |
18-15 |
|
||||||
|
Displaying IGMP Snooping Information |
18-15 |
|
||||||
|
Understanding Multicast VLAN Registration |
18-17 |
|
|
|
|
Using MVR in a Multicast Television Application |
18-18 |
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xvi |
|
|
OL-8915-01 |
|
|
|
|
|
Contents
Configuring MVR 18-19 |
|
Default MVR Configuration |
18-19 |
MVR Configuration Guidelines and Limitations 18-20 |
|
Configuring MVR Global Parameters 18-20 |
|
Configuring MVR Interfaces |
18-21 |
Displaying MVR Information |
18-23 |
Configuring IGMP Filtering and Throttling 18-23 |
|
Default IGMP Filtering and Throttling Configuration 18-24 |
|
Configuring IGMP Profiles |
18-24 |
Applying IGMP Profiles |
18-25 |
|
Setting the Maximum Number of IGMP Groups |
18-26 |
||||
|
Configuring the IGMP Throttling Action |
18-27 |
|
|||
|
Displaying IGMP Filtering and Throttling Configuration |
18-28 |
||||
|
Configuring Port-Based Traffic Control |
|
|
|
||
C H A P T E R 19 |
19-1 |
|
|
|||
|
Configuring Storm Control |
19-1 |
|
|
|
|
|
Understanding Storm Control |
19-1 |
|
|
|
|
|
Default Storm Control Configuration |
19-3 |
|
|||
|
Configuring Storm Control and Threshold Levels |
19-3 |
||||
|
Configuring Protected Ports |
19-5 |
|
|
|
|
|
Default Protected Port Configuration |
19-6 |
|
|||
|
Protected Port Configuration Guidelines |
19-6 |
|
|||
|
Configuring a Protected Port |
19-6 |
|
|
|
|
|
Configuring Port Blocking |
19-6 |
|
|
|
|
|
Default Port Blocking Configuration |
19-7 |
|
|||
|
Blocking Flooded Traffic on an Interface |
19-7 |
|
|||
|
Configuring Port Security |
19-7 |
|
|
|
|
|
Understanding Port Security |
19-8 |
|
|
|
|
|
Secure MAC Addresses |
19-8 |
|
|
|
|
|
Security Violations |
19-9 |
|
|
|
|
|
Default Port Security Configuration |
19-10 |
|
|||
|
Port Security Configuration Guidelines |
19-10 |
|
|||
|
Enabling and Configuring Port Security |
19-11 |
|
|||
|
Enabling and Configuring Port Security Aging 19-15 |
|||||
|
Displaying Port-Based Traffic Control Settings 19-16 |
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
xvii |
|
Contents
C H A P T E R 20 |
Configuring CDP |
20-1 |
|
|
|
|
|
|
|
|
|
|||
|
|
|
|
Understanding CDP |
20-1 |
|
|
|
|
|
|
|
||
|
|
|
|
Configuring CDP |
20-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default CDP Configuration |
20-2 |
|
|
|
|
|||||
|
|
|
|
Configuring the CDP Characteristics |
20-2 |
|
|
|||||||
|
|
|
|
Disabling and Enabling CDP |
|
20-3 |
|
|
|
|
||||
|
|
|
|
Disabling and Enabling CDP on an Interface |
20-4 |
|
||||||||
|
|
|
|
Monitoring and Maintaining CDP |
20-4 |
|
|
|
|
|||||
|
Configuring UDLD |
|
|
|
|
|
|
|
|
|
||||
C H A P T E R 21 |
21-1 |
|
|
|
|
|
|
|
|
|||||
|
|
|
|
Understanding UDLD |
21-1 |
|
|
|
|
|
|
|
||
|
|
|
|
Modes of Operation |
21-1 |
|
|
|
|
|
|
|||
|
|
|
|
Methods to Detect Unidirectional Links |
21-2 |
|
|
|||||||
|
|
|
|
Configuring UDLD |
21-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Default UDLD Configuration |
|
21-4 |
|
|
|
|
||||
|
|
|
|
Configuration Guidelines |
|
21-4 |
|
|
|
|
||||
|
|
|
|
Enabling UDLD Globally |
21-5 |
|
|
|
|
|
||||
|
|
|
|
Enabling UDLD on an Interface |
21-5 |
|
|
|
|
|||||
|
|
|
|
Resetting an Interface Disabled by UDLD |
21-6 |
|
||||||||
|
|
|
|
Displaying UDLD Status |
21-6 |
|
|
|
|
|
|
|||
|
Configuring SPAN and RSPAN |
|
|
|
|
|
|
|||||||
