cc/td/doc/product/access/sc/rel7
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring the Local-Area Network Switch

Configuring the Local-Area Network Switch

This chapter provides instructions on configuring the local-area network (LAN) switches
(Cisco Catalyst Switch family) in your solution. The LAN switch connects the Cisco MGC hosts to the
media gateways (MGWs) or to the Cisco Signaling Link Terminals (SLTs). This chapter includes the following sections:


Note   A LAN switch is not provided with the Cisco MGC.

LAN Switch Overview

The LAN switch is used in the Cisco MGC node to extend virtual LANs (VLANs) across platforms through backbone Ethernet connections, when necessary.

Figure 5-1 illustrates an example of a fault-tolerant control signaling network using dual Cisco Catalyst LAN switches.


Figure 5-1: Sample Configuration of a Duplex LAN Switch


Before Configuration

This section contains the following procedures:

Before you begin configuring the switch, you should collect the following information:

Installing the Hardware

Install the LAN switch based on the instructions that accompany the product and configure it to support the physical connections illustrated in Figure 5-1. For additional information on how to install and configure the LAN switch hardware, see the documentation that shipped with the product.

Installing the Software

Configuration files contain the switch configuration information. Using the following commands, you can view the current configuration, back up the existing configuration before making changes, or configure the switch using a backup configuration.

To...
Type the following command and press Enter...

Verify the current software version or configuration

show config
or
show version

Back up an existing configuration before an upgrade

copy config tftp

Configure a switch using a configuration file on a Trivial File Transfer Protocol (TFTP) server

copy tftp config

Copy the current configuration to a Flash device or a TFTP server

copy config {flash | file-id | tftp}

Copy a Flash file on the current default Flash device to another Flash device

copy file-id device:[file-id]

Copy a Flash file on the current default Flash device to a TFTP server

copy file-id tftp

Copy a file from a TFTP server to a Flash device (you are prompted for the Flash device name)

copy tftp file-id

Reset an individual module in a switch

reset mod_num

Reset the entire switch

reset

Managing Software Images

To change the system software image on your switch, obtain the appropriate software image file for your switch, place it on a TFTP server, and use the following procedure to copy the image to the switch and reboot.


Note   For more information about the correct Cisco IOS software version, see Release Notes for the Cisco Media Gateway Controller Software Release 7. For information on which image your switch supports, see the documentation that came with your switch.

To copy a system software image from a TFTP server and reboot the switch using the new software image, complete the following steps in privileged mode:


Step 1   To copy a system image file from a remote host, type the following command and press Enter:

copy tftp flash
 

Step 2   To modify the BOOT variable (prepending the new image to the BOOT string), type the following command and press Enter:

set boot system flash file_id prepend
 

Step 3   To reset the switch to run the new software, thereby disconnecting any Telnet sessions established with the switch (a console port session remains connected), type the following command and press Enter:

reset system
 

Step 4   To verify the software version number to confirm that the switch is running the new software, type the following command and press Enter:

show version
 

The following example shows how to copy a software image from a TFTP server, reset the switch, and check the version of the installed software image:

Console> (enable) copy tftp flash
IP address or name of remote host []? 10.10.10.150
Name of file to copy from []? cat4000.5-1-1.bin
Flash device [bootflash]? 
Name of file to copy to [cat4000.5-1-1.bin]? 
 
8784112 bytes available on device bootflash, proceed (y/n) [n]? y
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCC
File has been copied successfully.
Console> (enable) set boot system flash bootflash:cat4000.5-1-1.bin prepend
BOOT variable = bootflash:cat4000.5-1-1.bin,1;bootflash:cat4000.4-4-1.bin,1;
Console> (enable) reset system
This command will reset the system.
Do you want to continue (y/n) [n]? y
1999 Mar 26 22:01:56 %SYS-5-SYS_RESET 0:00.505752: Please set IPAddr variable
0:00.506320: Please set Netmask variable
0:00.506675: Please set Broadcast variable
0:00.507176: Network is not configured
WS-X4012 bootrom version 4.4(1), built on 1998.12.28 10:22:22
H/W Revisions:    Meteor: 4    Comet: 8    Board: 2
Supervisor MAC addresses: 00:10:7b:f7:2f:00 through 00:10:7b:f7:32:ff (1024 addr
esses)
Installed memory: 32 MB
Testing LEDs.... done!
The system will autoboot in 5 seconds.
Type control-C to prevent autobooting.
rommon 1 > 
The system will now begin autobooting.
Autobooting image: "bootflash:cat4000.5-1-1.bin"
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCC###########################
Starting Off-line Diagnostics
 
<...output truncated...>
 
Cisco Systems, Inc. Console
 
 
4003-ER-F1
Access Restricted
Enter password: <password>
Console> show version 1
Mod Port Model      Serial #              Versions
--- ---- ---------- -------------------- ---------------------------------
1   0    WS-X4012   JAB023806LN          Hw : 0.1
                                         Gsp: 5.1(1)
                                         Nmp: 5.1(1)
Console> 
 

Establishing a Console Port Connection

Connecting a terminal to the supervisor engine console port enables you to access the Command Language Interpreter (CLI) switch before the LAN switch is configured and connected to the network.


Note   See the hardware documentation for your LAN switch model for information on connecting a terminal to the console port.

To connect to the switch through the console port and enter privileged mode, peform the following steps:


Step 1   Make sure that the terminal connected to the console port is configured as follows: 9600 baud, 8 data bits, no parity, 1 stop bit.

Step 2   Power on the LAN switch.

The system displays output from the bootup script.

Step 3   At the Enter Password prompt, press Return.

Step 4   To enter privileged mode, type the following command and press Enter:

Console> enable
 

Step 5   At the Enter Password prompt, press Return.


Verifying the Port Connections

Following is sample output shown when you establish port connections. By default, neither the normal nor the privileged mode password is set:


Note   The output on your switch might look different from what is shown here, depending on the switch model you are booting.

<...output truncated...>
Exiting Off-line Diagnostics
 
IP address for Catalyst not configured
BOOTP will commence after the ports are online
Ports are coming online ...
 
 
Cisco Systems, Inc. Console
 
 
Enter password: 
1999 Apr 08 15:35:14 %SYS-5-MOD_OK:Module 1 is online
1999 Apr 08 15:35:17 %SYS-5-MOD_OK:Module 2 is online
1999 Apr 08 15:35:17 %SYS-5-MOD_OK:Module 3 is online
<Return>
Console> enable
 
Enter password: <Return>
Console> (enable)

Note   When the switch boots with the in-band (sc0) interface address set to 0.0.0.0 (the default on a new switch or after the configuration is cleared), the switch attempts to obtain an IP address using BOOTP and RARP. For more information, see the documentation that came with your switch.

VLAN Assignments

VLANs allow you to group ports on a switch to limit unicast, multicast, and broadcast traffic flooding. Flooded traffic, originating from a particular VLAN is flooded out only from other ports belonging to that VLAN.

Port VLAN membership on the switch is assigned manually on a port-by-port basis. When you assign switch ports to VLANs by using this method, it is known as port-based or static VLAN membership. Traffic between VLANs must be routed.

You can assign the in-band (sc0) interface of a switch to any VLAN, so that you can access another switch on the same VLAN directly without a router. You can assign only one IP address at a time to the in-band interface. If you change the IP address and assign the interface to a different VLAN, the previous IP address and VLAN assignment are overwritten.

Your solution is divided into four subnets. On the LAN switch, these subnets are configured as VLANs and are assigned colors.

