|
|
This chapter describes how to configure the Catalyst 8500 campus switch router and provides enough information to get the switch router up and running. For detailed information about Cisco IOS commands, refer to the Cisco IOS command references.
Before configuring your switch router, you should have the following information available:
A switch router initially refers to entries about networks or subnetworks that are directly connected. Each interface must be configured with an IP address and IP subnet mask, which the network administrator enters into a configuration file.
The high-level router configuration tasks are as follows:
Step 1 Set up the hardware as described in the Catalyst 8510 Chassis Installation Guide or the Catalyst 8540 Chassis Installation Guide.
Step 2 Initially configure the software as described later in this chapter.
Step 3 Configure any interface or interface management tasks as described in this chapter.
Step 4 Configure protocol-specific features on your switch router as described in the appropriate chapters of the other Cisco IOS software configuration guides.
Step 5 If desired, perform system management tasks to monitor and fine-tune the performance of your switch router in the network.
To use the CLI, your terminal must be connected to the switch router through the console port or one of the TTY lines. By default, the terminal is configured to a basic configuration, which should work for most terminal sessions. However, you may want to alter the terminal settings.
Step 1 Connect a console terminal to the Catalyst 8500 campus switch router, then power up the system.
For instructions, see the Catalyst 8510 Campus Switch Router Processor and Line Module Installation Guide or the Catalyst 8540 Campus Switch Router Processor and Line Module Installation Guide.
Step 2 When you are prompted to enter the initial dialog, answer no to enter configuration mode:
Would you like to enter the initial dialog? [yes]: no
The following user EXEC prompt appears: Router>
Step 3 To access privileged EXEC mode, enter the enable command.
Router> enable
The prompt changes to the privileged EXEC (enable) prompt:
Router#
Step 4 To access configuration mode, enter the configure terminal command:
Router# configure terminal
You can now enter any changes you want to the factory-default configuration file. To exit configuration mode, press Ctrl-Z.
Router# show running-config
To see the configuration in NVRAM, enter the show startup-config command:
Router# show startup-config
If you have made changes to the configuration, but have not yet written them to NVRAM, the results of the show running-config and show startup-config commands will differ. See the section "Saving Configuration Changes to NVRAM" in this chapter.
The virtual interfaces that Cisco campus switch routers support include subinterfaces and IP tunnels. Configuring multiple virtual interfaces, or subinterfaces, on a single physical interface allows greater flexibility and connectivity on the network. A subinterface is a mechanism that allows a single physical interface to support multiple logical interfaces or networks. That is, several logical interfaces or networks can be associated with a single hardware interface.
To configure an interface, follow these steps:
Step 1 Begin interface configuration in global configuration mode.
Step 2 Enter the configure command at the privileged EXEC prompt to enter global configuration mode.
Step 3 Once in the global configuration mode, start configuring the interface by entering the interface command.
Step 4 Identify the interface type followed by the slot number of the line module, the number 0, and the port number.
For example, to configure the Fast Ethernet port on slot 1, port 2, you enter this command:
Router# interface fa 1/0/2
See the next section, "Configuring the Catalyst 8500 Interfaces," for more information on the physical interface addresses.
Router# show interfaces
Ethernet 0/0/0 is up, line protocol is up
Hardware is Sonict, address is 172.68.16.0/24
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, rely 255/255, load 1/255
Encapsulation ARPA, loopback not set, keepalive set (10 sec)
To see a list of the system software and hardware, use the show hardware command.
Step 5 Follow each interface command with the interface configuration commands your particular interface requires.
The commands you enter define the protocols and applications that will run on the interface. The commands are collected and applied to the interface command until you enter another interface command, a command that is not an interface configuration command, or you enter Ctrl-Z to get out of configuration mode and return to privileged EXEC mode.
Step 6 Once an interface is configured, you can check its status by entering the show commands provided at the end of each configuration section.
This section explains what port addresses and physical interface addresses are and provides procedures to configure interfaces for communication over a LAN.
To configure the interface parameters, you need your interface network addresses and subnet mask information. Consult your network administrator for this information.
