HP CISCO CATALYST BLADE SWITCH 3020 User Manual

Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide

Cisco IOS Release 12.2(25)SEF June 2006
Corporate Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 526-4100
Text Part Number: OL-8915-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
Copyright © 2006 Cisco Systems, Inc. All rights reserved.
Preface xxvii
Audience xxvii
Purpose xxvii
Conventions xxviii
Related Publications xxviii
Obtaining Documentation xxix
Cisco.com xxix Product Documentation DVD xxix Ordering Documentation xxx
Documentation Feedback xxx
Cisco Product Security Overview xxx
Reporting Security Problems in Cisco Products xxxi

CONTENTS

CHAPTER
Obtaining Technical Assistance xxxi
Cisco Technical Support & Documentation Website xxxii Submitting a Service Request xxxii Definitions of Service Request Severity xxxiii
Obtaining Additional Publications and Information xxxiii
1 Overview 1-1
Features 1-1
Ease-of-Deployment and Ease-of-Use Features 1-2 Performance Features 1-2 Management Options 1-3 Manageability Features 1-3 Availability and Redundancy Features 1-4 VLAN Features 1-5 Security Features 1-5 QoS and CoS Features 1-7 Monitoring Features 1-8
Default Settings After Initial Switch Configuration 1-8
OL-8915-01
Design Concepts for Using the Switch 1-10
Where to Go Next 1-13
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
iii
Contents
CHAPTER
2 Using the Command-Line Interface 2-1
Understanding Command Modes 2-1
Understanding the Help System 2-3
Understanding Abbreviated Commands 2-4
Understanding no and default Forms of Commands 2-4
Understanding CLI Error Messages 2-5
Using Configuration Logging 2-5
Using Command History 2-6
Changing the Command History Buffer Size 2-6 Recalling Commands 2-6 Disabling the Command History Feature 2-7
Using Editing Features 2-7
Enabling and Disabling Editing Features 2-7 Editing Commands through Keystrokes 2-7 Editing Command Lines that Wrap 2-9
Searching and Filtering Output of show and more Commands 2-10
Accessing the CLI 2-10
Accessing the CLI through a Console Connection or through Telnet 2-10
CHAPTER
3 Assigning the Switch IP Address and Default Gateway 3-1
Understanding the Boot Process 3-1
Assigning Switch Information 3-2
Default Switch Information 3-3 Understanding DHCP-Based Autoconfiguration 3-3
DHCP Client Request Process 3-4
Configuring DHCP-Based Autoconfiguration 3-5
DHCP Server Configuration Guidelines 3-5 Configuring the TFTP Server 3-6 Configuring the DNS 3-6 Configuring the Relay Device 3-6 Obtaining Configuration Files 3-7 Example Configuration 3-8
Manually Assigning IP Information 3-10
Checking and Saving the Running Configuration 3-10
Modifying the Startup Configuration 3-13
Default Boot Configuration 3-14 Automatically Downloading a Configuration File 3-14 Specifying the Filename to Read and Write the System Configuration 3-14
iv
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Booting Manually 3-15 Booting a Specific Software Image 3-16 Controlling Environment Variables 3-16
Scheduling a Reload of the Software Image 3-18
Configuring a Scheduled Reload 3-18 Displaying Scheduled Reload Information 3-19
Contents
CHAPTER
4 Configuring Cisco IOS CNS Agents 4-1
Understanding Cisco Configuration Engine Software 4-1
Configuration Service 4-2 Event Service 4-3
NameSpace Mapper 4-3
What You Should Know About the CNS IDs and Device Hostnames 4-3
ConfigID 4-3 DeviceID 4-4 Hostname and DeviceID 4-4 Using Hostname, DeviceID, and ConfigID 4-4
Understanding Cisco IOS Agents 4-5
Initial Configuration 4-5 Incremental (Partial) Configuration 4-6 Synchronized Configuration 4-6
Configuring Cisco IOS Agents 4-6
Enabling Automated CNS Configuration 4-6 Enabling the CNS Event Agent 4-8 Enabling the Cisco IOS CNS Agent 4-9
Enabling an Initial Configuration 4-9 Enabling a Partial Configuration 4-11
CHAPTER
OL-8915-01
Displaying CNS Configuration 4-12
5 Administering the Switch 5-1
Managing the System Time and Date 5-1
Understanding the System Clock 5-1 Understanding Network Time Protocol 5-2 Configuring NTP 5-3
Default NTP Configuration 5-4 Configuring NTP Authentication 5-4 Configuring NTP Associations 5-5 Configuring NTP Broadcast Service 5-6 Configuring NTP Access Restrictions 5-8
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
v
Contents
Configuring the Source IP Address for NTP Packets 5-10 Displaying the NTP Configuration 5-11
Configuring Time and Date Manually 5-11
Setting the System Clock 5-11 Displaying the Time and Date Configuration 5-12 Configuring the Time Zone 5-12 Configuring Summer Time (Daylight Saving Time) 5-13
Configuring a System Name and Prompt 5-14
Default System Name and Prompt Configuration 5-15 Configuring a System Name 5-15 Understanding DNS 5-15
Default DNS Configuration 5-16 Setting Up DNS 5-16 Displaying the DNS Configuration 5-17
Creating a Banner 5-17
Default Banner Configuration 5-17 Configuring a Message-of-the-Day Login Banner 5-18 Configuring a Login Banner 5-19
CHAPTER
