cc/td/doc/product/lan/c2900xl/29_35sa6
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

A


accessing
command modes     2-24
CVSM     3-11
MIB files     2-32, 2-33
MIB objects     2-32
MIB variables     2-34

address aging time     3-51

address count, secure     3-57

address management illustrated     3-50

address security violations     3-56

address table
adding secure addresses     3-52
adding static addresses     3-54
defining secured port     3-56
MAC     3-49

addresses
adding secure     3-51
dynamic, default aging     3-66
secure, adding with CLI     3-52
static
adding and removing     3-52
adding with CLI     3-54
configuring (EtherChannel)     3-54

aggregation, wiring closet     1-5

aging time
changing address     3-51
defining     3-51

aging, accelerating     3-66

ARP table
illustrated     3-48
managing     3-47

ATM ports
settings for     3-19
VLAN membership     3-75

authentication, enabling NTP     3-38

autonegotiation
connecting to devices without     3-19
mismatches     5-1, 5-2

B


bandwidth, graphing     2-21

broadcast messages, configuring for     3-39

broadcast storm control, enabling     3-29

browsers
requirements     2-3

bytes, graphing     4-23, 4-24

C


candidates
adding     4-3
automatically discovering     4-4
requirements     4-3

Caution described     xii

CCO, accessing MIB files     2-33

CDP
configuring     3-59, 3-60
illustrated     3-61
MIB     2-32

CGMP
controlling management packets with     3-62
illustrated     3-64
MIB     2-32

Cisco Discovery Protocol. See CDP

Cisco Group Management Protocol. See CGMP

Cisco Visual Switch Manager. See CVSM

CiscoWorks     2-34

CLI
accessing     1-4
adding secure addresses with     3-52
adding static address with     3-54
assigning IP with     3-42, 3-46
assigning multi-VLAN ports to VLAN with     3-77
assigning static-access ports to VLAN with     3-74
blocking flooded traffic with     3-30
changing router hold time with     3-63
configuring CDP with     3-60
creating a cluster with     4-6
creating EtherChannel port groups with     3-24
defining aging time with     3-51
enabling a network port with     3-28
enabling broadcast storm control with     3-29
enabling Fast Leave option     3-63
enabling port security with     3-58
enabling STP Port Fast with     3-72
error messages     2-29
managing cluster members with     2-26
removing a cluster member with     4-9
removing multicast groups with     3-65
setting speed and duplex with     3-20
upgrading member switches with     4-18
upgrading with     3-34
using     2-23

Cluster Builder
illustrated     4-8
using     2-15

Cluster Management
described     2-1
displaying reports     4-26

Cluster Manager
displaying     2-17
using     2-21

Cluster View
displaying     4-10
using     2-19

clusters
creating     2-15, 4-6
managing     2-35, 4-1, 4-11
members
adding and removing     4-7
managing with CLI     2-26
removing     4-9
members, adding and removing     4-9

command modes     2-24

command switch     4-1
and management     1-4
and managing with SNMP     2-35
defined     1-2
enabling     3-12

command-line error messages     2-29

commands
?     2-27
abbreviating     2-28
copy running-config startup-config     2-31
list of available     2-25
no     2-28
rcommand     2-26
resetting to defaults     2-28
show cluster     2-26

community strings
configuring     4-19
entering     3-45
SNMP     2-35, 4-6

configuration
conflicts, managing     3-5
multiple port     4-15
parameters, port     3-18
saving cluster     4-4
saving Flash memory     2-31
single port     4-14
SNMP illustrated     3-44
startup, saving changes to     3-6

configuration file, saving     3-31

configuring
broadcast messages     3-39
CDP     3-59, 3-60
community strings     4-19
devices with Cluster Manager     2-21
flooding controls     3-26
Internet Explorer     2-4, 2-5
IP information     3-40
logging     3-78
member switches     2-26
Netscape Communicator     2-3
NTP     3-38
port parameters     3-19
ports     3-11, 3-14, 3-16, 4-13
SNMP     3-43, 4-19
static addresses (EtherChannel)     3-54
STP     3-65
switch     3-13
Telnet     2-30

conflicts
configuration     3-5
during upgrade     3-34

connecting to devices without autonegotiation     3-19

connection information     3-9
displaying     3-7

connectivity, workgroup     1-6

conventions
command     x
Note and Caution     xii
text     x

copy running-config startup-config command     2-31

creating
clusters     4-2, 4-6
VLANs     3-73

Current Multicast Groups table     3-64

CVSM
accessing     3-11
conflicts while upgrading     3-34
home page     3-12, 3-13
displayed     3-14
displaying     2-20, 2-21

