cc/td/doc/product/lan/28201900/1928v9x
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring and Monitoring from the Switch Manager

Configuring and Monitoring from the Switch Manager

This chapter explains how to use the switch manager to change the configuration settings and to monitor the switch. This chapter assumes that you have already performed these preliminary tasks that are described in this guide or in the Quick Start Guide: Catalyst 2820 Series Ethernet Switches:


Note The switch manager online help also provides the procedures for changing the configuration settings and detailed descriptions of the fields.

Note This chapter describes only standard-edition options. For information about the enterprise edition software features such as VLANs, see the Catalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide.

Navigating the Switch Manager

At the top of each switch manager page is a menu bar. Figure 3-1 describes the functions of the pages accessible from this bar.


Note On Netscape Communicator, when the cursor is above a topic on the menu bar, a pop-up briefly describes the options on that particular page.

Figure 3-1: Switch Manager Menu Bar

Making Changes from the Switch Manager

You can change the switch settings by entering information into fields, adding and removing list items, or selecting and deselecting check boxes. Click Apply to save your changes. Click Cancel to discard all your unsaved changes and to return the previous settings to the page.


Note After you click Apply, you cannot revert to the previous settings.

Note Wait approximately 1 minute for the changes to be saved to permanent storage before turning off the switch, or the changes might not be saved.

Assigning or Changing Basic Switch Information

You can assign or change basic descriptions about the switch. You can also assign an encrypted (secret) privileged-level password to the switch management interfaces and monitor network activity through the live switch image.

From the switch manager, you can open a Telnet session on the management console and contact Cisco Systems resources.

To display the Home Page (Figure 3-2), click HOME on the menu bar.


Figure 3-2: Home Page

Assigning or Changing the Switch Host Name and Description

You can assign or change the following information about the switch:

Switch Host Name

Caution Do not use "-NN" (where NN is a number) in the name you define for the switch. When the switch joins a cluster, the command switch overwrites any name containing "-NN."

The name you assign to the switch is kept even when the switch joins or leaves a cluster. If the switch does not have a name before it joins a cluster, the command switch assigns it a name that consists of the command-switch name and a number that reflects when the switch was added to the cluster. For example, a command switch can name a Catalyst 2820 switch eng-cluster-5, where eng-cluster is the command-switch name and 5 means that it is the fifth switch to join the cluster. When the switch name is viewed from the Cluster Management applications, the name is truncated to 32 characters. If the switch leaves the cluster, the switch keeps the name given by the command switch.

When the switch is a cluster member, the Member Switch Host Name field also displays the switch name at the top of each switch manager page. Therefore, the names in the Host Name and Member Switch Host Name fields are identical.

Switch and Command-Switch IP Addresses

The Switch IP Address field displays the IP address of the switch itself, which is typically assigned after the switch is installed. (See the "Assigning IP Information and a Password to the Switch" section.) If the switch does not have an IP address, the Switch IP Address field displays 0.0.0.0. When the switch is a cluster member, the Command Switch IP field displays the command-switch IP address at the top of each switch manager page.

IP information identifies the switch on the network and is required to configure and monitor it as an individual switch. When you assign the switch its own IP address, you can manage it from its management interfaces (switch manager, management console, SNMP, or CLI). The switch retains its own IP address even when it joins or leaves a switch cluster.

If you do not assign an IP address to the switch, you must add the switch to a switch cluster and manage it through the command switch. Whether or not the switch has its own IP address, when the switch is a cluster member, it is managed and communicates with other member switches through the IP address of the command switch. If the switch leaves the cluster and it does not have its own IP address, you then must assign IP information to it to manage and monitor it as a nonmember switch.


Note We recommend that you assign an I
P address to the switch even if the switch is or will be a cluster member so that if the switch is removed from the cluster, it remains manageable as a nonmember switch.

For additional information, see the "Assigning or Changing IP Information" section. For information about IP information in switch clusters, refer to the Cisco IOS Desktop Switch Software Configuration Guide, Catalyst 2900 Series XL and Catalyst 3500 Series XL Cisco IOS Release 12.0(5)XP.

Changing the Switch Password

A privileged-level password (encrypted or unencrypted) is required to access the switch management interfaces (switch manager, management console through a Telnet session, or CLI).

The password you assign from the Assign/Change Password field on the Home Page is an encrypted (secret) privileged-level password. This password provides higher security and supersedes any existing unencrypted privileged-level password, including the unencrypted privileged-level password that is assigned from the [P] Console Password option on the Management Console Logon Screen. (For information about where you can assign privileged-level passwords, see the "Privileged-Level Passwords" section.)

Follow these steps to assign an encrypted privileged-level password to the switch or to change the existing switch password to an encrypted privileged-level password:

Step 1 Enter a new password in the Assign/Change Password field. The password can be 1 to 25 characters and is case sensitive. You can use any character found on the keyboard, including spaces and double-quotation marks. A multistring password (such as two words) is also valid.

Step 2 Reenter the same string in the Reconfirm Password field.

Step 3 Click Apply.

Step 4 Access the switch manager by using the newly assigned password.


Note When the switch is shipped, no password is assigned to it. However, a privileged-level password is required to access the Catalyst 2820 Switch Manager or to use Telnet access from a remote station. If you do not assign a password, this access will not be available until the switch joins a cluster or until you assign the switch a privileged-level password from the management console (see the
"Console Settings Menu" section) through a direct connection to the switch console port.

When your switch is a cluster member, the highest privileged-level password for the command switch is the privileged-level password to the switch. The command-switch password overwrites any switch-specific passwords. For more information about passwords in switch clusters, see the "Cluster Member Passwords" section.


Note We do not recommend changing the password while the switch is a cluster member. This will cause a password mismatch, and you will have to manually enter the cluster member password to display the switch manager from the command switch.

If you have lost or forgotten the password, see the "Recovering from a Lost or Forgotten Password" section.

Privileged-Level Passwords

If you plan to manage the switch outside of a switch cluster, you can assign an unencrypted or encrypted privileged-level password to the switch to restrict access to its management interfaces (Table 3-1).


Table 3-1: Assigning Privileged-Level Passwords
Privileged-Level
Password
Assigned from...

Unencrypted

Encrypted

Read and Write community strings operate as passwords to the switch when managing it from an SNMP management station. See the "Changing the SNMP Settings" section.

For information about the user-level passwords, refer to the online-only Catalyst 1900 Series and Catalyst 2820 Series Command Reference.

Cluster Member Passwords

When the switch joins a cluster, the highest privileged-level password (encrypted or unencrypted) of the command switch supersedes any existing password for the switch. Keep in mind the following considerations:


Note We do not recommend changing the password while the switch is a cluster member. This will cause a password mismatch, and you will have to manually enter the cluster member password to display the switch manager from the command switch.

For password information about switch clusters, refer to the Cisco IOS Desktop Switch Software Configuration Guide, Catalyst 2900 Series XL and Catalyst 3500 Series XL Cisco IOS Release 12.0(5)XP.

Using the Switch Image to Monitor the Switch

If you are using a remote station, you can use the LEDs and the Mode button on the switch image to monitor the switch. The switch image on the Home Page shows the front-panel LED colors at the last polling interval and refreshes every 30 seconds.

System Status LED on the Switch Image

The colors of the system status (SYSTEM) LED on the switch image show that the switch is receiving power and functioning properly (Table 3-2).


Table 3-2: SYSTEM LED Description
Color System Status

Solid green

Switch is operating normally.

Solid amber

Switch is receiving power but might not be functioning properly. One or more power-on self-test (POST) errors occurred. The Management Console Logon Screen message identifies which nonfatal test(s) failed.

Note If a fatal error occurs, the switch is not operational, and no message is displayed. (See the "Powering Up and Using POST to Test the Switch" section and the "Understanding POST Failures" section.)

Redundant Power System LED on the Switch Image

The colors of the redundant power system (RPS) LED show the status (Table 3-3) of a connected Cisco RPS (model PWR600-AC-RPS). For more information about the RPS, see the "Power Connectors" section.


Table 3-3: RPS LED Description
Color RPS Status

Black (off)

RPS is off or is not installed.

Solid green

RPS is operational.

Blinking green

RPS and the switch AC power supply are both powered up.

Note This is not a recommended configuration. For more information, see the "Power Connectors" section.

Solid amber

RPS is connected but is not functioning properly. One of the power supplies in the RPS could be powered down, or a fan on the RPS could have failed.

Expansion Slot Status LEDs on the Switch Image

The colors of the expansion slot status LEDs (A and B) show the status of an installed module (Table 3-4). Each Catalyst 2820 module has resident LEDs that show the status of the module ports.

For information about the module port LEDs, refer to the Catalyst 2820 Modules User Guide and the Catalyst 2820 ATM Modules Installation and Configuration Guide.


Table 3-4: Expansion Slot LED Description
Color Expansion Slot Status

Black (off)

No module is in the slot, or the module has not been identified by the system and is not operational.

Solid green

Module is operational.

Solid amber

Module failed POST and is not operational.

Port LEDs and Modes on the Switch Image

Each port has an LED above it. These LEDs, as a group or individually, display information about the switch and about individual ports (Table 3-5).

The resident LEDs on an installed module show the status and duplex mode of the module ports. For information about the module port LEDs, refer to the Catalyst 2820 Modules User Guide and the Catalyst 2820 ATM Modules Installation and Configuration Guide.


Table 3-5: Port LED Modes Summary
Mode Determines...

Port status (default)

Status of individual ports

Bandwidth utilization

Percentage of the switch total bandwidth being used at any one time

Full-duplex operation

Which ports are operating in half- or full-duplex mode

Changing Between Modes

Click the Mode button on the switch image to change the mode of the port LEDs. The STAT (port status), UTL (switch utilization), and FDUP (port duplex mode) LEDs show which mode is active (Table 3-6). The selected mode remains on approximately for 30 seconds before returning to the default mode (port status). You can change the default mode from the Console Settings Menu on the management console.


