HP CISCO CATALYST BLADE SWITCH 3020 User Manual

HP CISCO CATALYST BLADE SWITCH 3020 User Manual

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

Cisco IOS Release 12.2(25)SEF

June 2006

Corporate Headquarters

Cisco Systems, Inc. 170 West Tasman Drive

San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

800 553-NETS (6387) Fax: 408 526-4100

Text Part Number: OL-8915-01

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

Copyright © 2006 Cisco Systems, Inc. All rights reserved.

C O N T E N T S

 

Preface xxvii

 

 

 

 

 

 

 

 

Audience xxvii

 

 

 

 

 

 

 

Purpose

xxvii

 

 

 

 

 

 

 

Conventions

xxviii

 

 

 

 

 

 

 

Related Publications

xxviii

 

 

 

 

 

Obtaining Documentation

xxix

 

 

 

 

Cisco.com

xxix

 

 

 

 

 

 

 

Product Documentation DVD

xxix

 

 

 

Ordering Documentation

xxx

 

 

 

Documentation Feedback

xxx

 

 

 

 

Cisco Product Security Overview

xxx

 

 

 

Reporting Security Problems in Cisco Products

xxxi

 

Obtaining Technical Assistance

xxxi

 

 

 

Cisco Technical Support & Documentation Website xxxii

 

Submitting a Service Request

xxxii

 

 

 

Definitions of Service Request Severity

xxxiii

 

 

Obtaining Additional Publications and Information

xxxiii

 

Overview

 

 

 

 

 

 

 

 

C H A P T E R 1

1-1

 

 

 

 

 

 

 

 

Features

1-1

 

 

 

 

 

 

 

 

Ease-of-Deployment and Ease-of-Use Features

1-2

 

Performance Features

 

1-2

 

 

 

 

Management Options

 

1-3

 

 

 

 

Manageability Features

1-3

 

 

 

 

Availability and Redundancy Features

1-4

 

 

VLAN Features

1-5

 

 

 

 

 

 

Security Features

1-5

 

 

 

 

 

 

QoS and CoS Features

 

1-7

 

 

 

 

Monitoring Features

1-8

 

 

 

 

Default Settings After Initial Switch Configuration

1-8

 

Design Concepts for Using the Switch 1-10

 

 

 

Where to Go Next 1-13

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

iii

 

Contents

C H A P T E R 2

 

Using the Command-Line Interface

2-1

 

 

 

 

 

 

 

 

 

 

Understanding Command Modes

2-1

 

 

 

 

 

 

 

 

 

 

 

Understanding the Help System

2-3

 

 

 

 

 

 

 

 

 

 

 

Understanding Abbreviated Commands

2-4

 

 

 

 

 

 

 

 

 

 

Understanding no and default Forms of Commands

2-4

 

 

 

 

 

 

 

Understanding CLI Error Messages

2-5

 

 

 

 

 

 

 

 

 

 

Using Configuration Logging

2-5

 

 

 

 

 

 

 

 

 

 

 

 

Using Command History

2-6

 

 

 

 

 

 

 

 

 

 

 

 

 

Changing the Command History Buffer Size

2-6

 

 

 

 

 

 

 

 

Recalling Commands

2-6

 

 

 

 

 

 

 

 

 

 

 

 

 

Disabling the Command History Feature

2-7

 

 

 

 

 

 

 

 

 

Using Editing Features

2-7

 

 

 

 

 

 

 

 

 

 

 

 

 

Enabling and Disabling Editing Features

2-7

 

 

 

 

 

 

 

 

 

Editing Commands through Keystrokes

2-7

 

 

 

 

 

 

 

 

 

Editing Command Lines that Wrap

2-9

 

 

 

 

 

 

 

 

 

 

Searching and Filtering Output of show and more Commands 2-10

 

 

 

 

 

 

 

Accessing the CLI 2-10

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Accessing the CLI through a Console Connection or through Telnet

2-10

 

 

 

Assigning the Switch IP Address and Default Gateway 3-1

 

 

C H A P T E R 3

 

 

 

 

 

 

 

 

Understanding the Boot Process

3-1

 

 

 

 

 

 

 

 

 

 

 

Assigning Switch Information

3-2

 

 

 

 

 

 

 

 

 

 

 

Default Switch Information

3-3

 

 

 

 

 

 

 

 

 

 

 

Understanding DHCP-Based Autoconfiguration

3-3

 

 

 

 

 

 

 

DHCP Client Request Process

3-4

 

 

 

 

 

 

 

 

 

 

Configuring DHCP-Based Autoconfiguration

3-5

 

 

 

 

 

 

 

DHCP Server Configuration Guidelines

3-5

 

 

 

 

 

 

 

 

Configuring the TFTP Server

3-6

 

 

 

 

 

 

 

 

 

 

Configuring the DNS

3-6

 

 

 

 

 

 

 

 

 

 

 

Configuring the Relay Device

3-6

 

 

 

 

 

 

 

 

 

 

Obtaining Configuration Files

3-7

 

 

 

 

 

 

 

 

 

 

Example Configuration

3-8

 

 

 

 

 

 

 

 

 

 

 

Manually Assigning IP Information

3-10

 

 

 

 

 

 

 

 

 

 

Checking and Saving the Running Configuration

3-10

 

 

 

 

 

 

 

Modifying the Startup Configuration

3-13

 

 

 

 

 

 

 

 

 

 

Default Boot Configuration

3-14

 

 

 

 

 

 

 

 

 

 

 

Automatically Downloading a Configuration File

3-14

 

 

 

 

 

 

 

Specifying the Filename to Read and Write the System Configuration

3-14

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

iv

 

 

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

 

 

Booting Manually

3-15

 

 

 

 

 

 

 

 

 

 

 

Booting a Specific Software Image

3-16

 

 

 

 

 

 

Controlling Environment Variables

3-16

 

 

 

 

 

 

 

Scheduling a Reload of the Software Image

3-18

 

 

 

 

 

 

Configuring a Scheduled Reload

3-18

 

 

 

 

 

 

 

Displaying Scheduled Reload Information

3-19

 

 

 

 

 

Configuring Cisco IOS CNS Agents

 

 

 

 

 

 

 

C H A P T E R 4

4-1

 

 

 

 

 

 

 

 

Understanding Cisco Configuration Engine Software

4-1

 

 

 

 

 

Configuration Service

4-2

 

 

 

 

 

 

 

 

 

 

 

Event Service

4-3

 

 

 

 

 

 

 

 

 

 

 

 

 

NameSpace Mapper

4-3

 

 

 

 

 

 

 

 

 

 

What You Should Know About the CNS IDs and Device Hostnames 4-3

 

 

ConfigID

4-3

 

 

 

 

 

 

 

 

 

 

 

 

 

DeviceID

4-4

 

 

 

 

 

 

 

 

 

 

 

 

 

Hostname and DeviceID

4-4

 

 

 

 

 

 

 

 

Using Hostname, DeviceID, and ConfigID

4-4

 

 

 

 

 

Understanding Cisco IOS Agents

 

4-5

 

 

 

 

 

 

 

 

Initial Configuration

4-5

 

 

 

 

 

 

 

 

 

 

 

Incremental (Partial) Configuration

4-6

 

 

 

 

 

 

 

Synchronized Configuration

4-6

 

 

 

 

 

 

 

 

 

Configuring Cisco IOS Agents

4-6

 

 

 

 

 

 

 

 

 

 

Enabling Automated CNS Configuration

4-6

 

 

 

 

 

 

Enabling the CNS Event Agent

 

4-8

 

 

 

 

 

 

 

 

Enabling the Cisco IOS CNS Agent

4-9

 

 

 

 

 

 

 

Enabling an Initial Configuration

4-9

 

 

 

 

 

 

Enabling a Partial Configuration

4-11

 

 

 

 

 

 

Displaying CNS Configuration

4-12

 

 

 

 

 

 

 

 

Administering the Switch

 

 

 

 

 

 

 

 

 

 

C H A P T E R 5

5-1

 

 

 

 

 

 

 

 

 

 

 

Managing the System Time and Date

5-1

 

 

 

 

 

 

 

Understanding the System Clock

5-1

 

 

 

 

 

 

 

Understanding Network Time Protocol

5-2

 

 

 

 

 

 

Configuring NTP

5-3

 

 

 

 

 

 

 

 

 

 

 

 

Default NTP Configuration

 

5-4

 

 

 

 

 

 

 

 

Configuring NTP Authentication

5-4

 

 

 

 

 

 

