Cisco Catalyst Blade Switch 3020 for HP
Software Configuration Guide
Cisco IOS Release 12.2(25)SEF
June 2006
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Text Part Number: OL-8915-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn,
and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco
Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel,
EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard,
LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect,
RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or
its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
DHCP Server Configuration Guidelines3-5
Configuring the TFTP Server3-6
Configuring the DNS3-6
Configuring the Relay Device3-6
Obtaining Configuration Files3-7
Example Configuration3-8
Manually Assigning IP Information3-10
Checking and Saving the Running Configuration3-10
Modifying the Startup Configuration3-13
Default Boot Configuration3-14
Automatically Downloading a Configuration File3-14
Specifying the Filename to Read and Write the System Configuration3-14
iv
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Booting Manually3-15
Booting a Specific Software Image3-16
Controlling Environment Variables3-16
Scheduling a Reload of the Software Image3-18
Configuring a Scheduled Reload3-18
Displaying Scheduled Reload Information3-19
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
v
Contents
Configuring the Source IP Address for NTP Packets5-10
Displaying the NTP Configuration5-11
Configuring Time and Date Manually5-11
Setting the System Clock5-11
Displaying the Time and Date Configuration5-12
Configuring the Time Zone 5-12
Configuring Summer Time (Daylight Saving Time)5-13
Configuring a System Name and Prompt5-14
Default System Name and Prompt Configuration5-15
Configuring a System Name5-15
Understanding DNS5-15
Default DNS Configuration5-16
Setting Up DNS5-16
Displaying the DNS Configuration5-17
Creating a Banner5-17
Default Banner Configuration5-17
Configuring a Message-of-the-Day Login Banner5-18
Configuring a Login Banner5-19
CHAPTER
Managing the MAC Address Table5-19
Building the Address Table5-20
MAC Addresses and VLANs5-20
Default MAC Address Table Configuration5-21
Changing the Address Aging Time5-21
Removing Dynamic Address Entries5-22
Configuring MAC Address Notification Traps5-22
Adding and Removing Static Address Entries5-24
Configuring Unicast MAC Address Filtering5-25
Displaying Address Table Entries5-26
Managing the ARP Table5-26
6Configuring Switch-Based Authentication6-1
Preventing Unauthorized Access to Your Switch6-1
Protecting Access to Privileged EXEC Commands6-2
Default Password and Privilege Level Configuration6-2
Setting or Changing a Static Enable Password6-3
Protecting Enable and Enable Secret Passwords with Encryption6-3
Disabling Password Recovery6-5
Setting a Telnet Password for a Terminal Line6-6
Configuring Username and Password Pairs6-6
vi
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring Multiple Privilege Levels6-7
Setting the Privilege Level for a Command6-8
Changing the Default Privilege Level for Lines6-9
Logging into and Exiting a Privilege Level6-9
Default TACACS+ Configuration6-13
Identifying the TACACS+ Server Host and Setting the Authentication Key6-13
Configuring TACACS+ Login Authentication6-14
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services6-16
Starting TACACS+ Accounting6-17
Default RADIUS Configuration6-20
Identifying the RADIUS Server Host 6-20
Configuring RADIUS Login Authentication6-23
Defining AAA Server Groups6-25
Configuring RADIUS Authorization for User Privileged Access and Network Services6-27
Starting RADIUS Accounting6-28
Configuring Settings for All RADIUS Servers6-29
Configuring the Switch to Use Vendor-Specific RADIUS Attributes6-29
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication6-31