Table 3-6: Changing Between Modes
For this Mode... Push the Mode Button Until...

Port status (STAT)

Only the STAT LED is green.

Bandwidth utilization (UTL)

Only the UTL LED is green.

Full-duplex operation (FDUP)

Only the FDUP LED is green.

Port Status Mode

The port status mode is the default mode. In this mode, the colors of the LEDs above the ports show the status of those ports (Table 3-7). You cannot change the default mode from the switch manager; instead, you must use the Console Settings Menu on the management console. (See the "Console Settings Menu" section.)


Table 3-7: Port Status Mode LED Description
Color Port Status

Blue (off)

No link.

Solid green

Link operational.

Alternating green
and amber

Link fault. Error frames can affect connectivity. Excessive collisions, CRC errors, and alignment and jabber errors are monitored for a link-fault indication.

Solid amber

Port is not forwarding. This could be because the port was disabled by management, suspended because of an address violation, or suspended by Spanning-Tree Protocol (STP) because of network loops.


Note The LEDs are solid amber for approximately 30 seconds after power up during spanning-tree discovery.
Bandwidth Utilization Mode

In the UTL mode, the port LEDs as a group show the switch bandwidth being used at any one time. The more LEDs that are lit, the higher the bandwidth being used. The peak utilization is recorded in the bandwidth-capture interval, described in the "Bandwidth Usage Report" section.


Table 3-8: Bandwidth Utilization Scale
Port LEDs Mbps Activity

1 to 8

0.1 to < 6

9 to 16

6 to < 120

17 to 24

above 120

Full-Duplex Operation Mode

The colors of the LEDs in FDUP mode show which 10BaseT ports are operating in full-duplex mode (Table 3-9).


Table 3-9: FDUP LED Description
Color Full-Duplex

Blue

Half-duplex mode is operational.

Green

Full-duplex mode is operational.

Cluster Management Button

Click Cluster Management to display the Cluster Management applications on the command switch. This button is available only when the switch is a cluster member. For information about the Cluster Management applications, refer to the Cisco IOS Desktop Switch Software Configuration Guide, Catalyst 2900 Series XL and Catalyst 3500 Series XL Cisco IOS Release 12.0(5)XP.

Link to Telnet to the Management Console

Click Telnet to open a Telnet session on the management console. At the prompt, enter the switch password or, if applicable, the command-switch password.

Links to Cisco Systems Resources

The Home Page provides these links to connect to Cisco Systems resources:

Changing the Port Settings

You can change the settings of the 10BaseT ports. To display the Port Management Page (Figure 3-3), click PORT on the menu bar, or click the port on the switch image.

For information on changing the module port settings, see the "Changing the Module Port Settings" section.


Figure 3-3: Port Management Page


Note The A
UI port settings are displayed in the 10BaseT Ports Table, where the AUI port is port 25.

Displaying the Module Management Page

Click Module Management to display and change the settings for the installed modules and module ports.

Enabling or Disabling a Port


Note You access the switch manager from a management station that is connected to one of the switch ports. Therefore, make sure that you do not disable or otherwise misconfigure the port through which you are communicating with the switch. You might want to write down the port number to which you are connected. Make changes to the switch IP information with care.

By default, all ports are enabled to transmit and receive data. To disable a port:

Step 1 Deselect the Enable check box in the Status: Requested/Actual column.

Step 2 Click Apply.

A linkDown trap is sent to the management station if you configured an SNMP manager.

Step 3 Click Home to display the switch image. The port LED for a disabled port is amber.

To re-enable a port:

Step 1 Select the Enable check box in the Status: Requested/Actual column.

Step 2 Click Apply.

A linkUp trap is sent to the management station if you configured an SNMP manager.

Step 3 Click Home to display the switch image. If the enabled port is connected to a device, the port LED is green; otherwise, it is blue.

Port Status

The Status: Requested/Actual column also displays the port status in the gray area below the Enable check box. Security violations, management intervention, or actions of the Spanning-Tree Protocol (STP) can change the port status. No packets are forwarded to or from a disabled or suspended port. However, suspended ports do monitor incoming packets to look for an activating condition. For example, when a linkbeat returns, a port suspended for no linkbeat returns to the enabled state.

Each port is always in one of the states listed in Table 3-10.


Table 3-10: Port Status Descriptions
Port Status Description

Enabled

Port can transmit and receive data.

Disabled-mgmt

Port is disabled by management action. Port must be manually re-enabled.

Suspended-no-linkbeat

Port is suspended because of no linkbeat. This is usually because the attached station is disconnected or powered-down. Port automatically returns to enabled state when the condition causing the suspension is removed.

Suspended-jabber

Port is suspended because attached station is jabbering. Port automatically returns to enabled state when the condition causing the suspension is removed.

Suspended-violation

Port is suspended because of an address violation. Port automatically returns to enabled state when the condition causing the suspension is removed.

Disabled-self-test

Port is disabled because it failed a self-test.

Disabled-violation

Port is disabled because of an address violation. Port must be manually enabled.

Reset

Port is in the reset state.

Changing the Port Duplex Mode

Full-duplex operation is the simultaneous transmission of data in both directions across a switched link. For example, a 10-Mbps port operating in full-duplex mode can provide up to 20 Mbps of bandwidth across the switched link.


Note Both ends of the link must be configured for full-duplex operation. Because hubs operate only at half duplex, a full-duplex port on the switch cannot be connected to a hub.

For information about changing the duplex mode on the modular ports, see the "Changing the Duplex Mode on the 100-Mbps Module Switch Ports" section.

The default duplex mode on the 10-Mbps ports is half duplex.

To change the port duplex mode:

Step 1 Select half duplex or full duplex from the Duplex Mode: Requested/Actual drop-down list.

The default for the 10-Mbps ports is half duplex.

Step 2 Click Apply.

Step 3 Click Home to display the switch image.

Step 4 Click the Mode button until the FDUP LED lights. If the port LED is blue (off), the port is running in half duplex. If the port LED is green, the port is running in full duplex.

Enabling or Disabling Flooding of Unknown MAC Addresses

By default, all switch ports are enabled to forward unicast and multicast packets with unknown destination Media Access Control (MAC) addresses. You can enable or disable flooding on a per-port basis.

A unicast packet is information addressed to one recipient from one sender. This type of traffic typically comprises the bulk of traffic on an Ethernet LAN. A multicast packet is information sent to multiple recipients from one sender. This lightens the load on the sender and on the network because only one data stream is sent, rather than one per recipient. A broadcast packet is information sent to all nodes within a single network segment and can be a major source of congestion.

The switch forwards each unicast or multicast packet it receives according to the entries stored in the switch content-addressable memory (CAM) table. The table entries are mappings of the MAC addresses of destination end-stations and of the associated switch ports through which incoming packets are forwarded to those destination end-stations.

Flooding is the forwarding of unicast or multicast packets with unknown destination addresses to all the switch ports. (A broadcast packet is always forwarded [flooded] to all ports.) Flooding adds traffic on the switch ports. In some configurations, flooding could be unnecessary. For example, there are no unknown destinations on switch ports with only statically assigned addresses or single stations attached. In this case, you can disable flooding on these ports.

You can assign a network port to which all unknown unicast addresses are forwarded. For more information, see the "Network Port" section.

Depending on the model, the switch can store:

For more information about address management, see the "Managing the Switch Address Tables" section. For information about multicast packet control, see the "Managing Multicast Packets with CGMP" section. For information about broadcast packet control, see the "Broadcast Storm Control" section.

To disable flooding on a port:

Step 1 Deselect the unicast or multicast check box for the port.

Step 2 Click Apply.

To enable flooding on a port:

Step 1 Select the unicast or multicast check box for the port.

Step 2 Click Apply.

Assigning or Changing a Port Name or Description

To assign a name or description to a port:

Step 1 In the Port Name/Description column, enter the port name or a description
(up to 60 characters).

Step 2 Click Apply.

Detailed Port Statistics

The Detailed Port Statistics Page (Figure 3-4) displays the receive and transmit statistics for the port you select. You can use this page to help identify performance or connectivity problems, which are listed under the Errors area of the page. For example, Frame Check Sequence (FCS) and alignment errors could be the result of cabling problems such as the following:

To display this page, click View... for a particular port on the Port Management Page. The errors are described in Table 3-11.


Figure 3-4: Detailed Port Statistics Page

    
Table 3-11: Error Descriptions (10BaseT Ports)
Error Description

FCS errors

Number of frames received on a particular interface that are an integral number of octets in length but do not pass the Frame Check Sequence (FCS) test.

Alignment errors

Number of frames received on a particular interface that are not an integral number of octets in length and do not pass the FCS test.

Giant frames

Number of frames received on a particular interface that exceed the permitted frame size.

Address violations

Number of times this secure port receives a source address that duplicates a static address configured on another port plus the number of times a source address was seen on this port that does not match any addresses secured for the port.

Late collisions

Number of times the port detects a collision on a particular interface later than 512 bit-times into the transmission of a packet.

Excessive deferrals

Number of frames the port defers transmission for an excessive period of time.

Jabber errors

Number of times the jabber function was invoked because a frame received from this port exceeded a certain time duration.

 

Managing the Switch Address Tables

The switches use source address tables (filters) to efficiently forward packets between the switch ports. Address filtering applies only to incoming (received) traffic on the switch. The source address tables list the source addresses (sending end-stations) and the associated switch port(s) through which packets are forwarded to the destination end-stations.

Packets with static addresses are usually received on any source port. The switch also supports source-port filtering on unicast and multicast addresses. This enhanced filtering enables the switch to only forward packets from source addresses when they are received on specified switch ports. These source addresses are referred to as restricted static addresses.

