Table of Contents
Index
- accessing
- command modes 2-24
- CVSM 3-11
- MIB files 2-32, 2-33
- MIB objects 2-32
- MIB variables 2-34
- address aging time 3-51
- address count, secure 3-57
- address management illustrated 3-50
- address security violations 3-56
- address table
- adding secure addresses 3-52
- adding static addresses 3-54
- defining secured port 3-56
- MAC 3-49
- addresses
- adding secure 3-51
- dynamic, default aging 3-66
- secure, adding with CLI 3-52
- static
- adding and removing 3-52
- adding with CLI 3-54
- configuring (EtherChannel) 3-54
- aggregation, wiring closet 1-5
- aging time
- changing address 3-51
- defining 3-51
- aging, accelerating 3-66
- ARP table
- illustrated 3-48
- managing 3-47
- ATM ports
- settings for 3-19
- VLAN membership 3-75
- authentication, enabling NTP 3-38
- autonegotiation
- connecting to devices without 3-19
- mismatches 5-1, 5-2
- bandwidth, graphing 2-21
- broadcast messages, configuring for 3-39
- broadcast storm control, enabling 3-29
- browsers
- requirements 2-3
- bytes, graphing 4-23, 4-24
- candidates
- adding 4-3
- automatically discovering 4-4
- requirements 4-3
- Caution described xii
- CCO, accessing MIB files 2-33
- CDP
- configuring 3-59, 3-60
- illustrated 3-61
- MIB 2-32
- CGMP
- controlling management packets with 3-62
- illustrated 3-64
- MIB 2-32
- Cisco Discovery Protocol. See CDP
- Cisco Group Management Protocol. See CGMP
- Cisco Visual Switch Manager. See CVSM
- CiscoWorks 2-34
- CLI
- accessing 1-4
- adding secure addresses with 3-52
- adding static address with 3-54
- assigning IP with 3-42, 3-46
- assigning multi-VLAN ports to VLAN with 3-77
- assigning static-access ports to VLAN with 3-74
- blocking flooded traffic with 3-30
- changing router hold time with 3-63
- configuring CDP with 3-60
- creating a cluster with 4-6
- creating EtherChannel port groups with 3-24
- defining aging time with 3-51
- enabling a network port with 3-28
- enabling broadcast storm control with 3-29
- enabling Fast Leave option 3-63
- enabling port security with 3-58
- enabling STP Port Fast with 3-72
- error messages 2-29
- managing cluster members with 2-26
- removing a cluster member with 4-9
- removing multicast groups with 3-65
- setting speed and duplex with 3-20
- upgrading member switches with 4-18
- upgrading with 3-34
- using 2-23
- Cluster Builder
- illustrated 4-8
- using 2-15
- Cluster Management
- described 2-1
- displaying reports 4-26
- Cluster Manager
- displaying 2-17
- using 2-21
- Cluster View
- displaying 4-10
- using 2-19
- clusters
- creating 2-15, 4-6
- managing 2-35, 4-1, 4-11
- members
- adding and removing 4-7
- managing with CLI 2-26
- removing 4-9
- members, adding and removing 4-9
- command modes 2-24
- command switch 4-1
- and management 1-4
- and managing with SNMP 2-35
- defined 1-2
- enabling 3-12
- command-line error messages 2-29
- commands
- ? 2-27
- abbreviating 2-28
- copy running-config startup-config 2-31
- list of available 2-25
- no 2-28
- rcommand 2-26
- resetting to defaults 2-28
- show cluster 2-26
- community strings
- configuring 4-19
- entering 3-45
- SNMP 2-35, 4-6
- configuration
- conflicts, managing 3-5
- multiple port 4-15
- parameters, port 3-18
- saving cluster 4-4
- saving Flash memory 2-31
- single port 4-14
- SNMP illustrated 3-44
- startup, saving changes to 3-6
- configuration file, saving 3-31
- configuring
- broadcast messages 3-39
- CDP 3-59, 3-60
- community strings 4-19
- devices with Cluster Manager 2-21
- flooding controls 3-26
- Internet Explorer 2-4, 2-5
- IP information 3-40
- logging 3-78
- member switches 2-26
- Netscape Communicator 2-3
- NTP 3-38
- port parameters 3-19
- ports 3-11, 3-14, 3-16, 4-13
- SNMP 3-43, 4-19
- static addresses (EtherChannel) 3-54
- STP 3-65
- switch 3-13
- Telnet 2-30
- conflicts
- configuration 3-5
- during upgrade 3-34
- connecting to devices without autonegotiation 3-19
- connection information 3-9
- displaying 3-7
- connectivity, workgroup 1-6
- conventions
- command x
- Note and Caution xii
- text x
- copy running-config startup-config command 2-31
- creating
- clusters 4-2, 4-6
- VLANs 3-73
- Current Multicast Groups table 3-64
- CVSM
- accessing 3-11
- conflicts while upgrading 3-34
- home page 3-12, 3-13
- displayed 3-14
- displaying 2-20, 2-21
- date, setting 3-36
- daylight saving time 3-38
- defaults
- resetting to 2-28
- deployment examples 1-5
- destination-based forwarding 3-23