Configuring NTP Associations

5-5

 

 

 

 

 

 

 

Configuring NTP Broadcast Service

5-6

 

 

 

 

 

 

Configuring NTP Access Restrictions

5-8

 

 

 

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

v

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

 

 

 

 

 

Configuring the Source IP Address for NTP Packets

5-10

 

 

 

 

 

 

Displaying the NTP Configuration

5-11

 

 

 

 

 

 

 

 

 

Configuring Time and Date Manually

5-11

 

 

 

 

 

 

 

 

 

Setting the System Clock

5-11

 

 

 

 

 

 

 

 

 

 

Displaying the Time and Date Configuration

5-12

 

 

 

 

 

 

 

Configuring the Time Zone

5-12

 

 

 

 

 

 

 

 

 

 

Configuring Summer Time (Daylight Saving Time)

5-13

 

 

 

 

 

 

Configuring a System Name and Prompt

5-14

 

 

 

 

 

 

 

 

 

Default System Name and Prompt Configuration

5-15

 

 

 

 

 

 

 

Configuring a System Name

5-15

 

 

 

 

 

 

 

 

 

 

Understanding DNS

5-15

 

 

 

 

 

 

 

 

 

 

 

 

Default DNS Configuration

5-16

 

 

 

 

 

 

 

 

 

 

Setting Up DNS

5-16

 

 

 

 

 

 

 

 

 

 

 

 

Displaying the DNS Configuration

5-17

 

 

 

 

 

 

 

 

 

Creating a Banner 5-17

 

 

 

 

 

 

 

 

 

 

 

 

 

Default Banner Configuration

5-17

 

 

 

 

 

 

 

 

 

 

Configuring a Message-of-the-Day Login Banner

5-18

 

 

 

 

 

 

 

Configuring a Login Banner

5-19

 

 

 

 

 

 

 

 

 

 

 

Managing the MAC Address Table 5-19

 

 

 

 

 

 

 

 

 

 

Building the Address Table

5-20

 

 

 

 

 

 

 

 

 

 

 

MAC Addresses and VLANs

5-20

 

 

 

 

 

 

 

 

 

 

Default MAC Address Table Configuration

5-21

 

 

 

 

 

 

 

Changing the Address Aging Time

5-21

 

 

 

 

 

 

 

 

 

Removing Dynamic Address Entries

5-22

 

 

 

 

 

 

 

 

 

Configuring MAC Address Notification Traps

5-22

 

 

 

 

 

 

 

Adding and Removing Static Address Entries

5-24

 

 

 

 

 

 

 

Configuring Unicast MAC Address Filtering

5-25

 

 

 

 

 

 

 

Displaying Address Table Entries

5-26

 

 

 

 

 

 

 

 

 

Managing the ARP Table

5-26

 

 

 

 

 

 

 

 

 

Configuring Switch-Based Authentication

 

 

 

 

 

C H A P T E R 6

 

6-1

 

 

 

 

 

 

 

 

 

Preventing Unauthorized Access to Your Switch

6-1

 

 

 

 

 

 

 

Protecting Access to Privileged EXEC Commands

6-2

 

 

 

 

 

 

 

Default Password and Privilege Level Configuration 6-2

 

 

 

 

 

Setting or Changing a Static Enable Password

6-3

 

 

 

 

 

 

 

Protecting Enable and Enable Secret Passwords with Encryption 6-3

 

 

 

 

 

Disabling Password Recovery

6-5

 

 

 

 

 

 

 

 

 

 

Setting a Telnet Password for a Terminal Line

6-6

 

 

 

 

 

 

 

Configuring Username and Password Pairs

6-6

 

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

vi

 

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

Configuring Multiple Privilege Levels

6-7

 

 

Setting the Privilege Level for a Command

6-8

 

Changing the Default Privilege Level for Lines 6-9

 

Logging into and Exiting a Privilege Level

6-9

 

Controlling Switch Access with TACACS+

6-10

 

 

Understanding TACACS+

6-10

 

 

 

 

 

TACACS+ Operation

6-12

 

 

 

 

 

Configuring TACACS+

6-12

 

 

 

 

 

Default TACACS+ Configuration

6-13

 

 

Identifying the TACACS+ Server Host and Setting the Authentication Key 6-13

 

Configuring TACACS+ Login Authentication

6-14

 

Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services

6-16

Starting TACACS+ Accounting

 

6-17

 

 

 

Displaying the TACACS+ Configuration

6-17

 

 

Controlling Switch Access with RADIUS

 

6-17

 

 

Understanding RADIUS

6-18

 

 

 

 

 

RADIUS Operation

6-19

 

 

 

 

 

Configuring RADIUS

6-20

 

 

 

 

 

Default RADIUS Configuration

 

6-20

 

 

 

Identifying the RADIUS Server Host

6-20

 

 

Configuring RADIUS Login Authentication

6-23

 

Defining AAA Server Groups

6-25

 

 

 

Configuring RADIUS Authorization for User Privileged Access and Network Services

6-27

Starting RADIUS Accounting

6-28

 

 

 

Configuring Settings for All RADIUS Servers

6-29

 

Configuring the Switch to Use Vendor-Specific RADIUS Attributes 6-29

 

Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 6-31

 

Displaying the RADIUS Configuration

6-31

 

 

Controlling Switch Access with Kerberos

6-32

 

 

Understanding Kerberos

6-32

 

 

 

 

 

Kerberos Operation

6-34

 

 

 

 

 

Authenticating to a Boundary Switch

6-34

 

 

Obtaining a TGT from a KDC

6-35

 

 

 

Authenticating to Network Services

6-35

 

 

Configuring Kerberos

6-35

 

 

 

 

 

Configuring the Switch for Local Authentication and Authorization 6-36

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

vii

 

Contents

 

 

 

 

 

Configuring the Switch for Secure Shell

6-37

 

 

 

 

 

 

 

 

 

 

Understanding SSH

6-38

 

 

 

 

 

 

 

 

 

 

 

 

 

SSH Servers, Integrated Clients, and Supported Versions 6-38

 

 

 

 

 

Limitations

6-39

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Configuring SSH

6-39

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Configuration Guidelines

6-39

 

 

 

 

 

 

 

 

 

 

 

 

Setting Up the Switch to Run SSH

6-39

 

 

 

 

 

 

 

 

 

 

Configuring the SSH Server

6-41

 

 

 

 

 

 

 

 

 

 

 

Displaying the SSH Configuration and Status

6-41

 

 

 

 

 

 

 

 

Configuring the Switch for Secure Socket Layer HTTP

6-42

 

 

 

 

 

 

 

Understanding Secure HTTP Servers and Clients

6-42

 

 

 

 

 

 

 

Certificate Authority Trustpoints

6-42

 

 

 

 

 

 

 

 

 

 

CipherSuites

6-44

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Configuring Secure HTTP Servers and Clients

6-44

 

 

 

 

 

 

 

 

Default SSL Configuration

6-44

 

 

 

 

 

 

 

 

 

 

 

SSL Configuration Guidelines

6-45

 

 

 

 

 

 

 

 

 

 

 

Configuring a CA Trustpoint

6-45

 

 

 

 

 

 

 

 

 

 

 

Configuring the Secure HTTP Server

6-46

 

 

 

 

 

 

 

 

 

Configuring the Secure HTTP Client

6-47

 

 

 

 

 

 

 

 

 

 

Displaying Secure HTTP Server and Client Status

6-48

 

 

 

 

 

 

 

Configuring the Switch for Secure Copy Protocol

6-48

 

 

 

 

 

 

 

 

 

Information About Secure Copy

6-49

 

 

 

 

 

 

 

Configuring IEEE 802.1x Port-Based Authentication 7-1

 

 

 

C H A P T E R 7

 

 

 

 

 

 

 

 

 

Understanding IEEE 802.1x Port-Based Authentication

7-1

 

 

 

 

 

 

 

Device Roles

7-2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Authentication Process

7-3

 

 

 

 

 

 

 

 

 

 

 

 

 

Authentication Initiation and Message Exchange

7-5

 

 

 

 

 

 

 

Ports in Authorized and Unauthorized States

7-7

 

 

 

 

 

 

 

 

 

IEEE 802.1x Host Mode

7-8

 

 

 

 

 

 

 

 

 

 

 

 

 

IEEE 802.1x Accounting

7-9

 

 

 

 

 

 

 

 

 

 

 

 

 

IEEE 802.1x Accounting Attribute-Value Pairs

7-9

 

 

 

 

 

 

 

 

 