Depending on the model, the switch can store:

For additional traffic control options, see the following sections:

To display the Address Table Management Page (Figure 3-5), click Address on the menu bar.


Figure 3-5: Address Table Management Page

Dynamic Address Table

The switch provides dynamic addressing by learning the source MAC address of each packet received on each switch port and then adding the address and its associated forwarding switch port number to the Dynamic Address Table. As end-stations are added or removed from the network, the switch updates the table, adding new entries and removing unused ones.

To delete a specific entry from the Dynamic Address Table:

Step 1 Select the entry you want to delete.

Step 2 Click Remove.

Changing the Address Aging Time

As the switch reaches the maximum address limit of 2048 or 8192 address entries in memory (depending on the switch model), switch performance can degrade. Address aging helps prevent this by allowing the switch to keep only dynamic addresses that remain active over a specified period of time.

During a topology change, if the Port Fast mode option on the Port Management Page is disabled, addresses are aged more quickly by using the Forward delay option on the Spanning-Tree Management Page. When the topology stabilizes, the address-aging value again takes effect.

To assign the length of time the switch stores an inactive entry, after which it is removed from the table:

Step 1 Enter the number of seconds (10 to 1000000; where 1000000 seconds is approximately 11 1/2 days) in the Aging Time field. The default is 300 seconds (5 minutes).

This value applies to all dynamic addresses in the Dynamic Address Table.

Step 2 Click Apply.

Permanent Unicast Address Table

The entries in the Permanent Unicast Address Table allow MAC addresses to be permanently associated with a switch port. Unlike the Dynamic Address Table, the entries in the Permanent Unicast Address Table are manually entered or sticky-learned. (See the "Securing a Port" section.)

If the address table is full, an error message is generated. You can change the size of the address table by using the Port Security Table Page. (See the "Changing the Maximum Secure Address Count" section.) For additional information about port security, see the "Changing the Port Security Table" section.

You can assign a network port to which all unknown unicast addresses are forwarded. For more information, see the "Network Port" section.


Note Only unicast addresses can be added. An attempt to add a multicast or broadcast address generates an error message.

To add a secure address to the Permanent Unicast Address Table:

Step 1 Select a switch port from the New Address scroll list.

Step 2 Enter the source MAC address in the MAC Address field. Use six hexadecimal octets, spaces are optional (such as hh hh hh hh hh hh or hhhhhhhhhhhh).

Step 3 Click Add.

Static entries do not age out and must be manually removed from the table. To delete an entry from the table:

Step 1 Select the entry you want to delete.

Step 2 Click Remove.

Permanent Multicast Address Table

The entries in the Permanent Multicast Address Table allow multicast addresses to be permanently associated with the switch port(s) that receive packets destined for those multicast addresses. Using the Permanent Multicast Address Table reduces the amount of multicast flooding on the switch. Unlike the Dynamic Address Table, the entries in the Permanent Multicast Address Table entries are manually entered.

If the address table is full, an error message is generated. You can change the size of the address table by using the Port Security Table Page. (See the "Changing the Maximum Secure Address Count" section.)

For additional information, see the

To add a secure address to the Permanent Multicast Address Table:

Step 1 Select a switch port from the New Address scroll list.

Step 2 Enter the multicast MAC address in the MAC Address field. Use six hexadecimal octets, spaces are optional (such as hh hh hh hh hh hh or hhhhhhhhhhhh).

Step 3 Click Register.

Static entries do not age out and must be manually removed from the table. To delete an entry from the table:

Step 1 Select the entry you want to delete.

Step 2 Click Unregister.

Changing the Port Security Table

You can use the Port Security Table Page (Figure 3-6) to prevent the switch from forwarding packets from unauthorized users and to send SNMP traps if security violations occur. To display this page, click Port Security Table from the Address Table Management Page.


Figure 3-6: Port Security Table Page

Securing a Port

By default, port security is disabled (Security check box is not selected). Secure ports restrict the use of a switch port to a specific group of source addresses (sending end-stations). When you assign source addresses to a secure port, the switch does not forward any packets from addresses outside that group.

The source addresses on a secure port are manually assigned (static) or sticky-learned. Sticky-learning takes place when the address table for a secure port does not contain a full complement of static addresses. The port sticky-learns the source address of incoming packets and automatically assigns them as static addresses.


Note This option must be disabled on the n
etwork port. For more information about the network port, see the "Network Port" section.

To enable port security on a port:

Step 1 Select the check box in the Security column for the port.

Step 2 Click Apply.

To disable port security on a port:

Step 1 Deselect the check box in the Security column for the port.

Step 2 Click Apply.

Changing the Maximum Secure Address Count

If the port is not a secure port, the value in the Maximum Secure Addresses field is 0. A secure port can have from 1 to 132 secure addresses associated with it.

Limiting the number of devices that can connect to a secure port has the following advantages:


Note The size of the address table for an unsecured port cannot be modified.

To change the number of addresses to the secure port:

Step 1 Enter a number (1 to 132) in the Maximum Secure Addresses column.

Step 2 Click Apply.

Security Reject Count

The Security Reject Count (SRC) column displays the number of unauthorized addresses seen on the secure port.

Secure ports generate address-security violations under the following conditions:

If a security violation occurs, the port can be suspended or disabled. When a port is disabled, you must manually re-enable the port. When a port is suspended, it is re-enabled when a packet containing a valid address is received. You can also choose to ignore the violation. You can define the action taken by the switch either by using the System Management Page or by using the MIB objects.

On the following switch manager pages, you can specify the action the switch takes if packets with unauthorized addresses arrive on the port:

Clearing Addresses on LinkDown

By default, the secure port keeps its association with all static addresses even if it loses link (Clear Addresses on LinkDown check box is not selected). You can enable a secure port to clear its address associations on linkDown.


Note This option is applicable only to secure ports (S
ecurity check box is selected).

To enable the secure port to clear its address table on linkDown:

Step 1 Select the check box in the Clear Addresses on LinkDown column for the port.

Step 2 Click Apply.

To disable the secure port from clearing its address table on linkDown:

Step 1 Deselect the check box in the Clear Addresses on LinkDown column for the port.

Step 2 Click Apply.

Changing the SNMP Settings

Simple Network Management Protocol (SNMP) provides the means to manage and monitor the switch through the Management Information Base (MIB) objects. Additional information about SNMP and MIB objects is in the "Simple Network Management Protocol" section and the "Accessing MIB Files" section.

For information about how the command switch uses SNMP to manage the switch in the cluster, refer to the Cisco IOS Desktop Switch Software Configuration Guide, Catalyst 2900 Series XL and Catalyst 3500 Series XL Cisco IOS Release 12.0(5)XP.

To display the SNMP Management Page (Figure 3-7), click SNMP on the menu bar.


Figure 3-7: SNMP Management Page

Assigning or Changing the SNMP Read Community Strings

The default for the first Read community string is public. You can assign up to four community strings to serve as passwords that enable the switch to validate SNMP read (Get) requests from a management station.

When the switch joins a cluster, the command switch propagates its first Read community string as the last Read community string for the member switch. If the joining Catalyst 2820 switch already has four Read community strings, the command switch overrides that fourth community string with its own first community string. When the switch leaves the cluster, the command-switch community string is deleted.

The command-switch string contains up to 27 characters and a suffix "@esNN" where NN is the member switch number.

Caution Do not use "@es" in the community strings you define for the switch. When the switch joins a cluster, any community string containing "@es" is deleted.

To add or change a SNMP Read community string:

Step 1 Enter up to 32 characters in the Read Community String field. The default for the first Read community string is public.

Step 2 Click Add.

To remove a SNMP Read community string:

Step 1 Select the community string from the Current list.

Step 2 Click Remove.

Assigning or Changing the SNMP Write Community Strings

The default for the first Write community string is private. You can assign up to four community strings to serve as passwords that enable the switch to validate SNMP read-write (Set) requests from a management station. The write managers you assign to the switch can use any of the switch Write community strings.

When the switch joins a cluster, the command switch assigns its first Write community string as the last Write community string for the member switch. If the joining Catalyst 2820 switch already has four Write community strings, the command switch overrides that fourth community string with its own first community string. When the switch leaves the cluster, the command-switch community string is deleted.

The command-switch string contains up to 27 characters and a suffix "@esNN" where NN is the member switch number.

Caution Do not use "@es" in the community strings you define for the switch. When the switch joins a cluster, any community string containing "@es" is deleted.

To add or change a SNMP Write community string:

Step 1 Enter up to 32 characters in the Write Community String field. The default for the first Write community string is private.

Step 2 Click Add.

To remove a SNMP Write community string:

Step 1 Select the community string from the Current list.

Step 2 Click Remove.

Assigning or Changing Trap Managers

A trap manager, or trap client, is an SNMP management station that receives traps, which are the system alerts generated by the switch. If no trap manager is defined, no traps are issued.

You can assign up to four trap managers and their accompanying community strings. A trap manager can use its accompanying community string only; it cannot use the community string of another trap manager.

Trap manager settings can be configured from the switch or, if the switch is a cluster member, from the command switch.

After you have assigned the trap manager(s), the switch generates, by default, the following traps:

For more information about traps, see the "Simple Network Management Protocol" section and the "Accessing MIB Files" section.

To assign a trap manager and its community string:

Step 1 In the IP Address field, enter the IP address of the SNMP management station that can issue trap requests to the switch. Use dotted quad format (nnn.nnn.nnn.nnn).

If the switch is connected to a Domain Name System (DNS) server, you can enter the name of the trap manager instead.

Step 2 Enter a community string (up to 32 characters) in the Trap Manager Community String field.

Step 3 Click Add.

To remove a trap manager:

Step 1 Select the manager from the Current list.

Step 2 Click Remove.

