cc/td/doc/product/lan/c2900xl/29_35xp
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

A


accessing
Cluster Mangement     2-17
command modes     2-30
CVSM     2-8, 3-14
CVSM from visual stack     3-13
MIB files     2-39
MIB objects     2-38
MIB variables     2-39

address aging time     3-69

address count, secure     3-77

address management, illustrated     3-68

address resolution     3-64

address security violations     3-76

address table
aging time, configuring     3-69
dynamic entries, removing     3-70
MAC     3-66
secure addresses
adding     3-71
removing     3-71
secured port, defining     3-76
static addresses
adding     3-74
removing     3-75

addresses
dynamic
aging time     3-69
default aging     3-88
described     3-66
removing     3-70
secure
adding with CLI     3-71
described     3-70
removing with CLI     3-71
static
adding with CLI     3-74
configuring (EtherChannel)     3-73
described     3-72
removing with CLI     3-75

administrative information     4-25

aggregation
enterprise workgroup     1-7
small-to-medium business workgroup     1-9

aging time
changing address     3-69
defining     3-69

aging, accelerating     3-88

alarms, RMON     3-109

ARP table
address resolution     3-64
illustrated     3-65
managing     3-64

ATM ports
settings for     3-22
VLAN membership     3-102

authentication, enabling NTP     3-48

autonegotiation
connecting to devices without     3-22
mismatches     5-1, 5-2

B


bandwidth, graphing     2-26

Beginning     3-85

broadcast messages, configuring for     3-48

broadcast storm control
disabling     3-36
enabling     3-35

browsers
configuring
Internet Explorer     2-4
Netscape Communicator     2-4
supported versions     2-3

buttons
Cluster Builder     2-20
Cluster Management     2-17
Cluster Manager     2-27
Cluster View     2-23
CVSM     2-8, 2-10
Network View     2-14

bytes, graphing     4-38, 4-40

C


candidates
adding     4-2
automatically discovering     4-6
displaying     2-18
requirements     4-3

Caution described     xiv

CDP
configuring     3-79, 3-81
illustrated     3-80

CGMP
controlling management packets with     3-82
Fast Leave, disabling with CLI     3-84
Fast Leave, enabling with CLI     3-84
illustrated     3-83

Cisco Discovery Protocol. See CDP

Cisco Group Management Protocol. See CGMP

Cisco Systems access page     2-10

Cisco Visual Switch Manager. See CVSM

CiscoWorks     2-39

CLI
accessing     1-6
error messages     2-35
upgrading
1900 and 2820 member switches     4-30
2900 and 3500 member switches     4-29
single switches     3-42
using     2-29

Cluster Builder
adding and removing members     4-12
arranging and saving the device layout     4-16
automatic discovery of candidates     4-6
changing the host name     4-25
changing the polling interval     4-17
displaying port connection information     4-25
illustrated     4-13
saving configuration changes     4-20
Suggested Candidate window     4-6
using     2-18

Cluster Management
described     2-1, 4-1
using     2-16

Cluster Manager
administrative information     4-25
changing the host name     4-25
changing the polling interval     4-20
configuring ports     4-21
configuring SNMP     4-31
displaying     2-20, 2-23
displaying VLAN membership     4-26
monitoring port status     4-20
saving configuration changes     4-20
upgrading groups of switches     4-27
using     2-25

Cluster View
arranging and saving the device layout     4-16
displaying     4-14
saving configuration changes     4-20
using     2-22

clusters
community string changes     4-9
creating     2-18, 4-11
described     4-1
disqualification code     4-14
host name changes     4-8
management VLAN
changing on candidates     4-5
changing on existing clusters     4-4
guidelines before changing     3-55
requirements     3-54
managing     2-41, 4-1, 4-18
members
adding and removing with Cluster Builder     4-12
managing with CLI     2-33
removing with CLI     4-15
naming     3-16
password changes     4-10

command modes     2-30

command switch     4-1
and management     1-6
and managing with SNMP     2-41
configuration conflicts     5-12
defined     1-3
enabling     3-16, 4-11
recovering
from a failure     5-7
from lost member connectivity     5-12
replacing
with another switch     5-10
with cluster member     5-7

command-line error messages     2-35

commands
?     2-34
abbreviating     2-35
copy running-config startup-config     2-38
list of available     2-31
no     2-35
rcommand     2-33
resetting to defaults     2-35
show cluster     2-33

community strings
changes to     4-9
configuring     4-31
entering     3-61
SNMP     2-41, 4-9

configuration
conflicts, managing     3-7, 5-12
guidelines, port     3-22
multiple port     4-24
saving changes through Cluster Management     4-20
saving cluster     2-17, 4-20
saving to Flash memory     2-38
single port     4-22
SNMP, illustrated     3-60
startup, saving changes to     3-8