Using IEEE 802.1x Authentication with VLAN Assignment

7-10

 

 

 

 

 

 

Using IEEE 802.1x Authentication with Per-User ACLs

7-11

 

 

 

 

 

 

Using IEEE 802.1x Authentication with Guest VLAN

 

7-12

 

 

 

 

 

 

 

Using IEEE 802.1x Authentication with Restricted VLAN

7-13

 

 

 

 

 

 

Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 7-14

 

 

 

 

 

Using IEEE 802.1x Authentication with Voice VLAN Ports

7-15

 

 

 

 

 

 

Using IEEE 802.1x Authentication with Port Security

7-15

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

viii

 

 

 

 

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

 

Using IEEE 802.1x Authentication with Wake-on-LAN

7-16

 

Using IEEE 802.1x Authentication with MAC Authentication Bypass 7-17

 

Configuring IEEE 802.1x Authentication

7-18

 

 

 

 

 

Default IEEE 802.1x Authentication Configuration

7-19

 

 

IEEE 802.1x Authentication Configuration Guidelines

7-20

 

 

IEEE 802.1x Authentication

7-20

 

 

 

 

 

VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication

 

Bypass

7-21

 

 

 

 

 

 

 

 

 

MAC Authentication Bypass

 

7-22

 

 

 

 

 

Configuring IEEE 802.1x Authentication

7-22

 

 

 

 

Configuring the Switch-to-RADIUS-Server Communication

7-23

 

Configuring the Host Mode

7-25

 

 

 

 

 

 

Configuring Periodic Re-Authentication

7-25

 

 

 

 

Manually Re-Authenticating a Client Connected to a Port

7-26

 

Changing the Quiet Period

7-26

 

 

 

 

 

 

 

Changing the Switch-to-Client Retransmission Time

7-27

 

 

Setting the Switch-to-Client Frame-Retransmission Number

7-28

 

Setting the Re-Authentication Number

7-29

 

 

 

 

Configuring IEEE 802.1x Accounting

7-29

 

 

 

 

Configuring a Guest VLAN

7-30

 

 

 

 

 

 

 

Configuring a Restricted VLAN

7-31

 

 

 

 

 

Configuring the Inaccessible Authentication Bypass Feature

7-33

 

Configuring IEEE 802.1x Authentication with WoL

7-35

 

 

Configuring MAC Authentication Bypass

7-36

 

 

 

 

Configuring IEEE 802.1x Authentication Using a RADIUS Server 7-37

 

Disabling IEEE 802.1x Authentication on the Port

7-38

 

 

Resetting the IEEE 802.1x Authentication Configuration to the Default Values 7-38

 

Displaying IEEE 802.1x Statistics and Status

7-39

 

 

 

 

Configuring Interface Characteristics

 

 

 

 

 

 

C H A P T E R 8

 

8-1

 

 

 

 

 

Understanding Interface Types

8-1

 

 

 

 

 

 

 

Port-Based VLANs

8-2

 

 

 

 

 

 

 

 

Switch Ports

8-2

 

 

 

 

 

 

 

 

 

Internal Gigabit Ethernet Ports

8-2

 

 

 

 

 

Access Ports

8-3

 

 

 

 

 

 

 

 

Trunk Ports

8-3

 

 

 

 

 

 

 

 

EtherChannel Port Groups

8-4

 

 

 

 

 

 

 

Dual-Purpose Uplink Ports

8-4

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

ix

 

Contents

 

 

 

 

Connecting Interfaces

8-5

 

 

 

 

 

 

 

 

 

 

Management-Only Interface

8-5

 

 

 

 

 

 

 

 

Using Interface Configuration Mode

8-6

 

 

 

 

 

 

 

 

Procedures for Configuring Interfaces

8-6

 

 

 

 

 

 

 

Configuring a Range of Interfaces 8-7

 

 

 

 

 

 

 

 

Configuring and Using Interface Range Macros

8-8

 

 

 

 

 

Configuring Ethernet Interfaces

8-10

 

 

 

 

 

 

 

 

Default Ethernet Interface Configuration

8-10

 

 

 

 

 

 

Configuring Interface Speed and Duplex Mode

8-11

 

 

 

 

 

Speed and Duplex Configuration Guidelines

8-11

 

 

 

 

 

Setting the Type of a Dual-Purpose Uplink Port 8-12

 

 

 

 

Setting the Interface Speed and Duplex Parameters 8-14

 

 

 

 

Configuring IEEE 802.3x Flow Control 8-15

 

 

 

 

 

 

 

Configuring Auto-MDIX on an Interface

8-16

 

 

 

 

 

 

Adding a Description for an Interface

8-17

 

 

 

 

 

 

 

Configuring the System MTU

8-18

 

 

 

 

 

 

 

 

 

Monitoring and Maintaining the Interfaces

8-19

 

 

 

 

 

 

 

Monitoring Interface Status

8-19

 

 

 

 

 

 

 

 

Clearing and Resetting Interfaces and Counters

8-20

 

 

 

 

 

Shutting Down and Restarting the Interface

8-20

 

 

Configuring Smartports Macros

 

 

 

 

 

C H A P T E R 9

9-1

 

 

 

 

 

 

 

 

Understanding Smartports Macros

9-1

 

 

 

 

 

 

 

 

Configuring Smartports Macros

9-2

 

 

 

 

 

 

 

 

Default Smartports Macro Configuration

9-2

 

 

 

 

 

 

Smartports Macro Configuration Guidelines

9-3

 

 

 

 

 

Creating Smartports Macros

 

9-4

 

 

 

 

 

 

 

 

Applying Smartports Macros

 

9-5

 

 

 

 

 

 

 

 

Applying Cisco-Default Smartports Macros

9-6

 

 

 

 

 

 

Displaying Smartports Macros

9-8

 

 

 

 

 

Configuring VLANs 10-1

 

 

 

 

 

 

 

 

C H A P T E R 10

 

 

 

 

 

 

 

 

 

 

 

 

Understanding VLANs

10-1

 

 

 

 

 

 

 

 

 

 

 

Supported VLANs

10-2

 

 

 

 

 

 

 

 

 

 

 

VLAN Port Membership Modes

10-3

 

 

 

 

 

 

 

 

Configuring Normal-Range VLANs

10-4

 

 

 

 

 

 

 

 

Token Ring VLANs

10-5

 

 

 

 

 

 

 

 

 

 

Normal-Range VLAN Configuration Guidelines

10-5

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

x

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

 

Contents

 

VLAN Configuration Mode Options

10-6

 

 

 

 

 

 

 

 

VLAN Configuration in config-vlan Mode

10-6

 

 

 

 

 

VLAN Configuration in VLAN Database Configuration Mode 10-6

 

Saving VLAN Configuration

10-6

 

 

 

 

 

 

 

 

 

 

Default Ethernet VLAN Configuration

10-7

 

 

 

 

 

 

 

Creating or Modifying an Ethernet VLAN

 

10-8

 

 

 

 

 

 

 

Deleting a VLAN 10-9

 

 

 

 

 

 

 

 

 

 

 

 

Assigning Static-Access Ports to a VLAN

 

10-10

 

 

 

 

 

 

Configuring Extended-Range VLANs

10-11

 

 

 

 

 

 

 

 

 

Default VLAN Configuration

10-11

 

 

 

 

 

 

 

 

 

 

Extended-Range VLAN Configuration Guidelines

10-12

 

 

 

 

 

Creating an Extended-Range VLAN

10-12

 

 

 

 

 

 

 

 

Displaying VLANs

10-13

 

 

 

 

 

 

 

 

 

 

 

 

 

Configuring VLAN Trunks

10-14

 

 

 

 

 

 

 

 

 

 

 

 

Trunking Overview

10-14

 

 

 

 

 

 

 

 

 

 

 

 

Encapsulation Types 10-16

 

 

 

 

 

 

 

 

 

 

IEEE 802.1Q Configuration Considerations

10-16

 

 

 

 

 

Default Layer 2 Ethernet Interface VLAN Configuration

10-17

 

 

 

 

Configuring an Ethernet Interface as a Trunk Port

10-17

 

 

 

 

 

Interaction with Other Features

10-17

 

 

 

 

 

 

 

Configuring a Trunk Port

 

10-18

 

 

 

 

 

 

 

 

 

 

Defining the Allowed VLANs on a Trunk

10-19

 

 

 

 

 

Changing the Pruning-Eligible List

10-20

 

 

 

 

 

 

 

Configuring the Native VLAN for Untagged Traffic

10-21

 

 

 

 