Authentication Trap Generation

By default, authentication trap generation is enabled (Enable Authentication Trap Generation check box is selected). This option enables the switch to generate authentication traps, which alert a management station of SNMP requests not accompanied by a valid community string.


Note Even if this option is enabled, no traps are generated if no trap manager addresses or names are assigned. (See the
"Assigning or Changing Trap Managers" section.)

To disable authentication trap generation:

Step 1 Deselect the Enable check box.

Step 2 Click Apply.

LinkUp/LinkDown Trap Generation

By default, linkUp/linkDown trap generation is enabled (Enable LinkUp/LinkDown Trap Generation check box is selected). This option enables the switch to generate linkDown traps when a port is suspended or disabled for any of these reasons:

The switch generates linkUp traps when a port is enabled for any of these reasons:


Note No more than one trap is sent every 5 seconds per port. The last trap generated in the 5-second interval is the one sent.

To disable linkUp/linkDown trap generation:

Step 1 Deselect the Enable check box.

Step 2 Click Apply.

Broadcast Storm Trap Generation

By default, broadcast storm trap generation is disabled (Enable Broadcast Storm Trap Generation check box is not selected). When this option is enabled, the switch generates SNMP alerts when the broadcast threshold is exceeded. The alert generated is the trapbroadcastStorm. A trap is generated every 30 seconds.

For information about broadcast storm control, see the "Broadcast Storm Control" section.

To enable broadcast storm trap generation:

Step 1 Select the Enable check box.

Step 2 Click Apply.

Address Violation Trap Generation

By default, address violation trap generation is enabled (Enable Address Violation Trap Generation check box is selected). This option enables the switch to generate SNMP alerts if an address violation occurs.

To disable address violation trap generation:

Step 1 Deselect the Enable check box.

Step 2 Click Apply.

Assigning or Changing Write Managers

A write manager is an SNMP management station that can issue write requests to the switch. You can assign up to four write managers. The switch allows write requests from only the specified write managers or from the command switch. The write managers you assign can use any of the switch Write community strings.

Caution If no write manager is assigned to the switch, any management station can modify the switch MIB objects.

Note The write manager option is not available from the command switch. To use this option, use the
SNMP Management Page or the Network Management (SNMP) WRITE Configuration Menu.

To assign a write manager:

Step 1 Enter the IP address in the IP Address field. Use dotted quad format (nnn.nnn.nnn.nnn).

If the switch is connected to a DNS server, you can enter the name of the write manager instead.

Step 2 Click Add.

To remove a write manager:

Step 1 Select the manager from the Current list.

Step 2 Click Remove.

Changing the Spanning-Tree Protocol Settings

The Spanning-Tree Protocol (STP) constructs network topologies that do not contain loops. When the network configuration changes, STP transparently reconfigures bridges and switches to avoid the creation of loops. STP avoids loops by placing ports in a forwarding or blocking state and establishes redundant paths (in the event of lost connections).

The following are two examples for using STP:

A separate spanning-tree instance runs on each bridge group, and each bridge group participates in a separate spanning tree. Each switch in a spanning tree adopts the Hello, Max age, and Delay parameters of the root bridge regardless of how it is configured. Overlapping ports (ports that belong to more than one bridge group) participate in all spanning trees to which they belong. All ports on the switch support STP, and STP is managed through the standard Bridge MIB.


Note From the switch manager, you can only configure the STP settings for bridge group 1 (the management bridge group) or VLAN 1 (the management VLAN).

Overlapping ports should be connected to end nodes only, not to other bridges. To configure the STP settings for other bridge groups on the switch, use the
Spanning Tree Configuration Menu on the management console.

For more information about bridge groups and to configure bridge groups, see the Bridge Group Configuration Menu and the "Spanning Tree Configuration Menu". For information about VLANs, refer to the Catalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide.

To display the Spanning-Tree Management Page (Figure 3-8), click STP on the menu bar.


Figure 3-8: Spanning-Tree Management Page

Enabling or Disabling Spanning-Tree Protocol

By default, STP is enabled (Enable Spanning Tree check box is selected). To disable STP:

Step 1 Deselect the Enable Spanning Tree check box.

Step 2 Click Apply.

Spanning-Tree Root Settings

The Operating Parameters section displays the following read-only STP settings for the current root switch, which could be defined on another switch.

Bridge ID

Unique hexadecimal ID number that has a bridge priority and a unique MAC address.

Number of Member Ports

Number of ports configured with STP.

Max Age

Number of seconds a bridge waits for STP configuration messages before attempting a reconfiguration.

Hello Time

Number of seconds between the transmission of STP configuration messages. All bridges send configuration messages during reconfiguration to elect the designated root bridge. After STP completes its network discovery, only designated bridges send configuration messages.

Topology
Changes

Number of bridge topology changes experienced by the network. A topology change occurs as ports on any bridge change from a nonforwarding to a forwarding state or when a new root is selected.

Designated Root

ID number of the bridge identified as the root by the STP.

Root Port

Port on this bridge with the lowest-cost path to the root bridge. This option identifies the port through which the path to the root bridge is established. N/A is displayed when STP is disabled or when this bridge is the root bridge.

Root Path Cost

Cost of the path from this bridge to the root bridge shown in the Designated Root field. It equals the path cost parameters held for the root port.

Forward Delay

Number of seconds before a port changes from its STP learning and listening states to a forwarding state. Every bridge on the network ensures that no loop is formed before the port can forward packets.

Last TopChange

Number of days (d), hours (h), minutes (min), and seconds (s) since the last topology change.

Changing the Spanning-Tree Options for the Switch

The Spanning Tree Configuration section displays a list of STP parameters that this switch will use when it is the root switch.


Note Modifying the spanning-tree settings causes a temporary loss of connectivity while the network reconfigures. STP requires approximately 30 seconds to complete its discovery of the network, and the switch does not forward packets during this time.

Note For information about VLANs and the U
plink Fast option, refer to the Catalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide.

To change the STP configuration on this switch:

Step 1 Enable STP if you have previously disabled it:

Step 2 In the Bridge Priority field, enter the value (0 to 65535) used in determining the root bridge. The bridge with the lowest value has the highest priority and is selected as the root. The default is 32768.

Step 3 In the Hello Time field, enter the number of seconds (1 to 10) between the transmission of STP configuration messages. The default is 2.

Step 4 In the Max Age field, enter the number of seconds (6 to 40) a switch waits for STP configuration messages before it attempts a reconfiguration. After this period expires, other bridges recognize that the root has not sent a configuration message, and a new root is selected. The default is 20.

Step 5 In the Forward Delay field, enter the number of seconds (4 to 30) a port waits before changing from its STP learning and listening states to the forwarding state. This delay time is necessary to ensure that no loop is formed before the switch forwards a packet. The default is 15.

Step 6 Click Apply.

Changing Spanning-Tree Settings for Bridge Group 1 and Its Ports


Note Modifying the spanning-tree settings causes a temporary loss of connectivity while the network reconfigures. STP requires approximately 30 seconds to complete its discovery of the network, and the switch does not forward packets during this time.

To change the spanning-tree parameters for a port, follow these steps:

Step 1 Enable STP if you have previously disabled it:

Step 2 In the Path Cost column, enter a number from 1 to 65535 for each port. The default for the 10-Mbps ports is 100. The default for the 100-Mbps ports is 10.

The path cost is inversely proportional to the LAN speed of the network interface at the port. A high path cost means the port has low bandwidth and should not be used, if possible. A lower path cost represents higher-speed transmission; this setting can affect which port remains enabled in the event of a loop.

This option also affects which port is to remain enabled by STP if another bridge device forms a loop with the switch.

Step 3 In the Priority column, enter a number from 0 to 255 for each port. The default is 128. The lower the number, the higher the priority. The higher priority port remains enabled by STP if two ports form a loop.

Step 4 In the Port Fast Mode column, select a port, and select the check box to enable the Port Fast mode. The default for the 10-Mbps ports is enabled (Port Fast Mode check box is selected). The default for the 100-Mbps ports is disabled (Port Fast Mode check box is not selected).

Port Fast mode immediately brings a port from the blocking state into the forwarding state by eliminating the forward delay (the amount of time a port waits before changing from its STP learning and listening states to the forwarding state).

Step 5 Click Apply.

Port and Forwarding STP States

The State column displays the state of the port. A port can be in one of the following states:

Blocking

The port is not forwarding frames and is not learning new addresses.

Listening

The port is not forwarding frames but is progressing toward a forwarding state. The port is not learning addresses.

Learning

The port is not forwarding frames but is learning addresses.

Forwarding

The port is forwarding frames and learning addresses.

Disabled

The port has been removed from STP operation. You need to re-enable the port.

The Forward Transitions column displays the number of times STP changed forwarding states.

Changing the CDP Settings

The Cisco Discovery Protocol (CDP) enables the switch to advertise its existence to other Cisco devices on the network. When CDP is enabled, the switch and the network management applications have an accurate picture of the network at any time because CDP gathers information about device types, links between devices, and the number of interfaces on each device.

Before the switch joins a cluster, CDP version 2 must be enabled on the switch. For information about enabling this option, see the "CDP Configuration/Status Menu" section. For information about cluster management and membership, refer to the Cisco IOS Desktop Switch Software Configuration Guide, Catalyst 2900 Series XL and Catalyst 3500 Series XL Cisco IOS Release 12.0(5)XP.

To display the CDP Management Page (Figure 3-9), click CDP on the menu bar.


Figure 3-9: CDP Management Page

Displaying CDP Neighbors

The Discovered Neighboring Devices list shows the devices with which the switch exchanges CDP messages. To display information about neighboring devices:

Step 1 Select a device from the Discovered Neighboring Devices list.

Step 2 Click one of these buttons:

When you select a neighboring device and click Details on the CDP Management Page, the switch manager displays the following information about that device (see CDP Details Page, Figure 3-10):

Device ID

Neighbor host name.