D


date, setting     3-36

daylight saving time     3-38

defaults
resetting to     2-28

deployment examples     1-5

destination-based forwarding     3-23

destination-based port groups     3-21, 3-54

device arrangement     4-22

device reports
displaying     2-21, 4-28
illustrated     4-28, 4-29, 4-30

documentation, related     xi

duplex settings     3-10, 3-16, 3-19, 3-20

dynamic addresses     3-51, 3-66

E


enable password     2-26

enable secret password     2-26

enabling
broadcast storm control     3-29
Fast Leave     3-62
flow control     3-18
network port     3-28
NTP authentication     3-38
Port Fast option     3-71
port security     3-56, 3-58
ports     3-16
SNMP     3-43
STP Port Fast     3-72
Switch Port Analyzer (SPAN)     3-24
traps     4-21

Enterprise Edition Software
features     1-2
switches supported     1-2
upgrading to     1-1

error messages, understanding     2-29

errors, graphing     4-23, 4-26

EtherChannel port groups
configuring static address for     3-54
creating     3-21

examples, deployment     1-5

F


Fast EtherChannel port groups, creating     3-21

Fast Leave, enabling     3-62, 3-63

features
conflicts between     2-23
Enterprise Edition Software     1-2
graphing     2-35
IOS     1-1, 3-1
management interface     2-1
port, conflicting     3-5

filenames, Flash memory     3-31

files, Flash memory     2-31

firmware, upgrading     3-31

Flash memory
saving configuration     2-31
specifying filenames     3-31
working with files in     2-31

flooded traffic, reducing     3-30

flooding controls
configuring     3-26
illustrated     3-27

flooding, reducing     3-63

flow control, enabling and disabling     3-18

forwarding
controlling (SNMP)     2-35
restrictions     3-23
source-based, illustrated     3-22

forwarding map, static address     3-52, 3-53

forwarding port groups     3-21

FTP, accessing MIB files     2-32, 2-33

G


get-next-request operation     2-34, 2-35

get-request operation     2-34, 2-35

get-response operation     2-35

Gigabit Ethernet devices, connecting to     3-19

Gigabit Ethernet port settings     3-19

global configuration mode     2-25

graph, bandwidth     2-21

graphing features, enabling     2-35

graphs, link utilization     4-22

H


hardware
supported     1-2

help command     2-27

hold time, modifying     3-63

home page
CVSM, displayed     3-14
switch     3-12

host name, entering     2-21

HTTP     2-2

I


incompatible features     3-5

Index     1

interface configuration mode     2-25

interfaces
IOS supported     1-4
web-based     1-4

Internet Explorer
configuring     2-4, 2-5

IOS
command-line interface, accessing     1-4
deployment examples     1-5
features     1-1
hardware supported     1-3
interfaces supported     1-4
switching features, changing     3-1

IP address, discovering     3-47

IP information
assigning     3-42, 3-46
configuring     3-40

IP management packets, controlling     3-62

IP Management, illustrated     3-41

IP setup program     5-8, 5-10

L


LEDs
changing mode     2-21
Cluster Manager     4-13
monitoring     3-13
visual stack colors     3-10

line configuration mode     2-25

link
errors, graphing     4-26
graph, illustrated     4-23
utilization graphs     4-22

link report
displaying     4-26
illustrated     4-27

location, entering     2-21

logging     3-78

M


MAC address
adding secure     3-51
aging time     3-51
discovering     3-47, 3-49
tables, managing     3-49

management interface features     2-1

map
static address forwarding     3-52, 3-53

member switches
defined     1-2, 4-1
IP addresses     2-1

messages     2-29

MIB files
accessing with CCO     2-33
accessing with FTP     2-32, 2-33
specific trap information     2-32

MIB objects, accessing     2-32, 2-33

MIB variables, accessing     2-34

Microsoft Internet Explorer. See Internet Explorer

mismatches, autonegotiation     5-1, 5-2

modes, accessing command     2-24

monitoring
devices with Cluster Manager     2-21
LEDs     3-13
port status     3-10, 4-13
ports     3-13, 3-24
switch     3-13
traffic     3-24

multicast groups
listing and removing     3-62
removing     3-64

multicast packets. See flooding controls

multi-VLAN ports     3-74
assigning to VLANs     3-77

N


Network Management System (NMS)     2-34

network port, enabling     3-28

Network Time Protocol (NTP)     3-38

Network View
described     2-1
displaying     3-7
managing switches with     3-6
page     3-8
stack     3-6

