cc/td/doc/product/lan/c2900xl/29_35xu
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Managing Switches

Managing Switches

This chapter describes how to use the device-management features of the Cluster Management Suite (CMS). The features described in this chapter can all be implemented through Visual Switch Manager (VSM), the web-based interface for managing standalone switches, or through Cluster Manager. If you need information on how to group your switches into a cluster, see "Creating and Managing Clusters."

This chapter describes two ways to configure switches:

How-to procedures for using the windows are in the online help.
CLI procedures are included for many tasks in this chapter. There are some features that can only be implemented by using the CLI.

Finding More Information About IOS Commands

This guide describes only the use of IOS commands that have been created or changed for use with the 2900 and 3500 XL switches. These commands are further described in the Cisco IOS Desktop Switching Command Reference (online only).
For information on other IOS Release 12.0 commands, refer to the IOS documentation set available from the CCO home page by selecting Service and Support>Technical Documents>Documentation Home Page>Cisco IOS Software Configuration>Cisco IOS Release 12.0.

Managing Configuration Conflicts

Certain combinations of port features conflict with one another. For example, if you define a port as the network port for a VLAN, all unknown unicast and multicast traffic is flooded to the port. You could not enable port security on the network port because a secure port limits the traffic allowed on it. In Table 4-1, no means that the two referenced features are incompatible.

If you try to enable incompatible features by using CMS, CMS issues a warning message and prevents you from making the change. Redisplay the web page to refresh a CMS window.


Table 4-1: Conflicting Features
ATM Port1 Port Group Port Security SPAN Port Multi-VLAN Port Network Port Connect to Cluster? Private VLAN edge

ATM Port

-

No

No

No

No

No

Yes

No

Port Group

No

-

No

No

Yes

Yes2

Yes

Yes

Port Security

No

No

-

No

No

No

Yes

Yes

SPAN Port

No3

No

No

-

No

No

Yes

Yes

Multi-VLAN Port

No

Yes

No

No

-

Yes

Yes

Yes

Network Port

No

Yes (source-based only)

No

No

Yes

-

No4

Yes

Connect to Cluster

Yes

Yes

Yes

Yes

Yes

No

-

Yes

Private VLAN edge

No

Yes

Yes

Yes5

Yes

No

Yes

-

1Catalyst 2900 XL switches only.
2Cannot be in a destination-based port group.
3An ATM port cannot be a monitor port but can be monitored.
4Cannot connect cluster members to the command switch.
5SPAN can operate only if the monitor port or the port being monitored is not a private VLAN edge port.

Features, Default Settings, and Descriptions

You can configure the software features of this release by using any of the available interfaces. Table 4-2 lists the most important features, their defaults, and where they are described in this guide.


Table 4-2: Default Settings and Where To Change Them
Feature Default Setting Location of Feature and Feature Description Equivalent IOS CLI Procedure
Network Management

Creating clusters

None

Cluster Builder

"Creating Clusters" section

"CLI: Creating a Cluster" section

Removing cluster members

None

Cluster Builder

"Adding and Removing Member Switches" section

"CLI: Removing a Member from a Cluster" section

Upgrading cluster software

Enabled

Cluster Manager: System>Software Upgrade

"Upgrading Switch Software" section

"Upgrading Switch Software" section

Displaying graphs

Enabled

Cluster Manager and Cluster Builder

"Displaying Link Graphs" section

-

Configuring SNMP community strings and trap managers

None

Cluster Manager: System>SNMP Management

"Configuring SNMP" section

-

Configuring a port

None

Cluster Manager

"Monitoring and Configuring Ports" section

"Configuring Ports" section

Device Management

Switch IP address, subnet mask, and default gateway

0.0.0.0

Cluster Manager: System>IP Management

"Configuring IP Information" section

"CLI: Assigning IP Information to the Switch" section

Management VLAN

VLAN 1

Cluster Manager: Cluster>Management VLAN

"Changing the Management VLAN" section

"Changing the Management VLAN" section

Domain name

None

Cluster Manager: System>IP Management

"Specifying a Domain Name and Configuring the DNS" section

Documentation set for Cisco IOS Release 12.0 on CCO

Cisco Discovery Protocol (CDP)

Enabled

-

Documentation set for Cisco IOS Release 12.0 on CCO

Address Resolution Protocol (ARP)

Enabled

Cluster Manager: System>ARP Table

"Managing the ARP Table" section

Documentation set for Cisco IOS Release 12.0 on CCO

System Time Management

None

Cluster Manager: Cluster>System Time Management

"Setting the System Date and Time" section

Documentation set for Cisco IOS Release 12.0 on CCO

Static address assignment

None assigned

Cluster Manager: Security>Address Management

"Adding and Removing Static Addresses" section

"CLI: Adding Static Addresses" section

Dynamic address management

Enabled

Cluster Manager: Security>Address Management

"Managing the MAC Address Tables" section and "Changing the Address Aging Time" section