Entry address

IP address.

Platform

Description of the product platform to which the neighbor belongs.

Capabilities

Description of the type of device (such as, repeater or switch).

Remote Port

Description of the port on the neighbor to which this switch is connected.

Local Port

Number and description of the port on this switch to which the neighbor is connected.

If a neighboring Catalyst 2820 or Catalyst 1900 cluster member does not have an IP address before it joins a cluster, the command switch IP address is displayed in the Entry Address field when you select that Catalyst 2820 or Catalyst 1900 cluster member, and click Details.


Figure 3-10: CDP Details Page

Changing the CDP Settings

To change the global CDP settings for the switch:

Step 1 In the Packet Hold Time field, enter the number of seconds (between 5 and 255) that a neighboring device keeps the CDP neighbor information received from this switch. The default is 180 seconds.

If a neighboring device does not receive a CDP message before the hold time expires, the device drops this switch as a neighbor. The packet hold time should be higher than the packet transmission time.

Step 2 In the Packet Transmission Time field, enter the number of seconds (between 5 and 900) between transmissions of CDP messages. The default is 60 seconds. The packet transmission time should be lower than the packet hold time.

Step 3 Click Apply.

Enabling or Disabling CDP on a Port

By default, CDP is enabled on all ports on the switch. If you do not want a port to exchange information with Cisco devices, you can disable CDP on that port. To disable CDP on a port:

Step 1 Select the port from the CDP Enabled list.

Step 2 Click Disable.


Note Only 15 ports can be selected at a time. Repeat these steps until you have removed the ports that you no longer want to participate in CDP exchanges.

To enable CDP on a port:

Step 1 Select the port from the CDP Disabled list.

Step 2 Click Enable.


Note Only 15 ports can be selected at a time. Repeat these steps until you have added the ports that you want to participate in CDP exchanges.

Port Monitoring (Switched Port Analyzer)

The remote monitoring (RMON) capability on the switch helps you monitor network traffic traversing the switch, and with the Switched Port Analyzer (SPAN) feature, you can use a single network analyzer to monitor traffic on any of the switch ports. You simply attach the network analyzer to a switch port, using that port as a monitoring port. You can also use a network analyzer on the monitoring port to troubleshoot network problems by examining the traffic on other Cisco switched ports or segments.

By default, no port on the switch is designated as the monitoring port, and no ports on the switch are monitored. Remember the following restrictions when monitoring ports:


Note STP and B
OOTP are disabled on the enabled monitor port. The flooding of unregistered multicast packets and unknown unicast packets is also disabled.

Note Enable monitoring only for problem diagnosis. Disable monitoring during normal operation so that switch performance is not degraded.

To display the SPAN Configuration Page (Figure 3-11), click SPAN on the menu bar.


Figure 3-11: SPAN Configuration Page

By default, port monitoring is disabled (Capturing Frames to the Monitoring Port check box is not selected).

To enable port monitoring on the switch and its port(s):

Step 1 Select the Capturing Frames to the Monitoring Port check box.

Step 2 Select the monitoring port (the port to which captured frames are sent) from the Select Monitoring Port drop-down list.

You can designate any port as the monitoring port, but the following restrictions apply:

Step 3 Select the port(s) you want to monitor from the Port Not Monitored list.

Step 4 Click Add.

To disable port monitoring on a port or ports:

Step 1 Select the port(s) that you no longer want to monitor from the Ports Monitored list.

Step 2 Click Remove.

Changing the Console Port Settings and Upgrading the Firmware

Cisco periodically provides new firmware to implement enhancements and maintenance releases. New firmware releases can be downloaded from Cisco Connection Online (CCO), the Cisco Systems' customer web site available at the following URLs: www.cisco.com, www-china.cisco.com, and www-europe.cisco.com.

The Firmware Version field and the Module Firmware Version field display the firmware version being used by the switch and the installed module(s).

Caution If you interrupt the transfer by turning the switch off and on, the firmware could get corrupted. For recovery procedures, see the "Recovering from Corrupted Firmware".

Note When you download the firmware to Flash memory, the switch or module does not respond to commands for approximately 1 minute. This is normal and correct. Unlike the management console, the switch manager does not provide any status on the download. Do not turn off the switch until after the switch (or the FDDI or ATM module) resets and begins using the new firmware.

To display the Console and Upgrade Configuration Page (Figure 3-12), click Console on the menu bar.


Figure 3-12: Console and Upgrade Configuration Page

Configuring the Switch Console Port

The console port on the switch provides terminal and PC access to the switch. After the switch is installed, be sure to configure the console port settings of the switch to match the settings of the terminal or PC.

These are the default settings of the switch console port:

If you change any of these settings, click Apply to save your changes.

Management Console Inactivity Timeout

By default, the management console inactivity timeout is 0 (which means the console session does not time out). You can change the number of seconds that the management console can wait without activity before it times out. After timeout, you must reenter the password.

To change the inactivity timeout setting:

Step 1 Enter the number of seconds (0, or 30 to 65500) in the Management Console Inactivity Timeout field.

Step 2 Click Apply.

Modem Initialization String

The switch uses the initialization string to initialize the modem connected to the console port. This string must match your modem requirement.


Note Do not use an AT prefix or end-of-line suffix.

Auto Baud

By default, auto baud (match remote baud rate) is enabled (Enable Auto Baud check box is selected). This option enables the switch to automatically match the same or lower baud rate of an incoming call. After the call, the switch reverts to its configured rate.

Auto Answer

By default, auto answer is enabled (Enable Auto Answer check box is selected). This option enables the switch to automatically answer calls.

Upgrading the Switch Firmware

The Firmware Version field displays the firmware version being used by the switch.


Note The firmware for the switch is different from the FDDI and ATM modules firmware. For information about upgrading module firmware, see the
"Upgrading the FDDI and ATM Module Firmware" section.

The following sections provide instructions on how to upgrade the switch firmware:

Downloading Switch Firmware from a TFTP Server

Caution If you interrupt the transfer by turning the switch off and on, the firmware could get corrupted. For recovery procedures, see the "Recovering from Corrupted Firmware".

Follow these steps to download the latest firmware from a TFTP server to your switch.

Step 1 Download the upgrade file from CCO into an appropriate directory on your TFTP server.

Step 2 Enter the IP address in the Server: IP Address or Name of TFTP Server field. Use dotted quad format (nnn.nnn.nnn.nnn).

If the switch is connected to a Domain Name System (DNS) server, you can enter the name of the TFTP server instead.

Step 3 Enter the upgrade filename (up to 80 characters) in the Filename for Firmware Upgrades field.

Step 4 Click System TFTP Upgrade to download the upgrade file from the TFTP server to the switch.

Step 5 Click OK on the confirmation prompt.

After the existing firmware validates the file, the new image is transferred into Flash memory, the switch resets, and the new firmware begins executing. If the upgrade file is invalid, the temporary image is discarded, the existing firmware continues to execute, and the firmware upgrade ends.

Step 6 Click the browser Reload button to refresh the Console and Upgrade Configuration Page.

Step 7 Ensure that the Firmware Version field displays the updated firmware version.

Downloading Switch Firmware from a TFTP Client

Caution If you interrupt the transfer by turning the switch off and on, the firmware could get corrupted. For recovery procedures, see the "Recovering from Corrupted Firmware".

Follow these steps to download the latest firmware from a TFTP client to your switch.

Step 1 Download the upgrade file from CCO into an appropriate directory on your TFTP client.

Step 2 From the client management station, establish a TFTP session with the IP address of the switch. Make sure the client station is in binary transfer mode.

Step 3 Select the Accept Upgrade Transfer from Other Hosts check box. By default, this check box is not selected.

Step 4 Download the upgrade file from the client station to the switch, using the TFTP user interface or the appropriate command for the put operation (such as, put upgrade_ filename).

After the existing firmware validates the file, the new image is transferred into Flash memory, the switch resets, and the new firmware begins executing. If the upgrade file is invalid, the temporary image is discarded, the existing firmware continues to execute, and the firmware upgrade ends.

Step 5 Click the browser Reload button to refresh the Console and Upgrade Configuration Page.

Step 6 Ensure that the Firmware Version field displays the updated firmware version.

Step 7 Deselect the Accept Upgrade Transfer from Other Hosts check box.

Upgrading the FDDI and ATM Module Firmware

The Module Version field displays the Catalyst 2820 switch FDDI and ATM module firmware versions used by the switch.


Note The firmware for the FDDI and ATM modules are different from the switch firmware. For information about upgrading switch firmware, see the
"Upgrading the Switch Firmware" section.

The following sections provide instructions on how to upgrade the module firmware:

Downloading Module Firmware from a TFTP Server

Caution If you interrupt the transfer by turning the switch off and on or by removing and reinserting the module, the firmware could get corrupted. For recovery procedures, see the "Recovering from Corrupted Firmware".

Follow these steps to download the latest module firmware from a TFTP server to your FDDI or ATM module.

Step 1 Download the upgrade file from CCO into an appropriate directory on your TFTP server.

Step 2 Enter the IP address in the Server: IP Address or Name of TFTP Server field. Use dotted quad format (nnn.nnn.nnn.nnn).

If the switch is connected to a DNS server, you can enter the name of the TFTP server instead.

Step 3 Enter the upgrade filename (up to 80 characters) in the Filename for Firmware Upgrades field.

Step 4 Depending on which expansion slot the module is in, click Module (slot A or B) TFTP Upgrade to download the upgrade file from the TFTP server to the module.

Step 5 Click OK on the confirmation prompt.

After existing firmware validates the file, the new image is transferred into Flash memory, the module resets, and the new firmware begins executing. If the upgrade file is invalid, the temporary image is discarded, the existing firmware continues to execute, and the firmware upgrade ends.

Step 6 Click the browser Reload button to refresh the Console and Upgrade Configuration Page.