Configuring Trunk Ports for Load Sharing

 

10-21

 

 

 

 

 

 

Load Sharing Using STP Port Priorities

10-22

 

 

 

 

 

 

Load Sharing Using STP Path Cost

10-23

 

 

 

 

 

 

 

Configuring VMPS

10-25

 

 

 

 

 

 

 

 

 

 

 

 

 

Understanding VMPS

10-25

 

 

 

 

 

 

 

 

 

 

 

 

Dynamic-Access Port VLAN Membership

10-26

 

 

 

 

 

Default VMPS Client Configuration

10-26

 

 

 

 

 

 

 

 

VMPS Configuration Guidelines

10-26

 

 

 

 

 

 

 

 

 

Configuring the VMPS Client

 

10-27

 

 

 

 

 

 

 

 

 

 

Entering the IP Address of the VMPS

 

10-27

 

 

 

 

 

 

Configuring Dynamic-Access Ports on VMPS Clients

10-27

 

 

 

 

Reconfirming VLAN Memberships

10-28

 

 

 

 

 

 

 

Changing the Reconfirmation Interval

10-28

 

 

 

 

 

 

Changing the Retry Count

 

10-29

 

 

 

 

 

 

 

 

 

Monitoring the VMPS

10-29

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

xi

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

 

 

 

 

Troubleshooting Dynamic-Access Port VLAN Membership 10-30

 

 

 

 

VMPS Configuration Example

10-30

 

 

 

 

 

Configuring VTP

 

 

 

 

 

 

 

 

 

 

 

C H A P T E R 11

11-1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Understanding VTP

11-1

 

 

 

 

 

 

 

 

 

 

 

 

The VTP Domain

 

11-2

 

 

 

 

 

 

 

 

 

 

 

VTP Modes

11-3

 

 

 

 

 

 

 

 

 

 

 

 

 

VTP Advertisements

11-3

 

 

 

 

 

 

 

 

 

 

VTP Version 2

11-4

 

 

 

 

 

 

 

 

 

 

 

 

VTP Pruning

11-4

 

 

 

 

 

 

 

 

 

 

 

 

Configuring VTP

11-6

 

 

 

 

 

 

 

 

 

 

 

 

 

Default VTP Configuration

11-6

 

 

 

 

 

 

 

 

 

VTP Configuration Options

11-7

 

 

 

 

 

 

 

 

 

VTP Configuration in Global Configuration Mode

11-7

 

 

 

 

 

VTP Configuration in VLAN Database Configuration Mode 11-7

 

 

 

 

VTP Configuration Guidelines

11-8

 

 

 

 

 

 

 

 

Domain Names

11-8

 

 

 

 

 

 

 

 

 

 

Passwords

 

11-8

 

 

 

 

 

 

 

 

 

 

 

 

VTP Version

 

11-8

 

 

 

 

 

 

 

 

 

 

 

Configuration Requirements

11-9

 

 

 

 

 

 

 

 

Configuring a VTP Server

11-9

 

 

 

 

 

 

 

 

 

Configuring a VTP Client

11-11

 

 

 

 

 

 

 

 

 

Disabling VTP (VTP Transparent Mode)

11-12

 

 

 

 

 

 

 

Enabling VTP Version 2

11-13

 

 

 

 

 

 

 

 

 

Enabling VTP Pruning

11-14

 

 

 

 

 

 

 

 

 

 

Adding a VTP Client Switch to a VTP Domain

11-14

 

 

 

 

 

 

Monitoring VTP

11-16

 

 

 

 

 

 

 

 

 

Configuring Voice VLAN

 

 

 

 

 

 

 

 

C H A P T E R 12

12-1

 

 

 

 

 

 

 

 

 

 

 

Understanding Voice VLAN

12-1

 

 

 

 

 

 

 

 

 

 

Cisco IP Phone Voice Traffic

12-2

 

 

 

 

 

 

 

 

 

Cisco IP Phone Data Traffic

12-2

 

 

 

 

 

 

 

 

 

Configuring Voice VLAN

12-3

 

 

 

 

 

 

 

 

 

 

Default Voice VLAN Configuration

12-3

 

 

 

 

 

 

 

Voice VLAN Configuration Guidelines

12-3

 

 

 

 

 

 

 

Configuring a Port Connected to a Cisco 7960 IP Phone

12-4

 

 

 

 

 

Configuring Cisco IP Phone Voice Traffic

12-4

 

 

 

 

 

 

Configuring the Priority of Incoming Data Frames

12-6

 

 

 

 

 

Displaying Voice VLAN

12-6

 

 

 

 

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

xii

 

 

 

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

C H A P T E R 13

Configuring STP 13-1

 

 

 

Understanding Spanning-Tree Features

13-1

 

STP Overview 13-2

 

 

 

Spanning-Tree Topology and BPDUs

13-3

 

Bridge ID, Switch Priority, and Extended System ID 13-4

 

Spanning-Tree Interface States 13-4

 

Blocking State

13-6

 

 

Listening State

13-6

 

 

Learning State

13-6

 

 

Forwarding State

13-6

 

 

Disabled State

13-7

 

How a Switch or Port Becomes the Root Switch or Root Port

13-7

Spanning Tree and Redundant Connectivity

13-8

 

 

Spanning-Tree Address Management

13-8

 

 

Accelerated Aging to Retain Connectivity

13-8

 

 

Spanning-Tree Modes and Protocols

13-9

 

 

Supported Spanning-Tree Instances

13-9

 

 

 

Spanning-Tree Interoperability and Backward Compatibility

13-10

STP and IEEE 802.1Q Trunks

13-10

 

 

 

 

Configuring Spanning-Tree Features

13-10

 

 

 

Default Spanning-Tree Configuration

13-11

 

 

Spanning-Tree Configuration Guidelines

13-12

 

 

Changing the Spanning-Tree Mode.

13-13

 

 

Disabling Spanning Tree

13-14

 

 

 

 

 

Configuring the Root Switch

13-14

 

 

 

 

Configuring a Secondary Root Switch

13-16

 

 

Configuring Port Priority

13-16

 

 

 

 

 

Configuring Path Cost

13-18

 

 

 

 

 

 

Configuring the Switch Priority of a VLAN

13-19

 

 

Configuring Spanning-Tree Timers

13-20

 

 

 

Configuring the Hello Time

13-20

 

 

 

Configuring the Forwarding-Delay Time for a VLAN

13-21

Configuring the Maximum-Aging Time for a VLAN

13-21

 

Configuring the Transmit Hold-Count

13-22

 

 

Displaying the Spanning-Tree Status

13-22

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

xiii

 

Contents

C H A P T E R 14

Configuring MSTP

14-1

 

 

 

 

 

Understanding MSTP

14-2

 

 

 

 

Multiple Spanning-Tree Regions 14-2

 

 

IST, CIST, and CST

14-3

 

 

 

 

Operations Within an MST Region

14-3

 

Operations Between MST Regions

14-4

 

IEEE 802.1s Terminology

14-5

 

 

 

Hop Count

14-5

 

 

 

 

 

Boundary Ports 14-6

 

 

 

 

IEEE 802.1s Implementation

14-6

 

 

 

Port Role Naming Change

14-7

 

 

 

Interoperation Between Legacy and Standard Switches 14-7

 

Detecting Unidirectional Link Failure

14-8

 

Interoperability with IEEE 802.1D STP

14-8

 

Understanding RSTP

14-8

 

 

 

 

Port Roles and the Active Topology

14-9

 

 

Rapid Convergence 14-10

 

 

 

 

Synchronization of Port Roles

14-11

 

 

Bridge Protocol Data Unit Format and Processing 14-12

Processing Superior BPDU Information

14-13

Processing Inferior BPDU Information

14-13

Topology Changes 14-13

 

Configuring MSTP Features 14-14

 

Default MSTP Configuration 14-14

 

 

 

 

MSTP Configuration Guidelines

14-15

 

 

 

 

 

 

Specifying the MST Region Configuration and Enabling MSTP 14-16

 

 

 

Configuring the Root Switch

14-17

 

 

 

 

 

 

Configuring a Secondary Root Switch

14-18

 

 

 

 

Configuring Port Priority

14-19

 

 

 

 

 

 

 

Configuring Path Cost

14-20

 

 

 

 

 

 

 

 

Configuring the Switch Priority

14-21

 

 

 

 

 

 

Configuring the Hello Time

14-22

 

 

 

 

 

 

Configuring the Forwarding-Delay Time

 

14-23

 

 

 

 