"CLI: Configuring the Aging Time" section

"CLI: Removing Dynamic Address Entries" section

Voice configuration

"Configuring Voice Ports" section

"CLI: Configuring a Port to Connect to a Cisco 7960 IP Phone" section

"CLI: Configuring Inline Power on a Catalyst 3524-PWR Switch" section

"CLI: Overriding the CoS Priority of Incoming Frames" section

VLAN membership

Static-
access ports in VLAN 1

Cluster Manager: VLAN>VLAN Membership

"Displaying VLAN Membership" section

"Assigning Static-Access Ports to a VLAN" section

"CLI: Configuring a Trunk Port" section

"CLI: Assigning Static-Access Ports to a VLAN" section

"CLI: Configuring a Trunk Port" section

VMPS Configuration

-

Cluster Manager: Cluster>VMPS Configuration

"Configuring Dynamic VLAN Membership" section

"CLI: Entering the IP Address of the VMPS" section

"CLI: Configuring Dynamic Ports on VMPS Clients" section

"CLI: Reconfirming VLAN Memberships" section

"CLI: Changing the Reconfirmation Interval" section

VTP Management

VTP server mode

Cluster Manager: VLAN>VTP Management

"Configuring VTP" section

"CLI: Configuring VTP Server Mode" section

Performance

Autonegotiation of duplex mode and port speeds

Enabled

Cluster Manager: Port>Port Configuration

"Monitoring and Configuring Ports" section

"CLI: Setting Speed and Duplex Parameters" section

Gigabit Ethernet flow control

Any

Cluster Manager: Port>Port Configuration

"Configuring Ports" section

"CLI: Configuring Flow Control on Gigabit Ethernet Ports" section

Flooding Control

Storm control

Disabled

Cluster Manager: Port>Flooding Control

"Configuring Flooding Controls" section

"CLI: Enabling Storm Control" section

Flooding unknown unicast and multicast packets

Enabled

Cluster Manager: Port>Flooding Control

"Configuring Flooding Controls" section

"CLI: Blocking Flooded Traffic on a Port" section

Cisco Group Management Protocol (CGMP)

Enabled

Cluster Manager: Device>Cisco Group Management Protocol

"Controlling IP Multicast Packets through CGMP" section

"CLI: Enabling the CGMP Fast Leave Feature" section

"CLI: Changing the CGMP Router Hold-Time" section

"CLI: Removing Multicast Groups" section

Network Port

Disabled

-

"CLI: Enabling a Network Port" section

Network Redundancy

Hot Standby Router Protocol

Disabled

"Building a Redundant Cluster" section

"CLI: Creating a Standby Group" section

"CLI: Adding Member Switches to a Standby Group" section

"CLI: Removing a Switch from a Standby Group" section

Spanning Tree Protocol

Enabled

Cluster Manager: Device>Spanning Tree Protocol

"Configuring the Spanning Tree Protocol" section

"CLI: Disabling STP" section

"CLI: Changing the Path Cost" section

"CLI: Changing the Port Priority" section

"CLI: Enabling STP Port Fast" section

"CLI: Configuring STP Root Guard" section

Unidirectional link detection

-

"CLI: Configuring UniDirectional Link Detection" section

Port grouping

None assigned

Cluster Manager: Port>Port Grouping (EC)

"Creating EtherChannel Port Groups" section

"CLI: Creating EtherChannel Port Groups" section

Diagnostics

SPAN port monitoring

Disabled

Cluster Manager: Port>Switch Port Analyzer (SPAN)

"Enabling Switch Port Analyzer" section

"CLI: Enabling Switch Port Analyzer" section

Console, buffer, and file logging

Disabled

-

Documentation set for Cisco IOS Release 12.0 on CCO

Remote monitoring (RMON)

Disabled

-

Documentation set for Cisco IOS Release 12.0 on CCO

Security

Password

None

"Changing the Password" section

"Recovering from a Lost or Forgotten Password" section

Addressing security

Disabled

Cluster Manager: Security>Address Management

"Adding Secure Addresses" section

"CLI: Adding Secure Addresses" section

Trap manager

0.0.0.0

Cluster Manager: System>SNMP Management

"CLI: Adding a Trap Manager" section

"CLI: Adding a Trap Manager" section

Community strings

public

Cluster Manager: System>SNMP Configuration

"Entering Community Strings" section

Documentation set for Cisco IOS Release 12.0 on CCO

Port security

Disabled

Cluster Manager: Security>Port Security

"Enabling Port Security" section

"CLI: Enabling Port Security" section

TACACS+

Disabled

"Configuring TACACS+" section

"CLI Procedures for Configuring TACACS+" section

Private VLAN edge

Disabled

-

"CLI: Configuring Private VLAN Edge Ports" section

Configuring Standalone Switches

Visual Switch Manager (VSM) is one of the CMS interfaces for managing individual switch features. If you are configuring a standalone switch, you can access VSM directly by entering the switch IP address in the browser Location field (Netscape Communicator) or Address field (Internet Explorer). Click Cluster Management Suite or Visual Switch Manager on the Cisco Systems Access Page, and the switch senses that the IP address refers to a standalone switch and displays the VSM home page.


Note Menu options are arranged slightly differently in VSM than in Cluster Manager. For the complete list of the options available, see "VSM Menu Bar Options" section.

A browser plug-in is required to access the HTML interface. See the "Installing the Required Plug-In" section for more information.


Figure 4-1: VSM Home Page


Enabling the Switch as a Command Switch

Before you can create a cluster, one switch must be assigned an IP address and enabled as the command switch. See the "Command Switch Requirements" section to ensure that the switch meets all the requirements.

To enable a command switch, select Cluster>Cluster Command Configuration from the menu bar, and select Enable on the Cluster Configuration window. You can use up to 28 characters to name your cluster. After you have enabled the command switch, select Cluster>Cluster Builder to begin building your cluster. To build your cluster by using the CLI, see the "CLI: Creating a Cluster" section.


Figure 4-2: Enable Command Switch


Changing the Password

If you change the enable secret password, your connection with the switch breaks, and the browser prompts you for the new password. You can only change a password by using the CLI. If you have forgotten your password, see the "Recovering from a Lost or Forgotten Password" section.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Creating EtherChannel Port Groups

Use the Port Group (EtherChannel) window (Figure 4-4) to create Fast EtherChannel and Gigabit EtherChannel port groups. These port groups act as single logical ports for high-bandwidth connections between switches or between switches and servers.