configuration file, saving     3-39

configuring
broadcast messages     3-48
CDP     3-79, 3-81
community strings     3-61, 4-31
devices with Cluster Manager     2-25
flooding controls     3-31
hello time     3-94
Internet Explorer     2-4, 2-6
IP information     3-49
logging     3-106
management VLAN
through console connection     3-55
through Telnet     3-56
member switches     2-33
Netscape Communicator     2-4
NTP     3-46
port parameters     3-22
ports
through Cluster Manager     4-21
through CVSM     3-17, 3-19
through visual stack     3-13
ports (Mode button)     2-11
preferences in Cluster Management     2-18
SNMP     3-59, 4-31
static addresses (EtherChannel)     3-73
STP     3-87
switch     3-16
Telnet     2-36
traps     3-61, 4-35

conflicts
configuration     3-7, 5-12
during upgrade     3-42

connecting to devices without autonegotiation     3-22

connection information
Cluster Builder information     4-25
displaying     2-13
switch network view information     3-11

conventions
command     xii
Note and Caution     xiv
text     xii

copy running-config startup-config command     2-38

creating
clusters     4-5, 4-11
VLANs     3-100

Current Multicast Groups table     3-86

CVSM
accessing     2-8
accessing the home page     3-14
buttons     2-8
conflicts while upgrading     3-42
home page, illustrated     3-15
menu options     2-11, 2-12
monitoring port settings     3-16
using     2-8

D


date, setting     3-44

daylight saving time     3-46

defaults, resetting to     2-35

deployment examples     1-7

destination-based forwarding     3-27

destination-based port groups     3-25, 3-73

device arrangement     4-37

device layout, arranging and saving     4-16

device reports
displaying     2-16, 4-42
illustrated
configuration information     4-43
port information     4-45
system information     4-44

disabling
broadcast storm control     3-36
CDP     3-79
CGMP Fast Leave     3-84
network port     3-34
port security     3-78
SNMP     3-60, 4-31
STP     3-88
Switch Port Analyzer     3-30

disqualification code for clusters     4-14

documentation, related     xiii

domain name
described     3-57
specifying     3-58

Domain Name System (DNS) server     3-57, 3-58

duplex
configuration guidelines     3-22
displaying with stack view     3-13
setting
with CLI     3-23
with Cluster Manager     4-21
with CVSM     3-19

dynamic addresses
accelerated aging     3-88
changing the aging time     3-69
removing     3-70

E


enable password     2-32

enable secret password     2-32

enabling
broadcast storm control     3-34, 3-35
CGMP Fast Leave     3-84
command switch     4-6, 4-11
flow control     3-21
network port     3-33
NTP authentication     3-48
port security     3-76, 3-78
ports     3-19
SNMP     3-60, 4-31
STP Port Fast     3-97
Switch Port Analyzer (SPAN)     3-28
traps     4-35

Enterprise Edition Software
features     1-3
upgrading to     1-1

enterprise workgroup aggregation     1-7

error messages     2-35

errors, graphing     4-38, 4-42

EtherChannel port groups
configuring static address for     3-73
creating     3-25

Ethernet statistics, RMON     3-109

events, RMON     3-109

examples, deployment     1-7

F


failures, command switch     5-7

Fast EtherChannel port groups, creating     3-25

Fast Leave
defined     3-82
disabling     3-84
enabling     3-84

features
Cluster Management interface     2-17
conflicts between     2-29
default settings     3-2
Enterprise Edition Software     1-3
graphing     2-41
IOS     1-2, 3-1
management interface     2-1
port, conflicting     3-7

filenames, Flash memory     3-39

files, Flash memory     2-37

firmware, upgrading     3-39

Flash memory
saving configuration     2-38
specifying filenames     3-39
working with files in     2-37

flooded traffic, reducing     3-36

flooding controls
configuring     3-31
illustrated     3-32

flow control
configuring with CLI     3-24
configuring with CVSM     3-21

forwarding
controlling (SNMP)     2-41
restrictions     3-27
resuming     3-37
source-based, illustrated     3-26

forwarding delay
changing     3-95
defined     3-90

forwarding map, static address     3-72, 3-73

forwarding port groups     3-25

FTP, accessing MIB files     2-39

G


get-next-request operation     2-40

get-request operation     2-40

get-response operation     2-40

Gigabit Ethernet
connecting to     3-22
port settings     3-22

global configuration mode     2-31

graphs
bandwidth     2-26
link utilization     4-37
percent utilization     4-40
prerequisites for     2-41
total bytes sent and received on link     4-40
total errors on link     4-42
total number of packets sent on link     4-41

H


hardware
PC requirements     2-2
supported switches     1-3

hello time
changing     3-94
configuring     3-94
defined     3-90

help command     2-34

history statistics, RMON     3-109

hold-time, modifying     3-85

home page
CVSM, displayed     3-15
switch     3-14

host name
changes to     4-8
changring     4-25
entering     2-26
to address mappings     3-57