C H A P T E R 22 |
|
22-1 |
|
|
|
|
||||||||
|
|
|
|
Understanding SPAN and RSPAN |
22-1 |
|
|
|
|
|||||
|
|
|
|
Local SPAN |
22-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Remote SPAN |
22-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
SPAN and RSPAN Concepts and Terminology |
22-3 |
|
||||||||
|
|
|
|
SPAN Sessions |
22-3 |
|
|
|
|
|
|
|||
|
|
|
|
Monitored Traffic |
22-4 |
|
|
|
|
|
||||
|
|
|
|
Source Ports 22-5 |
|
|
|
|
|
|
|
|||
|
|
|
|
Source VLANs |
22-6 |
|
|
|
|
|
|
|||
|
|
|
|
VLAN Filtering |
22-6 |
|
|
|
|
|
|
|||
|
|
|
|
Destination Port |
22-6 |
|
|
|
|
|
|
|||
|
|
|
|
RSPAN VLAN |
22-7 |
|
|
|
|
|
|
|
||
|
|
|
|
SPAN and RSPAN Interaction with Other Features 22-8 |
||||||||||
|
|
|
|
Configuring SPAN and RSPAN |
22-9 |
|
|
|
|
|||||
|
|
|
|
Default SPAN and RSPAN Configuration |
22-9 |
|
||||||||
|
|
|
|
Configuring Local SPAN |
22-9 |
|
|
|
|
|
||||
|
|
|
|
SPAN Configuration Guidelines |
22-10 |
|
|
|||||||
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
||||||||
|
|
|
|
|
|
|||||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xviii |
|
|
|
|
|
|
|
|
|
|
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
|
Creating a Local SPAN Session |
22-10 |
|
|
||||
|
Creating a Local SPAN Session and Configuring Incoming Traffic 22-13 |
|||||||
|
Specifying VLANs to Filter |
|
22-14 |
|
|
|
||
|
Configuring RSPAN |
22-15 |
|
|
|
|
|
|
|
RSPAN Configuration Guidelines |
22-15 |
|
|
||||
|
Configuring a VLAN as an RSPAN VLAN |
22-16 |
||||||
|
Creating an RSPAN Source Session 22-17 |
|
||||||
|
Creating an RSPAN Destination Session |
22-19 |
||||||
|
Creating an RSPAN Destination Session and Configuring Incoming Traffic 22-20 |
|||||||
|
Specifying VLANs to Filter |
|
22-22 |
|
|
|
||
|
Displaying SPAN and RSPAN Status |
22-23 |
|
|
||||
|
Configuring RMON |
|
|
|
|
|
|
|
C H A P T E R 23 |
23-1 |
|
|
|
|
|
|
|
|
Understanding RMON |
23-1 |
|
|
|
|
|
|
|
Configuring RMON |
23-2 |
|
|
|
|
|
|
|
Default RMON Configuration |
23-3 |
|
|
|
|||
|
Configuring RMON Alarms and Events |
23-3 |
|
|
||||
|
Collecting Group History Statistics on an Interface |
23-5 |
||||||
|
Collecting Group Ethernet Statistics on an Interface 23-5 |
|||||||
|
Displaying RMON Status |
23-6 |
|
|
|
|
|
|
|
Configuring System Message Logging |
|
|
|
||||
C H A P T E R 24 |
24-1 |
|
|
|||||
|
Understanding System Message Logging |
24-1 |
|
|
||||
|
Configuring System Message Logging |
24-2 |
|
|
||||
|
System Log Message Format |
24-2 |
|
|
|
|||
|
Default System Message Logging Configuration |
24-3 |
||||||
|
Disabling Message Logging |
24-3 |
|
|
|
|||
|
Setting the Message Display Destination Device |
24-4 |
||||||
|
Synchronizing Log Messages |
24-5 |
|
|
|
|||
|
Enabling and Disabling Time Stamps on Log Messages 24-7 |
|||||||
|
Enabling and Disabling Sequence Numbers in Log Messages 24-7 |
|||||||
|
Defining the Message Severity Level |
24-8 |
|
|
||||
|
Limiting Syslog Messages Sent to the History Table and to SNMP 24-9 |
|||||||
|
Configuring UNIX Syslog Servers |
24-10 |
|
|
||||
|
Logging Messages to a UNIX Syslog Daemon |
24-10 |
||||||
|
Configuring the UNIX System Logging Facility |
24-11 |
||||||
|
Displaying the Logging Configuration |
24-12 |
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
xix |
|
Contents
C H A P T E R 25 |
Configuring SNMP 25-1 |