Managing the MAC Address Table 5-19
Building the Address Table 5-20 MAC Addresses and VLANs 5-20 Default MAC Address Table Configuration 5-21 Changing the Address Aging Time 5-21 Removing Dynamic Address Entries 5-22 Configuring MAC Address Notification Traps 5-22 Adding and Removing Static Address Entries 5-24 Configuring Unicast MAC Address Filtering 5-25 Displaying Address Table Entries 5-26
Managing the ARP Table 5-26
6 Configuring Switch-Based Authentication 6-1
Preventing Unauthorized Access to Your Switch 6-1
Protecting Access to Privileged EXEC Commands 6-2
Default Password and Privilege Level Configuration 6-2 Setting or Changing a Static Enable Password 6-3 Protecting Enable and Enable Secret Passwords with Encryption 6-3 Disabling Password Recovery 6-5 Setting a Telnet Password for a Terminal Line 6-6 Configuring Username and Password Pairs 6-6
vi
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring Multiple Privilege Levels 6-7
Setting the Privilege Level for a Command 6-8 Changing the Default Privilege Level for Lines 6-9 Logging into and Exiting a Privilege Level 6-9
Controlling Switch Access with TACACS+ 6-10
Understanding TACACS+ 6-10 TACACS+ Operation 6-12 Configuring TACACS+ 6-12
Default TACACS+ Configuration 6-13 Identifying the TACACS+ Server Host and Setting the Authentication Key 6-13 Configuring TACACS+ Login Authentication 6-14 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services 6-16 Starting TACACS+ Accounting 6-17
Displaying the TACACS+ Configuration 6-17
Controlling Switch Access with RADIUS 6-17
Understanding RADIUS 6-18 RADIUS Operation 6-19 Configuring RADIUS 6-20
Default RADIUS Configuration 6-20 Identifying the RADIUS Server Host 6-20 Configuring RADIUS Login Authentication 6-23 Defining AAA Server Groups 6-25 Configuring RADIUS Authorization for User Privileged Access and Network Services 6-27 Starting RADIUS Accounting 6-28 Configuring Settings for All RADIUS Servers 6-29 Configuring the Switch to Use Vendor-Specific RADIUS Attributes 6-29 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 6-31
Displaying the RADIUS Configuration 6-31
Contents
OL-8915-01
Controlling Switch Access with Kerberos 6-32
Understanding Kerberos 6-32 Kerberos Operation 6-34
Authenticating to a Boundary Switch 6-34 Obtaining a TGT from a KDC 6-35 Authenticating to Network Services 6-35
Configuring Kerberos 6-35
Configuring the Switch for Local Authentication and Authorization 6-36
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
vii
Contents
Configuring the Switch for Secure Shell 6-37
Understanding SSH 6-38
SSH Servers, Integrated Clients, and Supported Versions 6-38 Limitations 6-39
Configuring SSH 6-39
Configuration Guidelines 6-39 Setting Up the Switch to Run SSH 6-39 Configuring the SSH Server 6-41
Displaying the SSH Configuration and Status 6-41
Configuring the Switch for Secure Socket Layer HTTP 6-42
Understanding Secure HTTP Servers and Clients 6-42
Certificate Authority Trustpoints 6-42 CipherSuites 6-44
Configuring Secure HTTP Servers and Clients 6-44
Default SSL Configuration 6-44 SSL Configuration Guidelines 6-45 Configuring a CA Trustpoint 6-45 Configuring the Secure HTTP Server 6-46 Configuring the Secure HTTP Client 6-47
Displaying Secure HTTP Server and Client Status 6-48
CHAPTER
Configuring the Switch for Secure Copy Protocol 6-48
Information About Secure Copy 6-49
7 Configuring IEEE 802.1x Port-Based Authentication 7-1
Understanding IEEE 802.1x Port-Based Authentication 7-1
Device Roles 7-2 Authentication Process 7-3 Authentication Initiation and Message Exchange 7-5 Ports in Authorized and Unauthorized States 7-7 IEEE 802.1x Host Mode 7-8 IEEE 802.1x Accounting 7-9 IEEE 802.1x Accounting Attribute-Value Pairs 7-9 Using IEEE 802.1x Authentication with VLAN Assignment 7-10 Using IEEE 802.1x Authentication with Per-User ACLs 7-11 Using IEEE 802.1x Authentication with Guest VLAN 7-12 Using IEEE 802.1x Authentication with Restricted VLAN 7-13 Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 7-14 Using IEEE 802.1x Authentication with Voice VLAN Ports 7-15 Using IEEE 802.1x Authentication with Port Security 7-15
viii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Using IEEE 802.1x Authentication with Wake-on-LAN 7-16 Using IEEE 802.1x Authentication with MAC Authentication Bypass 7-17
Configuring IEEE 802.1x Authentication 7-18
Default IEEE 802.1x Authentication Configuration 7-19 IEEE 802.1x Authentication Configuration Guidelines 7-20
IEEE 802.1x Authentication 7-20 VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