Subnet
Color
Purpose
Components

1

Default

VTP traffic-unused

System hubs (LAN switch)

2

Green

SS7 signaling and call control traffic

Interface #1

  • Active and standby Cisco MGCs

  • Cisco Signaling Link Terminal (SLT)

  • Network access servers or media gateways (MGWs)

3

Blue

SNMP and management traffic

Interface #2

  • Active and standby Cisco MGCs

  • SLT

  • MGWs

4

Red

PPP and VoIP traffic

MGW interfaces to ISP network carrier

Configuring Switch Ports

When you connect Ethernet, Fast Ethernet, or Gigabit Ethernet ports on the switch to other devices, the following conditions must be met:

Gigabit Ethernet ports (and some Fast Ethernet ports) support flow control and link negotiation. In most cases, the default port configuration is adequate. If you have problems communicating with the connected device, check the port configuration on both ends of the link.

To change the port configuration, complete the following steps in privileged mode:


Step 1   To set the port speed on 10/100-Mbps Fast Ethernet ports, type the following command and press Enter:

Console> set port speed mod_num/port_num {10 | 100 | auto}
 

Note   You can explicitly set the port speed or you can use the auto keyword to allow the port to auto negotiate both port speed and duplex mode with the connected port.

Step 2   To set the port duplex mode on Ethernet or Fast Ethernet ports, type the following command and press Enter:

Console> set port duplex mod_num/port_num {full | half}
 

Note   Make sure that the duplex mode is the same on both ends of the link.

Step 3   To set the flow control mode for transmit (Tx) and receive (Rx) on Fast Ethernet or Gigabit Ethernet ports (if supported on your platform), type the following command and press Enter:

Console> set port flowcontrol mod_num/port_num {receive | send} {on | off | desired}
 

Step 4   To configure link negotiation on Fast or Gigabit Ethernet ports (if supported on your platform), type the following command and press Enter:

Console> set port negotiation mod_num/port_num {enable | disable}
 

Step 5   (Optional.) To set the port name, type the following command and press Enter:

Console> setport name mod_num/port_num name_string
 

Step 6   To verify the port configuration, type the following command and press Enter:

Console> show port mod_num/port_num
 

Verifying Switch Port Configuration

Following is an example showing the configuration of the port speed, duplex mode, and port name on a 10/100-Mbps Fast Ethernet port:

Console> (enable) set port speed 6/1 100 
Port(s) 6/1 speed set to 100Mbps.
Console> (enable) set port duplex 6/1 full
Port(s) 6/1 set to full-duplex.
Console> (enable) set port name 6/1 Sparc Ultra
Port 6/1 name set.
Console> (enable) show port 6/1                
Port  Name               Status     Vlan       Level  Duplex Speed Type
----- ------------------ ---------- ---------- ------ ------ ----- ------------
6/1   Sparc Ultra        connected  trunk      normal   full   100 10/100BaseTX
 
<...output truncated...>
 
Last-Time-Cleared
--------------------------
Thu Apr 30 1999, 18:38:59
Console> (enable)

Configuring the Standby Ports

To configure the standby ports, you must enable the uplink ports on the second supervisor module for standby mode. To do so, type the following command in privileged mode and press Enter:

set standbyports enable
 

This completes the preparation for the LAN switch configuration. Continue to the next section to configure the LAN switch. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring the LAN Switch

If your Cisco MGC node contains two hosts, you must first configure the two LAN switches, then designate one switch as the primary switch and the other as the backup switch.

This section contains the following procedures:


Note   If your network has a dual configuration, perform the following procedures on both switches.

Configuring the Basic System Information

To configure the basic system information, complete the following steps in privileged mode:


Step 1   To configure the password, type the following command and press Enter:

Console> set password password
 

Step 2   To configure the enable password, type the following command and press Enter:

Console> set enablepass enable_password
 

Step 3   To configure the system prompt, type the following command and press Enter:

Console> set prompt prompt_name
 

Step 4   To configure the system name, type the following command and press Enter:

Console> set system name system_name
 

Step 5   To configure the system location, type the following command and press Enter:

Console> set system location system_location
 

Step 6   To configure the system contact, type the following command and press Enter:

Console> set system contact  system_contact phone
 

Step 7   To configure the login banner (the text that the system displays when you open a Telnet session or console port connection to the switch), type the following command and press Enter:

Console> set banner motd c [text] c
 

Note   The login banner can be as many as 255 characters long, and c signifies the beginning and the end of the message.

Step 8   To manage configuration files or show the current configuration, type the following command and press Enter:

Console> show config
 

Configuring the Domain Name System

The Domain Name System (DNS) allows you to use host names instead of IP addresses to refer to other devices on the network. To use DNS, you must have one or more name servers connected to the network.

To configure DNS, complete the following steps in privileged mode:


Step 1   To set the address of the DNS server, type the following command and press Enter:

set ip dns server ip_addr [primary]
 

Note   The first address you enter is considered the primary server. If you enter more than one server, you can use the primary keyword to make a particular name server the primary server.

Step 2   To set the domain name, type the following command and press Enter:

set ip dns domain name
 

Step 3   To enable DNS, type the following command and press Enter:

set ip dns enable
 

Step 4   To verify the DNS configuration, type the following command and press Enter:

show ip dns [noalias]
 

Note   Use the noalias keyword to show IP addresses instead of server names.


This completes the basic system configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring the Logical Interface

Before you can access a switch with Telnet or use Simple Network Management Protocol (SNMP) to manage a switch, you must assign an IP address to the in-band (sc0) logical interface. The IP address enables you to communicate with the LAN switch using IP.


Note   When configuring the switch for the first time, assign the in-band (sc0) interface to the default VLAN, VLAN 1. After you have configured additional VLANs, you can assign the interface to any VLAN. Make sure that the IP address you specify belongs to the IP subnet associated with that VLAN, and that you configure an appropriate default gateway for that subnet.

To configure the logical interface, complete the following steps in privileged mode:


Step 1   To assign an IP address and subnet mask to the switch, type the following command and press Enter:

Console> set interface sc0 ip_addr netmask
 

Step 2   To assign the switch interface to a VLAN, type the following command and press Enter (if you do not specify a VLAN, VLAN 1 is used):

Console> set interface sc0 vlan_num
 

Step 3   To specify one or more default gateways to the switch, type the following command and press Enter:


Note   The default gateway address should be the address of the SLT in the same subnet/VLAN as the switch IP address.

Console> set ip route default gateway
 

Step 4   To verify the in-band interface configuration, type the following command and press Enter:

Console> show interface
 

Step 5   To verify the default gateway assignment, type the following command and press Enter:

Console> show ip route
 

Verifying the IP Configuration

Following is an example of switch IP configuration, including the assigning of an IP address and default gateway to the switch:

Console> (enable) set interface sc0 10.10.1.20/24
Interface sc0 IP address set.
Console> (enable) set ip route default 10.10.1.1
Route added.
Console> (enable) show interface
sl0: flags=50<DOWN,POINTOPOINT,RUNNING>
        slip 0.0.0.0 dest 0.0.0.0
sc0: flags=63<UP,BROADCAST,RUNNING>
        vlan 1 inet 10.10.1.20 netmask 255.0.0.0 broadcast 10.255.255.255
me1: flags=62<DOWN,BROADCAST,RUNNING>
        inet 0.0.0.0 netmask 255.0.0.0 broadcast 0.0.0.0
Console> (enable) show ip route
 
Fragmentation   Redirect   Unreachable
-------------   --------   -----------
enabled         enabled    enabled 
 
The primary gateway: 10.10.1.1
Destination      Gateway          RouteMask    Flags   Use       Interface
---------------  ---------------  ----------   -----   --------  ---------
default          10.10.1.1        0x0          UG      0           sc0
10.0.0.0         10.10.1.20       0xff000000   U       11          sc0
Console> (enable)
 

This completes the logical interface configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring the SNMP Information

To use SNMP to manage a switch, you must configure the community strings and specify the traps that should be sent to any SNMP managers.