Configuring the Maximum-Aging Time

14-23

 

 

 

 

Configuring the Maximum-Hop Count

14-24

 

 

 

 

Specifying the Link Type to Ensure Rapid Transitions 14-24

 

 

 

Designating the Neighbor Type

14-25

 

 

 

 

 

 

Restarting the Protocol Migration Process

14-25

 

 

 

 

Displaying the MST Configuration and Status

14-26

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

xiv

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

Contents

C H A P T E R 15

Configuring Optional Spanning-Tree Features

15-1

 

Understanding Optional Spanning-Tree Features

15-1

 

Understanding Port Fast

15-2

 

 

Understanding BPDU Guard

15-2

 

 

Understanding BPDU Filtering

15-3

 

 

Understanding UplinkFast

15-3

 

 

Understanding BackboneFast

15-5

 

 

Understanding EtherChannel Guard 15-7

 

 

Understanding Root Guard

15-8

 

 

Understanding Loop Guard

 

15-9

 

Configuring Optional Spanning-Tree Features 15-9

 

Default Optional Spanning-Tree Configuration 15-9

Optional Spanning-Tree Configuration Guidelines

15-10

Enabling Port Fast 15-10

 

Enabling BPDU Guard

15-11

 

Enabling BPDU Filtering 15-12

 

Enabling UplinkFast for Use with Redundant Links

15-13

Enabling BackboneFast

15-13

 

Enabling EtherChannel Guard 15-14

 

Enabling Root Guard

15-15

 

Enabling Loop Guard

15-15

 

 

Displaying the Spanning-Tree Status

15-16

 

 

Configuring Flex Links and the MAC Address-Table Move Update Feature 16-1

C H A P T E R 16

 

Understanding Flex Links and the MAC Address-Table Move Update 16-1

 

Flex Links 16-1

 

 

 

 

MAC Address-Table Move Update

16-2

 

 

Configuring Flex Links and MAC Address-Table Move Update

16-4

 

Configuration Guidelines 16-4

 

 

 

Default Configuration

16-4

 

 

 

Configuring Flex Links and MAC Address-Table Move Update

16-5

 

Configuring Flex Links

16-5

 

 

 

Configuring the MAC Address-Table Move Update Feature

16-6

 

Monitoring Flex Links and the MAC Address-Table Move Update 16-8

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

xv

 

Contents

C H A P T E R 17

Configuring DHCP Features

17-1

 

 

 

 

 

 

Understanding DHCP Features

 

17-1

 

 

 

 

 

DHCP Server 17-2

 

 

 

 

 

 

 

 

DHCP Relay Agent

17-2

 

 

 

 

 

 

 

DHCP Snooping

17-2

 

 

 

 

 

 

 

Option-82 Data Insertion

17-3

 

 

 

 

 

Configuring DHCP Features

17-6

 

 

 

 

 

Default DHCP Configuration

17-6

 

 

 

 

DHCP Snooping Configuration Guidelines 17-7

 

 

Configuring the DHCP Relay Agent

17-8

 

 

Enabling DHCP Snooping and Option 82

17-8

 

 

Enabling the Cisco IOS DHCP Server Database 17-10

 

 

Displaying DHCP Snooping Information

17-10

 

 

Configuring IGMP Snooping and MVR

 

 

C H A P T E R 18

18-1

 

 

Understanding IGMP Snooping

18-1

 

 

 

 

IGMP Versions

18-2

 

 

 

 

 

 

 

Joining a Multicast Group

18-3

 

 

 

 

Leaving a Multicast Group

18-5

 

 

 

 

Immediate Leave

18-5

 

 

 

 

 

 

 

IGMP Configurable-Leave Timer

18-5

 

 

 

IGMP Report Suppression

18-6

 

 

 

 

 

Configuring IGMP Snooping

18-6

 

 

 

 

 

Default IGMP Snooping Configuration

18-6

 

 

Enabling or Disabling IGMP Snooping

18-7

 

 

Setting the Snooping Method

18-8

 

 

 

Configuring a Multicast Router Port

18-9

 

 

Configuring a Blade Server Statically to Join a Group

18-9

 

Enabling IGMP Immediate Leave

18-10

 

 

Configuring the IGMP Leave Timer

18-11

 

 

Configuring TCN-Related Commands

18-11

 

 

Controlling the Multicast Flooding Time After a TCN Event 18-12

 

Recovering from Flood Mode

18-12

 

 

Disabling Multicast Flooding During a TCN Event

18-13

 

Configuring the IGMP Snooping Querier

18-13

 

 

Disabling IGMP Report Suppression

18-15

 

 

Displaying IGMP Snooping Information

18-15

 

 

Understanding Multicast VLAN Registration

18-17

 

 

 

 

Using MVR in a Multicast Television Application

18-18

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

xvi

 

 

OL-8915-01

 

 

 

 

 

Contents

Configuring MVR 18-19

 

Default MVR Configuration

18-19

MVR Configuration Guidelines and Limitations 18-20

Configuring MVR Global Parameters 18-20

Configuring MVR Interfaces

18-21

Displaying MVR Information

18-23

Configuring IGMP Filtering and Throttling 18-23

Default IGMP Filtering and Throttling Configuration 18-24

Configuring IGMP Profiles

18-24

Applying IGMP Profiles

18-25

 

Setting the Maximum Number of IGMP Groups

18-26

 

Configuring the IGMP Throttling Action

18-27

 

 

Displaying IGMP Filtering and Throttling Configuration

18-28

 

Configuring Port-Based Traffic Control

 

 

 

C H A P T E R 19

19-1

 

 

 

Configuring Storm Control

19-1

 

 

 

 

 

Understanding Storm Control

19-1

 

 

 

 

Default Storm Control Configuration

19-3

 

 

Configuring Storm Control and Threshold Levels

19-3

 

Configuring Protected Ports

19-5

 

 

 

 

 

Default Protected Port Configuration

19-6

 

 

Protected Port Configuration Guidelines

19-6

 

 

Configuring a Protected Port

19-6

 

 

 

 

Configuring Port Blocking

19-6

 

 

 

 

 

Default Port Blocking Configuration

19-7

 

 

Blocking Flooded Traffic on an Interface

19-7

 

 

Configuring Port Security

19-7

 

 

 

 

 

Understanding Port Security

19-8

 

 

 

 

Secure MAC Addresses

19-8

 

 

 

 

Security Violations

19-9

 

 

 

 

 

Default Port Security Configuration

19-10

 

 

Port Security Configuration Guidelines

19-10

 

 

Enabling and Configuring Port Security

19-11

 

 

Enabling and Configuring Port Security Aging 19-15

 

Displaying Port-Based Traffic Control Settings 19-16

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

xvii

 

Contents

C H A P T E R 20

Configuring CDP

20-1

 

 

 

 

 

 

 

 

 

 

 

 

 

Understanding CDP

20-1

 

 

 

 

 

 

 

 

 

 

 

Configuring CDP

20-2

 

 

 

 

 

 

 

 

 

 

 

 

Default CDP Configuration

20-2

 

 

 

 

 

 

 

 

Configuring the CDP Characteristics

20-2

 

 

 

 

 

 

Disabling and Enabling CDP

 

20-3

 

 

 

 

 

 

 

 

Disabling and Enabling CDP on an Interface

20-4

 

 

 

 

 

Monitoring and Maintaining CDP

20-4

 

 

 

 

 

Configuring UDLD

 

 

 

 

 

 

 

 

 

C H A P T E R 21

21-1

 

 

 

 

 

 

 

 

 

 

 

 

Understanding UDLD

21-1

 

 

 

 

 

 

 

 

 

 

 

Modes of Operation

21-1

 

 

 

 

 

 

 

 

 

 

Methods to Detect Unidirectional Links

21-2

 

 

 

 

 

 

Configuring UDLD

21-3

 

 

 

 

 

 

 

 

 

 

 

 

Default UDLD Configuration

 

21-4

 

 

 

 

 

 

 

 

Configuration Guidelines

 

21-4

 

 

 

 

 

 

 

 

Enabling UDLD Globally

21-5

 

 

 

 

 

 

 

 

 

Enabling UDLD on an Interface

21-5

 

 

 

 

 

 

 

 

Resetting an Interface Disabled by UDLD

21-6

 

 

 

 

 

Displaying UDLD Status

21-6

 

 

 

 

 

 

 

Configuring SPAN and RSPAN

 

 

 

 

 

 

C H A P T E R 22

 

22-1

 

 

 

 

 

 

 

 

Understanding SPAN and RSPAN

22-1

 