|
|
|
|
|
|
|
|
|
Understanding SNMP |
|
25-1 |
|
|
|
|
|
|
|
SNMP Versions |
25-2 |
|
|
|
|
|
|
|
|
SNMP Manager Functions |
25-3 |
|
|
|
|
|||
|
SNMP Agent Functions 25-4 |
|
|
|
|
|
|||
|
SNMP Community Strings |
25-4 |
|
|
|
|
|||
|
Using SNMP to Access MIB Variables |
25-4 |
|
||||||
|
SNMP Notifications |
25-5 |
|
|
|
|
|
|
|
|
SNMP ifIndex MIB Object Values |
25-5 |
|
|
|||||
|
Configuring SNMP |
25-6 |
|
|
|
|
|
|
|
|
Default SNMP Configuration |
25-6 |
|
|
|
||||
|
SNMP Configuration Guidelines |
25-6 |
|
|
|
||||
|
Disabling the SNMP Agent |
25-7 |
|
|
|
|
|||
|
Configuring Community Strings |
25-8 |
|
|
|
||||
|
Configuring SNMP Groups and Users |
25-9 |
|
||||||
|
Configuring SNMP Notifications |
25-11 |
|
|
|||||
|
Setting the Agent Contact and Location Information |
25-14 |
|||||||
|
Limiting TFTP Servers Used Through SNMP |
25-15 |
|
||||||
|
SNMP Examples |
25-15 |
|
|
|
|
|
|
|
|
Displaying SNMP Status |
25-16 |
|
|
|
|
|
|
|
|
Configuring Network Security with ACLs |
|
|
||||||
C H A P T E R 26 |
26-1 |
|
|||||||
|
Understanding ACLs |
26-1 |
|
|
|
|
|
|
|
|
Supported ACLs |
26-2 |
|
|
|
|
|
|
|
|
Port ACLs |
26-3 |
|
|
|
|
|
|
|
|
VLAN Maps |
26-4 |
|
|
|
|
|
|
|
|
Handling Fragmented and Unfragmented Traffic 26-4 |
||||||||
|
Configuring IPv4 ACLs |
26-5 |
|
|
|
|
|
|
|
|
Creating Standard and Extended IPv4 ACLs |
26-6 |
|
||||||
|
Access List Numbers |
26-7 |
|
|
|
|
|||
|
Creating a Numbered Standard ACL |
26-8 |
|
||||||
|
Creating a Numbered Extended ACL |
26-9 |
|
||||||
|
Resequencing ACEs in an ACL |
26-13 |
|
|
|||||
|
Creating Named Standard and Extended ACLs |
26-13 |
|||||||
|
Using Time Ranges with ACLs |
26-15 |
|
|
|||||
|
Including Comments in ACLs |
26-17 |
|
|
|
|
|
Applying an IPv4 ACL to a Terminal Line 26-17 |
|
|
|
|
|
Applying an IPv4 ACL to an Interface 26-18 |
|
|
|
|
|
Hardware and Software Treatment of IP ACLs |
26-19 |
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
xx |
|
|
OL-8915-01 |
|
|
|
|
|
Contents
IPv4 ACL Configuration Examples
Numbered ACLs
Extended ACLs
Named ACLs 26-20
|
|
Time Range Applied to an IP ACL |
26-20 |
|
|
|
|
||||||
|
|
Commented IP ACL Entries |
26-20 |
|
|
|
|
|
|
||||
|
|
Creating Named MAC Extended ACLs |
26-21 |
|
|
|
|
|
|
||||
|
|
Applying a MAC ACL to a Layer 2 Interface |
26-22 |
|
|
|
|
||||||
|
|
Configuring VLAN Maps |
26-23 |
|
|
|
|
|
|
|
|
|
|
|
|
VLAN Map Configuration Guidelines |
26-24 |
|
|
|
|
||||||
|
|
Creating a VLAN Map |
26-25 |
|
|
|
|
|
|
|
|
|
|
|
|
Examples of ACLs and VLAN Maps |
26-25 |
|
|
|
|
||||||
|
|
Applying a VLAN Map to a VLAN |
26-27 |
|
|
|
|
|
|
||||
|
|
Using VLAN Maps in Your Network |
|
26-28 |
|
|
|
|
|
||||
|
|
Wiring Closet Configuration |
|
26-28 |
|
|
|
|
|
|
|||
|
|
Denying Access to a Server on a VLAN |
26-29 |
|
|
|
|
||||||
|
|
Displaying IPv4 ACL Configuration |
26-30 |
|
|
|
|
|
|
|
|||
|
Configuring QoS 27-1 |
|
|
|
|
|
|
|
|
|
|
|
|
C H A P T E R 27 |
|
|
|
|
|
|
|
|
|
|
|
||
|
|
Understanding QoS |
27-1 |
|
|
|
|
|
|
|
|
|
|
|
|
Basic QoS Model |
27-3 |
|
|
|
|
|
|
|
|
|
|
|
|
Classification 27-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Classification Based on QoS ACLs |
27-7 |
|
|
|
|
||||||
|
|
Classification Based on Class Maps and Policy Maps 27-7 |
|||||||||||
|
|
Policing and Marking |
27-8 |
|
|
|
|
|
|
|
|
|
|
|