Step 7 Ensure that the Module Firmware Version field displays the updated firmware version.

Downloading Module Firmware from a TFTP Client

Caution If you interrupt the transfer by turning the switch off and on or by removing and reinserting the module, the firmware could get corrupted. For recovery procedures, see the "Recovering from Corrupted Firmware".

Follow these steps to download the latest firmware from a TFTP client to your FDDI or ATM module.

Step 1 Download the upgrade file from CCO into an appropriate directory on your TFTP client.

Step 2 From the client management station, establish a TFTP session with the IP address of the switch. Make sure the client station is in binary transfer mode.

Step 3 Select the Accept Upgrade Transfer from Other Hosts check box. By default, this check box is not selected.

Step 4 Download the upgrade file from the client station to the switch, using the TFTP user interface or the appropriate command for the put operation (such as, put upgrade_ filename).

After existing firmware validates the file, the new image is transferred into Flash memory, the module resets, and the new firmware begins executing. If the upgrade file is invalid, the temporary image is discarded, the existing firmware continues to execute, and the firmware upgrade ends.

Step 5 Click the browser Reload button to refresh the Console and Upgrade Configuration Page.

Step 6 Ensure that the Module Firmware Version field displays the updated firmware version.

Step 7 Deselect the Accept Upgrade Transfer from Other Hosts check box.

Exception and Utilization Statistics

The Statistics Reports Page (Figure 3-13) displays the exception and utilization statistics for the switch. To display this page, click Statistics on the menu bar.


Figure 3-13:
Statistics Reports Page

Resetting Port and Switch Statistics

To reset the statistics for a switch port:

Step 1 Select the port from the Select Port list.

Step 2 Click Reset Port Statistics.

To reset the statistics for all ports on the switch, click Reset All Statistics.

The switch manager does not automatically refresh the statistics shown on this page. Click the browser Reload button to refresh the statistics shown on this page.

Exception Statistics

This report displays the number of receive and transmit errors for each port.

Receive

Number of giants and FCS and alignment errors

Transmit

Number of excessive deferrals, late collisions, jabber errors, and other transmit errors

Utilization Statistics

This report displays the number of bytes received and transmitted for each port.

Receive

Number of bytes received in good packets

Forward

Number of good frames forwarded

Transmit

Number of bytes transmitted

Changing the System Management Settings

The system management settings include the switch IP information and the settings for switch performance and flood and traffic control. To display the System Management Page (Figure 3-14), click System on the menu bar.


Figure 3-14: System Management Page

Assigning or Changing IP Information

Typically, after the switch is installed, an IP address is assigned to the switch. (See the "Assigning IP Information and a Password to the Switch".)

IP information identifies the switch on the network and is required to configure and monitor it as an individual switch. When you assign the switch its own IP address, you can manage it from its management interfaces (switch manager, management console, SNMP, or CLI). The switch retains its own IP address even when it joins or leaves a switch cluster.

If you do not assign an IP address to the switch, you must add the switch to a switch cluster and manage it through the command switch. Whether or not the switch has its own IP address, when the switch is a cluster member, it is managed and communicates with other member switches through the IP address of the command switch. If the switch leaves the cluster and it does not have its own IP address, you then must assign IP information to it to manage and monitor it as a nonmember switch.


Note We recommend that you assign an I
P address to the switch even if the switch is or will be a cluster member so that if the switch is removed from the cluster, it remains manageable as a nonmember switch.

Note You access the switch manager from a management station that is connected to one of the switch ports. Therefore, make sure that you do not disable or otherwise misconfigure the port through which you are communicating with the switch. You might want to write down the port number to which you are connected. Make changes to the switch IP information with care.

For information about IP information in switch clusters, refer to the Cisco IOS Desktop Switch Software Configuration Guide, Catalyst 2900 Series XL and Catalyst 3500 Series XL Cisco IOS Release 12.0(5)XP.

To change the switch IP information:

Step 1 Enter a new IP address for the switch in the IP Address field. Use dotted quad format (nnn.nnn.nnn.nnn).

If the switch is connected to a network that has a Dynamic Host Configuration Protocol (DHCP)/Bootstrap Protocol (BOOTP) server, the server automatically assigns it an IP address.

This field displays the IP address assigned to the switch. If the switch does not have an IP address, this field displays 0.0.0.0.

Caution Changing the switch IP address on this page will end your switch manager session. You will need to open a new session and enter the new IP address in the URL field if you are using Communicator (the Address field if you are using Internet Explorer).

Note We recommend that you assign an I
P address to the switch even if the switch is or will be a cluster member so that if the switch is removed from the cluster, it remains manageable as a nonmember switch.

Step 2 Enter the subnet mask for the switch in the Subnet Mask field.

Subnet masks exist only if the network has been divided up into subnetworks.

Step 3 In the Domain Name field, enter the domain name (up to 62 characters) of the Domain Name System (DNS) server to which the switch is associated (such as cisco.com).

Step 4 In the Default Gateway field, enter the IP address of the default gateway. Use dotted quad format (nnn.nnn.nnn.nnn).

The default gateway is the router that the switch uses to reach IP subnets other than the local subnet to which the switch is attached. A default gateway is also necessary if the management station from which the switch is to be managed is not on the same IP subnet as the switch.

For automatic IP gateway assignment, see the "Routing Information Protocol" section.

Step 5 In the IP Address of DNS Server 1 and 2 fields, enter the IP address(es) of the DNS server(s). For more information about the DNS server, see the "Domain Name System Servers" section.

Step 6 Click Apply.

Domain Name System Servers

A network device can be identified through its IP address or its associated host name. Domain Name System (DNS) servers maintain name-to-address mappings.

If you enter the device name when using the switch management interfaces, the DNS server associated with the switch looks up the device IP address. The switch can be associated to up to two DNS servers.

To associate a DNS server to the switch:

Step 1 Enter the IP address of the DNS server in the IP Address of DNS Server field. Use dotted quad format (nnn.nnn.nnn.nnn).

Step 2 Click Apply.

Routing Information Protocol

By default, the Routing Information Protocol (RIP) is enabled (Use Routing Information Protocol check box is selected). RIP automatically discovers and assigns an IP gateway to the switch.

The default gateway is the router that the switch uses to reach IP subnets other than the local subnet to which the switch is attached. A default gateway is also necessary if the management station from which the switch is to be managed is not on the same IP subnet as the switch.

Switch Performance and Flooding and Traffic Control

Switching Modes

By default, the switching mode is FragmentFree (cut-through). The switching mode determines how quickly the switch forwards a packet and, therefore, how much latency the packet experiences. Latency is the delay between the time a port begins to receive a packet and the time the port begins to transmit the packet to a destination port. FragmentFree mode filters out collision fragments before forwarding. Store-and-forward stores complete packets and checks for errors before forwarding.

The switch uses these switching modes:

If latency is an issue, use FragmentFree switching.
Store-and-forward is the most error-free form of switching, but the forwarding latency is higher than FragmentFree (cut-through) switching. If you have frame check sequence (FCS) or alignment errors, use the store-and-forward mode so that packets with errors are filtered and not propagated to the rest of the network.

Although Table 3-12 shows store-and-forward experiencing the lowest latency, the figures do not include the time it takes to receive the packet, which varies according to the packet size. Table 3-13 shows the minimum and maximum packet reception latencies, which you need to add to the store-and-forward latencies in Table 3-12.


Table 3-12: FIFO Switching Latencies
Switching Mode 10 Mbps to
10 Mbps
10 Mbps to
100 Mbps
100 Mbps to
100 Mbps
100 Mbps to
10 Mbps

FragmentFree (cut-through)

70 microsec

-

9 microsec

10 microsec

Store-and-forward

7 microsec + PRL

7 microsec + PRL

3 microsec + PRL

3 microsec + PRL


Table 3-13: Packet Reception Latencies (PRL)
Link Speed Minimum Latency Maximum Latency

10 Mbps

51.2 microsec

1224 microsec

100 Mbps

5.1 microsec

122.4 microsec

Store-and-Forward for Multicast Frames

By default, store-and-forward for multicast frames is disabled (Enable the Use of Store-and-Forward for Multicast check box is not selected). If this option is disabled, the switch forwards multicast frames according to the switching mode. The store-and-forward mode is always used for broadcast frames.

Action Upon Address Violations

The default action is Suspend. An address violation occurs if a secure port receives a source address statically assigned to another port or if a secure port tries to learn more than a defined number of addresses. From the Action Upon Address Violation drop-down list, you can select the action a port takes if an address violation occurs:

For information about secure ports, see the "Securing a Port" section.

Network Port

A unicast address identifies one unique device on the network. However, if the switch has not received packets from the device for a while (longer than the aging period), the switch removes the device address from its address table, and the address is then an unknown unicast address. The switch must flood (send to all ports except the one the packet is received on) packets destined for the unknown unicast address in order to ensure the device receives the packet. Once the switch learns the location of the device, this flooding stops.

The use of a network port can eliminate this type of flooding. The network port that you select from the Network Port drop-down list is the destination port for all packets with unknown unicast addresses. By default, no port is assigned as the network port.

The network port

For more information about unicast addresses, see the "Enabling or Disabling Flooding of Unknown MAC Addresses" section and the "Permanent Unicast Address Table" section.

Half-Duplex Back Pressure on 10-Mbps Ports

By default, half-duplex back pressure on all 10-Mbps ports is disabled. Back pressure ensures retransmission of incoming packets if a half-duplex 10-Mbps switch port is unable to receive incoming packets.

When back pressure is enabled and no buffers are available to a port, the switch generates collision frames across the affected port and causes the transmitting station to resend the packets. The switch can then use this retransmission time to clear its receive buffer by transmitting packets already in the queue.

For information about flow control on the 100-Mbps ports, see the "Flow Control".