Note You can create port groups of either Gigabit Ethernet ports or 100BaseTX ports, but you cannot create a port group that contains both port speeds at the same time.

To display this window, select Port>Port Grouping (EtherChannel) from the menu bar.

For the restrictions that apply to port groups, see the "Managing Configuration Conflicts" section.

Understanding EtherChannel Port Grouping

This software release supports two different types of port groups: source-based forwarding port groups and destination-based forwarding port groups.

Source-based forwarding port groups distribute packets forwarded to the group based on the source address of incoming packets. You can configure up to eight ports in a source-based forwarding port group. Source-based forwarding is enabled by default.

Destination-based port groups distribute packets forwarded to the group based on the destination address of incoming packets. You can configure an unlimited number of ports in a destination-based port group.

You can create up to 12 port groups of all source-based, all destination-based, or a combination of source- and destination-based ports. All ports in the group must be of the same type; for example, they must be all source based or all destination based. You can independently configure port groups that link switches, but you must consistently configure both ends of a port group.

In Figure 4-3, a port group of two workstations communicates with a router. Because the router is a single-MAC address device, source-based forwarding ensures that the switch uses all available bandwidth to the router. The router is configured for destination-based forwarding because the large number of stations ensures that the traffic is evenly distributed through the port-group ports on the router.


Figure 4-3: Source-Based Forwarding


The switch treats the port group as a single logical port; therefore, when you create a port group, the switch uses the configuration of the first port for all ports added to the group. If you add a port and change the forwarding method, it changes the forwarding for all ports in the group. After the group is created, changing STP or VLAN membership parameters for one port in the group automatically changes the parameters for all ports. Each port group has one port that carries all unknown multicast, broadcast, and STP packets.


Figure 4-4: Port
Grouping (EtherChannel)



Figure 4-5:
Port Group Configuration


Port Group Restrictions on Static-Address Forwarding

The following restrictions apply to entering static addresses that are forwarded to port groups:

CLI: Creating EtherChannel Port Groups

Beginning in privileged EXEC mode, follow these steps to create a two-port group:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port of the first port to be added to the group.

Step 3

port group 1 distribution destination

Assign the port to group 1 with destination-based forwarding.

Step 4

interface interface

Enter the second port to be added to the group.

Step 5

port group 1 distribution destination

Assign the port to group 1 with destination-based forwarding.

Step 6

end

Return to privileged EXEC mode.

Step 7

show running-config

Verify your entries.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Enabling Switch Port Analyzer

You can monitor traffic on a given port by forwarding incoming and outgoing traffic on the port to another port in the same VLAN. Use the Switch Port Analyzer (SPAN) window (Figure 4-6) to enable port monitoring on a port, and use the Modify the Ports Being Monitored window (Figure 4-7) to select the ports to be monitored. A SPAN port cannot monitor ports in a different VLAN, and a SPAN port must be a static-access port. Any number of ports can be defined as SPAN ports, and any combination of ports can be monitored.

To display this window, select Port>Switch Port Analyzer from the menu bar.

For the restrictions that apply to SPAN ports, see the "Managing Configuration Conflicts" section.


Figure 4-6: Switch Port Analyzer (SPAN)



Figure 4-7:
Modify the Ports Being Monitored


CLI: Enabling Switch Port Analyzer

Beginning in privileged EXEC mode, follow these steps to enable switch port analyzer:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port that acts as the monitor port.

Step 3

port monitor interface

Enable port monitoring on the port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entries.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Disabling Switch Port Analyzer

Beginning in privileged EXEC mode, follow these steps to disable switch port analyzer:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port number of the monitor port.

Step 3

no port monitor interface

Disable port monitoring on the port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entries.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Configuring Flooding Controls

Use the Flooding Controls window (Figure 4-8) to block the forwarding of unnecessary flooded traffic. You can use three flooding techniques:

To display this window, select Port>Flooding Controls from the menu bar.

Enabling Storm Control

A packet storm occurs when a large number of broadcast, unicast, or multicast packets are received on a port. Forwarding these packets can cause the network to slow down or to time out. Storm control is configured for the switch as a whole but operates on a per-port basis. By default, storm control is disabled.

Storm control uses high and low thresholds to block and then restore the forwarding of broadcast, unicast, or multicast packets. You can also set the switch to shut down the port when the rising threshold is reached.

The rising threshold is the number of packets that a switch port can receive before forwarding is blocked. The falling threshold is the number of packets below which the switch resumes normal forwarding. In general, the higher the threshold, the less effective the protection against broadcast storms. The maximum half-duplex transmission on a 100BaseT link is 148,000 packets per second, but you can enter a threshold of up to 4294967295 broadcast packets per second.

To configure storm control, right-click a switch chassis in Cluster Manager, and select Port>Flooding Controls. Select one of the Storm tabs (Figure 4-8), select a port, and click Modify. Set the parameters on the Flooding Controls Configuration pop-up (Figure 4-9).


Figure 4-8: Flooding Controls



Figure 4-9:
Flooding Controls Configuration Pop-up


CLI: Enabling Storm Control

With the exception of the broadcast keyword, the following procedure could also be used to enable storm control for unicast or multicast packets.

Beginning in privileged EXEC mode, follow these steps to enable broadcast-storm control.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3

port storm-control broadcast [threshold {rising rising-number falling falling-number}]

Enter the rising and falling thresholds for broadcast packets.

Make sure the rising threshold is greater than the falling threshold.

Step 4

port storm-control trap

Generate an SNMP trap when the traffic on the port crosses the rising or falling threshold.

Step 5

end

Return to privileged EXEC mode.

Step 6

show port storm-control [interface]

Verify your entries.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Disabling Storm Control

Beginning in privileged EXEC mode, follow these steps to disable broadcast-storm control.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3

no port storm-control broadcast

Disable port storm control.