|
Policing on Physical Ports |
27-9 |
|
|
|
|
|
|
|
|||
|
|
Policing on SVIs |
27-10 |
|
|
|
|
|
|
|
|
|
|
|
|
Mapping Tables |
27-12 |
|
|
|
|
|
|
|
|
|
|
|
|
Queueing and Scheduling Overview |
27-13 |
|
|
|
|
|
|||||
|
|
Weighted Tail Drop 27-13 |
|
|
|
|
|
|
|
|
|
||
|
|
SRR Shaping and Sharing |
27-14 |
|
|
|
|
|
|
|
|||
|
|
Queueing and Scheduling on Ingress Queues |
27-15 |
|
|
|
|||||||
|
|
Queueing and Scheduling on Egress Queues |
27-17 |
|
|
|
|||||||
|
|
Packet Modification |
27-19 |
|
|
|
|
|
|
|
|
|
|
|
|
Configuring Auto-QoS |
27-20 |
|
|
|
|
|
|
|
|
|
|
|
|
Generated Auto-QoS Configuration |
|
27-21 |
|
|
|
|
|
||||
|
|
Effects of Auto-QoS on the Configuration |
|
27-25 |
|
|
|
|
|||||
|
|
Auto-QoS Configuration Guidelines |
|
27-25 |
|
|
|
|
|
||||
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
||||||
|
|
|
|
|
|||||||||
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
xxi |
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
Enabling Auto-QoS for VoIP |
27-26 |
|
|
|
|
|
|
||
Auto-QoS Configuration Example |
27-27 |
|
|
|
|
|
|||
Displaying Auto-QoS Information |
27-29 |
|
|
|
|
|
|
||
Configuring Standard QoS |
27-29 |
|
|
|
|
|
|
|
|
Default Standard QoS Configuration |
27-30 |
|
|
|
|
||||
Default Ingress Queue Configuration |
27-30 |
|
|
|
|||||
Default Egress Queue Configuration |
27-31 |
|
|
|
|||||
Default Mapping Table Configuration |
|
27-32 |
|
|
|
||||
Standard QoS Configuration Guidelines |
27-32 |
|
|
|
|||||
QoS ACL Guidelines |
27-32 |
|
|
|
|
|
|
|
|
Applying QoS on Interfaces |
27-32 |
|
|
|
|
|
|||
Policing Guidelines |
27-33 |
|
|
|
|
|
|
|
|
General QoS Guidelines |
27-33 |
|
|
|
|
|
|
||
Enabling QoS Globally |
27-34 |
|
|
|
|
|
|
|
|
Enabling VLAN-Based QoS on Physical Ports |
27-34 |
|
|
|
|||||
Configuring Classification Using Port Trust States |
27-35 |
|
|
||||||
Configuring the Trust State on Ports within the QoS Domain 27-35 |
|
||||||||
Configuring the CoS Value for an Interface 27-37 |
|
|
|||||||
Configuring a Trusted Boundary to Ensure Port Security |
27-37 |
|
|||||||
Enabling DSCP Transparency Mode |
27-39 |
|
|
|
|||||
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain 27-39 |
|
||||||||
Configuring a QoS Policy 27-41 |
|
|
|
|
|
|
|
||
Classifying Traffic by Using ACLs |
27-42 |
|
|
|
|||||
Classifying Traffic by Using Class Maps |
27-45 |
|
|
|
|||||
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps |
27-47 |
||||||||
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps |
27-51 |
||||||||
Classifying, Policing, and Marking Traffic by Using Aggregate Policers 27-57 |
|
||||||||
Configuring DSCP Maps |
27-59 |
|
|
|
|
|
|
|
|
Configuring the CoS-to-DSCP Map |
|
27-59 |
|
|
|
||||
Configuring the IP-Precedence-to-DSCP Map |
27-60 |
|
|
||||||
Configuring the Policed-DSCP Map |
27-61 |
|
|
|
|||||
Configuring the DSCP-to-CoS Map |
|
27-62 |
|
|
|
||||
Configuring the DSCP-to-DSCP-Mutation Map |
27-63 |
|
|
||||||
Configuring Ingress Queue Characteristics |
27-65 |
|
|
|
|||||
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds 27-66 |
|||||||||
Allocating Buffer Space Between the Ingress Queues |
27-67 |
|
|||||||
Allocating Bandwidth Between the Ingress Queues 27-67 |
|
||||||||
Configuring the Ingress Priority Queue |
27-68 |
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
xxii |
