|
|
This chapter describes these features:
The Fast EtherChannel feature provides parallel bandwidth of up to 400 Mbps (in full-duplex mode) between a Catalyst 1900 or Catalyst 2820 switch and another switch or host. It groups two Fast Ethernet interfaces into a single, logical transmission path. VLANs must be enabled to configure the Fast EtherChannel feature.
You can configure channels by using the standard command-line interface (CLI), the Simple Network Management Protocol (SNMP), or the switch web console.
When a Fast EtherChannel link is formed, the port-channel interface is enabled. You can verify this by using the show interfaces port-channel command. The port-channel remains enabled until both ports lose the link.
The Fast EtherChannel feature includes four user-configurable channel modes: on, off, auto, and desirable. Each mode affects the way a port handles PAgP packets. By default, ports are in off mode. Table 3-1 describes each of the four modes.
| Mode | Description |
|---|---|
On | Forces the port to aggregate without negotiation. |
Off | Prevents the port from aggregating without negotiation. (Default) |
Auto | The port responds to PAgP packets it receives, but does not initiate PAgP packet negotiation. |
Desirable | The port initiates negotiations with other ports by sending PAgP packets. |
Both the auto and desirable modes allow ports to negotiate with connected ports to determine if they can form a channel, based on criteria such as trunking state, VLAN numbers, and so on.
The Fast EtherChannel mode only affects the two Fast Ethernet ports and is always the same on both of the Fast Ethernet ports.
Once aggregated, the following template port parameters are applied to both ports automatically:
When a port-channel is enabled, the parameters of the template port are applied to both physical ports (port A and port B). Any changes made to the port-channel or either of the physical ports are applied to both member ports and the port-channel.
Source-based distribution prevents the switch from misordering frame transmissions. If not configured to preserve the order, the partner can distribute traffic arbitrarily, and unicast traffic is transmitted on the link where the source address was last seen. This provides the maximum possible load balancing configuration.
By default, frame ordering is not preserved. However, the chances for frame misordering is highly unlikely, even in this mode. This default setting maximizes load balancing on the switch.
When the Fast EtherChannel feature is configured with PAgP disabled, the switch cannot negotiate with its partner about its learning capability. Whether the switch preserves frame ordering or not depends on whether the Fast EtherChannel partner performs source-based distribution.
This section describes the concepts involved with the packet forwarding behavior of a Catalyst 1900 or Catalyst 2820 switch configured to use the Fast EtherChannel feature.
For flooded traffic, the switch always transmits packets on the active link.
EtherChannel-capable devices forward known unicast traffic in one of these ways:
If you add an address when the port-channel is down, the address is added only to the physical link specified. If you add an address when the port-channel is up, the address can be added to the physical link or to the port-channel. If the address is added to the port-channel, the address is located as if it was added to the physical port associated with the active link.
Irrespective of where the address is added, when the port-channel is formed, packets destined for an address are forwarded on the physical port of the active port-channel link.
The trunk status of both Fast Ethernet ports must be identical (trunking or nontrunking) in order for the ports to aggregate.
To avoid network loops and other problems, Fast EtherChannel links do not form if they are not properly configured.
The following information applies to the interaction of Fast EtherChannel and other features of the Catalyst 1900 and Catalyst 2820 switches:
To configure the Fast EtherChannel feature, follow these steps:
Step 1 Make sure that the ports you want to channel are configured according to the configuration guidelines.
Step 2 Make sure you have cabled a loop-free topology for all channeled VLANs.
Step 3 Create a Fast EtherChannel link by using the following command in global configuration mode:
switch(config)# port-channel mode {on | desirable | auto}
Step 4 If you want to change the template port for port channel parameters, use the following command in global configuration mode:
switch(config)# port-channel template-port template_port
Step 5 If you use PAgP, configure the PAgP port priority to select the active link using the following command in interface configuration mode:
switch(config-if)# pagp-port-priority priority
PortChannel is downPort-channel mode: on, preserve-order: Disabled Port parameters template port: APortMemberPriorityCap.PartnerPartnerPartnerPartnerDevice-idPort-idPriorityCap.-------------------------------------------------------------------------- ANo128100-00-00-00-00-0000 BNo128100-00-00-00-00-0000
The following display is an example of the show interfaces command when the port-channel is up:
PortChannel is Enabled802.1d STP State: ForwardingForward Transitions: 1Port-channel mode: on, preserve-order: Disabled Port parameters template port: A Active port: APortMemberPriorityCap.PartnerPartnerPartnerPartnerDevice-idPort-idPriorityCap.-------------------------------------------------------------------------- AYes128100-00-00-00-00-0000 BYes128100-00-00-00-00-0000
This example shows how to enable the Fast EtherChannel feature in desirable mode, specifies port 27 or port B as the template port for member-port configuration, and configures the hot-standby port priority of Fast Ethernet port B to 100.
switch(config)# port-channel mode desirable switch(config)# port-channel template port fastethernet 0/27 switch(config)# interface fastethernet 0/27 switch(config-if)# pagp-port-priority 100
port-channel mode
port-channel preserve-order
port-channel template-port
pagp-port-priority
show interfaces
To configure the Fast EtherChannel feature from the switch web console, click PORT on the menu bar. The Port Management Page is displayed. (See Figure 3-1.)