MAC Authentication Bypass 7-22 Configuring IEEE 802.1x Authentication 7-22 Configuring the Switch-to-RADIUS-Server Communication 7-23 Configuring the Host Mode 7-25 Configuring Periodic Re-Authentication 7-25 Manually Re-Authenticating a Client Connected to a Port 7-26 Changing the Quiet Period 7-26 Changing the Switch-to-Client Retransmission Time 7-27 Setting the Switch-to-Client Frame-Retransmission Number 7-28 Setting the Re-Authentication Number 7-29 Configuring IEEE 802.1x Accounting 7-29 Configuring a Guest VLAN 7-30 Configuring a Restricted VLAN 7-31 Configuring the Inaccessible Authentication Bypass Feature 7-33 Configuring IEEE 802.1x Authentication with WoL 7-35 Configuring MAC Authentication Bypass 7-36 Configuring IEEE 802.1x Authentication Using a RADIUS Server 7-37 Disabling IEEE 802.1x Authentication on the Port 7-38 Resetting the IEEE 802.1x Authentication Configuration to the Default Values 7-38
7-21
Contents
CHAPTER
OL-8915-01
Displaying IEEE 802.1x Statistics and Status 7-39
8 Configuring Interface Characteristics 8-1
Understanding Interface Types 8-1
Port-Based VLANs 8-2 Switch Ports 8-2
Internal Gigabit Ethernet Ports 8-2
Access Ports 8-3
Trunk Ports 8-3 EtherChannel Port Groups 8-4 Dual-Purpose Uplink Ports 8-4
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
ix
Contents
Connecting Interfaces 8-5 Management-Only Interface 8-5
Using Interface Configuration Mode 8-6
Procedures for Configuring Interfaces 8-6 Configuring a Range of Interfaces 8-7 Configuring and Using Interface Range Macros 8-8
Configuring Ethernet Interfaces 8-10
Default Ethernet Interface Configuration 8-10 Configuring Interface Speed and Duplex Mode 8-11
Speed and Duplex Configuration Guidelines 8-11 Setting the Type of a Dual-Purpose Uplink Port 8-12
Setting the Interface Speed and Duplex Parameters 8-14 Configuring IEEE 802.3x Flow Control 8-15 Configuring Auto-MDIX on an Interface 8-16 Adding a Description for an Interface 8-17
CHAPTER
CHAPTER
Configuring the System MTU 8-18
Monitoring and Maintaining the Interfaces 8-19
Monitoring Interface Status 8-19 Clearing and Resetting Interfaces and Counters 8-20 Shutting Down and Restarting the Interface 8-20
9 Configuring Smartports Macros 9-1
Understanding Smartports Macros 9-1
Configuring Smartports Macros 9-2
Default Smartports Macro Configuration 9-2 Smartports Macro Configuration Guidelines 9-3 Creating Smartports Macros 9-4 Applying Smartports Macros 9-5 Applying Cisco-Default Smartports Macros 9-6
Displaying Smartports Macros 9-8
10 Configuring VLANs 10-1
Understanding VLANs 10-1
Supported VLANs 10-2 VLAN Port Membership Modes 10-3
Configuring Normal-Range VLANs 10-4
Token Ring VLANs 10-5 Normal-Range VLAN Configuration Guidelines 10-5
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
x
OL-8915-01
VLAN Configuration Mode Options 10-6
VLAN Configuration in config-vlan Mode 10-6
VLAN Configuration in VLAN Database Configuration Mode 10-6 Saving VLAN Configuration 10-6 Default Ethernet VLAN Configuration 10-7 Creating or Modifying an Ethernet VLAN 10-8 Deleting a VLAN 10-9 Assigning Static-Access Ports to a VLAN 10-10
Configuring Extended-Range VLANs 10-11
Default VLAN Configuration 10-11 Extended-Range VLAN Configuration Guidelines 10-12 Creating an Extended-Range VLAN 10-12
Displaying VLANs 10-13
Configuring VLAN Trunks 10-14
Trunking Overview 10-14
Encapsulation Types 10-16
IEEE 802.1Q Configuration Considerations 10-16 Default Layer 2 Ethernet Interface VLAN Configuration 10-17 Configuring an Ethernet Interface as a Trunk Port 10-17
Interaction with Other Features 10-17
Configuring a Trunk Port 10-18
Defining the Allowed VLANs on a Trunk 10-19
Changing the Pruning-Eligible List 10-20
Configuring the Native VLAN for Untagged Traffic 10-21 Configuring Trunk Ports for Load Sharing 10-21
Load Sharing Using STP Port Priorities 10-22
Load Sharing Using STP Path Cost 10-23
Contents
OL-8915-01
Configuring VMPS 10-25
Understanding VMPS 10-25
Dynamic-Access Port VLAN Membership 10-26 Default VMPS Client Configuration 10-26 VMPS Configuration Guidelines 10-26 Configuring the VMPS Client 10-27
Entering the IP Address of the VMPS 10-27
Configuring Dynamic-Access Ports on VMPS Clients 10-27
Reconfirming VLAN Memberships 10-28
Changing the Reconfirmation Interval 10-28
Changing the Retry Count 10-29 Monitoring the VMPS 10-29
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xi
Contents
Troubleshooting Dynamic-Access Port VLAN Membership 10-30 VMPS Configuration Example 10-30
CHAPTER
11 Configuring VTP 11-1
Understanding VTP 11-1
The VTP Domain 11-2 VTP Modes 11-3 VTP Advertisements 11-3 VTP Version 2 11-4 VTP Pruning 11-4
Configuring VTP 11-6
Default VTP Configuration 11-6 VTP Configuration Options 11-7
VTP Configuration in Global Configuration Mode 11-7 VTP Configuration in VLAN Database Configuration Mode 11-7
VTP Configuration Guidelines 11-8
Domain Names 11-8 Passwords 11-8 VTP Version 11-8
Configuration Requirements 11-9 Configuring a VTP Server 11-9 Configuring a VTP Client 11-11 Disabling VTP (VTP Transparent Mode) 11-12 Enabling VTP Version 2 11-13 Enabling VTP Pruning 11-14 Adding a VTP Client Switch to a VTP Domain 11-14
CHAPTER
xii
Monitoring VTP 11-16
12 Configuring Voice VLAN 12-1
Understanding Voice VLAN 12-1
Cisco IP Phone Voice Traffic 12-2 Cisco IP Phone Data Traffic 12-2
Configuring Voice VLAN 12-3