NMS     2-34

Note described     xii

NTP     3-38, 3-39

O


order, switch     4-21

P


packets
controlling management (CGMP)     3-62
graphing     4-23, 4-25

packets. See also traffic

passwords
candidate switch     4-4
changing     3-12
community strings     3-45
configuring for Telnet     2-30
recovery     5-4
setting     2-26

path cost     3-70

PC requirements     2-2

performance graph, displaying link     2-20

polling interval     4-10

Port Configuration page     3-17

Port Fast
enabling     3-71
setting     3-16

port groups
configuring static addresses (EtherChannel)     3-54
configuring static addresses for     3-54
creating EtherChannel     3-21, 3-24
destination based     3-54
illustrated     3-23
restrictions on forwarding     3-23
source-based     3-54

port status, monitoring     4-13

ports
assigning multi-VLAN     3-77
assigning to VLANs     3-74
configuration
multiple     4-15
single     4-14
configuration parameters     3-18
configuring     3-14, 3-16, 4-13
configuring switch     3-11
features, conflicting     3-5
flooded traffic     3-30
mismatches     5-2
monitoring     3-13
parameters, configuring     3-19
secure     3-57
secured     3-56
security
enabling     3-56
enabling with CLI     3-58
illustrated     3-57
settings, correcting     5-3
speed
checking     3-10
setting     3-16
status, monitoring     3-10
STP parameters, changing     3-70

priority     3-70

privileged EXEC mode     2-24

Protocol     3-38

publications, related     xi

R


rcommand     2-26

recovery procedures     5-3

redundancy     3-66

reload options, system     3-32

remote devices, connecting to     3-19

reports
displaying     4-26
displaying device     2-21

router hold time
modifying     3-63

router hold time, modifying     3-63

S


saving
cluster configuration     4-4
configuration file     3-31
layout of switch icons     2-17
startup configuration changes     3-6

secure address
count, defining     3-57

secure addresses
adding     3-51, 3-52

secure ports     3-56, 3-57

security
levels, defining     3-80
port     3-56, 3-57
violations, address     3-56

set-request operation     2-34

setting
date and time     3-36
passwords     2-26
time     3-38

settings
configuring duplex     3-19
correcting port     5-3
displaying link     2-20

setup program     5-8, 5-10

SNMP
accessing MIB variables with     2-34
configuration, illustrated     3-44
configuring     3-43, 4-19
defined     2-34
enabling and disabling     3-43
management     2-32
managing clusters with     2-35
network management platforms     1-4

SNMP Manager, illustrated     4-20

software
recovery procedures     5-3
upgrading     3-31
upgrading for groups of switches     4-16
upgrading switch     3-33

source-based forwarding     3-23

source-based port groups     3-21, 3-54

SPAN, enabling     3-24

Spanning-Tree Protocol. See STP

speed
checking port     3-10
setting     3-16, 3-20

startup configuration, saving     3-6

static access ports assigned to VLANs     3-74

static address forwarding map     3-52, 3-53

static address forwarding restrictions     3-23

static addresses
adding and removing     3-52, 3-54
configuring for EtherChannel port groups     3-54

status, monitoring port     3-10

STP
changing VLAN parameters     3-67
configuring     3-65
disabling     3-67
illustrated     3-69, 3-71
Port Fast option     3-71, 3-72
port parameters, changing     3-70
unpredictable behavior     3-76

switch home page     3-12

Switch Network View. See Network View

switch order     4-21

Switch Port Analyzer (SPAN)
enabling     3-24
illustrated     3-25

syslog messages     3-80

system configuration     3-32

system date and time, setting     3-36

system reload options, entering     3-32

system-up time, entering     2-21

T


Telnet
configuring     2-30
starting     2-30

time
daylight saving     3-38
setting     3-36

time zones     3-37

traffic
blocking flooded     3-30
monitoring     3-24
reducing flooded     3-26, 3-28

trap information location     2-32

trap managers, adding     3-45

trap operation     2-35

traps, enabling     4-21

troubleshooting
IOS     5-1
with CiscoWorks     2-34

U


unicast packets. See flooding controls

UNIX workstation requirements     2-2

upgrading
conflicts while     3-34
groups of switches     4-16
member switches     4-18
software with CLI     3-34
switch software     3-31, 3-33
to Enterprise Edition Software     1-1

user EXEC mode     2-24

user settings, changing     4-10

utilization
graphing     4-24

utilization graphs     4-22

V


visual stack
described     3-6
displaying     3-9

VLAN database mode     2-25

VLAN ID, discovering     3-47, 3-49

VLANs
aging dynamic addresses     3-66
assigning ports to     3-74, 3-77
assigning static-access ports to     3-74
changing STP parameters     3-67
creating and maintaining     3-73
members, displaying     2-21
membership
ATM port     3-75
displaying     4-15
illustrated     3-75
MIB     2-32
overlapping     3-76

W


web-based management features, using     2-2

web-based management interfaces, preparing to use     2-2

web-based management tools     2-1

wiring closet aggregation     1-5

workgroup connectivity     1-6

hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed May 26 10:46:37 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.