OL-8915-01 |
|
|
|
Contents
|
|
Configuring Egress Queue Characteristics |
27-69 |
|
|
|
|
|
|
|||||
|
|
Configuration Guidelines 27-70 |
|
|
|
|
|
|
|
|
|
|||
|
|
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set 27-70 |
||||||||||||
|
|
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID 27-72 |
||||||||||||
|
|
Configuring SRR Shaped Weights on Egress Queues |
27-74 |
|
|
|
||||||||
|
|
Configuring SRR Shared Weights on Egress Queues |
27-75 |
|
|
|
||||||||
|
|
Configuring the Egress Expedite Queue |
27-76 |
|
|
|
|
|
||||||
|
|
Limiting the Bandwidth on an Egress Interface |
|
27-76 |
|
|
|
|
||||||
|
|
Displaying Standard QoS Information |
27-77 |
|
|
|
|
|
|
|
|
|||
|
Configuring EtherChannels and Layer 2 Trunk Failover |
|
|
|
|
|
||||||||
C H A P T E R 28 |
28-1 |
|
|
|
|
|||||||||
|
|
Understanding EtherChannels |
28-1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
EtherChannel Overview |
28-2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Port-Channel Interfaces |
28-3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Port Aggregation Protocol |
28-4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
PAgP Modes |
28-4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
PAgP Interaction with Other Features |
|
28-5 |
|
|
|
|
|
|
||||
|
|
Link Aggregation Control Protocol |
28-5 |
|
|
|
|
|
|
|
|
|||
|
|
LACP Modes |
28-5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
LACP Interaction with Other Features |
|
28-6 |
|
|
|
|
|
|
||||
|
|
EtherChannel On Mode |
28-6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Load Balancing and Forwarding Methods |
28-6 |
|
|
|
|
|
|
|||||
|
|
Configuring EtherChannels 28-8 |
|
|
|
|
|
|
|
|
|
|
||
|
|
Default EtherChannel Configuration |
|
28-9 |
|
|
|
|
|
|
|
|||
|
|
EtherChannel Configuration Guidelines |
28-9 |
|
|
|
|
|
|
|||||
|
|
Configuring Layer 2 EtherChannels |
|
28-10 |
|
|
|
|
|
|
|
|||
|
|
Configuring EtherChannel Load Balancing |
28-12 |
|
|
|
|
|
|
|||||
|
|
Configuring the PAgP Learn Method and Priority |
28-13 |
|
|
|
|
|||||||
|
|
Configuring LACP Hot-Standby Ports |
28-14 |
|
|
|
|
|
|
|
||||
|
|
Configuring the LACP System Priority |
|
28-15 |
|
|
|
|
|
|
||||
|
|
Configuring the LACP Port Priority |
28-16 |
|
|
|
|
|
|
|||||
|
|
Displaying EtherChannel, PAgP, and LACP Status |
28-17 |
|
|
|
|
|
||||||
|
|
Understanding Layer 2 Trunk Failover |
28-17 |
|
|
|
|
|
|
|
|
|||
|
|
Configuring Layer 2 Trunk Failover |
28-18 |
|
|
|
|
|
|
|
||||
|
|
Default Layer 2 Trunk Failover Configuration |
28-18 |
|
|
|
|
|||||||
|
|
Layer 2 Trunk Failover Configuration Guidelines |
28-19 |
|
|
|
||||||||
|
|
Configuring Layer 2 Trunk Failover |
28-19 |
|
|
|
|
|
|
|||||
|
|
Displaying Layer 2 Trunk Failover Status |
28-20 |
|
|
|
|
|
||||||
|
|
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
|||||||
|
|
|
|
|
||||||||||
|
OL-8915-01 |
|
|
|
|
|
|
|
|
|
|
|
xxiii |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Contents
C H A P T E R 29 |
Troubleshooting 29-1 |
|
|
|
Recovering from a Software Failure 29-2 |
|
|
|
Recovering from a Lost or Forgotten Password |
29-3 |
|
|
Procedure with Password Recovery Enabled |
29-4 |
|
|
Procedure with Password Recovery Disabled |
29-6 |
|
|
Preventing Autonegotiation Mismatches |
29-7 |
|
|
SFP Module Security and Identification |
29-8 |
|
|