To configure the SNMP information, complete the following steps in privileged mode:


Step 1   To configure the community strings, type each of the following commands and press Enter:

set snmp community read-only string
set snmp community read-write string
set snmp community read-write-all string
 

Step 2   To enable the traps on the primary LAN switch, type each of the following commands and press Enter:

set snmp trap enable module
set snmp trap enable chassis
set snmp trap enable bridge
set snmp trap enable repeater
set snmp trap enable auth
set snmp trap enable ippermit
set snmp trap enable vmps
set snmp trap enable entity
set snmp trap enable config
set snmp trap enable stpx
set snmp trap enable syslog
 

This completes the SNMP configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring the VLANs

VLANs allow you to segment your network, limiting broadcast domains and organizing your network hierarchically. They also minimize traffic on a LAN.

VLAN configuration consists of the following:

Configuring VTP

VTP propagates information about the VLAN configuration throughout the switched network.


Note   VTP exchanges VLAN information over VLAN trunk links only. For information on configuring trunk links, see the "Configuring EtherChannel and VLAN Trunks" section.

The switch can operate in any one of these three VTP modes:


Note   Before you configure VLANs on the switch, you should decide whether to use VTP. If you decide to use VTP, you need to decide whether the switch should function as a VTP client or a VTP server. If you are connecting the switch to an existing network, make sure that your VTP configuration reflects the strategy used in the rest of the network.

Configuring the Switch as a VTP Server

When you configure a switch as a VTP server, you must define a VTP domain before you can create VLANs.

To configure a switch as a VTP server, complete the following steps in privileged mode:


Step 1   To assign a name to the VTP management domain, type the following command and press Enter:

set vtp domain name
 

Step 2   To set the VTP mode, type the following command and press Enter:

set vtp mode server
 

Step 3   To verify the VTP configuration, type the following command and press Enter:

show vtp domain
 

The system displays information similar to the following:

Console> (enable) show vtp domain
Domain Name                      Domain Index VTP Version Local Mode  Password
-------------------------------- ------------ ----------- ----------- ----------
BigCorp                          1            2           server      -
 
Vlan-count Max-vlan-storage Config Revision Notifications
---------- ---------------- --------------- -------------
5          1023             0               disabled
 
Last Updater    V2 Mode  Pruning  PruneEligible on Vlans
--------------- -------- -------- -------------------------
0.0.0.0         disabled disabled 2-1000
Console> (enable)
 

Configuring the Switch as a VTP Client

When a switch is a VTP client, you cannot configure VLANs on the switch; instead, you configure VLANs on a VTP server in the same VTP domain as the client. The VTP client synchronizes its VLAN configuration to the configuration of the server.

To configure a switch as a VTP client, complete the following steps in privileged mode:


Step 1   To assign a name to the VTP management domain, type the following command and press Enter:

set vtp domain name
 

Step 2   To set the VTP mode, type the following command and press Enter:

set vtp mode client
 

Step 3   To verify the VTP configuration, type the following command and press Enter:

show vtp domain
 

Note   It might take a few moments before VTP and VLAN configuration information propagates from neighboring switches to the VTP client.

The system displays information similar to the following:

Console> (enable) show vtp domain
Domain Name                      Domain Index VTP Version Local Mode  Password
-------------------------------- ------------ ----------- ----------- ----------
BigCorp                          1            2           client      -
 
Vlan-count Max-vlan-storage Config Revision Notifications
---------- ---------------- --------------- -------------
5          1023             0               disabled
 
Last Updater    V2 Mode  Pruning  PruneEligible on Vlans
--------------- -------- -------- -------------------------
0.0.0.0         disabled disabled 2-1000
Console> (enable)
 

Configuring the Switch as VTP Transparent

When a switch is in VTP transparent mode, you must configure VLAN information manually on the switch. A VTP-transparent switch does not advertise its VLAN configuration information to other switches and ignores VTP updates from VTP clients and servers.

To configure a switch for VTP transparent mode, complete the following steps in privileged mode:


Step 1   To set the VTP mode, type the following command and press Enter:

set vtp mode transparent
 

Step 2   To verify the VTP configuration, type the following command and press Enter:

show vtp domain
 

The system displays information similar to the following:

Console> (enable) show vtp domain
Domain Name                      Domain Index VTP Version Local Mode  Password
-------------------------------- ------------ ----------- ----------- ----------
                                 1            2           Transparent -
 
 
Vlan-count Max-vlan-storage Config Revision Notifications
---------- ---------------- --------------- -------------
5          1023             0               disabled
 
Last Updater    V2 Mode  Pruning  PruneEligible on Vlans
--------------- -------- -------- -------------------------
0.0.0.0         disabled disabled 2-1000
Console> (enable)
 

Creating VLANs

Once you have properly configured the switch for VTP, you can create, modify, and delete VLANs on the switch (unless you configured the switch as a VTP client). When you configure a VLAN on a VTP server, the configuration information is distributed to switches throughout the VTP domain. Following are typical VLAN assignments:

VLAN
Color
Description

1

Default

Default VLAN; used for VTP traffic

2

Green

Used for signaling and control traffic

3

Blue

Used for signaling and control traffic

4

Red

Payload — PPP/VoIP

VTP clients and servers in the same domain update their VLAN configuration based on the advertised configuration. VTP transparent switches do not act on VTP updates; you must manually make changes to the VLAN configuration on such switches.

Typically, in an IP network, each VLAN is associated with a single IP subnetwork. That is, all of the hosts in a given VLAN belong to a single subnet, use the same subnet mask, and use one or more default gateways connected to that subnetwork. Remember that stations in different VLANs cannot communicate with one another without a router configured to route traffic between the different VLANs.

The supervisor engine software supports many VLAN types, including Ethernet, Fiber Distributed Data Interface (FDDI), ATM, and Token Ring.


Note   This section describes how to configure Ethernet VLANs, only.

To configure an Ethernet VLAN in a VTP domain, complete the following steps in privileged mode:


Step 1   Type the following command and press Enter to create a VLAN by assigning it a VLAN number and a VLAN name:

set vlan vlan_num [name name]
 

Step 2   To verify the VLAN configuration, type the following command and press Enter:

show vlan vlan_num
 

The system displays information similar to the following:

Console> (enable) show vlan 10
VLAN Name                             Status    IfIndex Mod/Ports, Vlans
---- -------------------------------- --------- ------- ------------------------
10   Corporate                        active    103     
 
 
 
VLAN Type  SAID       MTU   Parent RingNo BrdgNo Stp  BrdgMode Trans1 Trans2
---- ----- ---------- ----- ------ ------ ------ ---- -------- ------ ------
10   enet  100010     1500  -      -      -      -    -        0      0
 
 
VLAN DynCreated
---- ----------
10   static    
 
 
VLAN AREHops STEHops Backup CRF 1q VLAN
---- ------- ------- ---------- -------
Console> (enable)
 

Step 3   To add one or more switch ports to a VLAN, type the following command and press Enter:

set vlan vlan_num mod_num/port_num

Note   After you create a VLAN, you can assign one or more switch ports to the VLAN. Devices connected to those ports belong to that VLAN. Make sure that the connected device is properly configured with an IP address, subnet mask, and default gateway in the subnet associated with the VLAN.

Step 4   To verify that the ports are properly assigned to the VLAN, type the following command and press Enter:

show vlan vlan_num
 

Step 5   To check to which VLAN a particular port belongs, type the following command and press Enter:

show port [mod_num/port_num]
 

The system displays information similar to the following:

Console> (enable) show port 3
Port  Name               Status     Vlan       Level  Duplex Speed Type
----- ------------------ ---------- ---------- ------ ------ ----- ------------
 3/1                     connected  10         normal   full  1000 1000BaseSX
 3/2                     connected  10         normal   full  1000 1000BaseSX
<... output truncated ...>
Console> (enable)
 

This completes the VLAN configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring the Spanning-Tree Parameters

The following spanning-tree features enable fast convergence in the case of a port failure. These parameters apply only to a network with a dual configuration.