Displaying the RADIUS Configuration6-31
Contents
OL-8915-01
Controlling Switch Access with Kerberos6-32
Understanding Kerberos6-32
Kerberos Operation6-34
Authenticating to a Boundary Switch6-34
Obtaining a TGT from a KDC6-35
Authenticating to Network Services6-35
Configuring Kerberos6-35
Configuring the Switch for Local Authentication and Authorization6-36
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
vii
Contents
Configuring the Switch for Secure Shell6-37
Understanding SSH6-38
SSH Servers, Integrated Clients, and Supported Versions6-38
Limitations6-39
Configuring SSH6-39
Configuration Guidelines6-39
Setting Up the Switch to Run SSH6-39
Configuring the SSH Server6-41
Displaying the SSH Configuration and Status6-41
Configuring the Switch for Secure Socket Layer HTTP6-42
Default SSL Configuration6-44
SSL Configuration Guidelines6-45
Configuring a CA Trustpoint6-45
Configuring the Secure HTTP Server6-46
Configuring the Secure HTTP Client6-47
Displaying Secure HTTP Server and Client Status6-48
CHAPTER
Configuring the Switch for Secure Copy Protocol6-48
Device Roles7-2
Authentication Process7-3
Authentication Initiation and Message Exchange7-5
Ports in Authorized and Unauthorized States7-7
IEEE 802.1x Host Mode7-8
IEEE 802.1x Accounting7-9
IEEE 802.1x Accounting Attribute-Value Pairs7-9
Using IEEE 802.1x Authentication with VLAN Assignment7-10
Using IEEE 802.1x Authentication with Per-User ACLs7-11
Using IEEE 802.1x Authentication with Guest VLAN7-12
Using IEEE 802.1x Authentication with Restricted VLAN7-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass7-14
Using IEEE 802.1x Authentication with Voice VLAN Ports7-15
Using IEEE 802.1x Authentication with Port Security7-15
viii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Using IEEE 802.1x Authentication with Wake-on-LAN7-16
Using IEEE 802.1x Authentication with MAC Authentication Bypass7-17
MAC Authentication Bypass7-22
Configuring IEEE 802.1x Authentication7-22
Configuring the Switch-to-RADIUS-Server Communication7-23
Configuring the Host Mode7-25
Configuring Periodic Re-Authentication7-25
Manually Re-Authenticating a Client Connected to a Port7-26
Changing the Quiet Period7-26
Changing the Switch-to-Client Retransmission Time7-27
Setting the Switch-to-Client Frame-Retransmission Number7-28
Setting the Re-Authentication Number7-29
Configuring IEEE 802.1x Accounting7-29
Configuring a Guest VLAN7-30
Configuring a Restricted VLAN7-31
Configuring the Inaccessible Authentication Bypass Feature7-33
Configuring IEEE 802.1x Authentication with WoL7-35
Configuring MAC Authentication Bypass7-36
Configuring IEEE 802.1x Authentication Using a RADIUS Server7-37
Disabling IEEE 802.1x Authentication on the Port7-38
Resetting the IEEE 802.1x Authentication Configuration to the Default Values7-38
7-21
Contents
CHAPTER
OL-8915-01
Displaying IEEE 802.1x Statistics and Status7-39
8Configuring Interface Characteristics8-1
Understanding Interface Types8-1
Port-Based VLANs8-2
Switch Ports8-2
Internal Gigabit Ethernet Ports8-2
Access Ports8-3
Trunk Ports8-3
EtherChannel Port Groups8-4
Dual-Purpose Uplink Ports8-4
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Procedures for Configuring Interfaces8-6
Configuring a Range of Interfaces8-7
Configuring and Using Interface Range Macros8-8
Configuring Ethernet Interfaces8-10
Default Ethernet Interface Configuration8-10
Configuring Interface Speed and Duplex Mode8-11
Speed and Duplex Configuration Guidelines8-11
Setting the Type of a Dual-Purpose Uplink Port8-12
Setting the Interface Speed and Duplex Parameters8-14
Configuring IEEE 802.3x Flow Control8-15
Configuring Auto-MDIX on an Interface8-16
Adding a Description for an Interface8-17
CHAPTER
CHAPTER
Configuring the System MTU8-18
Monitoring and Maintaining the Interfaces8-19
Monitoring Interface Status8-19