Default Voice VLAN Configuration 12-3 Voice VLAN Configuration Guidelines 12-3 Configuring a Port Connected to a Cisco 7960 IP Phone 12-4
Configuring Cisco IP Phone Voice Traffic 12-4
Configuring the Priority of Incoming Data Frames 12-6
Displaying Voice VLAN 12-6
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Contents
CHAPTER
13 Configuring STP 13-1
Understanding Spanning-Tree Features 13-1
STP Overview 13-2 Spanning-Tree Topology and BPDUs 13-3 Bridge ID, Switch Priority, and Extended System ID 13-4 Spanning-Tree Interface States 13-4
Blocking State 13-6 Listening State 13-6 Learning State 13-6 Forwarding State 13-6
Disabled State 13-7 How a Switch or Port Becomes the Root Switch or Root Port 13-7 Spanning Tree and Redundant Connectivity 13-8 Spanning-Tree Address Management 13-8 Accelerated Aging to Retain Connectivity 13-8 Spanning-Tree Modes and Protocols 13-9 Supported Spanning-Tree Instances 13-9 Spanning-Tree Interoperability and Backward Compatibility 13-10 STP and IEEE 802.1Q Trunks 13-10
Configuring Spanning-Tree Features 13-10
Default Spanning-Tree Configuration 13-11 Spanning-Tree Configuration Guidelines 13-12 Changing the Spanning-Tree Mode. 13-13 Disabling Spanning Tree 13-14 Configuring the Root Switch 13-14 Configuring a Secondary Root Switch 13-16 Configuring Port Priority 13-16 Configuring Path Cost 13-18 Configuring the Switch Priority of a VLAN 13-19 Configuring Spanning-Tree Timers 13-20
Configuring the Hello Time 13-20
Configuring the Forwarding-Delay Time for a VLAN 13-21
Configuring the Maximum-Aging Time for a VLAN 13-21
Configuring the Transmit Hold-Count 13-22
Displaying the Spanning-Tree Status 13-22
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xiii
Contents
CHAPTER
14 Configuring MSTP 14-1
Understanding MSTP 14-2
Multiple Spanning-Tree Regions 14-2 IST, CIST, and CST 14-3
Operations Within an MST Region 14-3 Operations Between MST Regions 14-4
IEEE 802.1s Terminology 14-5 Hop Count 14-5 Boundary Ports 14-6 IEEE 802.1s Implementation 14-6
Port Role Naming Change 14-7
Interoperation Between Legacy and Standard Switches 14-7
Detecting Unidirectional Link Failure 14-8 Interoperability with IEEE 802.1D STP 14-8
Understanding RSTP 14-8
Port Roles and the Active Topology 14-9 Rapid Convergence 14-10 Synchronization of Port Roles 14-11 Bridge Protocol Data Unit Format and Processing 14-12
Processing Superior BPDU Information 14-13
Processing Inferior BPDU Information 14-13 Topology Changes 14-13
Configuring MSTP Features 14-14
Default MSTP Configuration 14-14 MSTP Configuration Guidelines 14-15 Specifying the MST Region Configuration and Enabling MSTP 14-16 Configuring the Root Switch 14-17 Configuring a Secondary Root Switch 14-18 Configuring Port Priority 14-19 Configuring Path Cost 14-20 Configuring the Switch Priority 14-21 Configuring the Hello Time 14-22 Configuring the Forwarding-Delay Time 14-23 Configuring the Maximum-Aging Time 14-23 Configuring the Maximum-Hop Count 14-24 Specifying the Link Type to Ensure Rapid Transitions 14-24 Designating the Neighbor Type 14-25 Restarting the Protocol Migration Process 14-25
Displaying the MST Configuration and Status 14-26
xiv
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Contents
CHAPTER
15 Configuring Optional Spanning-Tree Features 15-1
Understanding Optional Spanning-Tree Features 15-1
Understanding Port Fast 15-2 Understanding BPDU Guard 15-2 Understanding BPDU Filtering 15-3 Understanding UplinkFast 15-3 Understanding BackboneFast 15-5 Understanding EtherChannel Guard 15-7 Understanding Root Guard 15-8 Understanding Loop Guard 15-9
Configuring Optional Spanning-Tree Features 15-9
Default Optional Spanning-Tree Configuration 15-9 Optional Spanning-Tree Configuration Guidelines 15-10 Enabling Port Fast 15-10 Enabling BPDU Guard 15-11 Enabling BPDU Filtering 15-12 Enabling UplinkFast for Use with Redundant Links 15-13 Enabling BackboneFast 15-13 Enabling EtherChannel Guard 15-14 Enabling Root Guard 15-15 Enabling Loop Guard 15-15
CHAPTER
Displaying the Spanning-Tree Status 15-16
16 Configuring Flex Links and the MAC Address-Table Move Update Feature 16-1
Understanding Flex Links and the MAC Address-Table Move Update 16-1
Flex Links 16-1 MAC Address-Table Move Update 16-2
Configuring Flex Links and MAC Address-Table Move Update 16-4
Configuration Guidelines 16-4 Default Configuration 16-4
Configuring Flex Links and MAC Address-Table Move Update 16-5
Configuring Flex Links 16-5 Configuring the MAC Address-Table Move Update Feature 16-6
Monitoring Flex Links and the MAC Address-Table Move Update 16-8
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xv
Contents
CHAPTER
CHAPTER
17 Configuring DHCP Features 17-1
Understanding DHCP Features 17-1
DHCP Server 17-2 DHCP Relay Agent 17-2 DHCP Snooping 17-2 Option-82 Data Insertion 17-3
Configuring DHCP Features 17-6
Default DHCP Configuration 17-6 DHCP Snooping Configuration Guidelines 17-7 Configuring the DHCP Relay Agent 17-8 Enabling DHCP Snooping and Option 82 17-8 Enabling the Cisco IOS DHCP Server Database 17-10