HTML interfaces     1-5

HTTP     2-2

I


interface configuration mode     2-31

interface features, Cluster Mangement buttons     2-17

interfaces
IOS supported     1-5
web-based     1-5

Internet Explorer, configuring     2-4, 2-6

IOS
command-line interface, accessing     1-6
deployment examples     1-7
features     1-2
hardware supported     1-4
interfaces supported     1-5
switching features, changing     3-1

IP addresses
discovering     3-64
member switches     2-1
removing     3-53

IP information
assigning     3-52
configuring     3-49
management VLAN     3-55, 3-56
removing     3-53

IP management packets, controlling     3-82

IP Management, illustrated     3-50

IP setup program     5-8, 5-10

L


LEDs
changing mode     2-11, 2-25
Cluster Manager     4-20
monitoring     3-16, 3-17
visual stack colors     3-12

line configuration mode     2-31

link
errors, graphing     4-42
graph, illustrated     4-39
utilization graphs     4-37

link reports, displaying in Network View     2-13

live images
displaying in Cluster Manager     2-25
displaying in visual stack     2-14

location, entering     2-26, 4-25

logging     3-106

M


MAC address
adding secure     3-70
aging time     3-69
discovering     3-64, 3-67
tables, managing     3-66

management interface features     2-1

management VLAN
changing on candidate switches     4-5
changing on existing clusters     4-4
characteristics     3-54
cluster requirements     3-54
configuring
through console     3-55
through Telnet     3-56
guidelines before changing     3-55

map, static address forwarding     3-72

member switches
defined     1-3, 4-1
IP addresses     2-1
recovering from lost connectivity     5-12

messages     2-35

MIB files, accessing with FTP     2-39

MIB objects, accessing     2-38

MIB variables, accessing     2-39

Microsoft Internet Explorer. See Internet Explorer

mismatches, autonegotiation     5-1, 5-2

Mode button, configuring ports with     2-11

modes, accessing command     2-30

monitoring
devices with Cluster Manager     2-25
LEDs     3-16, 3-17
port status     3-12, 4-20
ports     3-16, 3-28
traffic     3-28

multicast groups
described     3-82
removing     3-86

multicast packets. See flooding controls

multi-VLAN ports
assigning to VLANs     3-104
described     3-102, 3-103

N


Network Management System (NMS)     2-39

network ports
disabling     3-34
enabling     3-33

Network Time Protocol. See NTP

Network View
buttons     2-14
described     2-1
displaying     3-9
managing switches with     3-8
page     3-10
stack     3-8
using     2-13

NMS     2-39

Note described     xiv

NTP
authentication     3-48
broadcast-client mode     3-48
client     3-47
described     3-46
illustrated     3-47

O


operating systems, supported     2-3

order, switch     4-37

P


packets
See also traffic
controlling management (CGMP)     3-82
graphing     4-38, 4-41

passwords
candidate switch     4-7
changes to     4-10
changing     3-14
community strings     3-61
configuring for Telnet     2-36
recovery     5-4
setting     2-32

path cost     3-96

PC requirements     2-2

polling interval
graphing     4-17
port status monitoring     4-20
setting     2-18

Port Configuration page     3-20

Port Fast
enabling     3-97
setting     3-19

port groups
configuring static addresses (EtherChannel)     3-73
creating EtherChannel     3-25, 3-27
destination based     3-73
illustrated     3-26
restrictions on forwarding     3-27
source-based     3-73

port security     3-78

port settings, displaying     2-14

port status, monitoring     4-20

ports
assigning multi-VLAN     3-104
assigning to VLANs     3-102
configuration
multiple     4-24
single     4-22
configuration guidelines     3-22
configuring     3-17
through Cluster Manager     4-21
through CVSM     3-19
through visual stack     3-13
configuring (Mode button)     2-11, 4-20
connection information, displaying     3-11
duplex
checking     3-21
setting     3-13, 3-21
features, conflicting     3-7
flooded traffic     3-37
mismatches     5-2
monitoring     3-16, 4-20
parameters, configuring     3-22
resume normal forwarding     3-37
secure     3-77
secured     3-76
security
described     3-76
disabling     3-78
enabling     3-78
illustrated     3-77
settings
correcting     5-3
displaying     3-20, 4-23
speed
checking through Cluster Manager     4-22
checking through CVSM     3-21
checking through visual stack     3-13
setting through Cluster Manager     4-22
setting through CVSM     3-21
setting through visual stack     3-19
status, monitoring     3-12, 4-20
STP parameters, changing     3-95