Clearing and Resetting Interfaces and Counters8-20
Shutting Down and Restarting the Interface8-20
Supported VLANs10-2
VLAN Port Membership Modes10-3
Configuring Normal-Range VLANs10-4
Token Ring VLANs10-5
Normal-Range VLAN Configuration Guidelines10-5
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
x
OL-8915-01
VLAN Configuration Mode Options10-6
VLAN Configuration in config-vlan Mode10-6
VLAN Configuration in VLAN Database Configuration Mode10-6
Saving VLAN Configuration10-6
Default Ethernet VLAN Configuration10-7
Creating or Modifying an Ethernet VLAN10-8
Deleting a VLAN10-9
Assigning Static-Access Ports to a VLAN10-10
Disabled State13-7
How a Switch or Port Becomes the Root Switch or Root Port13-7
Spanning Tree and Redundant Connectivity13-8
Spanning-Tree Address Management13-8
Accelerated Aging to Retain Connectivity13-8
Spanning-Tree Modes and Protocols13-9
Supported Spanning-Tree Instances13-9
Spanning-Tree Interoperability and Backward Compatibility13-10
STP and IEEE 802.1Q Trunks13-10
Configuring Spanning-Tree Features13-10
Default Spanning-Tree Configuration13-11
Spanning-Tree Configuration Guidelines13-12
Changing the Spanning-Tree Mode.13-13
Disabling Spanning Tree13-14
Configuring the Root Switch13-14
Configuring a Secondary Root Switch13-16
Configuring Port Priority13-16
Configuring Path Cost13-18
Configuring the Switch Priority of a VLAN13-19
Configuring Spanning-Tree Timers13-20
Configuring the Hello Time13-20
Configuring the Forwarding-Delay Time for a VLAN13-21
Configuring the Maximum-Aging Time for a VLAN13-21
Configuring the Transmit Hold-Count 13-22
Displaying the Spanning-Tree Status13-22
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xiii
Contents
CHAPTER
14Configuring MSTP14-1
Understanding MSTP14-2
Multiple Spanning-Tree Regions14-2
IST, CIST, and CST14-3
Operations Within an MST Region14-3
Operations Between MST Regions14-4
IEEE 802.1s Terminology14-5
Hop Count14-5
Boundary Ports14-6
IEEE 802.1s Implementation14-6
Port Role Naming Change14-7
Interoperation Between Legacy and Standard Switches14-7
Detecting Unidirectional Link Failure14-8
Interoperability with IEEE 802.1D STP14-8
Understanding RSTP14-8
Port Roles and the Active Topology14-9
Rapid Convergence14-10
Synchronization of Port Roles14-11
Bridge Protocol Data Unit Format and Processing14-12
Default MSTP Configuration14-14
MSTP Configuration Guidelines14-15
Specifying the MST Region Configuration and Enabling MSTP14-16
Configuring the Root Switch14-17
Configuring a Secondary Root Switch14-18
Configuring Port Priority 14-19
Configuring Path Cost14-20
Configuring the Switch Priority14-21
Configuring the Hello Time14-22
Configuring the Forwarding-Delay Time14-23
Configuring the Maximum-Aging Time14-23
Configuring the Maximum-Hop Count14-24
Specifying the Link Type to Ensure Rapid Transitions14-24
Designating the Neighbor Type14-25
Restarting the Protocol Migration Process14-25
Displaying the MST Configuration and Status14-26
xiv
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Configuring Flex Links and MAC Address-Table Move Update16-5
Configuring Flex Links16-5
Configuring the MAC Address-Table Move Update Feature16-6
Monitoring Flex Links and the MAC Address-Table Move Update16-8
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xv
Contents
CHAPTER
CHAPTER
17Configuring DHCP Features17-1
Understanding DHCP Features17-1
DHCP Server17-2
DHCP Relay Agent17-2
DHCP Snooping17-2
Option-82 Data Insertion17-3
Configuring DHCP Features17-6
Default DHCP Configuration17-6
DHCP Snooping Configuration Guidelines17-7
Configuring the DHCP Relay Agent 17-8
Enabling DHCP Snooping and Option 8217-8
Enabling the Cisco IOS DHCP Server Database17-10
Displaying DHCP Snooping Information17-10
18Configuring IGMP Snooping and MVR18-1
Understanding IGMP Snooping18-1
IGMP Versions18-2