A second type of address is the Media Access Control (MAC) address or hardware address, which is a standard data link layer address required for every port or device that connects to a network. Other devices in the network use these addresses to locate specific ports in the network and to create and update routing tables and data structures.
slot number/0/port number
The first number identifies the slot in which the line module is installed. Module slots are numbered 0 to 12, from top to bottom.
The second number indicates the line module. When the module consists of a single card--as in the case of the Catalyst 8500 campus switch router--this number is always 0.
The third number identifies the physical port number on the line module. The port numbers always begin at 0 and, when facing the rear of the switch router, are numbered from the left port to the right port. The number of additional ports depends on the number of ports available on the line module.
The interface ports on the Ethernet modules maintain the same address regardless of whether other modules are installed or removed. However, when you move a line module to a different slot, the first number in the address changes to reflect the new slot number.
Figure 4-1 and Figure 4-2 illustrate the ports on the Catalyst 8510 line modules.


Figure 4-3 and Figure 4-4 illustrate the ports on the Catalyst 8540 line modules
The 10/100BaseT Ethernet line module has 16 ports. This module is used for 10-Mbps or 100-Mbps Layer 2 or Layer 3 unshielded twisted pair (UTP) connections. It supports half-duplex and full-duplex connections and Fast EtherChannel operation.
1. Specify an Ethernet, Fast Ethernet, or Gigabit Ethernet interface.
2. Specify an Ethernet encapsulation method.
3. Specify virtual LANs (VLANs).
| Step | Command | Description |
| 1 | | Enter privileged EXEC mode, then enter the enable password. |
| 2 | | Enter global configuration mode. |
| 3 | | Enter Ethernet interface configuration mode to configure the appropriate Fast Ethernet interface. |
| 4 | | Enter the IP address and IP subnet mask to be assigned to the FastEthernet x/0/z interface. |
| 5 | | Configure the transmission speed for 10 or 100 Mbps. If you set the speed for auto, you enable autonegotiation on the system--the switch router matches the speed of the partner node. For more information on autonegotiation, see below. |
| 6 | | Configure for full or half duplex. If you set duplex for auto, the switch router matches the duplex setting of the partner node. |
| 7 | | Return to privileged EXEC mode. |
(config-if)# speed auto
When this command is disabled, the saved values for port speed are restored. The speed auto command is unique to the Catalyst 8500 family of switch routers.
| Monitoring Commands | Function |
|---|---|
show arp | |
show interface fa x/0/z | Displays the status and global parameters associated with an interface. Enter this command to verify the configured port speed and duplex operation. |
To configure the gigabit Ethernet interface, follow these steps:
| Step | Command | Description |
| 1 | | From global configuration mode, enter Ethernet interface configuration mode to configure the gigabit Ethernet interface. |
| 2 | | Enter the IP address and IP subnet mask to be assigned to the gigabit Ethernet x/0/z interface. |
| 3 | | When you set negotiation mode to auto, the gigabit port attempts to negotiate the link (that is, both port speed and duplex setting) with the partner port. When you set the gigabit interface to no negotiation auto, the port forces the link up no matter what the partner port setting is. This brings up the link with 1000 Mbps and full duplex only. |
| 4 | | Return to privileged EXEC mode. |
VLANs enable efficient traffic separation and provide excellent bandwidth utilization. VLANs also alleviate scaling issues by logically segmenting the physical LAN structure into different subnetworks so that packets are switched only between ports within the same VLAN. This can be very useful for security, broadcast containment, and accounting.
The Catalyst 8500 supports VLAN frame encapsulation via the Inter-Switch Link (ISL) protocol and the 802.1q standard.
ISL is a Cisco protocol for interconnecting multiple switches and maintaining VLAN information as traffic travels between switches. For more information, see "Configuring Encapsulation Over EtherChannel" in the section "Configuring the EtherChannel."