Tips On both switches, enable PortFast on all ports connected to Cisco MGCs and to the Ethernet port on the media gateway or NAS. Enable UplinkFast on the primary switch to provide immediate failover in the event of a link failure between the hubs.

To configure the spanning-tree parameters, complete the following steps in privileged mode:


Step 1   To enable PortFast on the appropriate ports, type the following command and press Enter:

set spantree portfast port_nums enable 
 

Step 2   To enable fast switchover to alternate ports when the root port fails, type the following command and press Enter:

set spantree uplinkfast enable 
 

Step 3   To set the forward delay to 4, type the following command and press Enter:

set spantree fwddelay 4 
 

Step 4   To verify that the Spanning-Tree Protocol times out correctly (hello time), type the following command and press Enter:

set spantree hello 1 
 

Step 5   To set the priority to 1000, type the following command and press Enter:

set spantree priority 1000 
 

This completes the spanning-tree parameter configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring EtherChannel and VLAN Trunks

EtherChannel port bundles allow you to increase the bandwidth of connections between devices by grouping multiple physical ports into a single virtual port.

VLAN trunks are point-to-point links that carry the traffic of multiple VLANs. Trunk ports are useful in the network backbone, where traffic from many VLANs is handled.

You can configure EtherChannel links as VLAN trunks, providing high-bandwidth connections to the network backbone.

EtherChannel VLAN trunk configuration consists of the following:

Configuring EtherChannel

EtherChannel port bundles provide increased bandwidth between network devices by grouping multiple Fast or Gigabit Ethernet ports into a single logical transmission path.

EtherChannel bundles contain contiguous ports (for example, ports 1 to 4 or ports 5 to 8) on a Fast or Gigabit EtherChannel-capable switching module. You can configure ports into bundles containing two or four ports (for example, two bundles using ports 1 to 2 and 3 to 4, or one bundle using ports 1 to 4).

You can configure ports to negotiate an EtherChannel bundle with the neighboring device automatically (using the auto and desirable modes), or you can place the ports in on mode on both ends of the link. Ports in on mode do not form a channel with ports in auto or desirable mode. By default, Fast and Gigabit Ethernet ports are in auto mode.


Note   There are additional configuration restrictions associated with EtherChannel port bundles. For complete information, see the Software Configuration Guide for your switch.

To configure a group of Fast Ethernet or Gigabit Ethernet ports as an EtherChannel port bundle, complete the following steps in privileged mode:


Note   This procedure shows how to configure a two-port Gigabit EtherChannel bundle and how to verify the EtherChannel configuration. The assumption is that there are no configuration mismatches between the local and neighboring ports, and that the ports on the other end of the link are in auto or desirable mode).


Step 1   To verify the port groups for the module or switch you are configuring, type the following command and press Enter:

show port capabilities [mod_num[/port_num]] 
 

Step 2   To create a channel on the desired ports, type the following command and press Enter:

set port channel mod_num/ports {on | off | auto | desirable} 
 

Step 3   To verify the channeling configuration, type the following command and press Enter:

show port channel [mod_num[/port_num]] [info | statistics] 
 

The system displays information similar to the following:

Console> (enable) show port channel
Port  Status     Channel   Channel     Neighbor                  Neighbor
                 mode      status      device                    port
----- ---------- --------- ----------- ------------------------- ---------- 
 2/1  connected  desirable channel     WS-C5509    003812064     1/1       
 2/2  connected  desirable channel     WS-C5509    003812064     1/2       
----- ---------- --------- ----------- ------------------------- ---------- 
Console> (enable)
 

Configuring VLAN Trunks

VLAN trunks carry the traffic of multiple VLANs. Fast Ethernet and Gigabit Ethernet ports (including EtherChannel port bundles) can use Inter-Switch Link (ISL) or IEEE 802.1Q encapsulation for VLAN trunking. Other media use other encapsulation schemes (for example, LAN Emulation on ATM).

By default, Fast Ethernet and Gigabit Ethernet ports are in auto mode. If the port on the other end of the link is in desirable mode or on, a port in auto mode automatically becomes a trunk port.

The default trunk encapsulation depends on which encapsulation the hardware supports:


Note   For complete information on the various trunk modes and encapsulation types, see the documentation that came with your switch.

To configure a Fast Ethernet or Gigabit Ethernet port as a trunk, complete the following steps in privileged mode:


Note   This example shows how to configure a port to become a trunk and how to verify the trunk configuration. The assumption is that the port on the other end of the link is in auto, desirable, or on mode and supports IEEE 802.1Q encapsulation.


Step 1   To verify the port capabilities, type the following command and press Enter:

show port capabilities [mod_num[/port_num]] 
 

Step 2   To configure a Fast or a Gigabit Ethernet port as a trunk, type the following command and press Enter:

set trunk mod_num/port_num {on | desirable | auto} {isl | dot1q | negotiate} 
 

Note   If you are configuring an EtherChannel port bundle as a trunk, specify any one of the ports in the channel.

Step 3   To verify that the trunk configuration is correct, type the following command and press Enter:

show trunk 
 

The system displays information similar to the following:

Console> (enable) show trunk
Port      Mode         Encapsulation  Status        Native vlan
--------  -----------  -------------  ------------  -----------
 2/1      desirable    dot1q          trunking      1
 2/2      desirable    dot1q          trunking      1
 
Port      Vlans allowed on trunk
--------  ---------------------------------------------------------------------
 2/1      1-1005
 2/2      1-1005
 
Port      Vlans allowed and active in management domain 
--------  ---------------------------------------------------------------------
 2/1      1,10,20,30,40,50,60
 2/2      1,10,20,30,40,50,60
 
Port      Vlans in spanning tree forwarding state and not pruned
--------  ---------------------------------------------------------------------
 2/1      1,10,20,30,40,50,60
 2/2      1,10,20,30,40,50,60
Console> (enable)
 

This completes the EtherChannel and VLAN trunk configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Configuring the Switch Port Analyzer

If you plan to use a network analyzer (sniffer), you must configure a switch port analyzer (SPAN) port. To do this, you enable the SPAN port and specify that the information transmitted from and received by the source is to be monitored by the network analyzer.

To configure the SPAN port, type the following command and press Enter:

set span src_mod/src_ports dest_mod/dest_port both
set span enable

Configuring the Route Switch Module

Each LAN switch contains a Route Switch Module (RSM) that is used to route traffic between the VLANs. Perform the configurations described in the following sections on each switch in your network.

Configuring the Basic Parameters

To configure the RSM basic parameters, complete the following steps:


Step 1   To establish a session with the RSM, type the following command and press Enter:

session slot_number
enable
configure terminal
 

Step 2   To configure the host name of the RSM, type the following command and press Enter:

hostname hostname
 

Step 3   To configure the enable password, type the following command and press Enter:

enable password password
 

Step 4   To disable DNS, type the following command and press Enter:

no ip domain-lookup
 

Step 5   To configure the VTY interface for Telnet access, type each of the following commands and press Enter:

line vty 0 4
password cisco 
 

Configuring the Hot Standby Routing Protocol

The Hot Standby Routing Protocol (HSRP) provides redundancy between the RSMs in the LAN switch. HSRP uses a priority scheme to determine which HSRP-configured RSM is the default active RSM.

To configure an RSM as active, assign it a priority that is higher than the priority of all the other HSRP-configured RSMs. The default priority is 100. To configure HSRP for each VLAN logical interface, you must configure the IP address, disable the sending of redirect messages, and configure the HSRP parameters.