Joining a Multicast Group18-3
Leaving a Multicast Group18-5
Immediate Leave 18-5
IGMP Configurable-Leave Timer18-5
IGMP Report Suppression18-6
xvi
Configuring IGMP Snooping18-6
Default IGMP Snooping Configuration18-6
Enabling or Disabling IGMP Snooping18-7
Setting the Snooping Method18-8
Configuring a Multicast Router Port18-9
Configuring a Blade Server Statically to Join a Group18-9
Enabling IGMP Immediate Leave18-10
Configuring the IGMP Leave Timer18-11
Configuring TCN-Related Commands18-11
Controlling the Multicast Flooding Time After a TCN Event18-12
Recovering from Flood Mode18-12
Disabling Multicast Flooding During a TCN Event18-13
Configuring the IGMP Snooping Querier18-13
Disabling IGMP Report Suppression18-15
Displaying IGMP Snooping Information18-15
Understanding Multicast VLAN Registration18-17
Using MVR in a Multicast Television Application18-18
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring MVR18-19
Default MVR Configuration18-19
MVR Configuration Guidelines and Limitations18-20
Configuring MVR Global Parameters18-20
Configuring MVR Interfaces18-21
Displaying MVR Information18-23
Configuring IGMP Filtering and Throttling18-23
Default IGMP Filtering and Throttling Configuration18-24
Configuring IGMP Profiles18-24
Applying IGMP Profiles18-25
Setting the Maximum Number of IGMP Groups18-26
Configuring the IGMP Throttling Action18-27
Displaying IGMP Filtering and Throttling Configuration18-28
Contents
CHAPTER
19Configuring Port-Based Traffic Control19-1
Configuring Storm Control19-1
Understanding Storm Control19-1
Default Storm Control Configuration19-3
Configuring Storm Control and Threshold Levels19-3
Configuring Protected Ports19-5
Default Protected Port Configuration19-6
Protected Port Configuration Guidelines19-6
Configuring a Protected Port19-6
Configuring Port Blocking19-6
Default Port Blocking Configuration19-7
Blocking Flooded Traffic on an Interface19-7
Configuring Port Security19-7
Understanding Port Security19-8
Secure MAC Addresses19-8
Security Violations19-9
Default Port Security Configuration19-10
Port Security Configuration Guidelines19-10
Enabling and Configuring Port Security19-11
Enabling and Configuring Port Security Aging19-15
OL-8915-01
Displaying Port-Based Traffic Control Settings19-16
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xvii
Contents
CHAPTER
CHAPTER
20Configuring CDP20-1
Understanding CDP20-1
Configuring CDP20-2
Default CDP Configuration20-2
Configuring the CDP Characteristics20-2
Disabling and Enabling CDP20-3
Disabling and Enabling CDP on an Interface20-4
Monitoring and Maintaining CDP20-4
21Configuring UDLD21-1
Understanding UDLD21-1
Modes of Operation21-1
Methods to Detect Unidirectional Links21-2
Configuring UDLD21-3
Default UDLD Configuration21-4
Configuration Guidelines21-4
Enabling UDLD Globally21-5
Enabling UDLD on an Interface21-5
Resetting an Interface Disabled by UDLD21-6
CHAPTER
Displaying UDLD Status21-6
22Configuring SPAN and RSPAN22-1
Understanding SPAN and RSPAN22-1
Local SPAN22-2
Remote SPAN22-2
SPAN and RSPAN Concepts and Terminology22-3
SPAN and RSPAN Interaction with Other Features22-8
Configuring SPAN and RSPAN22-9
Default SPAN and RSPAN Configuration22-9
Configuring Local SPAN22-9
SPAN Configuration Guidelines22-10
xviii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Creating a Local SPAN Session22-10
Creating a Local SPAN Session and Configuring Incoming Traffic22-13
Specifying VLANs to Filter22-14
Configuring RSPAN22-15
RSPAN Configuration Guidelines22-15
Configuring a VLAN as an RSPAN VLAN22-16
Creating an RSPAN Source Session22-17
Creating an RSPAN Destination Session22-19
Creating an RSPAN Destination Session and Configuring Incoming Traffic22-20
Specifying VLANs to Filter22-22
Displaying SPAN and RSPAN Status22-23
Contents
CHAPTER
CHAPTER
23Configuring RMON23-1