Monitoring SFP Module Status 29-8 |
|
|
|
Monitoring Temperature 29-9 |
|
|
|
Using Ping 29-9 |
|
|
|
Understanding Ping |
29-9 |
|
|
|
|||
|
Executing Ping |
29-9 |
|
|
|
|
||
|
Using Layer 2 Traceroute |
29-10 |
|
|
|
|||
|
Understanding Layer 2 Traceroute |
29-10 |
|
|||||
|
Usage Guidelines |
|
29-11 |
|
|
|
|
|
|
Displaying the Physical Path |
29-12 |
|
|||||
|
Using IP Traceroute |
29-12 |
|
|
|
|
||
|
Understanding IP Traceroute |
29-12 |
|
|||||
|
Executing IP Traceroute |
29-13 |
|
|
||||
|
Using TDR |
29-14 |
|
|
|
|
|
|
|
Understanding TDR |
29-14 |
|
|
|
|||
|
Running TDR and Displaying the Results |
29-14 |
||||||
|
Using Debug Commands |
29-14 |
|
|
|
|||
|
Enabling Debugging on a Specific Feature |
29-15 |
||||||
|
Enabling All-System Diagnostics |
29-15 |
|
|||||
|
Redirecting Debug and Error Message Output 29-16 |
|||||||
|
Using the show platform forward Command |
29-16 |
||||||
|
Using the crashinfo Files |
29-18 |
|
|
|
|||
|
Basic crashinfo Files |
29-18 |
|
|
|
|||
|
Extended crashinfo Files |
29-18 |
|
|
||||
|
Supported MIBs A-1 |
|
|
|
|
|
|
|
A P P E N D I X A |
|
|
|
|
|
|
||
|
MIB List |
A-1 |
|
|
|
|
|
|
|
Using FTP to Access the MIB Files |
A-3 |
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
xxiv |
OL-8915-01 |
|
|
|
Contents
A P P E N D I X B |
Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 |
||
|
Working with the Flash File System |
B-1 |
|
|
Displaying Available File Systems |
B-2 |
|
|
Setting the Default File System |
B-3 |
|
|
Displaying Information about Files on a File System B-3 |
||
|
Changing Directories and Displaying the Working Directory B-3 |
||
|
Creating and Removing Directories B-4 |
||
|
Copying Files |
B-4 |
|
|
Deleting Files |
B-5 |
|
|
Creating, Displaying, and Extracting tar Files B-5 |
|
|
|
|
|
|||||
|
Creating a tar File |
B-6 |
|
|
|
|
|
|
|
|
|
|
Displaying the Contents of a tar File |
B-6 |
|
|
|
|
|
|
|||
|
Extracting a tar File |
B-8 |
|
|
|
|
|
|
|
|
|
|
Displaying the Contents of a File B-8 |
|
|
|
|
|
|
|
|||
|
Working with Configuration Files |
B-8 |
|
|
|
|
|
|
|
|
|
|
Guidelines for Creating and Using Configuration Files |
B-9 |
|
|
|
|
|||||
|
Configuration File Types and Location |
B-10 |
|
|
|
|
|
|
|||
|
Creating a Configuration File By Using a Text Editor |
B-10 |
|
|
|
|
|||||
|
Copying Configuration Files By Using TFTP |
B-10 |
|
|
|
|
|
|
|||
|
Preparing to Download or Upload a Configuration File By Using TFTP |
B-11 |
|||||||||
|
Downloading the Configuration File By Using TFTP B-11 |
|
|
|
|
||||||
|
Uploading the Configuration File By Using TFTP |
B-12 |
|
|
|
|
|||||
|
Copying Configuration Files By Using FTP |
B-12 |
|
|
|
|
|
|
|||
|
Preparing to Download or Upload a Configuration File By Using FTP |
B-13 |
|||||||||
|
Downloading a Configuration File By Using FTP |
B-13 |
|
|
|
|
|||||
|
Uploading a Configuration File By Using FTP |
B-14 |
|
|
|
|
|||||
|
Copying Configuration Files By Using RCP |
B-15 |
|
|
|
|
|
|
|||
|
Preparing to Download or Upload a Configuration File By Using RCP |
B-16 |
|||||||||
|
Downloading a Configuration File By Using RCP |
B-17 |
|
|
|
|
|||||
|
Uploading a Configuration File By Using RCP |
B-18 |
|
|
|
|
|||||
|
Clearing Configuration Information |
B-18 |
|
|
|
|
|
|
|
||
|
Clearing the Startup Configuration File |
B-19 |
|
|
|
|
|
||||
|