- destination-based port groups 3-21, 3-54
- device arrangement 4-22
- device reports
- displaying 2-21, 4-28
- illustrated 4-28, 4-29, 4-30
- documentation, related xi
- duplex settings 3-10, 3-16, 3-19, 3-20
- dynamic addresses 3-51, 3-66
- enable password 2-26
- enable secret password 2-26
- enabling
- broadcast storm control 3-29
- Fast Leave 3-62
- flow control 3-18
- network port 3-28
- NTP authentication 3-38
- Port Fast option 3-71
- port security 3-56, 3-58
- ports 3-16
- SNMP 3-43
- STP Port Fast 3-72
- Switch Port Analyzer (SPAN) 3-24
- traps 4-21
- Enterprise Edition Software
- features 1-2
- switches supported 1-2
- upgrading to 1-1
- error messages, understanding 2-29
- errors, graphing 4-23, 4-26
- EtherChannel port groups
- configuring static address for 3-54
- creating 3-21
- examples, deployment 1-5
- Fast EtherChannel port groups, creating 3-21
- Fast Leave, enabling 3-62, 3-63
- features
- conflicts between 2-23
- Enterprise Edition Software 1-2
- graphing 2-35
- IOS 1-1, 3-1
- management interface 2-1
- port, conflicting 3-5
- filenames, Flash memory 3-31
- files, Flash memory 2-31
- firmware, upgrading 3-31
- Flash memory
- saving configuration 2-31
- specifying filenames 3-31
- working with files in 2-31
- flooded traffic, reducing 3-30
- flooding controls
- configuring 3-26
- illustrated 3-27
- flooding, reducing 3-63
- flow control, enabling and disabling 3-18
- forwarding
- controlling (SNMP) 2-35
- restrictions 3-23
- source-based, illustrated 3-22
- forwarding map, static address 3-52, 3-53
- forwarding port groups 3-21
- FTP, accessing MIB files 2-32, 2-33
- get-next-request operation 2-34, 2-35
- get-request operation 2-34, 2-35
- get-response operation 2-35
- Gigabit Ethernet devices, connecting to 3-19
- Gigabit Ethernet port settings 3-19
- global configuration mode 2-25
- graph, bandwidth 2-21
- graphing features, enabling 2-35
- graphs, link utilization 4-22
- hardware
- supported 1-2
- help command 2-27
- hold time, modifying 3-63
- home page
- CVSM, displayed 3-14
- switch 3-12
- host name, entering 2-21
- HTTP 2-2
- incompatible features 3-5
- Index 1
- interface configuration mode 2-25
- interfaces
- IOS supported 1-4
- web-based 1-4
- Internet Explorer
- configuring 2-4, 2-5
- IOS
- command-line interface, accessing 1-4
- deployment examples 1-5
- features 1-1
- hardware supported 1-3
- interfaces supported 1-4
- switching features, changing 3-1
- IP address, discovering 3-47
- IP information
- assigning 3-42, 3-46
- configuring 3-40
- IP management packets, controlling 3-62
- IP Management, illustrated 3-41
- IP setup program 5-8, 5-10
- LEDs
- changing mode 2-21
- Cluster Manager 4-13
- monitoring 3-13
- visual stack colors 3-10
- line configuration mode 2-25
- link
- errors, graphing 4-26
- graph, illustrated 4-23
- utilization graphs 4-22
- link report
- displaying 4-26
- illustrated 4-27
- location, entering 2-21
- logging 3-78
- MAC address
- adding secure 3-51
- aging time 3-51
- discovering 3-47, 3-49
- tables, managing 3-49
- management interface features 2-1
- map
- static address forwarding 3-52, 3-53
- member switches
- defined 1-2, 4-1
- IP addresses 2-1
- messages 2-29
- MIB files
- accessing with CCO 2-33
- accessing with FTP 2-32, 2-33
- specific trap information 2-32
- MIB objects, accessing 2-32, 2-33
- MIB variables, accessing 2-34
- Microsoft Internet Explorer. See Internet Explorer
- mismatches, autonegotiation 5-1, 5-2
- modes, accessing command 2-24
- monitoring
- devices with Cluster Manager 2-21
- LEDs 3-13
- port status 3-10, 4-13
- ports 3-13, 3-24
- switch 3-13
- traffic 3-24
- multicast groups
- listing and removing 3-62
- removing 3-64
- multicast packets. See flooding controls
- multi-VLAN ports 3-74
- assigning to VLANs 3-77
- Network Management System (NMS) 2-34
- network port, enabling 3-28
- Network Time Protocol (NTP) 3-38
- Network View
- described 2-1
- displaying 3-7
- managing switches with 3-6
- page 3-8
- stack 3-6
- NMS 2-34
- Note described xii
- NTP 3-38, 3-39
- order, switch 4-21
- packets
- controlling management (CGMP) 3-62
- graphing 4-23, 4-25
- packets. See also traffic
- passwords
- candidate switch 4-4
- changing 3-12
- community strings 3-45
- configuring for Telnet 2-30
- recovery 5-4
- setting 2-26
- path cost 3-70
- PC requirements 2-2
- performance graph, displaying link 2-20
- polling interval 4-10
- Port Configuration page 3-17
- Port Fast
- enabling 3-71