ECC on 10-Mbps Ports

By default, enhanced congestion control (ECC) is disabled on all 10-Mbps ports. An ECC-enabled port accelerates transmission of frames and empties its queue more quickly. This option reduces congestion on the switch and keeps the switch from dropping frames because of full transmit queues. The ECC option can be enabled on half-duplex ports and can be configured on a global basis for the 10-Mbps ports.

For information about ECC on the 100-Mbps ports, see the "Enabling or Disabling ECC on the 100-Mbps Module Switch Ports" section. ECC on the 100-Mbps ports is set on a per-port basis, not on a global basis.

To enable ECC on a 10-Mbps port:

Step 1 Select one of the following modes from the Enhanced Congestion Control drop-down list.

Step 2 Click Apply.

Broadcast Storm Control

A broadcast storm is an excessive number of broadcast packets being received on a given switch port. Broadcast storm packets can congest the receiving switch port. If the switch port forwards a broadcast storm to the other switch ports, traffic on those ports and all network segments are also affected. You can use broadcast storm control to control the quantity of broadcast packets the switch forwards to your network, thus reserving switch bandwidth for your network users.

Use the broadcast storm control settings to inhibit the forwarding of broadcast packets when the broadcast rate (number of broadcast packets received from a port per second) on a switch port exceeds a specified threshold. Broadcast storm control is configured for the switch as a whole, but operates on a per-port basis.


Note Only broadcast packets are filtered through the broadcast storm control option. For information about unicast and multicast flooding control, see the
"Enabling or Disabling Flooding of Unknown MAC Addresses" section and the "Managing Multicast Packets with CGMP" section.

To change the broadcast storm control settings:

Step 1 Select Block or Ignore in the Action Upon Exceeding Broadcast Threshold field. The default is Ignore.

This option assigns the action the switch takes if the number of broadcast packets reaches the broadcast threshold:

Step 2 In the Broadcast Threshold field, enter the threshold that constitutes a broadcast storm. The range is 10 to 14400 broadcast packets received from a port per second. The default is 500.

When this threshold is exceeded, the switch, if configured to do so, blocks the broadcast packets received from the port and generates an SNMP alert.

Step 3 In the Broadcast Reenabled Threshold field, enter the threshold below which broadcast forwarding is re-enabled. The range is 10 to 14400 packets. The default is 250.

Step 4 Click Apply.

Managing Multicast Packets with CGMP

A multicast packet is information sent to multiple recipients from one sender. However, sometimes multicast traffic needs to be received only on certain networks segments, and not all. Indiscriminant flooding of multicast traffic can waste bandwidth on the switch and congest each segment.

The Cisco Group Management Protocol (CGMP) dynamically creates CGMP groups, which are designated recipients of multicast traffic. This limits the transmission of multicast packets to only end-stations that request them, thereby reducing flooding of multicast traffic within the network.

IP multicast routers are required to forward multicast packets across an IP internetwork. CGMP filtering requires a network connection from a CGMP-enabled switch to a router running CGMP. End stations issue join messages to become part of a CGMP group and issue leave messages to leave the group. A CGMP-enabled router sends CGMP packets to inform the switch when specific end-stations join or leave a CGMP group. When CGMP is enabled on the switch, the switch ports forward multicast traffic only to CGMP group members.

A CGMP group remains in the switch IP Multicast Address Table until all members have left that group. The switch supports up to 64 IP multicast group registrations. For additional information about multicast registrations, see the "Permanent Multicast Address Table" section.

To display the CGMP Management Page (Figure 3-15), click CGMP on the menu bar.

For additional information, see the

For information about IP multicast, including Internet Group Management Protocol (IGMP), refer to RFC 1112.


Figure 3-15:
CGMP Management Page

Changing the CGMP Settings

By default, CGMP is enabled (Enable CGMP check box is selected) on the switch.

To disable CGMP:

Step 1 Deselect the Enable CGMP check box.

Step 2 Click Apply.

CGMP Fast Leave

The CGMP Fast Leave option can eliminate unnecessary multicast traffic to switch ports that no longer have group members needing that specific multicast traffic. By default, the CGMP Fast Leave option is disabled (Enable CGMP Fast Leave check box is not selected).


Note For CGMP Fast Leave to take effect, all CGMP group members must have I
GMP version 2 enabled.

When this option is enabled, the following rules are in effect:

To enable CGMP Fast Leave:

Step 1 Select the Enable CGMP Fast Leave check box.

Step 2 Click Apply.

Router Hold Time

The Router Hold Time field displays the number of seconds (between 5 and 900) that the switch waits for keepalive messages before deleting CGMP-learned multicast groups. By default, the router hold time is 600.

Multicast routers that support CGMP periodically send CGMP join messages to advertise themselves to switches within a network. A receiving switch saves the information and sets a timer equal to the router hold time. The timer is updated every time the switch receives a CGMP join message advertising itself. When the last router hold time expires, the switch removes all IP multicast groups learned from CGMP.

To change the router hold time:

Step 1 In the Router Hold Time field, specify the number of seconds (5 to 900) the switch waits before removing all IP multicast groups learned from CGMP.

Step 2 Click Apply.

IP Multicast Address Table

When CGMP is enabled on the switch, the switch automatically creates and dynamically maintains a table that lists the addresses of designated multicast recipients and the associated switch port(s) through which multicast traffic are forwarded to those recipients.

If you have configured bridge groups, the bridge group number is not displayed on the IP Multicast Address Table. For more information about bridge groups, see the "Bridge Group Configuration Menu" section.

Caution Use the Remove option only to debug and recover from unexpected situations.

To delete a specific entry from the IP Multicast Address Table:

Step 1 Select the entry you want to delete.

Step 2 Click Remove.

Click Remove All to clear the table.

Router Ports Table

CGMP filtering requires a network connection from the switch to a router running CGMP. When CGMP is enabled on the switch, the switch automatically creates and dynamically maintains a table that lists the IP address of each attached CGMP-enabled router and the switch port to which the router is attached.

To delete a specific entry from the Router Ports Table:

Step 1 Select the entry you want to delete.

Step 2 Click Remove.

Click Remove All to clear the table.

Changing the Module Port Settings

You can change the settings of the module ports. To display the Module Management Page (Figure 3-16), click Module on the menu bar or click the port on the switch image. You can also click the Module Management button on the Port Management Page.


Figure 3-16: Module Management Page

Enabling or Disabling a Module Port


Note You access the switch manager from a management station that is connected to one of the switch ports. Therefore, make sure that you do not disable or otherwise misconfigure the port through which you are communicating with the switch. You might want to write down the port number to which you are connected. Make changes to the switch IP information with care.

By default, all module ports are enabled to transmit and receive data. To disable a module port:

Step 1 Deselect the Enable check box in the Status: Requested/Actual column.

Step 2 Click Apply.

A linkDown trap is sent to the management station if you configured an SNMP manager.

Step 3 Click Home to display the switch image. The port LED for a disabled port is amber.

To re-enable a module port:

Step 1 Select the Enable check box in the Status: Requested/Actual column.

Step 2 Click Apply.

A linkUp trap is sent to the management station if you configured an SNMP manager.

Step 3 Click Home to display the switch image. If the enabled port is connected to a device, the port LED is green; otherwise, it is blue.

Module Port Status

The Status: Requested/Actual column also displays the module port status in the gray area below the Enable check box. Security violations, management intervention, or actions of the Spanning-Tree Protocol (STP) can change the port status. No packets are forwarded to or from a disabled or suspended port. However, suspended ports do monitor incoming packets to look for an activating condition. For example, when a linkbeat returns, a port suspended for no linkbeat returns to the enabled state.

Each port is always in one of the states listed in Table 3-14.


Table 3-14: Port Status Descriptions
Port Status Description

Enabled

Port can transmit and receive data.

Disabled-mgmt

Port is disabled by management action. Port must be manually re-enabled.

  • Suspended-no-linkbeat
    (for 10BaseT and 100BaseT ports)

  • Suspended-ring-down (for FDDI ports)

Port is suspended because of no linkbeat or ring. This is usually because the attached station is disconnected or powered-down. Port automatically returns to enabled state when the condition causing the suspension is removed.

Suspended-ATM-LANE-down (for ATM ports)

Port is suspended due to nontrunking ATM module.

Suspended-jabber

Port is suspended because attached station is jabbering. Port automatically returns to enabled state when the condition causing the suspension is removed.

Suspended-violation

Port is suspended because of an address violation. Port automatically returns to enabled state when the condition causing the suspension is removed.

Disabled-self-test

Port is disabled because it failed a self-test.

Disabled-violation

Port is disabled because of an address violation. Port must be manually enabled.

Reset

Port is in the reset state.

Changing the Duplex Mode on the 100-Mbps Module Switch Ports

The default duplex mode for the 100-Mbps module switch ports is half duplex.


Note The duplex mode option is not available on the Catalyst 2820 100BaseT repeater, FDDI, and ATM module ports.

For information about changing the duplex mode on the 10-Mbps ports, see the "Changing the Port Duplex Mode" section.

To change the module port duplex mode:

Step 1 Select half duplex, full duplex, or full duplex with flow control from the Duplex Mode: Requested/Actual drop-down list.

The default is half duplex.

Step 2 Click Apply.

Step 3 Click Home to display the switch image.

Step 4 Click the Mode button until the FDUP LED lights. If the port LED is blue (off), the port is running in half duplex. If the port LED is green, the port is running in full duplex.

Full-Duplex Operation

Full-duplex operation is the simultaneous transmission of data in both directions across a link. For example, a 100-Mbps port operating in full-duplex mode can provide up to 200 Mbps of bandwidth across the switched link.


Note Both ends of the link must be configured for full-duplex operation. Because hubs operate only at half duplex, a full-duplex port on the switch cannot be connected to a hub.