Step 4

end

Return to privileged EXEC mode.

Step 5

show port storm-control [interface]

Verify your entries.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Blocking Flooded Traffic on a Port

By default, the switch floods packets with unknown destination MAC addresses to all ports. Some configurations do not require flooding. For example, a port that has only manually assigned addresses has no unknown destinations, and flooding serves no purpose. Therefore, you can disable the flooding of unicast and multicast packets on a per-port basis. Ordinarily, flooded traffic does not cross VLAN boundaries, but multi-VLAN ports flood traffic to all VLANs they belong to.

To block flooded traffic, select the Unknown MACs tab on the Flooding Control window to display the Flooding Controls Configuration pop-up (Figure 4-10).


Figure 4-10: Flooding Controls Configuration Pop-up


CLI: Blocking Flooded Traffic on a Port

Beginning in privileged EXEC mode, follow these steps to disable the flooding of multicast and unicast packets to a port:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3

port block multicast

Block multicast forwarding to the port.

Step 4

port block unicast

Block unicast flooding to the port.

Step 5

end

Return to privileged EXEC mode.

Step 6

show port block {multicast | unicast} interface

Verify your entries, entering the appropriate command once for the multicast option and once for the unicast option.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Resuming Normal Forwarding on a Port

Beginning in privileged EXEC mode, follow these steps to resume normal forwarding on a port:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3

no port block multicast

Enable multicast forwarding to the port.

Step 4

no port block unicast

Enable unicast flooding to the port.

Step 5

end

Return to privileged EXEC mode

Step 6

show port block {multicast | unicast} interface

Verify your entries, entering the appropriate command once for the multicast option and once for the unicast option.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Enabling a Network Port

Network ports are assigned per VLAN and can reduce flooded traffic on your network. The switch forwards all traffic with unknown destination addresses to the network port instead of flooding the traffic to all ports in the VLAN.

When you configure a port as the network port, the switch deletes all associated addresses from the address table and disables learning on the port. If you configure other ports in the VLAN as secure ports, the addresses on those ports are not aged. If you move a network port to a VLAN without a network port, it becomes the network port for the new VLAN.

You cannot change the settings for unicast and multicast flooding on a network port. You can assign only one network port per VLAN. For the restrictions that apply to a network port, see the "Managing Configuration Conflicts" section.


Caution Do not attempt to connect cluster members through a network port. A network port cannot link cluster members.

CLI: Enabling a Network Port

Beginning in privileged EXEC mode, follow these steps to define a network port:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

port network

Define the port as the network port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Disabling a Network Port

Beginning in privileged EXEC mode, follow these steps to disable a network port:
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

no port network

Disable the port as the network port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Managing the System Date and Time

Use the System Time Management window (Figure 4-11) to set the system time for a switch or enable an external source such as Network Time Protocol (NTP) to supply time to the switch.

You can use this window to set the switch time by using one of the following techniques:

To display this window, select Cluster>System Time Management from the menu bar.

Setting the System Date and Time

Enter the date and a 24-hour clock time setting on the System Time Management window. If you are entering the time for an American time zone, enter the three-letter abbreviation for the time zone in the Name of Time Zone field, such as PST for Pacific standard time. If you are identifying the time zone by referring to Greenwich mean time, enter UTC (universal coordinated time) in the Name of Time Zone field. You then must enter a negative or positive number as an offset to indicate the number of time zones between the switch and Greenwich, England. Enter a negative number if the switch is west of Greenwich, England, and east of the international date line. For example, California is eight time zones west of Greenwich, so you would enter -8 in the Hours Offset From UTC field. Enter a positive number if the switch is east of Greenwich. You can also enter negative and positive numbers for minutes.

You can also set the date and time by using the CLI. "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.


Figure 4-11: System Time Management


Configuring Daylight Saving Time

To configure daylight saving time, click the Set Daylight Saving Time tab (Figure 4-12). You can configure the switch to change to daylight saving time on a particular day every year, on a day that you enter, or not at all.


Figure 4-12: Set Daylight Savings Time Tab


Configuring the Network Time Protocol

In complex networks, it is often prudent to distribute time information from a central server. The NTP can distribute time information by responding to requests from clients or by broadcasting time information. You can use the Network Time Protocol window (Figure 4-13) to enable these options and to enter authentication information to accompany NTP client requests.

To display this window, click Network Time Protocol on the System Time Management window.

You can also configure NTP by using the CLI. "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.


Figure 4-13: Network Time Protocol


Configuring the Switch as an NTP Client

You configure the switch as an NTP client by entering the IP addresses of up to ten NTP servers in the IP Address field. Click Preferred Server to specify which server should be used first. You can also enter an authentication key to be used as a password when requests for time information are sent to the server.

Enabling NTP Authentication

To ensure the validity of information received from NTP servers, you can authenticate NTP messages with public-key encryption. This procedure must be coordinated with the administrator of the NTP servers: the information you enter on this window will be matched by the servers to authenticate it.

Click Help for more information about entering information in the Key Number, Key Value, and Encryption Type fields.

Configuring the Switch for NTP Broadcast-Client Mode

You can configure the switch to receive NTP broadcast messages if there is an NTP broadcast server, such as a router, broadcasting time information on the network. You can also enter a delay in the Estimated Round-Trip Delay field to account for round-trip delay between the client and the NTP broadcast server.

Configuring IP Information

Use the IP Management window (Figure 4-14) to change or enter IP information for the switch. Some of this information, such as the IP address was previously entered.

You can use this window to perform the following tasks:

To display this window, select System>IP Management from the menu bar.