Understanding RMON23-1
Configuring RMON23-2
Default RMON Configuration23-3
Configuring RMON Alarms and Events23-3
Collecting Group History Statistics on an Interface23-5
Collecting Group Ethernet Statistics on an Interface23-5
Displaying RMON Status23-6
24Configuring System Message Logging24-1
Understanding System Message Logging24-1
Configuring System Message Logging24-2
System Log Message Format24-2
Default System Message Logging Configuration24-3
Disabling Message Logging24-3
Setting the Message Display Destination Device24-4
Synchronizing Log Messages24-5
Enabling and Disabling Time Stamps on Log Messages24-7
Enabling and Disabling Sequence Numbers in Log Messages24-7
Defining the Message Severity Level24-8
Limiting Syslog Messages Sent to the History Table and to SNMP24-9
Configuring UNIX Syslog Servers24-10
Logging Messages to a UNIX Syslog Daemon24-10
Configuring the UNIX System Logging Facility24-11
OL-8915-01
Displaying the Logging Configuration24-12
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xix
Contents
CHAPTER
25Configuring SNMP25-1
Understanding SNMP25-1
SNMP Versions25-2
SNMP Manager Functions25-3
SNMP Agent Functions25-4
SNMP Community Strings25-4
Using SNMP to Access MIB Variables 25-4
SNMP Notifications25-5
SNMP ifIndex MIB Object Values25-5
Configuring SNMP25-6
Default SNMP Configuration25-6
SNMP Configuration Guidelines25-6
Disabling the SNMP Agent25-7
Configuring Community Strings25-8
Configuring SNMP Groups and Users25-9
Configuring SNMP Notifications25-11
Setting the Agent Contact and Location Information25-14
Limiting TFTP Servers Used Through SNMP25-15
SNMP Examples25-15
CHAPTER
Displaying SNMP Status25-16
26Configuring Network Security with ACLs26-1
Understanding ACLs26-1
Supported ACLs26-2
Port ACLs26-3
VLAN Maps26-4
Handling Fragmented and Unfragmented Traffic26-4
Configuring IPv4 ACLs26-5
Creating Standard and Extended IPv4 ACLs26-6
Access List Numbers26-7
Creating a Numbered Standard ACL26-8
Creating a Numbered Extended ACL26-9
Resequencing ACEs in an ACL26-13
Creating Named Standard and Extended ACLs26-13
Using Time Ranges with ACLs26-15
Including Comments in ACLs26-17
Applying an IPv4 ACL to a Terminal Line26-17
Applying an IPv4 ACL to an Interface26-18
Hardware and Software Treatment of IP ACLs26-19
xx
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
IPv4 ACL Configuration Examples26-19
Numbered ACLs26-19
Extended ACLs26-19
Named ACLs26-20
Time Range Applied to an IP ACL26-20
Commented IP ACL Entries26-20
Creating Named MAC Extended ACLs26-21
Applying a MAC ACL to a Layer 2 Interface26-22
Configuring VLAN Maps26-23
VLAN Map Configuration Guidelines26-24
Creating a VLAN Map26-25
Examples of ACLs and VLAN Maps26-25
Applying a VLAN Map to a VLAN26-27
Using VLAN Maps in Your Network26-28
Wiring Closet Configuration26-28
Denying Access to a Server on a VLAN26-29
Contents
CHAPTER
Displaying IPv4 ACL Configuration26-30
27Configuring QoS27-1
Understanding QoS27-1
Basic QoS Model27-3
Classification27-5
Classification Based on QoS ACLs27-7
Classification Based on Class Maps and Policy Maps27-7
Policing and Marking27-8
Policing on Physical Ports27-9
Policing on SVIs27-10
Mapping Tables27-12
Queueing and Scheduling Overview27-13
Weighted Tail Drop27-13
SRR Shaping and Sharing27-14
Queueing and Scheduling on Ingress Queues27-15
Queueing and Scheduling on Egress Queues27-17
Packet Modification27-19
OL-8915-01
Configuring Auto-QoS27-20
Generated Auto-QoS Configuration27-21
Effects of Auto-QoS on the Configuration27-25
Auto-QoS Configuration Guidelines27-25
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxi
Contents
Enabling Auto-QoS for VoIP27-26
Auto-QoS Configuration Example27-27
QoS ACL Guidelines27-32
Applying QoS on Interfaces27-32
Policing Guidelines27-33
General QoS Guidelines27-33
Enabling QoS Globally27-34