Displaying DHCP Snooping Information 17-10
18 Configuring IGMP Snooping and MVR 18-1
Understanding IGMP Snooping 18-1
IGMP Versions 18-2 Joining a Multicast Group 18-3 Leaving a Multicast Group 18-5 Immediate Leave 18-5 IGMP Configurable-Leave Timer 18-5 IGMP Report Suppression 18-6
xvi
Configuring IGMP Snooping 18-6
Default IGMP Snooping Configuration 18-6 Enabling or Disabling IGMP Snooping 18-7 Setting the Snooping Method 18-8 Configuring a Multicast Router Port 18-9 Configuring a Blade Server Statically to Join a Group 18-9 Enabling IGMP Immediate Leave 18-10 Configuring the IGMP Leave Timer 18-11 Configuring TCN-Related Commands 18-11
Controlling the Multicast Flooding Time After a TCN Event 18-12
Recovering from Flood Mode 18-12
Disabling Multicast Flooding During a TCN Event 18-13 Configuring the IGMP Snooping Querier 18-13 Disabling IGMP Report Suppression 18-15
Displaying IGMP Snooping Information 18-15
Understanding Multicast VLAN Registration 18-17
Using MVR in a Multicast Television Application 18-18
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring MVR 18-19
Default MVR Configuration 18-19 MVR Configuration Guidelines and Limitations 18-20 Configuring MVR Global Parameters 18-20 Configuring MVR Interfaces 18-21
Displaying MVR Information 18-23
Configuring IGMP Filtering and Throttling 18-23
Default IGMP Filtering and Throttling Configuration 18-24 Configuring IGMP Profiles 18-24 Applying IGMP Profiles 18-25 Setting the Maximum Number of IGMP Groups 18-26 Configuring the IGMP Throttling Action 18-27
Displaying IGMP Filtering and Throttling Configuration 18-28
Contents
CHAPTER
19 Configuring Port-Based Traffic Control 19-1
Configuring Storm Control 19-1
Understanding Storm Control 19-1 Default Storm Control Configuration 19-3 Configuring Storm Control and Threshold Levels 19-3
Configuring Protected Ports 19-5
Default Protected Port Configuration 19-6 Protected Port Configuration Guidelines 19-6 Configuring a Protected Port 19-6
Configuring Port Blocking 19-6
Default Port Blocking Configuration 19-7 Blocking Flooded Traffic on an Interface 19-7
Configuring Port Security 19-7
Understanding Port Security 19-8
Secure MAC Addresses 19-8
Security Violations 19-9 Default Port Security Configuration 19-10 Port Security Configuration Guidelines 19-10 Enabling and Configuring Port Security 19-11 Enabling and Configuring Port Security Aging 19-15
OL-8915-01
Displaying Port-Based Traffic Control Settings 19-16
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xvii
Contents
CHAPTER
CHAPTER
20 Configuring CDP 20-1
Understanding CDP 20-1
Configuring CDP 20-2
Default CDP Configuration 20-2 Configuring the CDP Characteristics 20-2 Disabling and Enabling CDP 20-3 Disabling and Enabling CDP on an Interface 20-4
Monitoring and Maintaining CDP 20-4
21 Configuring UDLD 21-1
Understanding UDLD 21-1
Modes of Operation 21-1 Methods to Detect Unidirectional Links 21-2
Configuring UDLD 21-3
Default UDLD Configuration 21-4 Configuration Guidelines 21-4 Enabling UDLD Globally 21-5 Enabling UDLD on an Interface 21-5 Resetting an Interface Disabled by UDLD 21-6
CHAPTER
Displaying UDLD Status 21-6
22 Configuring SPAN and RSPAN 22-1
Understanding SPAN and RSPAN 22-1
Local SPAN 22-2 Remote SPAN 22-2 SPAN and RSPAN Concepts and Terminology 22-3
SPAN Sessions 22-3 Monitored Traffic 22-4 Source Ports 22-5 Source VLANs 22-6 VLAN Filtering 22-6 Destination Port 22-6 RSPAN VLAN 22-7
SPAN and RSPAN Interaction with Other Features 22-8
Configuring SPAN and RSPAN 22-9
Default SPAN and RSPAN Configuration 22-9 Configuring Local SPAN 22-9
SPAN Configuration Guidelines 22-10
xviii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Creating a Local SPAN Session 22-10
Creating a Local SPAN Session and Configuring Incoming Traffic 22-13
Specifying VLANs to Filter 22-14 Configuring RSPAN 22-15
RSPAN Configuration Guidelines 22-15
Configuring a VLAN as an RSPAN VLAN 22-16
Creating an RSPAN Source Session 22-17
Creating an RSPAN Destination Session 22-19
Creating an RSPAN Destination Session and Configuring Incoming Traffic 22-20
Specifying VLANs to Filter 22-22
Displaying SPAN and RSPAN Status 22-23
Contents
CHAPTER
CHAPTER
23 Configuring RMON 23-1
Understanding RMON 23-1
Configuring RMON 23-2
Default RMON Configuration 23-3 Configuring RMON Alarms and Events 23-3 Collecting Group History Statistics on an Interface 23-5 Collecting Group Ethernet Statistics on an Interface 23-5
Displaying RMON Status 23-6
24 Configuring System Message Logging 24-1
Understanding System Message Logging 24-1
Configuring System Message Logging 24-2
System Log Message Format 24-2 Default System Message Logging Configuration 24-3 Disabling Message Logging 24-3 Setting the Message Display Destination Device 24-4 Synchronizing Log Messages 24-5 Enabling and Disabling Time Stamps on Log Messages 24-7 Enabling and Disabling Sequence Numbers in Log Messages 24-7 Defining the Message Severity Level 24-8 Limiting Syslog Messages Sent to the History Table and to SNMP 24-9 Configuring UNIX Syslog Servers 24-10