Figure 4-14: IP Management - IP Configuration Tab


Assigning IP Information to the Switch

You can use a BOOTP server to automatically assign IP information to the switch; however, the BOOTP server must be set up in advance with a database of physical MAC addresses and corresponding IP addresses, subnet masks, and default gateway addresses. In addition, the switch must be able to access the BOOTP server through one of its ports. At startup a switch without an IP address requests the information from the BOOTP server; the requested information is saved in the switch running configuration file. To ensure that the IP information is saved when the switch is restarted, select System>Save Configuration from the menu bar. If you are using the CLI, save the configuration by entering the write memory command in privileged EXEC mode.

You can also manually assign an IP address, mask, and default gateway to the switch through the management console. This information is displayed in the IP Address, IP Mask, and Default Gateway fields of the IP Management window.

You can change the information in these fields. The mask identifies the bits that denote the network number in the IP address. When you use the mask to subnet a network, the mask is then referred to as a subnet mask. The broadcast address is reserved for sending messages to all hosts. The CPU sends traffic to an unknown IP address through the default gateway.


Caution Changing the command switch IP address on this window ends your VSM session and any SNMP or Telnet sessions in progress. Restart the Cluster Manager by entering the new IP address in the browser Location field (Netscape Communicator) or Address field (Internet Explorer), as described in the "Using VSM" section.

CLI: Assigning IP Information to the Switch

Beginning in privileged EXEC mode, follow these steps to enter the IP information:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface vlan 1

Enter interface configuration mode, and enter the VLAN to which the IP information is assigned.
VLAN 1 is the management VLAN, but you can configure any VLAN from IDs 1 to 1001.

Step 3

ip address ip_address subnet_mask

Enter the IP address and subnet mask.

Step 4

exit

Return to global configuration mode.

Step 5

ip default-gateway ip_address

Enter the IP address of the default router.

Step 6

end

Return to privileged EXEC mode.

Step 7

show running-config

Verify that the information was entered correctly by displaying the running configuration. If the information is incorrect, repeat the procedure.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Removing an IP Address

Use the following procedure to remove the IP information from a switch.


Note Using the no ip address command in configuration mode disables the IP protocol stack as well as removes the IP information. Cluster members without IP addresses rely on the IP protocol stack being enabled.

Beginning in privileged EXEC mode, follow these steps to remove an IP address:

Command Purpose

Step 1

clear ip address vlan 1 ip_address subnet_mask

Remove the IP address and subnet mask.

Step 2

end

Return to privileged EXEC mode.

Step 3

show running-config

Verify that the information was removed by displaying the running configuration.


Caution If you are removing the IP address through a Telnet session, your connection to the switch will be lost.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Specifying a Domain Name and Configuring the DNS

Each unique Internet Protocol (IP) address can have a host name associated with it. The IOS software maintains a cache of host name-to-address mappings for use by the EXEC mode connect, telnet, ping, and related Telnet support operations. This cache speeds the process of converting names to addresses.

IP defines a hierarchical naming scheme that allows a device to be identified by its location or domain. Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco Systems is a commercial organization that IP identifies by a com domain name, so its domain name is cisco.com. A specific device in this domain, the File Transfer Protocol (FTP) system for example, is identified as ftp.cisco.com.

To keep track of domain names, IP has defined the concept of a domain name server (DNS), whose job is to hold a cache (or database) of names mapped to IP addresses. To map domain names to IP addresses, you must first identify the host names and then specify a name server and enable the DNS, the Internet's global naming scheme that uniquely identifies network devices.


Figure 4-15:
DNS Configuration


Specifying the Domain Name

You can specify a default domain name that the software uses to complete domain name requests. You can specify either a single domain name or a list of domain names. When you specify a domain name, any IP host name without a domain name will have that domain name appended to it before being added to the host table.

To specify a domain name, enter the name into the Domain Name field of the IP Configuration tab of the IP Management window (Figure 4-15), and click OK. Do not include the initial period that separates an unqualified name (names without a dotted-decimal domain name) from the domain name.

You can also configure the DNS name by using the CLI. The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Specifying a Name Server

You can specify up to six hosts that can function as a name server to supply name information for the DNS. Enter the IP address into the New Server field, and click Add.

Enabling the DNS

If your network devices require connectivity with devices in networks for which you do not control name assignment, you can assign device names that uniquely identify your devices within the entire internetwork. The Internet's global naming scheme, the DNS, accomplishes this task. This service is enabled by default.

Configuring SNMP

Use the SNMP Management window (Figure 4-16) to configure your switch for SNMP management. If your switch is part of a cluster, the clustering software can change SNMP parameters (such as host names) when the cluster is created. If you are configuring a cluster for SNMP, see the "Configuring SNMP for a Cluster" section.

You can use this window to perform the following tasks:

To display this window, select System>SNMP Configuration from the menu bar.

Disabling and Enabling SNMP

SNMP is enabled by default and must be enabled for Cluster Management features to work properly. If you deselect Enable SNMP and click Apply, SNMP is disabled, and the SNMP parameters are disabled. For information on SNMP and Cluster Management, see "Managing Cluster Switches Through SNMP" section.

SNMP is always enabled for 1900 and 2820 switches.

Entering Community Strings

Community strings serve as passwords for SNMP messages to permit access to the agent on the switch. If you are entering community strings for a cluster member, see the "Configuring Community Strings for Cluster Switches" section. You can enter community strings with the following characteristics:

Read-only (RO)

Requests accompanied by the string can display MIB-object information.

Read-write (RW)

Requests accompanied by the string can display MIB-object information and set MIB objects.

Use the Community Strings tab (Figure 4-17) to add and remove community strings. You can also use the CLI to configure SNMP community strings. The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.