To configure HSRP, type each of the following commands and press Enter:


interface vlan vlan_nummber
ip address vlan_ip_address subnet_mask
no ip redirects
standby vlan_nummber timers 1 3
standby vlan_nummber priority 110
standby vlan_nummber preempt
standby vlan_nummber authentication string
standby vlan_nummber ip hsrp_ip_address
 

Configuring the Routing Protocol

You must configure enhanced IGRP (EIGRP) as the routing protocol and specify the address of the network.

To configure the routing protocol, type each of the following commands and press Enter:

router eigrp 1
network network_address

Configuring the GPS Clock Source

To configure the GPS clock source connected to the auxiliary port on the RSM, complete the following steps for both RSMs:


Step 1   For RSM A, type each of the following commands and press Enter:

ntp master
ntp update-calendar
line aux 0
ntp refclock telecom-solutions pps cts stratum 1
 

Step 2   For RSM B, type the following command and press Enter:

ntp server ip_address
 

Step 3   To enable a session in enable mode for the LAN switch A, type each of the following commands and press Enter:

ntp
set ntp client enable
set ntp server ip_address_RSM_B
clear timezone
 

Step 4   To enable a session in enable mode for the LAN switch B, type each of the following commands and press Enter:

ntp
set ntp client enable
set ntp server ip_address_RSM_B
clear timezone
 

Step 5   Return to RSM mode for both LAN switches; type each of the following commands and press Enter:

session slot_number
enable
configure terminal
 

Configuring the SNMP Parameters

To configure the SNMP parameters, type each of the following commands and press Enter:


snmp-server community public RO
snmp-server community private RW
snmp-server chassis-id public
snmp-server enable traps snmp
snmp-server enable traps appn alert
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps rtr
 

Completing the Configuration

To complete the configuration, exit the RSM configuration mode and save your changes by typing in each of the following commands and pressing Enter:


Ctrl-Z
copy running-config startup-config
 

This completes the RSM configuration. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.

Monitoring the LAN Switch

This section contains commands you can use to monitor the switches in your solution.


Table 5-1: LAN Switch Commands
To... In privileged mode, type the following command and press Enter...

Display system status information

show system

Display switching module status information

show module [mod_num] 

Display switch port status information

show port [mod_num[/port_num]] 

Display switch port capability information

show port capabilities [mod_num[/port_num]] 

Ping another node on the network

ping [-s] host [packet_size] [packet_count]

Trace the route of packets through the network to another node (only Layer 3 devices, such as routers, appear in the path)

traceroute [-q nqueries] host [data_size]

Check the IP address, subnet mask, broadcast address, and VLAN assignment of the in-band (sc0) switch interface

show interface 

Check the default gateway assignment

show ip route 

Display spanning-tree information

show spantree [vlan | mod_num/port_num] [active] 

Display neighbor device information

show cdp neighbors [mod_num[/port_num]] [vlan | duplex | capabilities | detail] 

Display forwarding table entries

show cam [count]{dynamic | static | permanent | system} [vlan] 
show cam {dynamic | static | permanent | system} mod_num/port_num 
show cam mac_addr [vlan] 

Display the current user sessions

show users [noalias]

Display version information for the switch

show version [mod_num]

Sample Configurations

This section provides sample configurations for the two LAN switches and the route switch modules.

Sample Configuration for Cisco Catalyst 5500 A

To view the current configuration of the Cisco Catalyst 5500 A, type the following command in privileged mode, and press Enter:

Catalyst_5513A (enable) show config
 

Output similar to the following appears:

begin
!
#version 4.5(1)
!
set password $1$l30o$QUt/nAlYZH/WFmDoJqWAW0
set enablepass $1$tTCB$rbEX8KRDTtpVG9gsy7jc61
set prompt Catalyst_5513A
set length 24 default
set logout 20
set banner motd ^C^C
!
#system
set system baud  9600
set system modem disable
set system name  Catalyst_5513A
set system location Lab1
set system contact  Jim Smith 913 555-7998
!
#snmp
set snmp community read-only      public
set snmp community read-write     private
set snmp community read-write-all public
set snmp rmon disable
set snmp trap enable  module
set snmp trap enable  chassis
set snmp trap enable  bridge
set snmp trap enable  repeater
set snmp trap enable  vtp
set snmp trap enable  auth
set snmp trap enable  ippermit
set snmp trap enable  vmps
set snmp trap enable  entity
set snmp trap enable  config
set snmp trap enable  stpx
set snmp trap enable  syslog
set snmp extendedrmon vlanmode disable
set snmp extendedrmon vlanagent disable
set snmp extendedrmon enable
!
#ip
set interface sc0 3 172.25.66.122 255.255.255.192 172.25.66.127
 
set interface sc0 up
set interface sl0 0.0.0.0 0.0.0.0
set interface sl0 up
set arp agingtime 1200
set ip redirect   enable
set ip unreachable   enable
set ip fragmentation enable
set ip route 0.0.0.0         172.25.66.124 1
set ip alias default         0.0.0.0
!
#Command alias
!
#vmps
set vmps server retry 3
set vmps server reconfirminterval 60
set vmps tftpserver 0.0.0.0 vmps-config-database.1
set vmps state disable
 
!
#dns
set ip dns disable
!
#tacacs+
set tacacs attempts 3
set tacacs directedrequest disable
set tacacs timeout 5
!
#authentication
set authentication login tacacs disable console
set authentication login tacacs disable telnet
set authentication enable tacacs disable console
set authentication enable tacacs disable telnet
set authentication login local enable console
set authentication login local enable telnet
set authentication enable local enable console
set authentication enable local enable telnet
!
#bridge
set bridge ipx snaptoether   8023raw
set bridge ipx 8022toether   8023
set bridge ipx 8023rawtofddi snap
!
#vtp
set vtp domain vsc3000
set vtp mode transparent
set vtp v2 disable
set vtp pruneeligible 2-1000
clear vtp pruneeligible 1001-1005
set vlan 1 name default type ethernet mtu 1500 said 100001 state active
set vlan 2 name green type ethernet mtu 1500 said 100002 state active
set vlan 3 name blue type ethernet mtu 1500 said 100003 state active
set vlan 4 name red type ethernet mtu 1500 said 100004 state active
set vlan 1002 name fddi-default type fddi mtu 1500 said 101002 state active
set vlan 1004 name fddinet-default type fddinet mtu 1500 said 101004 state activ
e bridge 0x0 stp ieee
set vlan 1005 name trnet-default type trbrf mtu 1500 said 101005 state active br
idge 0x0 stp ibm
set vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state acti
ve parent 0 ring 0x0 mode srb aremaxhop 7 stemaxhop 7
set interface sc0 3 172.25.66.122 255.255.255.192 172.25.66.127
 