 

 

 

 

 

 

 

Local SPAN

22-2

 

 

 

 

 

 

 

 

 

 

 

 

Remote SPAN

22-2

 

 

 

 

 

 

 

 

 

 

 

 

SPAN and RSPAN Concepts and Terminology

22-3

 

 

 

 

 

SPAN Sessions

22-3

 

 

 

 

 

 

 

 

 

 

Monitored Traffic

22-4

 

 

 

 

 

 

 

 

 

Source Ports 22-5

 

 

 

 

 

 

 

 

 

 

 

Source VLANs

22-6

 

 

 

 

 

 

 

 

 

 

VLAN Filtering

22-6

 

 

 

 

 

 

 

 

 

 

Destination Port

22-6

 

 

 

 

 

 

 

 

 

 

RSPAN VLAN

22-7

 

 

 

 

 

 

 

 

 

 

 

SPAN and RSPAN Interaction with Other Features 22-8

 

 

 

 

Configuring SPAN and RSPAN

22-9

 

 

 

 

 

 

 

 

Default SPAN and RSPAN Configuration

22-9

 

 

 

 

 

Configuring Local SPAN

22-9

 

 

 

 

 

 

 

 

 

SPAN Configuration Guidelines

22-10

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

xviii

 

 

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

 

Creating a Local SPAN Session

22-10

 

 

 

Creating a Local SPAN Session and Configuring Incoming Traffic 22-13

 

Specifying VLANs to Filter

 

22-14

 

 

 

 

Configuring RSPAN

22-15

 

 

 

 

 

 

RSPAN Configuration Guidelines

22-15

 

 

 

Configuring a VLAN as an RSPAN VLAN

22-16

 

Creating an RSPAN Source Session 22-17

 

 

Creating an RSPAN Destination Session

22-19

 

Creating an RSPAN Destination Session and Configuring Incoming Traffic 22-20

 

Specifying VLANs to Filter

 

22-22

 

 

 

 

Displaying SPAN and RSPAN Status

22-23

 

 

 

Configuring RMON

 

 

 

 

 

 

 

C H A P T E R 23

23-1

 

 

 

 

 

 

 

Understanding RMON

23-1

 

 

 

 

 

 

Configuring RMON

23-2

 

 

 

 

 

 

Default RMON Configuration

23-3

 

 

 

 

Configuring RMON Alarms and Events

23-3

 

 

 

Collecting Group History Statistics on an Interface

23-5

 

Collecting Group Ethernet Statistics on an Interface 23-5

 

Displaying RMON Status

23-6

 

 

 

 

 

 

Configuring System Message Logging

 

 

 

C H A P T E R 24

24-1

 

 

 

Understanding System Message Logging

24-1

 

 

 

Configuring System Message Logging

24-2

 

 

 

System Log Message Format

24-2

 

 

 

 

Default System Message Logging Configuration

24-3

 

Disabling Message Logging

24-3

 

 

 

 

Setting the Message Display Destination Device

24-4

 

Synchronizing Log Messages

24-5

 

 

 

 

Enabling and Disabling Time Stamps on Log Messages 24-7

 

Enabling and Disabling Sequence Numbers in Log Messages 24-7

 

Defining the Message Severity Level

24-8

 

 

 

Limiting Syslog Messages Sent to the History Table and to SNMP 24-9

 

Configuring UNIX Syslog Servers

24-10

 

 

 

Logging Messages to a UNIX Syslog Daemon

24-10

 

Configuring the UNIX System Logging Facility

24-11

 

Displaying the Logging Configuration

24-12

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

xix

 

Contents

C H A P T E R 25

Configuring SNMP 25-1

 

 

 

 

 

 

 

 

Understanding SNMP

 

25-1

 

 

 

 

 

 

 

SNMP Versions

25-2

 

 

 

 

 

 

 

SNMP Manager Functions

25-3

 

 

 

 

 

SNMP Agent Functions 25-4

 

 

 

 

 

 

SNMP Community Strings

25-4

 

 

 

 

 

Using SNMP to Access MIB Variables

25-4

 

 

SNMP Notifications

25-5

 

 

 

 

 

 

 

SNMP ifIndex MIB Object Values

25-5

 

 

 

Configuring SNMP

25-6

 

 

 

 

 

 

 

Default SNMP Configuration

25-6

 

 

 

 

SNMP Configuration Guidelines

25-6

 

 

 

 

Disabling the SNMP Agent

25-7

 

 

 

 

 

Configuring Community Strings

25-8

 

 

 

 

Configuring SNMP Groups and Users

25-9

 

 

Configuring SNMP Notifications

25-11

 

 

 

Setting the Agent Contact and Location Information

25-14

 

Limiting TFTP Servers Used Through SNMP

25-15

 

 

SNMP Examples

25-15

 

 

 

 

 

 

 

Displaying SNMP Status

25-16

 

 

 

 

 

 

 

Configuring Network Security with ACLs

 

 

C H A P T E R 26

26-1

 

 

Understanding ACLs

26-1

 

 

 

 

 

 

 

Supported ACLs

26-2

 

 

 

 

 

 

 

Port ACLs

26-3

 

 

 

 

 

 

 

VLAN Maps

26-4

 

 

 

 

 

 

 

Handling Fragmented and Unfragmented Traffic 26-4

 

Configuring IPv4 ACLs

26-5

 

 

 

 

 

 

 

Creating Standard and Extended IPv4 ACLs

26-6

 

 

Access List Numbers

26-7

 

 

 

 

 

Creating a Numbered Standard ACL

26-8

 

 

Creating a Numbered Extended ACL

26-9

 

 

Resequencing ACEs in an ACL

26-13

 

 

 

Creating Named Standard and Extended ACLs

26-13

 

Using Time Ranges with ACLs

26-15

 

 

 

Including Comments in ACLs

26-17

 

 

 

 

 

Applying an IPv4 ACL to a Terminal Line 26-17

 

 

 

 

 

Applying an IPv4 ACL to an Interface 26-18

 

 

 

 

 

Hardware and Software Treatment of IP ACLs

26-19

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

xx

 

 

OL-8915-01

 

 

 

 

 

26-19
26-19
26-19

Contents

IPv4 ACL Configuration Examples

Numbered ACLs

Extended ACLs

Named ACLs 26-20

 

 

Time Range Applied to an IP ACL

26-20

 

 

 

 

 

 

Commented IP ACL Entries

26-20

 

 

 

 

 

 

 

 

Creating Named MAC Extended ACLs

26-21

 

 

 

 

 

 

 

 

Applying a MAC ACL to a Layer 2 Interface

26-22

 

 

 

 

 

 

Configuring VLAN Maps

26-23

 

 

 

 

 

 

 

 

 

 

 

VLAN Map Configuration Guidelines

26-24

 

 

 

 

 

 

Creating a VLAN Map

26-25

 

 

 

 

 

 

 

 

 

 

 

Examples of ACLs and VLAN Maps

26-25

 

 

 

 

 

 

Applying a VLAN Map to a VLAN

26-27

 

 

 

 

 

 

 

 

Using VLAN Maps in Your Network

 

26-28

 

 

 

 

 

 

 

Wiring Closet Configuration

 

26-28

 

 

 

 

 

 

 

 

Denying Access to a Server on a VLAN

26-29

 

 

 

 

 

 

Displaying IPv4 ACL Configuration

26-30

 

 

 

 

 

 

 

 

Configuring QoS 27-1

 

 

 

 

 

 

 

 

 

 

 

C H A P T E R 27

 

 

 

 

 

 

 

 

 

 

 

 

 

Understanding QoS

27-1

 

 

 

 

 

 

 

 

 

 

 

 

Basic QoS Model

27-3

 

 

 

 

 

 

 

 

 

 

 

Classification 27-5

 

 

 

 

 

 

 

 

 

 

 

 

Classification Based on QoS ACLs

27-7

 

 

 

 

 

 

Classification Based on Class Maps and Policy Maps 27-7

 

 

Policing and Marking

27-8

 

 

 

 

 

 

 

 

 

 

 

Policing on Physical Ports

27-9

 

 

 

 

 

 

 

 

 

Policing on SVIs

27-10

 

 

 

 

 

 

 

 

 

 

 

Mapping Tables

27-12

 

 

 

 

 

 

 

 

 

 

 

Queueing and Scheduling Overview

27-13

 

 

 

 

 

 

 

Weighted Tail Drop 27-13

 

 

 

 

 

 

 

 

 

 

 

SRR Shaping and Sharing

27-14

 