Figure 4-16: SNMP Management - System Options



Figure 4-17:
SNMP Configuration - Community Strings


Adding Trap Managers

A trap manager is a management station that receives and processes traps. When you configure a trap manager, community strings for each member switch must be unique. If a member switch has an IP address assigned to it, the management station accesses the switch by using its assigned IP address. Use the Trap Managers tab (Figure 4-18) to configure trap managers and enter trap manager community strings.

By default, no trap manager is defined, and no traps are issued. Select a check box to enable one of the following classes of traps:

Config

Generate traps whenever the switch configuration changes.

SNMP

Generate the supported SNMP traps.

TTY

Generate traps when the switch starts a management console CLI session.

VLAN membership

Generate a trap for each VLAN Membership Policy Server (VMPS) change.

VTP

Generate a trap for each VLAN Trunk Protocol (VTP) change.

C2900/C3500

Generate the switch-specific traps. These traps are in the private enterprise-specific MIB.


Figure 4-18: SNMP Management - Trap Managers


CLI: Adding a Trap Manager

Beginning in privileged EXEC mode, follow these steps to add a trap manager and community string:

Command Purpose

Step 1

config terminal

Enter global configuration mode.

Step 2

snmp-server host 172.2.128.263 traps1 snmp vlan-membership

Enter the trap manager IP address, community string, and the traps to generate.

Step 3

end

Return to privileged EXEC mode.

Step 4

show running-config

Verify that the information was entered correctly by displaying the running configuration.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Managing the ARP Table

To communicate with a device (on Ethernet, for example), the software first must determine the 48-bit MAC or local data link address of that device. The process of determining the local data link address from an IP address is called address resolution.

The Address Resolution Protocol (ARP) associates a host IP address with the corresponding media or MAC addresses and VLAN ID. Taking an IP address as input, ARP determines the associated MAC address. Once a MAC address is determined, the IP-MAC address association is stored in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame and sent over the network. Encapsulation of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP). By default, standard Ethernet-style ARP encapsulation (represented by the arpa keyword) is enabled on the IP interface.

Use the ARP Table window (Figure 4-19) to display the table and change the timeout value.

To display this window, select System>ARP Table from the menu bar. ARP entries added manually to the table do not age and must be manually removed.

You can manually add entries to the ARP Table by using the CLI; however, these entries do not age and must be manually removed. The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.


Figure 4-19: ARP Table


Managing the MAC Address Tables

Use the Address Management window (Figure 4-21) to manage the MAC address tables that the switch uses to forward traffic between ports. All MAC addresses in the address tables are associated with one or more ports. These MAC tables include the following types of addresses:

To display this window, select Security>Address Management from the menu bar.

The address tables list the destination MAC address and the associated VLAN ID, module, and port number associated with the address. Figure 4-20 shows an example list of addresses as they would appear in the dynamic, secure, or static address table.


Figure 4-20: Contents of the Address Table


MAC Addresses and VLANs

All addresses are associated with a VLAN. An address can exist in more than one VLAN and have different destinations in each. Multicast addresses, for example, could be forwarded to port 1 in VLAN 1 and ports 9, 10, and 11 in VLAN 5.

Each VLAN maintains its own logical address table. A known address in one VLAN is unknown in another until it is learned or statically associated with a port in the other VLAN. An address can be secure in one VLAN and dynamic in another. Addresses that are statically entered in one VLAN must be static addresses in all other VLANs.


Figure 4-21: Address Management - Dynamic Address


Changing the Address Aging Time

Dynamic addresses are source MAC addresses that the switch learns and then drops when they are not in use. Use the Aging Time field to define how long the switch retains unseen addresses in the table. This parameter applies to all VLANs.

CLI: Configuring the Aging Time

Setting too short an aging time can cause addresses to be prematurely removed from the table. Then when the switch receives a packet for an unknown destination, it floods the packet to all ports in the same VLAN as the receiving port. This unnecessary flooding can impact performance. Setting too long an aging time can cause the address table to be filled with unused addresses; it can cause delays in establishing connectivity when a workstation is moved to a new port.

Beginning in privileged EXEC mode, follow these steps to configure the dynamic address table aging time.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

mac-address-table aging-time seconds

Enter the number of seconds that dynamic addresses are to be retained in the address table. You can enter a number from 10 to 1000000.

Step 3

end

Return to privileged EXEC mode.

Step 4

show mac-address-table aging-time

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Removing Dynamic Address Entries

Beginning in privileged EXEC mode, follow these steps to remove a dynamic address entry:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

no mac-address-table dynamic hw-addr

Enter the MAC address to be removed from dynamic MAC address table.

Step 3

end

Return to privileged EXEC mode.

Step 4

show mac-address-table

Verify your entry.

You can remove all dynamic entries by using the clear mac-address-table dynamic command in privileged EXEC mode.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Adding Secure Addresses

The secure address table contains secure MAC addresses and their associated ports and VLANs. A secure address is a manually entered unicast address that is forwarded to only one port per VLAN. If you enter an address that is already assigned to another port, the switch reassigns the secure address to the new port.

You can enter a secure port address even when the port does not yet belong to a VLAN. When the port is later assigned to a VLAN, packets destined for that address are forwarded to the port.

You can use the Secure Address tab (Figure 4-22) to remove individual secure addresses or a group of them. To display this window, click the Secure Address tab on the Address Management window. Click the New button to display the New Address window (Figure 4-23), and enter a new secure address.


Figure 4-22: Address Management - Secure Address Tab


After you have entered the secure address, select Security>Port Security from the menu bar to secure the port by using the Port Security window.


Figure 4-23:
New Secure Address


CLI: Adding Secure Addresses

Beginning in privileged EXEC mode, follow these steps to add a secure address:

 
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

mac-address-table secure hw-addr interface
vlan vlan-id

Enter the MAC address, its associated port, and the VLAN ID.