!
#spantree
#uplinkfast groups
set spantree uplinkfast enable rate 15 all-protocols off
#backbonefast
set spantree backbonefast disable
set spantree enable  all
#vlan 1
set spantree fwddelay 4     1
set spantree hello    1     1
set spantree maxage   20    1
set spantree priority 1000 1
#vlan 2
set spantree fwddelay 4     2
set spantree hello    1     2
set spantree maxage   20    2
set spantree priority 1000 2
#vlan 3
set spantree fwddelay 4     3
set spantree hello    1     3
set spantree maxage   20    3
set spantree priority 1000 3
#vlan 4
set spantree fwddelay 4     4
set spantree hello    1     4
set spantree maxage   20    4
set spantree priority 1000 4
#vlan 1003
set spantree fwddelay 15    1003
set spantree hello    2     1003
set spantree maxage   20    1003
set spantree priority 49152 1003
set spantree portstate 1003 block 0
set spantree portcost 1003 62
set spantree portpri  1003 4
set spantree portfast 1003 disable
#vlan 1005
set spantree fwddelay 15    1005
set spantree hello    2     1005
set spantree maxage   20    1005
set spantree priority 49152 1005
set spantree multicast-address 1005 ieee
!
#cgmp
set cgmp disable
set cgmp leave disable
!
#syslog
set logging console enable
set logging server disable
set logging level cdp 2 default
set logging level mcast 2 default
set logging level dtp 5 default
set logging level dvlan 2 default
set logging level earl 2 default
set logging level fddi 2 default
set logging level ip 2 default
set logging level pruning 2 default
set logging level snmp 2 default
set logging level spantree 2 default
set logging level sys 5 default
set logging level tac 2 default
set logging level tcp 2 default
set logging level telnet 2 default
set logging level tftp 2 default
set logging level vtp 2 default
set logging level vmps 2 default
set logging level kernel 2 default
set logging level filesys 2 default
set logging level drip 2 default
set logging level pagp 5 default
set logging level mgmt 5 default
set logging level mls 5 default
set logging level protfilt 2 default
set logging level security 2 default
set logging server facility LOCAL7
set logging server severity 4
set logging buffer 500
set logging timestamp disable
!
#ntp
set ntp broadcastclient disable
set ntp broadcastdelay 3000
set ntp client disable
clear timezone
set summertime disable
!
#set boot command
set boot config-register 0x2
set boot system flash bootflash:RTSYNC_cat5000-sup3_4-5-1.bin
set boot system flash bootflash:RTSYNC_cat5000-sup3.4-4-1.bin
set boot system flash bootflash:cat5000-sup3.4-3-1a.bin
 
!
#permit list
set ip permit disable
!
#drip
set tokenring reduction enable
set tokenring distrib-crf disable
!
#igmp
set igmp disable
!
#protocolfilter
set protocolfilter disable
!
#mls
set mls enable
set mls flow destination
set mls agingtime 256
set mls agingtime fast 0 0
set mls nde disable
!
#standby ports
set standbyports enable
!
#module 1 : 2-port 10/100BaseTX Supervisor
set module name    1
set vlan 1    1/1-2
set port channel 1/1-2 off
set port enable     1/1-2
set port level      1/1-2  normal
set port speed      1/1-2  100
set port duplex     1/1-2  full
set port trap       1/1-2  disable
set port name       1/1-2
set port security   1/1-2  disable
set port broadcast  1/1-2  100%
set port membership 1/1-2  static
set port protocol 1/1-2 ip on
set port protocol 1/1-2 ipx auto
set cdp enable   1/1-2
set cdp interval 1/1-2 60
set trunk 1/1  on isl 1-1005
set trunk 1/2  on isl 1-1005
set spantree portfast    1/1-2 disable
set spantree portcost    1/1-2  3019
set spantree portpri     1/1-2  32
set spantree portvlanpri 1/1  0
set spantree portvlanpri 1/2  0
set spantree portvlancost 1/1  cost 3018
set spantree portvlancost 1/2  cost 3018
!
#module 2 : 2-port 10/100BaseTX Supervisor
set module name    2
set vlan 1    2/1-2
set port channel 2/1-2 off
set port enable     2/1-2
set port level      2/1-2  normal
set port speed      2/1-2  100
set port duplex     2/1-2  full
set port trap       2/1-2  disable
set port name       2/1-2
set port security   2/1-2  disable
set port broadcast  2/1-2  100%
set port membership 2/1-2  static
set port protocol 2/1-2 ip on
set port protocol 2/1-2 ipx auto
set cdp enable   2/1-2
set cdp interval 2/1-2 60
set trunk 2/1  desirable isl 1-1005
set trunk 2/2  desirable isl 1-1005
set spantree portfast    2/1-2 disable
set spantree portcost    2/1-2  3019
set spantree portpri     2/1-2  32
set spantree portvlanpri 2/1  0
set spantree portvlanpri 2/2  0
set spantree portvlancost 2/1  cost 3018
set spantree portvlancost 2/2  cost 3018
!
#module 3 : 24-port 10BaseT Ethernet
set module name    3
set module enable  3
set vlan 1    3/19-20,3/22-24
set vlan 2    3/1-18
set vlan 3    3/21
set port enable     3/1-24
set port level      3/1-24  normal
set port duplex     3/1-24  half
set port trap       3/1-24  disable
set port name       3/1-24
set port security   3/1-24  disable
set port broadcast  3/1-24  0
set port membership 3/1-24  static
set port protocol 3/1-24 ip on
set port protocol 3/1-24 ipx auto
set cdp enable   3/1-24
set cdp interval 3/1-24 60
set spantree portfast    3/1-24 enable
set spantree portcost    3/1-24  3100
set spantree portpri     3/1-24  32
!
#module 4 : 12-port 10/100BaseTX Ethernet
set module name    4
set module enable  4
set vlan 2    4/1-2
set vlan 3    4/7-8
set vlan 4    4/3-6
set port channel 4/1-4 off
set port channel 4/5-8 off
set port channel 4/9-12 off
set port enable     4/1-12
set port level      4/1-12  normal
set port speed      4/1-12 auto
set port trap       4/1-12  disable
set port name       4/1-12
set port security   4/1-12  disable
set port broadcast  4/1-12  0
set port membership 4/1-12  static
set port protocol 4/1-12 ip on
set port protocol 4/1-12 ipx auto
set cdp enable   4/1-12
set cdp interval 4/1-12 60
set trunk 4/1  auto isl 1-1005
set trunk 4/2  auto isl 1-1005
set trunk 4/3  auto isl 1-1005
set trunk 4/4  auto isl 1-1005
set trunk 4/5  auto isl 1-1005
set trunk 4/6  auto isl 1-1005
set trunk 4/7  auto isl 1-1005
set trunk 4/8  auto isl 1-1005
set trunk 4/9  auto isl 1-1005
set trunk 4/10 auto isl 1-1005
set trunk 4/11 off isl 1-1005
set trunk 4/12 off isl 1-1005
set spantree portfast    4/1-12 enable
set spantree portcost    4/5-8, 4/11-12 3019
set spantree portcost    4/1-4, 4/9-10 3100
set spantree portpri     4/1-12  32
set spantree portvlanpri 4/1  0
set spantree portvlanpri 4/2  0
set spantree portvlanpri 4/3  0
set spantree portvlanpri 4/4  0
set spantree portvlanpri 4/5  0
set spantree portvlanpri 4/6  0
set spantree portvlanpri 4/7  0
set spantree portvlanpri 4/8  0
set spantree portvlanpri 4/9  0
set spantree portvlanpri 4/10 0
set spantree portvlanpri 4/11 0
set spantree portvlanpri 4/12 0
set spantree portvlancost 4/1  cost 3099
set spantree portvlancost 4/2  cost 3099
set spantree portvlancost 4/3  cost 3099
set spantree portvlancost 4/4  cost 3099
set spantree portvlancost 4/5  cost 3018
set spantree portvlancost 4/6  cost 3018
set spantree portvlancost 4/7  cost 3018
set spantree portvlancost 4/8  cost 3018
set spantree portvlancost 4/9  cost 3099
set spantree portvlancost 4/10 cost 3099
set spantree portvlancost 4/11 cost 3018
set spantree portvlancost 4/12 cost 3018
!
#module 5 empty
!
#module 6 empty
!
#module 7 empty
!
#module 8 empty
!
#module 9 empty
!
#module 10 empty
!
#module 11 empty
!
#module 12 : 1-port Route Switch
set module name    12
set port level      12/1  normal
set port trap       12/1  disable
set port name       12/1
set cdp enable   12/1
set cdp interval 12/1 60
set trunk 12/1  on isl 1-1005
set spantree portcost    12/1  3005
set spantree portpri     12/1  15
set spantree portvlanpri 12/1  160
set spantree portvlancost 12/1  cost 3004 4-8,11-15
!
#module 13 empty
!
#switch port analyzer
set span 2 3/23 both inpkts disable
!set span enable
!
#cam
set cam agingtime 1-4,1003,1005 300
end

Sample Configuration for Cisco Catalyst 5500 A RSM

To view the current configuration of the Cisco Catalyst 5500 A RSM, access the RSM interface, type the following command in privileged mode, and press Enter:

Catalyst_5513A_RSM#show run
 

Output similar to the following appears:

Building configuration...
 