Deleting a Stored Configuration File |
B-19 |
|
|
|
|
|
|
|||
|
Working with Software Images |
B-19 |
|
|
|
|
|
|
|
|
|
|
Image Location on the Switch |
B-20 |
|
|
|
|
|
|
|
|
|
|
tar File Format of Images on a Server or Cisco.com |
B-20 |
|
|
|
|
|||||
|
Copying Image Files By Using TFTP |
B-21 |
|
|
|
|
|
|
|
||
|
Preparing to Download or Upload an Image File By Using TFTP B-21 |
|
|
|
|
||||||
|
Downloading an Image File By Using TFTP |
B-22 |
|
|
|
|
|||||
|
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
|
|
|
||||||
|
|
|
|||||||||
|
OL-8915-01 |
|
|
|
|
|
|
|
|
xxv |
|
|
|
|
|
|
|
|
|
|
|
Contents
|
|
Uploading an Image File By Using TFTP |
|
B-24 |
|
|
|||
|
Copying Image Files By Using FTP |
B-24 |
|
|
|
|
|||
|
|
Preparing to Download or Upload an Image File By Using FTP |
B-25 |
||||||
|
|
Downloading an Image File By Using FTP |
B-26 |
|
|||||
|
|
Uploading an Image File By Using FTP |
B-27 |
|
|
||||
|
Copying Image Files By Using RCP |
B-28 |
|
|
|
|
|||
|
|
Preparing to Download or Upload an Image File By Using RCP |
B-29 |
||||||
|
|
Downloading an Image File By Using RCP |
B-30 |
|
|||||
|
|
Uploading an Image File By Using RCP |
|
B-32 |
|
|
|||
|
Unsupported Commands in Cisco IOS Release 12.2(25)SEF C-1 |
|
|||||||
A P P E N D I X C |
|
||||||||
|
Access Control Lists |
C-1 |
|
|
|
|
|
|
|
|
Unsupported Privileged EXEC Commands |
C-1 |
|
|
|||||
|
Unsupported Global Configuration Commands |
C-1 |
|
||||||
|
Unsupported Route-Map Configuration Commands |
C-1 |
|
||||||
|
IGMP Snooping Commands |
C-2 |
|
|
|
|
|
||
|
Unsupported Global Configuration Commands |
C-2 |
|
||||||
|
Interface Commands |
C-2 |
|
|
|
|
|
|
|
|
Unsupported Privileged EXEC Commands |
C-2 |
|
|
|||||
|
Unsupported Global Configuration Commands |
C-2 |
|
||||||
|
Unsupported Interface Configuration Commands |
C-2 |
|
||||||
|
MAC Address Commands |
C-2 |
|
|
|
|
|
||
|
Unsupported Privileged EXEC Commands |
C-2 |
|
|
|||||
|
Unsupported Global Configuration Commands |
C-3 |
|
||||||
|
Miscellaneous C-3 |
|
|
|
|
|
|
|
|
|
Unsupported Privileged EXEC Commands |
C-3 |
|
|
|||||
|
Unsupported Global Configuration Commands |
C-3 |
|
||||||
|
Network Address Translation (NAT) Commands |
|
C-3 |
|
|
||||
|
Unsupported Privileged EXEC Commands |
C-3 |
|
|
|||||
|
QoS C-3 |
|
|
|
|
|
|
|
|
|
Unsupported Global Configuration Commands |
C-3 |
|
||||||
|
Unsupported Interface Configuration Commands |
C-4 |
|
||||||
|
Unsupported Policy-Map Configuration Commands |
C-4 |
|
||||||
|
RADIUS |
C-4 |
|
|
|
|
|
|
|
|
Unsupported Global Configuration Commands |
C-4 |
|
||||||
|
SNMP |
C-4 |
|
|
|
|
|
|
|
|
Unsupported Global Configuration Commands |
C-4 |
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
xxvi |
OL-8915-01 |
|
|
|
Contents
Spanning Tree C-4 |
|
|
|
Unsupported Global Configuration Command |
C-4 |
||
Unsupported Interface Configuration Command |
C-4 |
||
VLAN |
C-5 |
|
|
Unsupported Global Configuration Commands |
C-5 |
||
Unsupported vlan-config Command |
C-5 |
|
|
Unsupported User EXEC Commands |
C-5 |
|
|
VTP |
C-5 |
|
|
Unsupported Privileged EXEC Commands C-5
I N D E X
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
xxvii |
|
Contents
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
xxviii |
OL-8915-01 |