Step 3

end

Return to privileged EXEC mode.

Step 4

show mac-address-table secure

Verify your entry.

 

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Removing Secure Addresses

Beginning in privileged EXEC mode, follow these steps to remove a secure address: 

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

no mac-address-table secure hw-addr vlan vlan-id

Enter the secure MAC address, its associated port, and the VLAN ID to be removed.

Step 3

end

Return to privileged EXEC mode.

Step 4

show mac-address-table secure

Verify your entry.

 

You can remove all secure addresses by using the clear mac-address-table secure command in privileged EXEC mode.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Adding and Removing Static Addresses

A static address has the following characteristics:

By clicking the Static Address tab on the Address Management window (Figure 4-21), you can add and remove static addresses. You can also define the forwarding behavior for the static address. Click Forwarding to display the Static Address Forwarding window (Figure 4-24).

On the Static Address Forwarding window, you determine how a port that receives a packet forwards it to another port for transmission. Because all ports are associated with at least one VLAN, the switch acquires the VLAN ID for the address from the ports that you select on the forwarding map.

The Received On Port column lists the ports where a static address is received. The Forward to Port(s) column lists the ports that the address with the static address can be forwarded to. Select a row, and click Modify to change the entries for an address.

A static address in one VLAN must be a static address in other VLANs. A packet with a static address that arrives on a VLAN where it has not been statically entered is flooded to all ports and not learned.


Figure 4-24:
Static Address Forwarding


Configuring Static Addresses for EtherChannel Port Groups

Follow these rules if you are configuring a static address to forward to ports in an EtherChannel port group:

CLI: Adding Static Addresses

Static addresses are entered in the address table with an in-port-list, an out-port-list, and a VLAN ID, if needed. Packets received from the in-port are forwarded to ports listed in the out-port-list.


Note If the in-port and out-port-list parameters are all access ports in a single VLAN, you can omit the VLAN ID. In this case, the switch recognizes the VLAN as that associated with the in-port VLAN. Otherwise, you must supply the VLAN ID.

Beginning in privileged EXEC mode, follow these steps to add a static address:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

mac-address-table static hw-addr in-port out-port-list vlan vlan-id

Enter the MAC address, the input port, the ports to which it can be forwarded, and the VLAN ID of those ports.

Step 3

end

Return to privileged EXEC mode.

Step 4

show mac-address-table static

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Removing Static Addresses

Beginning in privileged EXEC mode, follow these steps to remove a static address:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

no mac-address-table static hw-addr in-port in-port out-port-list out-port-list vlan vlan-id

Enter the static MAC address, the input port, the ports to which it can be forwarded, and the VLAN ID to be removed.

Step 3

end

Return to privileged EXEC mode.

Step 4

show mac-address-table static

Verify your entry.

You can remove all secure addresses by using the clear mac-address-table static command in privileged EXEC mode.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Enabling Port Security

Secured ports restrict a port to a user-defined group of stations. When you assign secure addresses to a secure port, the switch does not forward any packets with source addresses outside the group of addresses you have defined. If you define the address table of a secure port to contain only one address, the workstation or server attached to that port is guaranteed the full bandwidth of the port.

Use the Port Security window (Figure 4-25) to enable port security on a port and to define the actions to take place when a security violation occurs. As part of securing the port, you can also define the size of the address table for the port.

To display this window, select Security>Port Security from the menu bar. To modify port-security parameters for several ports at once, select the rows by using the mouse, and click Modify to display the Port Security Configuration window (Figure 4-26).

Secured ports generate address-security violations under the following conditions:

Limiting the number of devices that can connect to a secure port has the following advantages:

The following fields validate port security or indicate security violations:

Interface

Port to secure.

Security

Enable port security on the port.

Trap

Issue a trap when an address-security violation occurs.

Shutdown Port

Disable the port when an address-security violation occurs.

Secure Addresses

Number of addresses in the address table for this port. Secure ports have at least one in this field.

Max Addresses

Number of addresses that the address table for the port can contain.

Security Rejects

The number of unauthorized addresses seen on the port.

For the restrictions that apply to secure ports, see the "Managing Configuration Conflicts" section.


Figure 4-25: Port Security


Defining the Maximum Secure Address Count

A secure port can have from 1 to 132 associated secure addresses. Setting one address in the MAC address table for the port ensures that the attached device has the full bandwidth of the port.


Figure 4-26:
Port Security Configuration Pop-up


CLI: Enabling Port Security

Beginning in privileged EXEC mode, follow these steps to enable port security.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode for the port you want to secure.

Step 3

port security max-mac-count 1

Secure the port and set the address table to one address.

Step 4

port security action shutdown

Set the port to shutdown when a security violation occurs.

Step 5

end

Return to privileged EXEC mode.

Step 6

show port security

Verify the entry.

"Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Disabling Port Security

Beginning in privileged EXEC mode, follow these steps to disable port security.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode for the port you want to unsecure.

Step 3

no port security

Disable port security

Step 4

end

Return to privileged EXEC mode.

Step 5

show port security

Verify the entry

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Configuring the Cisco Discovery Protocol

Use the Cisco IOS command-line interface and Cisco Discovery Protocol (CDP) to enable CDP for the switch, set global CDP parameters, and display information about neighboring Cisco devices.

CDP enables the Cluster Management Suite to display a graphical view of the network. For example, the switch uses CDP to find cluster candidates and maintain information about cluster members and other devices up to three cluster-enabled devices away from the command switch.

If necessary, you can configure CDP to discover switches running the Cluster Management Suite up to seven devices away from the command switch. Devices that do not run clustering software display as edge devices, and no device connected to them can be discovered by CDP.