Note The duplex mode option is not available on the Catalyst 2820 100BaseT repeater module.

Flow Control

Flow control is a function whereby the transmitting station does not send data or control information faster than the receiving station can accept it. This prevents the loss of outgoing packets during transmission. If the switch is transmitting packets faster than the attached device can receive and process them, the attached device sends pause-control frames when its port buffer becomes full. When you use the full-duplex with flow control option on a 100-Mbps port, the switch port responds to the pause-control frames sent from the attached device. The switch holds subsequent transmissions in the port queue for the time specified in the pause-control frame. When no more pause-control frames are received, or when the default time specified has passed, the switch resumes transmitting frames through the port.


Note Although the Catalyst 2820 switches do not generate pause-control frames, the switches do respond appropriately to pause-control frames generated by other devices.

Note Flow control on full-duplex ports is only available on the 100-Mbps ports. For information about using the half-duplex back pressure option on the 10-Mbps ports, see the
"Half-Duplex Back Pressure on 10-Mbps Ports" section.

Enabling or Disabling Flooding of Unknown MAC Addresses

By default, all switch ports are enabled to forward unicast and multicast packets with unknown destination Media Access Control (MAC) addresses. You can enable or disable flooding on a per-port basis.

A unicast packet is information addressed to one recipient from one sender. This type of traffic typically comprises the bulk of traffic on an Ethernet LAN. A multicast packet is information sent to multiple recipients from one sender. This lightens the load on the sender and on the network because only one data stream is sent, rather than one per recipient. A broadcast packet is information sent to all nodes within a single network segment and can be a major source of congestion.

The switch forwards each unicast or multicast packet it receives according to the entries stored in the switch content-addressable memory (CAM) table. The table entries are mappings of the MAC addresses of destination end-stations and of the associated switch ports through which incoming packets are forwarded to those destination end-stations.

Flooding is the forwarding of unicast or multicast packets with unknown destination addresses to all the switch ports. (A broadcast packet is always forwarded [flooded] to all ports.) Flooding adds traffic on the switch ports. In some configurations, flooding could be unnecessary. For example, there are no unknown destinations on switch ports with only statically assigned addresses or single stations attached. In this case, you can disable flooding on these ports.

You can assign a network port to which all unknown unicast addresses are forwarded. For more information, see the "Network Port" section.

Depending on the model, the switch can store:

For more information about address management, see the "Managing the Switch Address Tables" section. For information about multicast packet control, see the "Managing Multicast Packets with CGMP" section. For information about broadcast packet control, see the "Broadcast Storm Control" section.

To disable flooding on a port:

Step 1 Deselect the unicast or multicast check box for the port.

Step 2 Click Apply.

To enable flooding on a port:

Step 1 Select the unicast or multicast check box for the port.

Step 2 Click Apply.

Enabling or Disabling ECC on the 100-Mbps Module Switch Ports

By default, enhanced congestion control (ECC) is disabled on all 100-Mbps module switch ports. This option reduces congestion on the switch and keeps the switch from dropping frames because of full transmit queues. The ECC option can be enabled on half-duplex ports and can be configured on a per-port basis on the 100-Mbps ports.

For information about ECC on the 10-Mbps ports, see the "ECC on 10-Mbps Ports" section. ECC on the 10-Mbps ports is set on a global basis, not on a per-port basis.

To enable ECC on a 100-Mbps module switch port:

Step 1 Select one of the following modes from the Enhanced Congestion Control drop-down list.

Step 2 Click Apply.

Changing the SNAP Translation Settings on the FDDI Module Ports

You can change how the switch reinstalls Novell SNAP FDDI frames.

To change the SNAP translation settings on an FDDI module port:

Step 1 Select Automatic, Ethernet 802.3, Ethernet SNAP, Ethernet II, or Drop from the Novell SNAP Translation column. The default is Automatic.

Step 2 If Automatic is selected in the Novell SNAP Translation column, select All, Ethernet 802.3, Ethernet SNAP, Ethernet II, or Drop from the Unmatched SNAP Translation column. The default is All.

This option is available only if you selected Automatic in the Novell SNAP Translation column for the port. Use this option to select which FDDI-to-Ethernet translation to use for packets whose destinations cannot be determined from the Novell SNAP translation table.

Assigning or Changing a Module Port Name or Description

To assign a name or description to a module port:

Step 1 In the Port Name/Description column, enter the port name or a description
(up to 60 characters).

Step 2 Click Apply.

Detailed Module Port Statistics

The Detailed Port Statistics Page (Figure 3-4) displays the receive and transmit statistics for the port you select. You can use this page to help identify performance or connectivity problems, which are listed under the Errors area of the page. For example, Frame Check Sequence (FCS) and alignment errors could be the result of cabling problems such as the following:

To display this page, click View... for a particular port on the Port Management Page. The errors are described in Table 3-11, Table 3-16, and Table 3-17.


Figure 3-17: Detailed Port Statistics Page


Table 3-15: Error Descriptions (100BaseT Module Ports)
Error Description

FCS errors

Number of frames received on a particular interface that are an integral number of octets in length but do not pass the Frame Check Sequence (FCS) test.

Alignment errors

Number of frames received on a particular interface that are not an integral number of octets in length and do not pass the FCS test.

Giant frames

Number of frames received on a particular interface that exceed the permitted frame size.

Address violations

Number of times this secure port receives a source address that duplicates a static address configured on another port plus the number of times a source address was seen on this port that does not match any addresses secured for the port.

Late collisions

Number of times the port detects a collision on a particular interface later than 512 bit-times into the transmission of a packet.

Excessive deferrals

Number of frames the port defers transmission for an excessive period of time.

Jabber errors

Number of times the jabber function was invoked because a frame received from this port exceeded a certain time duration.


Table 3-16: Error Descriptions (FDDI Module Ports)
Error Description

FCS errors

Number of frames received on a particular interface that are an integral number of octets in length but do not pass the Frame Check Sequence (FCS) test.

Invalid data length

Number of FDDI packets that have not been completely received.

Error flag set

E indicator of the FDDI frame status is set.

Bad IP header

Bad data in the IP header.

Address violations

Number of times this secure port receives a source address that duplicates a static address configured on another port plus the number of times a source address was seen on this port that does not match any addresses secured for the port.

  
Table 3-17: Error Descriptions (ATM Module Ports)
Error Description

Cyclic redundancy check (CRC) errors

Number of frames received on the ATM port with AAL5 CRC error.

Cell header error control (HEC) errors

Number of frames received on the ATM port with cell header errors.

Giant frames

Number of frames received on a particular port exceeding the maximum frame size.

Address violations

Number of times this secure port receives a source address that duplicates a static address configured on another port plus the number of times a source address was seen on this port that does not match any addresses secured for the port.

For information on configuring the ATM module ports, see the "ATM and LANE Status Display" section and the Catalyst 2820 ATM Modules Installation and Configuration Guide.

Basic FDDI Settings

To display the Basic FDDI Settings Page (Figure 3-18), click Basic FDDI Settings on the Module Management Page. Use this page to display the most common FDDI module port settings.

For complete information about configuring the FDDI module ports, see the "Basic FDDI Settings Menu" section and "Secondary FDDI Settings Menu" section.


Figure 3-18: Basic FDDI Settings Page

Table 3-18 describes the MAC and SMT information fields on this page:


Table 3-18: MAC and SMT Information Fields (Basic FDDI Settings Page)
Field Description

SMT version

Version number of this particular Station Management (SMT) implementation.

MIB version

Version number of this FDDI management information base (MIB) implementation.

Number of MACs

Number of MACs that this FDDI entity implements.

Non-master ports

Number of ports on the FDDI module. Non-master ports are any ports other than the M type.

ECM state

Current status of the entity coordination management (ECM) state machine. The ECM handles the management and coordination of all of the ports in the node. During normal operation, this has the value In. The other possible values---Out, Trace, Leave, Path_test, Insert, Check, or Deinsert---indicate that the ECM state machine has detected an error.

Upstream neighbor

Station address of the upstream neighbor.

Station address

Station address of the FDDI module.

Downstream neighbor

Station address of the downstream neighbor.

Optical bypass

If an optical bypass device is attached to the FDDI module, this item is Present; otherwise, it is Not Present.

Attachment state

Current attachment configuration for the module. The normal state, Thru, indicates that both ports are connected to the ring. The value Isolated indicates that both expansion ports A and B are disconnected from the ring, Wrap_A indicates that only expansion port A is connected to the ring, and Wrap_B indicates that only port B is connected to the ring.

Table 3-19 describes the port information fields on this page:


Table 3-19: Port Information Fields (Basic FDDI Settings Page)
Field Description

Connection policy (rejects)

Types of connections that are not allowed for a port. For example, if port types A and S are listed under expansion port A, then port A of the FDDI module cannot be connected to an A port or an S port on another station.

Neighbor type

Port type to which each port is currently attached. Possible values are A, B, S, M, and NONE.

Current path

Path into which each port is currently inserted. The value will be Primary, Secondary, or Isolated.

Available paths

Possible paths into which each port can theoretically be inserted. This value will always be Primary+Secondary; for FDDI SAS, the value will be Primary.

PMD class

Class of the physical layer media dependent (PMD). The value is multimode or twisted-pair.

PCM state

Current state of the physical connection management (PCM) state machine. The PCM covers the management of the physical connection between the port and the connected port on the adjacent node. The possible values are Off, Break, Trace, Connect, Next, Signal, Join, Verify, Active, and Maint.

Link error alarm activated

If this value sets to True, the link error rate for the port has exceeded the alarm threshold.

Link confidence test failures

Number of consecutive times the link confidence test has failed.

Link error monitor rejections

Link-error monitoring count of the number of times that a link has been rejected.

Aggregate link error count

Aggregate count of link-error monitoring errors. This count is reset only at initialization.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Oct 28 20:11:00 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.