The VLAN configuration example below assumes the following, as shown in Figure 4-5:
To configure VLANs on the Catalyst 8500 campus switch router as shown in this example, follow these steps:
| Step | Command | Description |
| 1 | | Enter privileged EXEC mode, then enter the enable password. |
| 2 | | Enter global configuration mode. |
| 3 | | Enter Ethernet subinterface configuration mode to configure the Fast Ethernet subinterface fa1/0/2.1. |
| 4 |
or
| |
| 5 | | Assign VLAN 50 to bridge group 1. Note When you are configuring VLAN routing, skip this step. |
| 6 | | Proceed to configure the Fast Ethernet subinterface fa1/0/2.2. |
| 7 | | Assign subinterface fa 1/0/2.2 to VLAN 100. |
| 8 | | Assign VLAN 100 to bridge group 2. |
| 9 | | Return to privileged EXEC mode. |
The maximum VLAN/bridge group values obtainable are as follows:
| Monitoring Commands | Displays |
|---|---|
show vlan vlan_id | Information on all configured VLANs or on a specific VLAN (by VLAN ID number). |
clear vlan vlan_id | When the VLAN ID is not specified, this command clears the counters for all VLANs. |
| Troubleshooting Command |
|
debug vlan packet | Contents of the packets sent to and exiting from the route processor. |
The global tasks include:
To configure the interface, assign network and subnetwork addresses and the appropriate IP subnet mask.
The Catalyst 8500 campus switch router supports the following routing protocols:
| Step | Command | Description |
| 1 | | From global configuration mode, enter Ethernet interface configuration mode to configure a particular Fast Ethernet interface. |
| 2 | | |
| 3 | | Exit interface configuration mode and step back one level to global configuration mode. |
| 4 | | Use the switch router rip command to define RIP as the routing protocol and start the RIP routing process. |
| 5 | | The network command specifies a directly connected network based on the Network Information Center (NIC) network number--not a subnet number or individual address. The routing process associates interfaces with the appropriate addresses and begins processing packets on the specified network. |
| 6 | | Use the router igrp command to define IGRP as the IP routing protocol. The autonomous system number is the autonomous system to which this switch router belongs. |
| 7 | | The network command defines the directly connected networks that run IGRP. |
| 8 | | Use the router eigrp command to define EIGRP as the IP routing protocol. The autonomous system number is the autonomous system to which this switch router belongs. |
| 9 | | Use the network command to define the directly connected networks that run EIGRP. The network number is the number of the network that is advertised by this switch router. |
| 10 | | Use the router ospf command to define OSPF as the IP routing protocol. The process ID identifies a unique OSPF router process. This number is internal to the switch router only; the process ID does not have to match the process IDs on other routers. |
| 11 | | The network area command is a way of assigning an interface to a specific area. The network address is the address of directly connected networks or subnets. The wildcard mask is an inverse mask used to compare a given address with interface addressing to determine whether OSPF will use this interface. The area parameter identifies the interface as belonging to an area. The area ID specifies the area to be associated with the network address. |
| Monitoring Commands | Displays |
|---|---|
show ip protocol | |
show ip route | Contents of the IP routing table. The routing table contains entries for all known networks and subnetworks, and contains a code that indicates how that information was learned. |
show ip interfaces | The status and global parameters associated with an interface. The Cisco IOS automatically enters a directly connected route in the routing table if the interface is one through which a protocol can send and receive packets. Such an interface is marked "up." If the interface is unusable, it is removed from the routing table. |
| Troubleshooting Command |
|
debug ip rip | |
debug lss ipucast events | errors | reload | Updates sent to the line module for the IP switching control layer. |
IPX is a proprietary protocol. Novell IPX can be described as follows:
Novell IPX uses the following protocols and services
The network number is a 4-byte (32-bit) number that identifies the physical network. The network number is expressed in hexadecimal and must be unique throughout the entire IPX internetwork. When configuring an IPX network number, you can omit the leading zeros.
Since both the network number and the host address are needed to deliver traffic to a host, addresses are usually given as network numbers, followed by host addresses, separated with dots, as in the example: 4a.0000.0c00.23fe. In this example, the network number is 4a, and the host address is 0000.0c00.23fe.