Current configuration:
!
version 11.3
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Catalyst_5513A_RSM
!
enable password cisco
!
no ip domain-lookup
!
!
!
interface Vlan2
 ip address 209.165.200.224 255.255.255.224
 no ip redirects
 standby 2 timers 1 3
 standby 2 priority 110
 standby 2 preempt
 standby 2 authentication VSC3000
 standby 2 ip 172.25.66.60
!
interface Vlan3
 ip address 209.165.200.224 255.255.255.224
 no ip redirects
 standby 3 timers 1 3
 standby 3 priority 110
 standby 3 preempt
 standby 3 authentication VSC3000
 standby 3 ip 209.165.200.224 
!
interface Vlan4
 ip address 209.165.200.224 255.255.255.224
 no ip redirects
 standby 4 timers 1 3
 standby 4 priority 110
 standby 4 preempt
 standby 4 authentication VSC3000
 standby 4 ip 209.165.200.224 
!
router eigrp 1
 network 209.165.200.224 
!
ip classless
!
snmp-server community public RO
snmp-server community private RW
snmp-server chassis-id public
snmp-server enable traps snmp
snmp-server enable traps appn alert
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps rtr
!
line con 0
line aux 0
line vty 0 4
 password cisco
 login
!
end

Sample Configuration for Cisco Catalyst 5500 B

To view the current configuration of the Cisco Catalyst 5500 B, type the following command in privileged mode, and press Enter:

Catalyst_5513B (enable) show config
 

Output similar to the following appears:

begin
!
#version 4.5(1)
!
set password $1$7OtT$J/rAZe2CANYvHW72ZMtI10
set enablepass $1$0o8Z$xbxAzs4LlepsklB6Ju7VY.
set prompt Catalyst_5513B
set length 24 default
set logout 20
set banner motd ^C^C
!
#system
set system baud  9600
set system modem disable
set system name  Catalyst_5513B
set system location Lab1
set system contact  John Smith 913 555-7998
!
#snmp
set snmp community read-only      public
set snmp community read-write     private
set snmp community read-write-all public
set snmp rmon disable
set snmp trap disable module
set snmp trap disable chassis
set snmp trap disable bridge
set snmp trap disable repeater
set snmp trap disable vtp
set snmp trap disable auth
set snmp trap disable ippermit
set snmp trap disable vmps
set snmp trap disable entity
set snmp trap disable config
set snmp trap disable stpx
set snmp trap disable syslog
set snmp extendedrmon vlanmode disable
set snmp extendedrmon vlanagent disable
set snmp extendedrmon enable
!
#ip
set interface sc0 3 209.165.200.224 255.255.255.224
 
set interface sc0 up
set interface sl0 0.0.0.0 0.0.0.0
set interface sl0 up
set arp agingtime 1200
set ip redirect   enable
set ip unreachable   enable
set ip fragmentation enable
set ip route 0.0.0.0 209.165.200.224
set ip alias default         0.0.0.0
!
#Command alias
!
#vmps
set vmps server retry 3
set vmps server reconfirminterval 60
set vmps tftpserver 0.0.0.0 vmps-config-database.1
set vmps state disable
 
!
#dns
set ip dns disable
!
#tacacs+
set tacacs attempts 3
set tacacs directedrequest disable
set tacacs timeout 5
!
#authentication
set authentication login tacacs disable console
set authentication login tacacs disable telnet
set authentication enable tacacs disable console
set authentication enable tacacs disable telnet
set authentication login local enable console
set authentication login local enable telnet
set authentication enable local enable console
set authentication enable local enable telnet
!
#bridge
set bridge ipx snaptoether   8023raw
set bridge ipx 8022toether   8023
set bridge ipx 8023rawtofddi snap
!
#vtp
set vtp domain vsc3000
set vtp mode transparent
set vtp v2 disable
set vtp pruneeligible 2-1000
clear vtp pruneeligible 1001-1005
set vlan 1 name default type ethernet mtu 1500 said 100001 state active
set vlan 2 name green type ethernet mtu 1500 said 100002 state active
set vlan 3 name blue type ethernet mtu 1500 said 100003 state active
set vlan 4 name red type ethernet mtu 1500 said 100004 state active
set vlan 1002 name fddi-default type fddi mtu 1500 said 101002 state active
set vlan 1004 name fddinet-default type fddinet mtu 1500 said 101004 state active bridge 0x0 stp ieee
set vlan 1005 name trnet-default type trbrf mtu 1500 said 101005 state active bridge 0x0 stp ibm
set vlan 1003 name token-ring-default type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode srb aremaxhop 7 stemaxhop 7
set interface sc0 3 209.165.200.224 255.255.255.224 209.165.200.224
 