Enabling VLAN-Based QoS on Physical Ports27-34
Configuring Classification Using Port Trust States27-35
Configuring the Trust State on Ports within the QoS Domain27-35
Configuring the CoS Value for an Interface27-37
Configuring a Trusted Boundary to Ensure Port Security27-37
Enabling DSCP Transparency Mode27-39
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain27-39
Configuring a QoS Policy27-41
Classifying Traffic by Using ACLs27-42
Classifying Traffic by Using Class Maps27-45
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps 27-47
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps 27-51
Classifying, Policing, and Marking Traffic by Using Aggregate Policers27-57
Configuring DSCP Maps27-59
Configuring the CoS-to-DSCP Map27-59
Configuring the IP-Precedence-to-DSCP Map27-60
Configuring the Policed-DSCP Map27-61
Configuring the DSCP-to-CoS Map27-62
Configuring the DSCP-to-DSCP-Mutation Map27-63
Configuring Ingress Queue Characteristics27-65
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds27-66
Allocating Buffer Space Between the Ingress Queues27-67
Allocating Bandwidth Between the Ingress Queues27-67
Configuring the Ingress Priority Queue27-68
xxii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring Egress Queue Characteristics27-69
Configuration Guidelines27-70
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set27-70
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID27-72
Configuring SRR Shaped Weights on Egress Queues27-74
Configuring SRR Shared Weights on Egress Queues27-75
Configuring the Egress Expedite Queue27-76
Limiting the Bandwidth on an Egress Interface27-76
Displaying Standard QoS Information27-77
Contents
CHAPTER
28Configuring EtherChannels and Layer 2 Trunk Failover28-1
Understanding EtherChannels28-1
EtherChannel Overview28-2
Port-Channel Interfaces28-3
Port Aggregation Protocol28-4
PAgP Modes28-4
PAgP Interaction with Other Features28-5
Link Aggregation Control Protocol28-5
LACP Modes28-5
LACP Interaction with Other Features28-6
EtherChannel On Mode28-6
Load Balancing and Forwarding Methods28-6
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Contents
APPENDIX
BWorking with the Cisco IOS File System, Configuration Files, and Software ImagesB-1
Working with the Flash File SystemB-1
Displaying Available File SystemsB-2
Setting the Default File SystemB-3
Displaying Information about Files on a File SystemB-3
Changing Directories and Displaying the Working DirectoryB-3
Creating and Removing DirectoriesB-4
Copying FilesB-4
Deleting FilesB-5
Creating, Displaying, and Extracting tar FilesB-5
Creating a tar FileB-6
Displaying the Contents of a tar FileB-6
Extracting a tar FileB-8
Displaying the Contents of a FileB-8
Working with Configuration FilesB-8
Guidelines for Creating and Using Configuration FilesB-9
Configuration File Types and LocationB-10
Creating a Configuration File By Using a Text EditorB-10
Copying Configuration Files By Using TFTPB-10
Preparing to Download or Upload a Configuration File By Using TFTPB-11
Downloading the Configuration File By Using TFTPB-11
Uploading the Configuration File By Using TFTPB-12
Copying Configuration Files By Using FTPB-12
Preparing to Download or Upload a Configuration File By Using FTPB-13
Downloading a Configuration File By Using FTPB-13
Uploading a Configuration File By Using FTPB-14
Copying Configuration Files By Using RCPB-15
Preparing to Download or Upload a Configuration File By Using RCPB-16
Downloading a Configuration File By Using RCPB-17
Uploading a Configuration File By Using RCPB-18
Clearing Configuration InformationB-18
Clearing the Startup Configuration FileB-19
Deleting a Stored Configuration FileB-19
OL-8915-01
Working with Software ImagesB-19
Image Location on the SwitchB-20
tar File Format of Images on a Server or Cisco.comB-20
Copying Image Files By Using TFTPB-21