The serial interface does not have a MAC address. It uses the default Novell node address, which is the MAC address of the first activated interface.
1. Start the IPX routing process.
2. Enable load sharing if appropriate for your network.
The interface configuration tasks are:
You can assign multiple network numbers to an interface, allowing support of different encapsulation types. The IPX network number is the number of the Novell network to which the interface is attached. IPX packets received on an interface that does not have a network number are ignored.
2. Set the optional encapsulation type, if it is different from the default.
This section does not describe IPX configuration in detail. Please refer to the IPX documentation on the Cisco Documentation CD for detailed conceptual and configuration information.
| Step | Command | Description |
| 1 | | From global configuration mode, select IPX as the routing protocol and start the routing process. If no node address is specified, the switch router uses the MAC address of the interface. |
| 2 | | Allow load sharing over parallel metric paths to the destination. The maximum number of parallel paths is 2; the default number is 1. |
| 3 | | Enter Ethernet interface configuration mode to configure the Fast Ethernet interface. |
| 4 | | Each interface must have a unique hexadecimal IPX network number (up to 8 numbers in length). |
| 5 | | Return to privileged EXEC mode. |
Once IPX routing is configured, you can monitor and troubleshoot the protocol operation using the following commands:
| Monitoring Commands | Displays |
|---|---|
show ipx cache | |
show ipx interfaces | |
show ipx interface fa x/0/z | Status and parameters for the specified Fast Ethernet IPX interface |
show ipx route | Contents of the IPX routing table |
show ipx servers | The list of IPX servers discovered through SAP advertisements, plus the network address, port number, and the number of hops and ticks to the server |
show ipx traffic | Number and type of IPX packets transmitted and received, as well as the number of broadcasts, SAPs, and routing packets received |
| Troubleshooting Commands | Displays |
|---|---|
debug ipx routing activity | Information about RIP update packets |
debug ipx sap | Information about SAP update packets |
As networks increase in size, multicast routing becomes critically important as a means to determine which segments require multicast traffic and which do not. Internet Protocol Multicast is a routing technique that allows IP traffic to be propagated from one source to a number of destinations, or from many sources to many destinations. Rather than sending one packet to each destination, one packet is sent to the multicast group identified by a single IP destination group address.
IP multicast routing arose because unicast and broadcast techniques do not effectively handle the requirements of new applications. In addition, multicast addressing supports transmission of a single IP datagram to multiple hosts.
The routing protocols that the switch router uses to discover multicast groups and build routes for each group follow:
When a sender wants to send data, it first sends the data to the rendezvous point. When a router is ready to receive data, it registers with the rendezvous point. After the data stream begins to flow from the sender to the rendezvous point and then to the receiver, routers in the data path optimize the path by automatically removing any unnecessary hops, including the rendezvous point.
PIM sparse mode is optimized for environments in which there are many multipoint data streams and each multicast stream goes to a relatively small number of LANs in the internetwork. PIM sparse mode is most useful under these conditions:
To configure IP multicast routing, follow these steps:
| Step | Command | Description |
| 1 | | From global configuration mode, enable IP multicast on the Catalyst 8500. |
| 2 | | Enter Ethernet interface configuration mode to configure the Fast Ethernet interface. |
| 3 | | Assign an IP address and subnet mask to the interface. |
| 4 | | |
| 5 | | Return to privileged EXEC mode. |
| Monitoring Commands | Displays |
|---|---|
show ip mroute | Complete multicast routing table |
show ip mroute count | Combined statistics of packets processed by the RP and the Ethernet line modules |
show epc if-entry interface fa x/0/z entry fa x/0/z | |
show epc cam int interface fa x/0/z | The number of forwarding entries in a line module's content-addressable memory (CAM) |
show epc ipmcast all int interface fa x/0/z | All forwarding entries in a line module's CAM |
show epc ipmcast group_address [all | detail] interface fa x/0/z | |
show epc ipmcast group_address source_address [detail] int interface fa x/0/z | |
show epc patricia int interface fa x/0/z ipmcast [detail] | The IP multicast entries in the line module |
|
|
| Troubleshooting Command |
|
debug lss ipmcast events | errors | reload | Updates sent to the line module for the IP switching control layer |
Cisco IOS software supports transparent bridging for Ethernet. In addition, Cisco supports all the mandatory Management Information Base (MIB) variables specified for transparent bridging in RFC 1286.