Click Fast EtherChannel Management to display the Fast EtherChannel Page. (See Figure 3-2.)

Select information in the fields for Fast EtherChannel Mode, Preserve Order of Frames on Fast EtherChannel, and Port Parameters Template Port. Enter a number in the Port Priority field.
When using a Fast EtherChannel link as a trunk, configure the same trunk mode on all ports in a channel and on both ends of the link. Configuring ports in a channel in different trunk modes can prevent a port-channel from forming.
Switches are normally connected hierarchically, as shown in Figure 3-3. (In simpler networks, the upper two levels of the hierarchy might be collapsed into a single backbone layer.) Figure 3-3 shows the network topology after STP has blocked the redundant links to avoid loops. Every access switch and distribution switch in Figure 3-3 has at least one redundant uplink. The switch begins using the alternate paths as soon as STP selects a new root port. The root port transitions to the forwarding state immediately without going through the listening and learning states, as they would with normal STP procedures.

When the UplinkFast feature is enabled and the root port fails, station-learning multicast frames are sent out from the new root port. Each frame has a source address equal to an address on a designated port. The designated port must now be reached from the backbone by way of the new root port. We recommend that you limit the generation rate for these frames so that the network is not flooded with these packets.
The rate of station-learning frame generation is expressed as frames per 100 ms. If zero is entered, station-learning frames are not generated. If station-learning frames are not generated, the STP topology converges more slowly after a loss of connectivity.
To configure UplinkFast using the menu-based console, do the following:
| Step | Action | ||
|---|---|---|---|
| Enter [N] Network Management at the selection prompt in the Main Menu. | ||
| Select [B] Bridge Configuration. | ||
| Select [U] Uplink Fast. | ||
| Enter [E]nable or [D]isable, and press Return. | ||
| Select [R] Station-learning Frame Generation Rate. | ||
| Enter the desired rate, and press Return. |

Bridge groups interact with the Enterprise Edition software in the following ways:
TACACS+ uses a server to provide authentication, authorization, and accounting (AAA). These services are independent of one another. A given TACACS+ configuration can use any or all of the three services.
The switch authentication access can use locally configured passwords or can use the other services available on the TACACS+ server or on the network, as shown in Figure 3-5.