Logging Messages to a UNIX Syslog Daemon 24-10
Configuring the UNIX System Logging Facility 24-11
OL-8915-01
Displaying the Logging Configuration 24-12
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xix
Contents
CHAPTER
25 Configuring SNMP 25-1
Understanding SNMP 25-1
SNMP Versions 25-2 SNMP Manager Functions 25-3 SNMP Agent Functions 25-4 SNMP Community Strings 25-4 Using SNMP to Access MIB Variables 25-4 SNMP Notifications 25-5 SNMP ifIndex MIB Object Values 25-5
Configuring SNMP 25-6
Default SNMP Configuration 25-6 SNMP Configuration Guidelines 25-6 Disabling the SNMP Agent 25-7 Configuring Community Strings 25-8 Configuring SNMP Groups and Users 25-9 Configuring SNMP Notifications 25-11 Setting the Agent Contact and Location Information 25-14 Limiting TFTP Servers Used Through SNMP 25-15 SNMP Examples 25-15
CHAPTER
Displaying SNMP Status 25-16
26 Configuring Network Security with ACLs 26-1
Understanding ACLs 26-1
Supported ACLs 26-2
Port ACLs 26-3 VLAN Maps 26-4
Handling Fragmented and Unfragmented Traffic 26-4
Configuring IPv4 ACLs 26-5
Creating Standard and Extended IPv4 ACLs 26-6
Access List Numbers 26-7 Creating a Numbered Standard ACL 26-8 Creating a Numbered Extended ACL 26-9 Resequencing ACEs in an ACL 26-13 Creating Named Standard and Extended ACLs 26-13 Using Time Ranges with ACLs 26-15
Including Comments in ACLs 26-17 Applying an IPv4 ACL to a Terminal Line 26-17 Applying an IPv4 ACL to an Interface 26-18 Hardware and Software Treatment of IP ACLs 26-19
xx
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
IPv4 ACL Configuration Examples 26-19
Numbered ACLs 26-19 Extended ACLs 26-19 Named ACLs 26-20 Time Range Applied to an IP ACL 26-20 Commented IP ACL Entries 26-20
Creating Named MAC Extended ACLs 26-21
Applying a MAC ACL to a Layer 2 Interface 26-22
Configuring VLAN Maps 26-23
VLAN Map Configuration Guidelines 26-24 Creating a VLAN Map 26-25
Examples of ACLs and VLAN Maps 26-25 Applying a VLAN Map to a VLAN 26-27 Using VLAN Maps in Your Network 26-28
Wiring Closet Configuration 26-28
Denying Access to a Server on a VLAN 26-29
Contents
CHAPTER
Displaying IPv4 ACL Configuration 26-30
27 Configuring QoS 27-1
Understanding QoS 27-1
Basic QoS Model 27-3 Classification 27-5
Classification Based on QoS ACLs 27-7
Classification Based on Class Maps and Policy Maps 27-7 Policing and Marking 27-8
Policing on Physical Ports 27-9
Policing on SVIs 27-10 Mapping Tables 27-12 Queueing and Scheduling Overview 27-13
Weighted Tail Drop 27-13
SRR Shaping and Sharing 27-14
Queueing and Scheduling on Ingress Queues 27-15
Queueing and Scheduling on Egress Queues 27-17 Packet Modification 27-19
OL-8915-01
Configuring Auto-QoS 27-20
Generated Auto-QoS Configuration 27-21 Effects of Auto-QoS on the Configuration 27-25 Auto-QoS Configuration Guidelines 27-25
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxi
Contents
Enabling Auto-QoS for VoIP 27-26 Auto-QoS Configuration Example 27-27
Displaying Auto-QoS Information 27-29
Configuring Standard QoS 27-29
Default Standard QoS Configuration 27-30
Default Ingress Queue Configuration 27-30 Default Egress Queue Configuration 27-31 Default Mapping Table Configuration 27-32
Standard QoS Configuration Guidelines 27-32
QoS ACL Guidelines 27-32 Applying QoS on Interfaces 27-32 Policing Guidelines 27-33
General QoS Guidelines 27-33 Enabling QoS Globally 27-34 Enabling VLAN-Based QoS on Physical Ports 27-34 Configuring Classification Using Port Trust States 27-35
Configuring the Trust State on Ports within the QoS Domain 27-35
Configuring the CoS Value for an Interface 27-37
Configuring a Trusted Boundary to Ensure Port Security 27-37
Enabling DSCP Transparency Mode 27-39
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain 27-39 Configuring a QoS Policy 27-41
Classifying Traffic by Using ACLs 27-42
Classifying Traffic by Using Class Maps 27-45
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps 27-47
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps 27-51
Classifying, Policing, and Marking Traffic by Using Aggregate Policers 27-57 Configuring DSCP Maps 27-59
Configuring the CoS-to-DSCP Map 27-59
Configuring the IP-Precedence-to-DSCP Map 27-60
Configuring the Policed-DSCP Map 27-61
Configuring the DSCP-to-CoS Map 27-62
Configuring the DSCP-to-DSCP-Mutation Map 27-63 Configuring Ingress Queue Characteristics 27-65
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds 27-66
Allocating Buffer Space Between the Ingress Queues 27-67
Allocating Bandwidth Between the Ingress Queues 27-67
Configuring the Ingress Priority Queue 27-68
xxii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Configuring Egress Queue Characteristics 27-69
Configuration Guidelines 27-70 Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set 27-70 Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID 27-72 Configuring SRR Shaped Weights on Egress Queues 27-74 Configuring SRR Shared Weights on Egress Queues 27-75 Configuring the Egress Expedite Queue 27-76 Limiting the Bandwidth on an Egress Interface 27-76