The Catalyst 8500 campus switch router can be configured to serve as both an IP and IPX router and a MAC-level bridge, bridging any traffic that cannot otherwise be routed. For example, a router routing IP traffic can also bridge the Digital local-area transport (LAT) protocol or NetBIOS traffic.
To configure bridging, you must perform the following tasks:
To set up the switch router for bridging, follow these steps:
| Step | Command | Description |
| 1 | | From global configuration mode, assign a bridge group number and define a Spanning-Tree Protocol as either the IEEE 802.1D standard or DEC. Note The IEEE 802.1D Spanning-Tree Protocol is the preferred way of running the bridge. |
| 2 | | The bridge priority command assigns a specific priority to the bridge, assisting in the spanning tree root definition. The lower the priority, the more likely the bridge will be selected as the root. |
| 3 | | Enter Ethernet interface configuration mode to configure the appropriate Fast Ethernet interface. |
| 4 | | |
| 5 | | If you need to assign additional interfaces to a bridge group, then choose the next interface and assign it to a bridge group. |
| 6 | | Return to privileged EXEC mode. |
For additional transparent bridging configuration tasks, such as configuring bridged VLANs and routing between VLANs, as well as adjusting the Spanning-Tree Protocol, refer to the Cisco IOS documents on those subjects.
Once the VLANS are configured on the switch router, you can monitor their operation using the following commands:
| Monitoring Commands | Displays |
|---|---|
clear bridge bridge_group_number | |
clear vlan statistics | Remove virtual LAN statistics from any statically or system configured entries. |
show bridge bridge_group_number | interface address | mask | Display classes of entries in the bridge forwarding database. |
show bridge bridge_group circuit-group circuit_group | src_mac_address | dest_mac_address | Display the interfaces configured in each circuit group and show whether they are participating in load distribution. |
show bridge group verbose | |
show bridge vlan | Display IEEE 802.10 transparently bridged virtual LAN configuration. |
show span | Display the spanning-tree topology known to the Catalyst 8500 campus switch router. |
show vlans | Display a summary of virtual LAN subinterfaces. |
Your network may require you to bridge local traffic within several segments while having hosts on the bridged segments reach the hosts or routers on routed networks. For example, if you are migrating bridged topologies into routed topologies, you may want to start by connecting some of the bridged segments to the routed networks.
Using the Integrated Routing and Bridging (IRB) feature, you can route a given protocol between routed interfaces and bridge groups within a single switch router. Specifically, local or unroutable traffic will be bridged among the bridged interfaces in the same bridge group, while routable traffic will be routed to other routed interfaces or bridge groups.
Because bridging is in the data-link layer (Layer 2) and routing is in the network layer (Layer 3), they have different protocol configuration models. With IP, for example, bridge group interfaces belong to the same network and have a collective IP network address. In contrast, each routed interface represents a distinct network and has its own IP network address. Integrated routing and bridging uses the concept of a Bridge Group Virtual Interface (BVI) to enable these interfaces to exchange packets for a given protocol.
The Catalyst 8500 campus switch router supports the routing of IP and IPX between routed interfaces and bridged interfaces in the same router, in both fast-switching and process-switching paths.
Consider the following before configuring IRB:
Configuring integrated routing and bridging consists of two key tasks:
1. Configuring bridge groups and routed interfaces
(a) Enable bridging
(b) Assign bridge groups to interfaces
(c) Configure routing for desired protocols
2. Configuring IRB and the BVI
(a) Enable IRB
(b) Configure the BVI
(c) Enable the BVI to accept routed packets
(d) Enable routing on the BVI for desired protocols
The packet is routed to the BVI.From the BVI, the packet is forwarded to the bridging engine. From the bridging engine, the packet exits through a bridged interface.