You can enable or disable TACACS+ at your discretion. If TACACS+ is not enabled, the current switch login interface is enabled by default.
You can use the TACACS+ feature for these authentication tasks:
user@host
Authentication controls access to network devices by determining the identity of a user or an entity. TACACS+ works with a fixed password that is assigned to you by the TACACS+ security administrator at your site (that is, passwords are not dynamically assigned by the TACACS+ server). Your identity is authenticated each time you log into a switch using your assigned password.
When you send a request for privileged or restricted service, TACACS+ prompts you for the information necessary to access the privileged service.
By default, if the TACACS+ server cannot be contacted, access to the console is denied. This can be overridden with the last-resort command.The default setting of the last-resort command denies access if TACACS+ authentication cannot be performed.
If the TACACS+ last-resort command is configured to require a password and the TACACS+ server is down or unreachable, then the password authentication rules are the same as when TACACS+ is disabled---that is, the encrypted (secret) password takes precedence over the unencrypted password. Disabling TACACS+ authentication automatically reenables local authentication.
A TACACS+ key can be configured on the switch so that you can encrypt the packets transmitted to the server. The key must be the same as the one configured on the server daemon. If a TACACS+ key is not configured, the packets are not encrypted.
Up to three TACACS+ servers can be configured. The servers are tried in the order in which they are configured
![]() | Caution
Make sure that TACACS+ is enabled and configured correctly before disabling local login or enabling authentication. If TACACS+ is enabled but not configured correctly, or if the TACACS+ server is not on, you might not be able to log into the switch. If this occurs, you will need to access the boot code and reset the console, but not the system, to default values. For more information on accessing the boot code, see the Catalyst 1900 Series Installation and Configuration Guide, or the Catalyst 2820 Series Installation and Configuration Guide. |
You must configure a TACACS+ server before enabling TACACS+ on the Catalyst 1900 or Catalyst 2820 switch.
To configure TACACS+, perform these steps in privileged mode from the CLI:
| Task | Command |
|---|---|
Step 1 Enable TACACS+ authentication for login. | login tacacs |
Step 2 Enable TACACS+ authentication for enable. | enable use-tacacs |
Step 3 Configure the action to be taken when TACACS+ servers cannot be reached. | tacacs-server last-resort [password | succeed] |
Step 4 Configure the key used to encrypt packets. | tacacs-server key key |
Step 5 Configure the IP address of the TACACS+ server. | tacacs-server host hostaddress |
Step 6 Configure the number of login attempts allowed to the TACACS+ server (optional). | tacacs-server attempts integer |
Step 7 Set the timeout interval in which the server must respond (optional). | tacacs-server timeout seconds |
The following TACACS+ commands are fully documented in the Catalyst 1900 Series and Catalyst 2820 Series Command Reference (online only):
enable use-tacacs
login tacacs
show tacacs
tacacs-server attempts
tacacs-server directed-request
tacacs-server host
tacacs-server key
tacacs-server last-resort
tacacs-server timeout
The following example enables TACACS+ login authentication, configures a TACACS+ server at address 192.20.22.7, sets the server key to "I am cool," sets the maximum allowable login attempts to 3, and sets the server timeout to 5 seconds.
switch(config)# login tacacs switch(config)# tacacs-server host 192.20.22.7 switch(config)# tacacs-server key "I am cool" switch(config)# tacacs-server attempts 3 switch(config)# tacacs-server timeout 5
To verify the TACACS+ configuration settings, use the show tacacs command. After entering the command, you see this display:
switch# show tacacs Enable use-tacacs:Enabled Login tacacs:Enabled Tacacs-server last-resort:password Tacacs-server hosts:192.20.27.7 Tacacs-server key:I am cool Tacacs-server login attempts:3 Tacacs-server timeout:5 seconds Tacacs-server directed-request:Disabled
With the Configuration File Upload/Download feature, you can upload the current non-default switch configuration to an ASCII file on a TFTP server or download a saved configuration file from a TFTP server. You can also configure the switch to automatically retrieve the configuration file from a TFTP server when the switch powers on.
The switch does not maintain a copy of the file, nor does it store any comments that are in the file. If you enter the show running-config command to view the current configuration, no comments, other than the default comments, are listed.
In addition, because the switch executes the commands, but does not save the original file, output from the show running-config command might list the commands in a different order from which they appeared in the original file. The same is true when uploading the current configuration to a TFTP server.
The configuration download stops if the total size of the CLI command file exceeds 15 KB.
A Catalyst 1900 or Catalyst 2820 switch can automatically retrieve the configuration file from the TFTP server when it powers on. You can either specify the address of the TFTP server or have the switch send a broadcast to the IP address 255.255.255.255. Once this feature is configured, the switch requests to download one of the following filenames, in this order:
You can also use DHCP to trigger an automatic download of the configuration file, as described in the "DHCP Auto Configuration" section.
To configure the switch to download the configuration immediately from a TFTP server, use the following command in privileged mode:
switch# copy tftp://host/src_file nvram
To configure the switch to upload the current configuration to a TFTP server, use the following command in privileged mode:
switch# copy nvram tftp://host/dst_file
To configure the IP address of a TFTP server so that the configuration is downloaded when the switch powers on, use the following command in global configuration mode:
switch(config)# tftp server host
To configure the switch to automatically retrieve the configuration file from a TFTP server, use the following command in global configuration mode:
switch(config)# service config
To display the current configuration of the switch, use the following command:
switch# show running-config
The following commands are fully documented in the Catalyst 1900 Series and Catalyst 2820 Series Command Reference (online only):
copy tftp
copy nvram tftp
service config
show running-config
tftp accept
tftp server
The following example configures the switch to download a configuration file named corporate.cfg from the TFTP server 192.20.22.7:
switch# copy tftp://192.20.22.7/corporate.cfg nvram
The following example configures the switch to upload its configuration to a file named normal.cfg on the TFTP server named tahoe:
switch# copy nvram tftp://tahoe/normal.cfg
The following example sets the TFTP server address to 192.20.22.7 and configures the switch to automatically retrieve the configuration upon cold-start:
switch(config)# tftp server 192.20.22.7 switch(config)# service config
DHCP can be used to enable automatic configuration download, whether or not the
service config command has been configured on the switch. Using DHCP, the switch gets its address from a DHCP server on the network. To use DHCP, you must do the following:
# switch (config)# no service config
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Oct 28 20:12:43 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.