 

 

 

 

 

 

 

 

Queueing and Scheduling on Ingress Queues

27-15

 

 

 

 

 

Queueing and Scheduling on Egress Queues

27-17

 

 

 

 

 

Packet Modification

27-19

 

 

 

 

 

 

 

 

 

 

 

Configuring Auto-QoS

27-20

 

 

 

 

 

 

 

 

 

 

 

Generated Auto-QoS Configuration

 

27-21

 

 

 

 

 

 

 

Effects of Auto-QoS on the Configuration

 

27-25

 

 

 

 

 

 

Auto-QoS Configuration Guidelines

 

27-25

 

 

 

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

xxi

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

Enabling Auto-QoS for VoIP

27-26

 

 

 

 

 

 

Auto-QoS Configuration Example

27-27

 

 

 

 

 

Displaying Auto-QoS Information

27-29

 

 

 

 

 

 

Configuring Standard QoS

27-29

 

 

 

 

 

 

 

 

Default Standard QoS Configuration

27-30

 

 

 

 

Default Ingress Queue Configuration

27-30

 

 

 

Default Egress Queue Configuration

27-31

 

 

 

Default Mapping Table Configuration

 

27-32

 

 

 

Standard QoS Configuration Guidelines

27-32

 

 

 

QoS ACL Guidelines

27-32

 

 

 

 

 

 

 

Applying QoS on Interfaces

27-32

 

 

 

 

 

Policing Guidelines

27-33

 

 

 

 

 

 

 

General QoS Guidelines

27-33

 

 

 

 

 

 

Enabling QoS Globally

27-34

 

 

 

 

 

 

 

 

Enabling VLAN-Based QoS on Physical Ports

27-34

 

 

 

Configuring Classification Using Port Trust States

27-35

 

 

Configuring the Trust State on Ports within the QoS Domain 27-35

 

Configuring the CoS Value for an Interface 27-37

 

 

Configuring a Trusted Boundary to Ensure Port Security

27-37

 

Enabling DSCP Transparency Mode

27-39

 

 

 

Configuring the DSCP Trust State on a Port Bordering Another QoS Domain 27-39

 

Configuring a QoS Policy 27-41

 

 

 

 

 

 

 

Classifying Traffic by Using ACLs

27-42

 

 

 

Classifying Traffic by Using Class Maps

27-45

 

 

 

Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps

27-47

Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps

27-51

Classifying, Policing, and Marking Traffic by Using Aggregate Policers 27-57

 

Configuring DSCP Maps

27-59

 

 

 

 

 

 

 

Configuring the CoS-to-DSCP Map

 

27-59

 

 

 

Configuring the IP-Precedence-to-DSCP Map

27-60

 

 

Configuring the Policed-DSCP Map

27-61

 

 

 

Configuring the DSCP-to-CoS Map

 

27-62

 

 

 

Configuring the DSCP-to-DSCP-Mutation Map

27-63

 

 

Configuring Ingress Queue Characteristics

27-65

 

 

 

Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds 27-66

Allocating Buffer Space Between the Ingress Queues

27-67

 

Allocating Bandwidth Between the Ingress Queues 27-67

 

Configuring the Ingress Priority Queue

27-68

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

xxii

OL-8915-01

 

 

 

Contents

 

 

Configuring Egress Queue Characteristics

27-69

 

 

 

 

 

 

 

 

Configuration Guidelines 27-70

 

 

 

 

 

 

 

 

 

 

 

Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set 27-70

 

 

Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID 27-72

 

 

Configuring SRR Shaped Weights on Egress Queues

27-74

 

 

 

 

 

Configuring SRR Shared Weights on Egress Queues

27-75

 

 

 

 

 

Configuring the Egress Expedite Queue

27-76

 

 

 

 

 

 

 

Limiting the Bandwidth on an Egress Interface

 

27-76

 

 

 

 

 

 

Displaying Standard QoS Information

27-77

 

 

 

 

 

 

 

 

 

Configuring EtherChannels and Layer 2 Trunk Failover

 

 

 

 

 

C H A P T E R 28

28-1

 

 

 

 

 

 

Understanding EtherChannels

28-1

 

 

 

 

 

 

 

 

 

 

 

 

EtherChannel Overview

28-2

 

 

 

 

 

 

 

 

 

 

 

 

Port-Channel Interfaces

28-3

 

 

 

 

 

 

 

 

 

 

 

 

Port Aggregation Protocol

28-4

 

 

 

 

 

 

 

 

 

 

 

 

PAgP Modes

28-4

 

 

 

 

 

 

 

 

 

 

 

 

 

PAgP Interaction with Other Features

 

28-5

 

 

 

 

 

 

 

 

Link Aggregation Control Protocol

28-5

 

 

 

 

 

 

 

 

 

 

LACP Modes

28-5

 

 

 

 

 

 

 

 

 

 

 

 

 

LACP Interaction with Other Features

 

28-6

 

 

 

 

 

 

 

 

EtherChannel On Mode

28-6

 

 

 

 

 

 

 

 

 

 

 

 

Load Balancing and Forwarding Methods

28-6

 

 

 

 

 

 

 

 

Configuring EtherChannels 28-8

 

 

 

 

 

 

 

 

 

 

 

 

Default EtherChannel Configuration

 

28-9

 

 

 

 

 

 

 

 

 

EtherChannel Configuration Guidelines

28-9

 

 

 

 

 

 

 

 

Configuring Layer 2 EtherChannels

 

28-10

 

 

 

 

 

 

 

 

 

Configuring EtherChannel Load Balancing

28-12

 

 

 

 

 

 

 

 

Configuring the PAgP Learn Method and Priority

28-13

 

 

 

 

 

 

Configuring LACP Hot-Standby Ports

28-14

 

 

 

 

 

 

 

 

 

Configuring the LACP System Priority

 

28-15

 

 

 

 

 

 

 

 

Configuring the LACP Port Priority

28-16

 

 

 

 

 

 

 

 

Displaying EtherChannel, PAgP, and LACP Status

28-17

 

 

 

 

 

 

 

Understanding Layer 2 Trunk Failover

28-17

 

 

 

 

 

 

 

 

 

 

Configuring Layer 2 Trunk Failover

28-18

 

 

 

 

 

 

 

 

 

Default Layer 2 Trunk Failover Configuration

28-18

 

 

 

 

 

 

Layer 2 Trunk Failover Configuration Guidelines

28-19

 

 

 

 

 

Configuring Layer 2 Trunk Failover

28-19

 

 

 

 

 

 

 

 

Displaying Layer 2 Trunk Failover Status

28-20

 

 

 

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

 

 

 

xxiii

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Contents

C H A P T E R 29

Troubleshooting 29-1

 

 

 

Recovering from a Software Failure 29-2

 

 

Recovering from a Lost or Forgotten Password

29-3

 

Procedure with Password Recovery Enabled

29-4

 

Procedure with Password Recovery Disabled

29-6

 

Preventing Autonegotiation Mismatches

29-7

 

 

SFP Module Security and Identification

29-8

 

 

Monitoring SFP Module Status 29-8

 

 

 

Monitoring Temperature 29-9

 

 

 

Using Ping 29-9

 

 

 

Understanding Ping

29-9

 

 

 

 

Executing Ping

29-9

 

 

 

 

 

Using Layer 2 Traceroute

29-10

 

 

 

 

Understanding Layer 2 Traceroute

29-10

 

 

Usage Guidelines

 

29-11

 

 

 

 

 

Displaying the Physical Path

29-12

 

 

Using IP Traceroute

29-12

 

 

 

 

 

Understanding IP Traceroute

29-12

 

 

Executing IP Traceroute

29-13

 

 

 

Using TDR

29-14

 

 

 

 

 

 

 

Understanding TDR

29-14

 

 

 

 

Running TDR and Displaying the Results

29-14

 

Using Debug Commands

29-14

 

 

 

 

Enabling Debugging on a Specific Feature

29-15

 

Enabling All-System Diagnostics

29-15

 

 

Redirecting Debug and Error Message Output 29-16

 

Using the show platform forward Command

29-16

 

Using the crashinfo Files

29-18

 

 

 

 

Basic crashinfo Files

29-18

 

 

 

 

Extended crashinfo Files

29-18

 

 

 

Supported MIBs A-1

 

 

 

 

 

 

A P P E N D I X A

 

 

 

 

 

 

 

MIB List

A-1

 

 

 

 

 

 

 

Using FTP to Access the MIB Files

A-3

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

xxiv

OL-8915-01

 