Similarly, packets that come in on a bridged interface but are sent to a host on a routed interface go first to the BVI. Then the BVI forwards the packets to the routing engine before sending them out on the routed interface.
| Step | Command | Description |
|
| |
| Configuring Bridge Groups and Routed Interfaces | ||
| 1 | | From global configuration mode, define one or more bridge groups. |
| 2 |
| Enter Ethernet interface configuration mode to configure the Fast Ethernet interface. |
| 3 | | Assign bridge groups to appropriate interfaces. |
| 4 | | Return to global configuration mode. |
|
| |
| Configuring IRB and BVI | ||
| 1 | | Enable IRB. This provides for the ability to route traffic from the bridged interfaces. |
| 2 | | |
| 3 |
| Enable a BVI to accept and route routable packets received from its corresponding bridge group. You must issue this command for each protocol that you want the BVI to route from its corresponding bridge group to other routed interfaces. |
| 4 | | Configure protocol addresses on routed interfaces. This step shows an example for IP. |
| 5 | | Optionally, you can configure additional routing attributes to the BVI. |
Once IRB is configured, you can monitor the IRB operation using the following command:
| Monitoring Commands | Displays |
|---|---|
show interfaces bvi interface_name | Information about the BVI such as the BVI MAC address and processing statistics |
show interfaces irb | Information about the BVI:
|
EtherChannel is a trunking technology that groups together multiple full-duplex 802.3 Ethernet interfaces to provide fault-tolerant high-speed links between switches, routers, and servers. EtherChannel is a logical aggregation of multiple Ethernet interfaces. EtherChannel forms a single higher bandwidth routing or bridging endpoint. EtherChannel is designed primarily for host-to-switch connectivity or Inter-Switch Link (ISL) switch-to-switch connectivity (for example, connectivity to a Catalyst 5500 switch).
In summary, EtherChannel provides the following benefits:
The Catalyst 8500 campus switch router supports Fast EtherChannel (FEC) and Gigabit EtherChannel (GEC).
Cisco's Fast EtherChannel technology builds upon standards-based 802.3 full-duplex Fast Ethernet to provide a reliable high-speed solution for the campus network backbone. Fast EtherChannel provides bandwidth scalability within the campus by providing increments of 200 Mbps to 800 Mbps.
Configuring a Fast EtherChannel or a gigabit EtherChannel consists of the following required steps:
1. Create an EtherChannel (port-channel) and assign a network (IP or IPX) address.
2. Assign the Fast Ethernet or gigabit Ethernet interfaces (up to four) to the port-channel.
| Step | Command | Description |
| 1 | | Create the EtherChannel interface. The channel number can be from 1 to 64 for FEC and GEC. |
| 2 | | Assign an IP address and subnet mask to the Fast EtherChannel interface. For IPX, use the ipx network network_number command. |
| 3 | | Exit this mode. Optionally, you can remain in interface configuration mode and enable other supported interface commands to meet your requirements. |
For information on other configuration tasks for the EtherChannel, refer to the section "Configure an Ethernet or Fast Ethernet Interface" in the chapter "Configuring Interfaces" of the Configuration Fundamentals Configuration Guide.
You can now assign the Fast Ethernet or gigabit Ethernet interfaces to the EtherChannel.
| Step | Command | Description |
| 1 | or | Enter Ethernet interface configuration mode to configure the Fast Ethernet or gigabit Ethernet interface you want to assign to the EtherChannel. You can assign any interface on any line module installed on the system to the EtherChannel. |
| 2 | | If the Fast Ethernet or gigabit Ethernet interface already exists and has an IP address assigned, disable the IP address before performing the next step. The Ethernet interface uses the IP address assigned to the EtherChannel interface. |
| 3 | | |
| 4 | | Exit interface configuration mode and repeat Steps 3 through 6 to add up to four Fast Ethernet or gigabit Ethernet interfaces to the Fast EtherChannel. |
| Step | Command | Description |
| 1 | or | Enter Ethernet interface configuration mode and specify the Fast Ethernet or gigabit Ethernet interface you want to remove from the EtherChannel. |
| 2 | | |
| 3 | | Return to privileged EXEC mode. |
The Cisco IOS software automatically removes a Fast Ethernet or gigabit Ethernet interface from the EtherChannel if the interface goes down, and the software automatically adds the interface to the EtherChannel when the interface is back up.