- setting 3-16
- port groups
- configuring static addresses (EtherChannel) 3-54
- configuring static addresses for 3-54
- creating EtherChannel 3-21, 3-24
- destination based 3-54
- illustrated 3-23
- restrictions on forwarding 3-23
- source-based 3-54
- port status, monitoring 4-13
- ports
- assigning multi-VLAN 3-77
- assigning to VLANs 3-74
- configuration
- multiple 4-15
- single 4-14
- configuration parameters 3-18
- configuring 3-14, 3-16, 4-13
- configuring switch 3-11
- features, conflicting 3-5
- flooded traffic 3-30
- mismatches 5-2
- monitoring 3-13
- parameters, configuring 3-19
- secure 3-57
- secured 3-56
- security
- enabling 3-56
- enabling with CLI 3-58
- illustrated 3-57
- settings, correcting 5-3
- speed
- checking 3-10
- setting 3-16
- status, monitoring 3-10
- STP parameters, changing 3-70
- priority 3-70
- privileged EXEC mode 2-24
- Protocol 3-38
- publications, related xi
- rcommand 2-26
- recovery procedures 5-3
- redundancy 3-66
- reload options, system 3-32
- remote devices, connecting to 3-19
- reports
- displaying 4-26
- displaying device 2-21
- router hold time
- modifying 3-63
- router hold time, modifying 3-63
- saving
- cluster configuration 4-4
- configuration file 3-31
- layout of switch icons 2-17
- startup configuration changes 3-6
- secure address
- count, defining 3-57
- secure addresses
- adding 3-51, 3-52
- secure ports 3-56, 3-57
- security
- levels, defining 3-80
- port 3-56, 3-57
- violations, address 3-56
- set-request operation 2-34
- setting
- date and time 3-36
- passwords 2-26
- time 3-38
- settings
- configuring duplex 3-19
- correcting port 5-3
- displaying link 2-20
- setup program 5-8, 5-10
- SNMP
- accessing MIB variables with 2-34
- configuration, illustrated 3-44
- configuring 3-43, 4-19
- defined 2-34
- enabling and disabling 3-43
- management 2-32
- managing clusters with 2-35
- network management platforms 1-4
- SNMP Manager, illustrated 4-20
- software
- recovery procedures 5-3
- upgrading 3-31
- upgrading for groups of switches 4-16
- upgrading switch 3-33
- source-based forwarding 3-23
- source-based port groups 3-21, 3-54
- SPAN, enabling 3-24
- Spanning-Tree Protocol. See STP
- speed
- checking port 3-10
- setting 3-16, 3-20
- startup configuration, saving 3-6
- static access ports assigned to VLANs 3-74
- static address forwarding map 3-52, 3-53
- static address forwarding restrictions 3-23
- static addresses
- adding and removing 3-52, 3-54
- configuring for EtherChannel port groups 3-54
- status, monitoring port 3-10
- STP
- changing VLAN parameters 3-67
- configuring 3-65
- disabling 3-67
- illustrated 3-69, 3-71
- Port Fast option 3-71, 3-72
- port parameters, changing 3-70
- unpredictable behavior 3-76
- switch home page 3-12
- Switch Network View. See Network View
- switch order 4-21
- Switch Port Analyzer (SPAN)
- enabling 3-24
- illustrated 3-25
- syslog messages 3-80
- system configuration 3-32
- system date and time, setting 3-36
- system reload options, entering 3-32
- system-up time, entering 2-21
- Telnet
- configuring 2-30
- starting 2-30
- time
- daylight saving 3-38
- setting 3-36
- time zones 3-37
- traffic
- blocking flooded 3-30
- monitoring 3-24
- reducing flooded 3-26, 3-28
- trap information location 2-32
- trap managers, adding 3-45
- trap operation 2-35
- traps, enabling 4-21
- troubleshooting
- IOS 5-1
- with CiscoWorks 2-34
- unicast packets. See flooding controls
- UNIX workstation requirements 2-2
- upgrading
- conflicts while 3-34
- groups of switches 4-16
- member switches 4-18
- software with CLI 3-34
- switch software 3-31, 3-33
- to Enterprise Edition Software 1-1
- user EXEC mode 2-24
- user settings, changing 4-10
- utilization
- graphing 4-24
- utilization graphs 4-22
- visual stack
- described 3-6
- displaying 3-9
- VLAN database mode 2-25
- VLAN ID, discovering 3-47, 3-49
- VLANs
- aging dynamic addresses 3-66
- assigning ports to 3-74, 3-77
- assigning static-access ports to 3-74
- changing STP parameters 3-67
- creating and maintaining 3-73
- members, displaying 2-21
- membership
- ATM port 3-75
- displaying 4-15
- illustrated 3-75
- MIB 2-32
- overlapping 3-76
- web-based management features, using 2-2
- web-based management interfaces, preparing to use 2-2
- web-based management tools 2-1
- wiring closet aggregation 1-5
- workgroup connectivity 1-6







Posted: Wed May 26 10:46:37 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.