Displaying Standard QoS Information 27-77
Contents
CHAPTER
28 Configuring EtherChannels and Layer 2 Trunk Failover 28-1
Understanding EtherChannels 28-1
EtherChannel Overview 28-2 Port-Channel Interfaces 28-3 Port Aggregation Protocol 28-4
PAgP Modes 28-4 PAgP Interaction with Other Features 28-5
Link Aggregation Control Protocol 28-5
LACP Modes 28-5
LACP Interaction with Other Features 28-6 EtherChannel On Mode 28-6 Load Balancing and Forwarding Methods 28-6
Configuring EtherChannels 28-8
Default EtherChannel Configuration 28-9 EtherChannel Configuration Guidelines 28-9 Configuring Layer 2 EtherChannels 28-10 Configuring EtherChannel Load Balancing 28-12 Configuring the PAgP Learn Method and Priority 28-13 Configuring LACP Hot-Standby Ports 28-14
Configuring the LACP System Priority 28-15
Configuring the LACP Port Priority 28-16
OL-8915-01
Displaying EtherChannel, PAgP, and LACP Status 28-17
Understanding Layer 2 Trunk Failover 28-17
Configuring Layer 2 Trunk Failover 28-18
Default Layer 2 Trunk Failover Configuration 28-18
Layer 2 Trunk Failover Configuration Guidelines 28-19
Configuring Layer 2 Trunk Failover 28-19
Displaying Layer 2 Trunk Failover Status 28-20
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxiii
Contents
CHAPTER
29 Troubleshooting 29-1
Recovering from a Software Failure 29-2
Recovering from a Lost or Forgotten Password 29-3
Procedure with Password Recovery Enabled 29-4 Procedure with Password Recovery Disabled 29-6
Preventing Autonegotiation Mismatches 29-7
SFP Module Security and Identification 29-8
Monitoring SFP Module Status 29-8
Monitoring Temperature 29-9
Using Ping 29-9
Understanding Ping 29-9 Executing Ping 29-9
Using Layer 2 Traceroute 29-10
Understanding Layer 2 Traceroute 29-10 Usage Guidelines 29-11 Displaying the Physical Path 29-12
Using IP Traceroute 29-12
Understanding IP Traceroute 29-12 Executing IP Traceroute 29-13
APPENDIX
Using TDR 29-14
Understanding TDR 29-14 Running TDR and Displaying the Results 29-14
Using Debug Commands 29-14
Enabling Debugging on a Specific Feature 29-15 Enabling All-System Diagnostics 29-15 Redirecting Debug and Error Message Output 29-16
Using the show platform forward Command 29-16
Using the crashinfo Files 29-18
Basic crashinfo Files 29-18 Extended crashinfo Files 29-18
A Supported MIBs A-1
MIB List A-1
Using FTP to Access the MIB Files A-3
xxiv
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Contents
APPENDIX
B Working with the Cisco IOS File System, Configuration Files, and Software Images B-1
Working with the Flash File System B-1
Displaying Available File Systems B-2 Setting the Default File System B-3 Displaying Information about Files on a File System B-3 Changing Directories and Displaying the Working Directory B-3 Creating and Removing Directories B-4 Copying Files B-4 Deleting Files B-5 Creating, Displaying, and Extracting tar Files B-5
Creating a tar File B-6
Displaying the Contents of a tar File B-6
Extracting a tar File B-8 Displaying the Contents of a File B-8
Working with Configuration Files B-8
Guidelines for Creating and Using Configuration Files B-9 Configuration File Types and Location B-10 Creating a Configuration File By Using a Text Editor B-10 Copying Configuration Files By Using TFTP B-10
Preparing to Download or Upload a Configuration File By Using TFTP B-11
Downloading the Configuration File By Using TFTP B-11
Uploading the Configuration File By Using TFTP B-12 Copying Configuration Files By Using FTP B-12
Preparing to Download or Upload a Configuration File By Using FTP B-13
Downloading a Configuration File By Using FTP B-13
Uploading a Configuration File By Using FTP B-14 Copying Configuration Files By Using RCP B-15
Preparing to Download or Upload a Configuration File By Using RCP B-16
Downloading a Configuration File By Using RCP B-17
Uploading a Configuration File By Using RCP B-18 Clearing Configuration Information B-18
Clearing the Startup Configuration File B-19
Deleting a Stored Configuration File B-19
OL-8915-01
Working with Software Images B-19
Image Location on the Switch B-20 tar File Format of Images on a Server or Cisco.com B-20 Copying Image Files By Using TFTP B-21
Preparing to Download or Upload an Image File By Using TFTP B-21
Downloading an Image File By Using TFTP B-22
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxv
Contents
Uploading an Image File By Using TFTP B-24
Copying Image Files By Using FTP B-24
Preparing to Download or Upload an Image File By Using FTP B-25 Downloading an Image File By Using FTP B-26 Uploading an Image File By Using FTP B-27
Copying Image Files By Using RCP B-28
Preparing to Download or Upload an Image File By Using RCP B-29 Downloading an Image File By Using RCP B-30 Uploading an Image File By Using RCP B-32
APPENDIX
C Unsupported Commands in Cisco IOS Release 12.2(25)SEF C-1
Access Control Lists C-1