Currently, EtherChannel relies on keepalives to detect whether the line protocol is up or down. Keepalives are enabled by default on the Fast Ethernet and gigabit Ethernet interfaces. If the line protocol on the interface goes down because it did not receive a keepalive signal, the EtherChannel detects that the line protocol is down and removes the interface from the EtherChannel.
However, if the line protocol remains up because keepalives are disabled on the Fast Ethernet or gigabit Ethernet interface, the EtherChannel cannot detect this link failure (other than a cable disconnect) and does not remove the interface from the EtherChannel even if the line protocol goes down. This can result in unpredictable behavior.
To configure encapsulation over Fast EtherChannel or gigabit EtherChannel, follow these steps:
| Step | Command | Description |
| 1 | | From global configuration mode, create the EtherChannel (or port-channel) virtual interface. The channel number can be from 1 to 64 for FEC and GEC. |
| 2 | or
| Configure the port-channel member. |
| 3 | | Up to four interfaces can be added to the EtherChannel. |
| 4 | | Configure the subinterface on the port-channel. |
| 5 | | Assign the ISL encapsulation to the subinterface. |
| 6 | | Assign the protocol IP address and subnet mask to the subinterface. |
| 7 | | Exit this mode. Optionally, you can remain in interface configuration mode and enable other supported interface commands to meet your requirements. |
Once Fast EtherChannel or gigabit EtherChannel is configured, you can monitor its operation using the following command:
| Monitoring Command | Displays |
|---|---|
show interfaces port-channel |
To save your configuration changes to NVRAM so that they are not lost during a power cycle or power outage, take these steps:
| Step | Command | Description |
| 1 | | Check the settings you have configured so far. |
| 2 | | If the settings are what you want, save the configuration to NVRAM. |
This concludes the procedure for configuring the Catalyst 8500 campus switch router. Refer to the appendix "Comprehensive Configuration Examples" for real-world switch router configuration examples.
After you have installed the Catalyst 8500 campus switch router hardware, checked all external connections, turned on the system power, allowed the system to boot up, and minimally configured the system, you might need to perform more complete and complex configurations, which are beyond the scope of this text.
The Cisco IOS software running your Catalyst 8500 campus switch router contains extensive features and functionality. The effective use of many of many of these features is easier if you have more information at hand. For additional information on Cisco IOS software and configuring your router, refer to the following documentation resources:
For systems with Cisco IOS Release 10.0 (1) or later, refer to the following publications:
-- Cisco IOS Software Command Summary
-- Configuration Builder Getting Started Guide
-- Cisco Management Information Base (MIB) User Quick Reference
-- Debug Command Reference
-- Router Products Command Reference
-- Router Products Configuration Guide
-- System Error Messages
-- Troubleshooting Internetworking Systems
For systems with Cisco IOS Release 11.2(1) or later, refer to the following modular configuration and modular command reference publications, as appropriate for your configuration:
-- Bridging and IBM Networking Configuration Guide
-- Bridging and IBM Networking Command Reference
-- Cisco IOS Software Command Summary
-- Cisco IOS Solutions for Voice, Video, and Home Applications
-- Cisco Management Information Base (MIB) User Quick Reference
-- Configuration Builder Getting Started Guide
-- Configuration Fundamentals Configuration Guide
-- Configuration Fundamentals Command Reference
-- Debug Command Reference
-- Network Protocols Configuration Guide, Parts 1, 2, and 3
-- Network Protocols Command Reference, Parts 1, 2, and 3
-- Quality of Service Solutions
-- Security Configuration Guide
-- Security Command Reference
-- System Error Messages
-- Troubleshooting Internetworking Systems
-- Wide-Area Networking Configuration Guide
-- Wide-Area Networking Command Reference
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed Aug 2 09:51:22 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.