Preparing to Download or Upload an Image File By Using TFTPB-21
Downloading an Image File By Using TFTPB-22
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxv
Contents
Uploading an Image File By Using TFTPB-24
Copying Image Files By Using FTPB-24
Preparing to Download or Upload an Image File By Using FTPB-25
Downloading an Image File By Using FTPB-26
Uploading an Image File By Using FTPB-27
Copying Image Files By Using RCPB-28
Preparing to Download or Upload an Image File By Using RCPB-29
Downloading an Image File By Using RCPB-30
Uploading an Image File By Using RCPB-32
APPENDIX
CUnsupported Commands in Cisco IOS Release 12.2(25)SEFC-1
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
I
NDEX
Contents
Spanning TreeC-4
Unsupported Global Configuration CommandC-4
Unsupported Interface Configuration CommandC-4
VLANC-5
Unsupported Global Configuration CommandsC-5
Unsupported vlan-config CommandC-5
Unsupported User EXEC CommandsC-5
VTPC-5
Unsupported Privileged EXEC CommandsC-5
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxvii
Contents
xxviii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Audience
Preface
This guide is for the networking professional managing the Cisco Catalyst Blade Switch 3020 for HP,
hereafter referred to as the switch module. Before using this guide, you should have experience working
with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local
area networking.
Purpose
This guide provides the information that you need to configure Cisco IOS software features on your
switch. The Cisco Catalyst Blade Switch 3020 for HPsoftware provides enterprise-class intelligent
services such as access control lists (ACLs) and quality of service (QoS) features.
This guide provides procedures for using the commands that have been created or changed for use with
the Cisco Catalyst Blade Switch3020 for HP. It does not provide detailed information about these
commands. For detailed information about these commands, see the Cisco Catalyst Blade Switch 3020 for HP Command Reference for this release. For information about the standard Cisco IOS Release 12.2
commands, see the Cisco IOS documentation set available from the Cisco.com home page at Technical Support & Documentation > Cisco IOS Software.
This guide does not provide detailed information on the graphical user interface (GUI) for the embedded
device manager that you can use to manage the switch. However, the concepts in this guide are applicable
to the GUI user. For information about the device manager, see the switch online help.
This guide does not describe system messages you might encounter or how to install your switch. For
more information, see the Cisco Catalyst Blade Switch 3020 for HP System Message Guide for this
release and the Cisco Catalyst Blade Switch 3020 for HP Hardware Installation Guide.
For documentation updates, see the release notes for this release.
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxvii
Conventions
Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Interactive examples use these conventions:
Notes, cautions, and timesavers use these conventions and symbols:
Preface
• Commands and keywords are in boldface text.
• Arguments for which you supply values are in italic.
• Square brackets ([ ]) mean optional elements.
• Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
• Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
• Terminal sessions and system displays are in screen font.
• Information you enter is in boldface screen font.
• Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
NoteMeans reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
CautionMeans reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Related Publications
For more information about the switch, see the Cisco Catalyst Blade Switch 3020 for HP documentation
on Cisco.com.