Unsupported Privileged EXEC Commands C-1 Unsupported Global Configuration Commands C-1 Unsupported Route-Map Configuration Commands C-1
IGMP Snooping Commands C-2
Unsupported Global Configuration Commands C-2
Interface Commands C-2
Unsupported Privileged EXEC Commands C-2 Unsupported Global Configuration Commands C-2 Unsupported Interface Configuration Commands C-2
MAC Address Commands C-2
Unsupported Privileged EXEC Commands C-2 Unsupported Global Configuration Commands C-3
Miscellaneous C-3
Unsupported Privileged EXEC Commands C-3 Unsupported Global Configuration Commands C-3
Network Address Translation (NAT) Commands C-3
Unsupported Privileged EXEC Commands C-3
xxvi
QoS C-3
Unsupported Global Configuration Commands C-3 Unsupported Interface Configuration Commands C-4 Unsupported Policy-Map Configuration Commands C-4
RADIUS C-4
Unsupported Global Configuration Commands C-4
SNMP C-4
Unsupported Global Configuration Commands C-4
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
I
NDEX
Contents
Spanning Tree C-4
Unsupported Global Configuration Command C-4 Unsupported Interface Configuration Command C-4
VLAN C-5
Unsupported Global Configuration Commands C-5 Unsupported vlan-config Command C-5 Unsupported User EXEC Commands C-5
VTP C-5
Unsupported Privileged EXEC Commands C-5
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxvii
Contents
xxviii
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01

Audience

Preface

This guide is for the networking professional managing the Cisco Catalyst Blade Switch 3020 for HP, hereafter referred to as the switch module. Before using this guide, you should have experience working with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local area networking.

Purpose

This guide provides the information that you need to configure Cisco IOS software features on your switch. The Cisco Catalyst Blade Switch 3020 for HPsoftware provides enterprise-class intelligent services such as access control lists (ACLs) and quality of service (QoS) features.
This guide provides procedures for using the commands that have been created or changed for use with the Cisco Catalyst Blade Switch3020 for HP. It does not provide detailed information about these commands. For detailed information about these commands, see the Cisco Catalyst Blade Switch 3020 for HP Command Reference for this release. For information about the standard Cisco IOS Release 12.2 commands, see the Cisco IOS documentation set available from the Cisco.com home page at Technical Support & Documentation > Cisco IOS Software.
This guide does not provide detailed information on the graphical user interface (GUI) for the embedded device manager that you can use to manage the switch. However, the concepts in this guide are applicable to the GUI user. For information about the device manager, see the switch online help.
This guide does not describe system messages you might encounter or how to install your switch. For more information, see the Cisco Catalyst Blade Switch 3020 for HP System Message Guide for this release and the Cisco Catalyst Blade Switch 3020 for HP Hardware Installation Guide.
For documentation updates, see the release notes for this release.
OL-8915-01
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
xxvii

Conventions

Conventions
This publication uses these conventions to convey instructions and information:
Command descriptions use these conventions:
Interactive examples use these conventions:
Notes, cautions, and timesavers use these conventions and symbols:
Preface
Commands and keywords are in boldface text.
Arguments for which you supply values are in italic.
Square brackets ([ ]) mean optional elements.
Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements.
Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional
element.
Terminal sessions and system displays are in screen font.
Information you enter is in boldface screen font.
Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).
Note Means reader take note. Notes contain helpful suggestions or references to materials not contained in
this manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.

Related Publications

For more information about the switch, see the Cisco Catalyst Blade Switch 3020 for HP documentation on Cisco.com.
http://www.cisco.com/en/US/products/ps6748/tsd_products_support_series_home.html
Note Before installing, configuring, or upgrading the switch, see these documents:
For initial configuration information, see the “Configuring the Switch Module”section in the getting
started guide or the “Configuring the Switch with the CLI-Based Setup Program” appendix in the hardware installation guide.
For device manager requirements, see the “System Requirements” section in the release notes (not
orderable but available on Cisco.com).
xxviii
For upgrading information, see the “Downloading Software” section in the release notes.
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide
OL-8915-01
Loading...
+ 682 hidden pages