This guide is for the networking professional managing the Cisco Catalyst Blade Switch 3020 for HP, hereafter referred to as the switch module. Before using this guide, you should have experience working with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local area networking.
This guide provides the information that you need to configure Cisco IOS software features on your switch. The Cisco Catalyst Blade Switch 3020 for HPsoftware provides enterprise-class intelligent services such as access control lists (ACLs) and quality of service (QoS) features.
This guide provides procedures for using the commands that have been created or changed for use with the Cisco Catalyst Blade Switch3020 for HP. It does not provide detailed information about these commands. For detailed information about these commands, see the Cisco Catalyst Blade Switch 3020 for HP Command Reference for this release. For information about the standard Cisco IOS Release 12.2 commands, see the Cisco IOS documentation set available from the Cisco.com home page at Technical Support & Documentation > Cisco IOS Software.
This guide does not provide detailed information on the graphical user interface (GUI) for the embedded device manager that you can use to manage the switch. However, the concepts in this guide are applicable to the GUI user. For information about the device manager, see the switch online help.
This guide does not describe system messages you might encounter or how to install your switch. For more information, see the Cisco Catalyst Blade Switch 3020 for HP System Message Guide for this release and the Cisco Catalyst Blade Switch 3020 for HP Hardware Installation Guide.
For documentation updates, see the release notes for this release.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
|
OL-8915-01 |
xxvii |
|
Preface
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
•Commands and keywords are in boldface text.
•Arguments for which you supply values are in italic.
•Square brackets ([ ]) mean optional elements.
•Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
•Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional element.
Interactive examples use these conventions:
•Terminal sessions and system displays are in screen font.
•Information you enter is in boldface screen font.
•Nonprinting characters, such as passwords or tabs, are in angle brackets (< >). Notes, cautions, and timesavers use these conventions and symbols:
Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in this manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.
For more information about the switch, see the Cisco Catalyst Blade Switch 3020 for HP documentation on Cisco.com.
http://www.cisco.com/en/US/products/ps6748/tsd_products_support_series_home.html
Note Before installing, configuring, or upgrading the switch, see these documents:
•For initial configuration information, see the “Configuring the Switch Module”section in the getting started guide or the “Configuring the Switch with the CLI-Based Setup Program” appendix in the hardware installation guide.
•For device manager requirements, see the “System Requirements” section in the release notes (not orderable but available on Cisco.com).
•For upgrading information, see the “Downloading Software” section in the release notes.
|
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide |
xxviii |
OL-8915-01 |