!
#spantree
#uplinkfast groups
set spantree uplinkfast disable
#backbonefast
set spantree backbonefast disable
set spantree enable  all
#vlan 1
set spantree fwddelay 4 1
set spantree hello    2     1
set spantree maxage   20    1
set spantree priority 2000 1
#vlan 2
set spantree fwddelay 4 2
set spantree hello    2     2
set spantree maxage   20    2
set spantree priority 2000 2
#vlan 3
set spantree fwddelay 4 3
set spantree hello    2     3
set spantree maxage   20    3
set spantree priority 2000 3
#vlan 4
set spantree fwddelay 4 4
set spantree hello    2     4
set spantree maxage   20    4
set spantree priority 2000 4
#vlan 1003
set spantree fwddelay 15    1003
set spantree hello    2     1003
set spantree maxage   20    1003
set spantree priority 32768 1003
set spantree portstate 1003 block 0
set spantree portcost 1003 62
set spantree portpri  1003 4
set spantree portfast 1003 disable
#vlan 1005
set spantree fwddelay 15    1005
set spantree hello    2     1005
set spantree maxage   20    1005
set spantree priority 32768 1005
set spantree multicast-address 1005 ieee
!
#cgmp
set cgmp disable
set cgmp leave disable
!
#syslog
set logging console enable
set logging server disable
set logging level cdp 2 default
set logging level mcast 2 default
set logging level dtp 5 default
set logging level dvlan 2 default
set logging level earl 2 default
set logging level fddi 2 default
set logging level ip 2 default
set logging level pruning 2 default
set logging level snmp 2 default
set logging level spantree 2 default
set logging level sys 5 default
set logging level tac 2 default
set logging level tcp 2 default
set logging level telnet 2 default
set logging level tftp 2 default
set logging level vtp 2 default
set logging level vmps 2 default
set logging level kernel 2 default
set logging level filesys 2 default
set logging level drip 2 default
set logging level pagp 5 default
set logging level mgmt 5 default
set logging level mls 5 default
set logging level protfilt 2 default
set logging level security 2 default
set logging server facility LOCAL7
set logging server severity 4
set logging buffer 500
set logging timestamp disable
!
#ntp
set ntp broadcastclient disable
set ntp broadcastdelay 3000
set ntp client disable
clear timezone
set summertime disable
!
#set boot command
set boot config-register 0x2
set boot system flash bootflash:cat5000-sup3.4-5-1.bin
!
#permit list
set ip permit disable
!
#drip
set tokenring reduction enable
set tokenring distrib-crf disable
!
#igmp
set igmp disable
!
#protocolfilter
set protocolfilter disable
!
#mls
set mls enable
set mls flow destination
set mls agingtime 256
set mls agingtime fast 0 0
set mls nde disable
!
#standby ports
set standbyports enable
!
#module 1 : 2-port 10/100BaseTX Supervisor
set module name    1
set vlan 1    1/1-2
set port channel 1/1-2 off
set port enable     1/1-2
set port level      1/1-2  normal
set port speed      1/1-2  100
set port duplex     1/1-2  full
set port trap       1/1-2  disable
set port name       1/1-2
set port security   1/1-2  disable
set port broadcast  1/1-2  100%
set port membership 1/1-2  static
set port protocol 1/1-2 ip on
set port protocol 1/1-2 ipx auto
set cdp enable   1/1-2
set cdp interval 1/1-2 60
set trunk 1/1  on isl 1-1005
set trunk 1/2  on isl 1-1005
set spantree portfast    1/1-2 disable
set spantree portcost    1/1-2  3019
set spantree portpri     1/1-2  32
set spantree portvlanpri 1/1  0
set spantree portvlanpri 1/2  0
set spantree portvlancost 1/1  cost 3018
set spantree portvlancost 1/2  cost 3018
!
#module 2 : 2-port 10/100BaseTX Supervisor
set module name    2
set vlan 1    2/1-2
set port channel 2/1-2 off
set port enable     2/1-2
set port level      2/1-2  normal
set port speed      2/1-2  100
set port duplex     2/1-2  full
set port trap       2/1-2  disable
set port name       2/1-2
set port security   2/1-2  disable
set port broadcast  2/1-2  100%
set port membership 2/1-2  static
set port protocol 2/1-2 ip on
set port protocol 2/1-2 ipx auto
set cdp enable   2/1-2
set cdp interval 2/1-2 60
set trunk 2/1  desirable isl 1-1005
set trunk 2/2  desirable isl 1-1005
set spantree portfast    2/1-2 disable
set spantree portcost    2/1-2  3019
set spantree portpri     2/1-2  32
set spantree portvlanpri 2/1  0
set spantree portvlanpri 2/2  0
set spantree portvlancost 2/1  cost 3018
set spantree portvlancost 2/2  cost 3018
!
#module 3 : 24-port 10BaseT Ethernet
set module name    3
set module enable  3
set vlan 1    3/20-24
set vlan 2    3/17
set vlan 3    3/1-16,3/19
set port enable     3/1-24
set port level      3/1-24  normal
set port duplex     3/1-24  half
set port trap       3/1-24  disable
set port name       3/1-24
set port security   3/1-24  disable
set port broadcast  3/1-24  0
set port membership 3/1-24  static
set port protocol 3/1-24 ip on
set port protocol 3/1-24 ipx auto
set cdp enable   3/1-24
set cdp interval 3/1-24 60
set spantree portfast    3/1-24 enable
set spantree portcost    3/1-24  3100
set spantree portpri     3/1-24  32
!
#module 4 : 12-port 10/100BaseTX Ethernet
set module name    4
set module enable  4
set vlan 2    4/1-2
set vlan 3    4/7-8
set vlan 4    4/3-6
set port channel 4/1-4 off
set port channel 4/5-8 off
set port channel 4/9-12 off
set port enable     4/1-12
set port level      4/1-12  normal
set port speed      4/1-10  auto
set port speed      4/11-12  100
set port duplex     4/11-12  full
set port trap       4/1-12  disable
set port name       4/1-12
set port security   4/1-12  disable
set port broadcast  4/1-12  0
set port membership 4/1-12  static
set port protocol 4/1-12 ip on
set port protocol 4/1-12 ipx auto
set cdp enable   4/1-12
set cdp interval 4/1-12 60
set trunk 4/1  auto isl 1-1005
set trunk 4/2  auto isl 1-1005
set trunk 4/3  auto isl 1-1005
set trunk 4/4  auto isl 1-1005
set trunk 4/5  auto isl 1-1005
set trunk 4/6  auto isl 1-1005
set trunk 4/7  auto isl 1-1005
set trunk 4/8  auto isl 1-1005
set trunk 4/9  auto isl 1-1005
set trunk 4/10 auto isl 1-1005
set trunk 4/11 desirable isl 1-1005
set trunk 4/12 desirable isl 1-1005
set spantree portfast    4/1-12 enable
set spantree portcost    4/1,4/6-7,4/11-12 3019
set spantree portcost    4/2-5,4/8-10 3100
set spantree portpri     4/1-12  32
set spantree portvlanpri 4/1  0
set spantree portvlanpri 4/2  0
set spantree portvlanpri 4/3  0
set spantree portvlanpri 4/4  0
set spantree portvlanpri 4/5  0
set spantree portvlanpri 4/6  0
set spantree portvlanpri 4/7  0
set spantree portvlanpri 4/8  0
set spantree portvlanpri 4/9  0
set spantree portvlanpri 4/10 0
set spantree portvlanpri 4/11 0
set spantree portvlanpri 4/12 0
set spantree portvlancost 4/1  cost 3018
set spantree portvlancost 4/2  cost 3099
set spantree portvlancost 4/3  cost 3099
set spantree portvlancost 4/4  cost 3099
set spantree portvlancost 4/5  cost 3099
set spantree portvlancost 4/6  cost 3018
set spantree portvlancost 4/7  cost 3018
set spantree portvlancost 4/8  cost 3099
set spantree portvlancost 4/9  cost 3099
set spantree portvlancost 4/10 cost 3099
set spantree portvlancost 4/11 cost 3018
set spantree portvlancost 4/12 cost 3018
!
#module 5 empty
!
#module 6 empty
!
#module 7 empty
!
#module 8 empty
!
#module 9 empty
!
#module 10 empty
!
#module 11 empty
!
#module 12 : 1-port Route Switch
set module name    12
set port level      12/1  normal
set port trap       12/1  disable
set port name       12/1
set cdp enable   12/1
set cdp interval 12/1 60
set trunk 12/1  on isl 1-1005
set spantree portcost    12/1  3005
set spantree portpri     12/1  15
set spantree portvlanpri 12/1  160
set spantree portvlancost 12/1  cost 3004 4-8,11-15
!
#module 13 empty
!
#switch port analyzer
!set span 1 1/1 both inpkts disable
set span disable
!
#cam
set cam agingtime 1-4,1003,1005 300
end

Sample Configuration for Cisco Catalyst 5500 B RSM

To view the current configuration of the Cisco Catalyst 5500 B RSM, access the RSM interface, type the following command in privileged mode, and press Enter:

Catalyst_5513B_RSM#show run
 

Output similar to the following appears:

Building configuration...
 
Current configuration:
!
version 11.3
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Catalyst_5513B_RSM
!
enable password cisco
!
no ip domain-lookup
!
!
!
interface Vlan2
 ip address 209.165.200.224 255.255.255.224
 no ip redirects
 standby 2 timers 1 3
 standby 2  preempt
 standby 2 authentication VSC3000
 standby 2 ip 172.25.66.60
!
interface Vlan3
 ip address 209.165.200.224 255.255.255.224
 no ip redirects
 standby 3 timers 1 3
 standby 3  preempt
 standby 3 authentication vsc3000
 standby 3 ip 209.165.200.224
!
interface Vlan4
 ip address 209.165.200.224 255.255.255.224
 no ip redirects
 standby 4 timers 1 3
 standby 4  preempt
 standby 4 authentication VSC3000
 standby 4 ip 209.165.200.224
!
router eigrp 1
 network 209.165.200.224
!
ip classless
!
snmp-server community public RO
snmp-server community private RW
snmp-server chassis-id public
snmp-server enable traps snmp
snmp-server enable traps appn alert
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps rtr
!
line con 0
line aux 0
line vty 0 4
 password cisco
 login
!
end
 

This completes the configuration of the LAN switches. If you have questions or need assistance, see the "Obtaining Technical Assistance" section of the Preface.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Sep 1 16:40:56 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.