 

 

Contents

A P P E N D I X B

Working with the Cisco IOS File System, Configuration Files, and Software Images B-1

 

Working with the Flash File System

B-1

 

Displaying Available File Systems

B-2

 

Setting the Default File System

B-3

 

Displaying Information about Files on a File System B-3

 

Changing Directories and Displaying the Working Directory B-3

 

Creating and Removing Directories B-4

 

Copying Files

B-4

 

 

Deleting Files

B-5

 

 

Creating, Displaying, and Extracting tar Files B-5

 

 

 

 

 

 

Creating a tar File

B-6

 

 

 

 

 

 

 

 

 

 

Displaying the Contents of a tar File

B-6

 

 

 

 

 

 

 

Extracting a tar File

B-8

 

 

 

 

 

 

 

 

 

Displaying the Contents of a File B-8

 

 

 

 

 

 

 

 

Working with Configuration Files

B-8

 

 

 

 

 

 

 

 

 

Guidelines for Creating and Using Configuration Files

B-9

 

 

 

 

 

Configuration File Types and Location

B-10

 

 

 

 

 

 

 

Creating a Configuration File By Using a Text Editor

B-10

 

 

 

 

 

Copying Configuration Files By Using TFTP

B-10

 

 

 

 

 

 

 

Preparing to Download or Upload a Configuration File By Using TFTP

B-11

 

Downloading the Configuration File By Using TFTP B-11

 

 

 

 

 

Uploading the Configuration File By Using TFTP

B-12

 

 

 

 

 

Copying Configuration Files By Using FTP

B-12

 

 

 

 

 

 

 

Preparing to Download or Upload a Configuration File By Using FTP

B-13

 

Downloading a Configuration File By Using FTP

B-13

 

 

 

 

 

Uploading a Configuration File By Using FTP

B-14

 

 

 

 

 

Copying Configuration Files By Using RCP

B-15

 

 

 

 

 

 

 

Preparing to Download or Upload a Configuration File By Using RCP

B-16

 

Downloading a Configuration File By Using RCP

B-17

 

 

 

 

 

Uploading a Configuration File By Using RCP

B-18

 

 

 

 

 

Clearing Configuration Information

B-18

 

 

 

 

 

 

 

 

Clearing the Startup Configuration File

B-19

 

 

 

 

 

 

Deleting a Stored Configuration File

B-19

 

 

 

 

 

 

 

Working with Software Images

B-19

 

 

 

 

 

 

 

 

 

Image Location on the Switch

B-20

 

 

 

 

 

 

 

 

 

tar File Format of Images on a Server or Cisco.com

B-20

 

 

 

 

 

Copying Image Files By Using TFTP

B-21

 

 

 

 

 

 

 

 

Preparing to Download or Upload an Image File By Using TFTP B-21

 

 

 

 

 

Downloading an Image File By Using TFTP

B-22

 

 

 

 

 

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

 

 

 

 

 

 

OL-8915-01

 

 

 

 

 

 

 

 

xxv

 

 

 

 

 

 

 

 

 

 

 

Contents

 

 

Uploading an Image File By Using TFTP

 

B-24

 

 

 

Copying Image Files By Using FTP

B-24

 

 

 

 

 

 

Preparing to Download or Upload an Image File By Using FTP

B-25

 

 

Downloading an Image File By Using FTP

B-26

 

 

 

Uploading an Image File By Using FTP

B-27

 

 

 

Copying Image Files By Using RCP

B-28

 

 

 

 

 

 

Preparing to Download or Upload an Image File By Using RCP

B-29

 

 

Downloading an Image File By Using RCP

B-30

 

 

 

Uploading an Image File By Using RCP

 

B-32

 

 

 

Unsupported Commands in Cisco IOS Release 12.2(25)SEF C-1

 

A P P E N D I X C

 

 

Access Control Lists

C-1

 

 

 

 

 

 

 

Unsupported Privileged EXEC Commands

C-1

 

 

 

Unsupported Global Configuration Commands

C-1

 

 

Unsupported Route-Map Configuration Commands

C-1

 

 

IGMP Snooping Commands

C-2

 

 

 

 

 

 

Unsupported Global Configuration Commands

C-2

 

 

Interface Commands

C-2

 

 

 

 

 

 

 

Unsupported Privileged EXEC Commands

C-2

 

 

 

Unsupported Global Configuration Commands

C-2

 

 

Unsupported Interface Configuration Commands

C-2

 

 

MAC Address Commands

C-2

 

 

 

 

 

 

Unsupported Privileged EXEC Commands

C-2

 

 

 

Unsupported Global Configuration Commands

C-3

 

 

Miscellaneous C-3

 

 

 

 

 

 

 

 

Unsupported Privileged EXEC Commands

C-3

 

 

 

Unsupported Global Configuration Commands

C-3

 

 

Network Address Translation (NAT) Commands

 

C-3

 

 

 

Unsupported Privileged EXEC Commands

C-3

 

 

 

QoS C-3

 

 

 

 

 

 

 

 

Unsupported Global Configuration Commands

C-3

 

 

Unsupported Interface Configuration Commands

C-4

 

 

Unsupported Policy-Map Configuration Commands

C-4

 

 

RADIUS

C-4

 

 

 

 

 

 

 

 

Unsupported Global Configuration Commands

C-4

 

 

SNMP

C-4

 

 

 

 

 

 

 

 

Unsupported Global Configuration Commands

C-4

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

xxvi

OL-8915-01

 

 

 

Contents

Spanning Tree C-4

 

 

Unsupported Global Configuration Command

C-4

Unsupported Interface Configuration Command

C-4

VLAN

C-5

 

 

Unsupported Global Configuration Commands

C-5

Unsupported vlan-config Command

C-5

 

Unsupported User EXEC Commands

C-5

 

VTP

C-5

 

 

Unsupported Privileged EXEC Commands C-5

I N D E X

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

xxvii

 

Contents

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

xxviii

OL-8915-01

Preface

Audience

This guide is for the networking professional managing the Cisco Catalyst Blade Switch 3020 for HP, hereafter referred to as the switch module. Before using this guide, you should have experience working with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local area networking.

Purpose

This guide provides the information that you need to configure Cisco IOS software features on your switch. The Cisco Catalyst Blade Switch 3020 for HPsoftware provides enterprise-class intelligent services such as access control lists (ACLs) and quality of service (QoS) features.

This guide provides procedures for using the commands that have been created or changed for use with the Cisco Catalyst Blade Switch3020 for HP. It does not provide detailed information about these commands. For detailed information about these commands, see the Cisco Catalyst Blade Switch 3020 for HP Command Reference for this release. For information about the standard Cisco IOS Release 12.2 commands, see the Cisco IOS documentation set available from the Cisco.com home page at Technical Support & Documentation > Cisco IOS Software.

This guide does not provide detailed information on the graphical user interface (GUI) for the embedded device manager that you can use to manage the switch. However, the concepts in this guide are applicable to the GUI user. For information about the device manager, see the switch online help.

This guide does not describe system messages you might encounter or how to install your switch. For more information, see the Cisco Catalyst Blade Switch 3020 for HP System Message Guide for this release and the Cisco Catalyst Blade Switch 3020 for HP Hardware Installation Guide.

For documentation updates, see the release notes for this release.

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

 

OL-8915-01

xxvii

 

Preface

Conventions

Conventions

This publication uses these conventions to convey instructions and information:

Command descriptions use these conventions:

Commands and keywords are in boldface text.

Arguments for which you supply values are in italic.

Square brackets ([ ]) mean optional elements.

Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.

Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional element.

Interactive examples use these conventions:

Terminal sessions and system displays are in screen font.

Information you enter is in boldface screen font.

Nonprinting characters, such as passwords or tabs, are in angle brackets (< >). Notes, cautions, and timesavers use these conventions and symbols:

Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in this manual.

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Related Publications

For more information about the switch, see the Cisco Catalyst Blade Switch 3020 for HP documentation on Cisco.com.

http://www.cisco.com/en/US/products/ps6748/tsd_products_support_series_home.html

Note Before installing, configuring, or upgrading the switch, see these documents:

For initial configuration information, see the “Configuring the Switch Module”section in the getting started guide or the “Configuring the Switch with the CLI-Based Setup Program” appendix in the hardware installation guide.

For device manager requirements, see the “System Requirements” section in the release notes (not orderable but available on Cisco.com).

For upgrading information, see the “Downloading Software” section in the release notes.

 

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

xxviii

OL-8915-01

Loading...
+ 682 hidden pages