portsconnection information, displaying     4-25

priority     3-96

privilege levels
mapping on member switches     4-10
setting     2-32

privileged EXEC mode     2-30

publications, related     xiii

R


rcommand     2-33

recovery procedures     5-3

redundancy     3-88

reload options, system     3-40

remote devices, connecting to     3-22

remote monitoring     3-109

reports
device     2-13, 4-42
link     2-13, 2-16

RMON     3-109

router hold-time, modifying     3-85

S


saving
cluster configuration     2-17, 4-20
configuration file     3-39
layout of switch icons     2-20, 2-23
startup configuration changes     3-8

secure address count, defining     3-77

secure addresses
adding     3-70, 3-71
removing     3-71

secure ports     3-76
address-security violations     3-76
disabling     3-78
enabling     3-78
maximum secure address count     3-77

security
levels, defining     3-107
port     3-76, 3-77
violations, address     3-76

set-request operation     2-40

setting
date and time     3-44
passwords     2-32
privilege levels     2-32
time     3-46

settings
configuring duplex     3-22
correcting port     5-3
port, displaying     2-14, 2-25

setup program     5-8, 5-10

small-to-medium business workgroup aggregation     1-9

SNMP
accessing MIB variables with     2-39
changes to community strings     4-9
configuration, illustrated     3-60
configuring community strings
member switches     4-31
single switch     3-61
configuring on
cluster members     4-31
single switch     3-59
configuring traps
member switches     4-35
single switch     3-61
defined     2-39
enabling and disabling     3-60, 4-31
management     2-38
managing clusters with     2-41
network management platforms     1-6
trap types
in Cluster Manager     4-35, 4-36
in CVSM     3-62

SNMP Manager, illustrated     4-33

software
recovery procedures     5-3
upgrading
a single switch     3-39
groups of switches     4-27
with CLI     3-42
with CVSM     3-41

source-based forwarding     3-27

source-based port groups     3-25, 3-73

SPAN
described     3-28
disabling with CLI     3-30
enabling with CLI     3-30

Spanning-Tree Protocol. See STP

speed
checking port     3-13, 4-20
setting     3-23, 4-22

startup configuration, saving     3-8

static address
forwarding map     3-72, 3-73
forwarding restrictions     3-27

static addresses
adding     3-74
configuring for EtherChannel port groups     3-73
described     3-72
removing     3-75

static-access ports
assigning to VLANs     3-103
described     3-102

statistics, RMON     3-109

status, monitoring port
with Cluster Manager     4-20
with CVSM     3-16
with stack view     3-12

STP
BPDU message interval     3-93
described     3-87
disabling     3-88
enabling Port Fast feature     3-97
forwarding delay timer     3-95
hello BPDU intervaI     3-94
illustrated     3-91, 3-97
implementation type     3-92
number of supported instances     3-101
path cost     3-98
port parameters, changing     3-95
port priority     3-99
redundant connectivity     3-88
switch priority     3-92
unpredictable behavior     3-104
VLAN parameters described     3-89

STP Port Fast     3-97

Suggested Candidate window     4-6

switch home page     3-14

Switch Network View. See Network View

switch order     4-37

Switch Port Analyzer (SPAN)
disabling     3-30
enabling     3-28
illustrated     3-29

syslog messages     3-107

system
configuration     3-40
date and time, setting     3-44
reload options, entering     3-40
up time, displaying     2-26

T


Telnet
configuring     2-36
connections to cluster members     2-33
starting     2-37

time
daylight saving     3-46
setting     3-44

time zones     3-45

traffic
blocking flooded     3-36, 3-37
monitoring     3-28
reducing flooded     3-31, 3-33

trap managers, adding     3-61, 3-63

trap operation     2-40

traps, enabling     4-35

troubleshooting
IOS     5-1
with CiscoWorks     2-39

U


unicast packets. See flooding controls

UNIX workstation requirements     2-2

upgrading
1900 and 2820 member switches     4-30
2900 and 3500 member switches     4-29
conflicts while     3-42
groups of switches     4-27
software with CLI     3-42
software with CVSM     3-41
to Enterprise Edition Software     1-1

user EXEC mode     2-30

user settings     2-18, 4-17

utilization graphs     4-37

V


visual stack
accessing CVSM     3-13
described     3-8
displaying     3-11

VLAN database mode     2-31

VLAN ID, discovering     3-64, 3-67

VLANs
See also management VLAN
aging dynamic addresses     3-88
changing STP parameters     3-89
creating and maintaining     3-100
described     3-101
membership
ATM port     3-102
displaying     2-26, 4-26
illustrated     3-100
multi-VLAN ports
assigning     3-104
defined     3-102
number supported     3-101
overlapping     3-103
static-access ports
assigning     3-103
defined     3-102

W


web-based management tools     2-1

web-based management, using     2-2

X


XMODEM protocol     5-3

hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Nov 5 07:50:22 PST 1999
Copyright 1989-1999©Cisco Systems Inc.