Note Creating and maintaining switch clusters is based on the regular exchange of CDP messages. Disabling CDP can interrupt cluster discovery. For more information on the role that CDP plays in clustering, see the "Automatically Discovering Cluster Candidates" section.

CLI: Configuring CDP for Extended Discovery

You can change the default configuration of CDP on the command switch to continue discovering devices up to seven hops away. Figure 4-27 shows a command switch that can discover candidates up to seven devices away from it. Figure 4-27 also shows the command switch connected to a Catalyst 5000 series switch. Because the Catalyst 5000 is a CDP device that does not support clustering, the command switch cannot learn about cluster candidate switches connected to it, even if they are running the Cluster Management Suite.


Figure 4-27: Discovering Cluster Candidates via CDP


Beginning in privileged EXEC mode, follow these steps to configure the number of hops that CDP discovers.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

cluster discovery hop-count number

Enter the number of hops that you want CDP to search for cluster candidates.

Step 3

end

Return to privileged EXEC mode.

Step 4

show running-config

Verify the change by displaying the running configuration file. The hop count is displayed in the file.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Controlling IP Multicast Packets through CGMP

Use the Cisco Group Management Protocol (CGMP) window (Figure 4-28) to enable CGMP and the CGMP Fast Leave feature. CGMP reduces the unnecessary flooding of IP multicast packets by limiting the transmission of these packets to CGMP clients that request them. The Fast Leave feature accelerates the removal of unused CGMP groups. By default, CGMP is enabled, and the Fast Leave feature is disabled.

End stations issue join messages to become part of a CGMP group and issue leave messages to leave the group. The membership of these groups is managed by the switch and by connected routers through the further exchange of CGMP messages.

CGMP groups are maintained on a per-VLAN basis: a multicast IP address packet can be forwarded to one list of ports in one VLAN and to a different list of ports in another VLAN. When a CGMP group is added, it is added on a per-VLAN, per-group basis. When a CGMP group is removed, it is only removed in a given VLAN.

You can use this window to perform the following tasks:

To display this window, select Device>Cisco Group Management Protocol from the menu bar.


Figure 4-28:
CGMP - Protocol Tab


Enabling the Fast Leave Feature

The CGMP Fast Leave feature reduces the delay when group members leave groups. When an end station requests to leave a CGMP group, the group remains enabled for that VLAN until all members have requested to leave. With the Fast Leave feature enabled, the switch immediately checks if there are other members attached to its ports in that group. If there are no other members, the switch removes the port from the group. If there are no other ports in the group, the switch sends a message to routers connected to the VLAN to delete the entire group.

The Fast Leave feature functions only if CGMP is enabled. The client must be running IGMP version 2 for the Fast Leave feature to function properly.

CLI: Enabling the CGMP Fast Leave Feature

Beginning in privileged EXEC mode, follow these steps to enable the CGMP Fast Leave feature:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

cgmp leave-processing

Enable CGMP and CGMP Fast Leave.

Step 3

end

Return to privileged EXEC mode.

Step 4

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Disabling the CGMP Fast Leave Feature

Beginning in privileged EXEC mode, follow these steps to disable the CGMP Fast Leave feature:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

no cgmp leave-processing

Disable CGMP and CGMP Fast Leave.

Step 3

end

Return to privileged EXEC mode.

Step 4

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Changing the CGMP Router Hold-Time

The router hold-time is the number of seconds the switch waits before removing (aging) a router entry and ceasing to exchange messages with it. If it is the last router entry on a VLAN, then all CGMP groups on that VLAN are removed. You can thus enter a lower number in the Router Hold-Time field (Figure 4-28) to accelerate the removal of CGMP groups.


Note You can also use the Router Ports tab (Figure 4-28) to remove router ports before the router hold-time has expired.

CLI: Changing the CGMP Router Hold-Time

Beginning in privileged EXEC mode, follow these steps to change the router hold-time.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

cgmp holdtime 400

Configure the number of seconds the switch is to wait before dropping a router entry.

Step 3

end

Return to privileged EXEC mode.

Step 4

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Removing Multicast Groups

You can reduce the forwarding of IP multicast packets by removing groups from the Current Multicast Groups table. Each entry in the table consists of the VLAN, IGMP multicast address, and ports.


Figure 4-29: CGMP Management Groups Tab


CLI: Removing Multicast Groups

You can use the CLI to clear all CGMP groups, all CGMP groups in a VLAN, or all routers, their ports, and their expiration times. Beginning in privileged EXEC mode, follow these steps to remove all multicast groups.

Command Purpose

Step 1

clear cgmp group

Clear all CGMP groups on all VLANs on the switch.

Step 2

show cgmp

Verify your entry by displaying CGMP information.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Configuring the Spanning Tree Protocol

Use the Spanning Tree Protocol (STP) window (Figure 4-30) to change parameters for STP, an industry standard for avoiding loops in switched networks. Each VLAN supports its own instance of STP.

You can use this window to perform the following tasks:

To display this window, select Device>Spanning Tree Protocol from the menu bar to display STP information for the command switch, or right-click on a switch, and select Device>Spanning Tree Protocol from the pop-up menu to display the STP information defined for the switch. You can also click the STP icon on the toolbar.

The STP rootguard option is described in the "CLI: Configuring STP Root Guard" section,


Figure 4-30: Spanning Tree Protocol - Status


Using STP to Support Redundant Connectivity

You can create a redundant backbone with STP by connecting two of the switch ports to another device or to two different devices. STP automatically disables one port but enables it if the other port is lost. If one link is high-speed and the other low-speed, the low-speed link is always disabled. If the speed of the two links is the same, the port priority and port ID are added together, and STP disables the link with the lowest value.

You can also create redundant links between switches by using EtherChannel port groups. For more information on creating port groups, see the "Creating EtherChannel Port Groups" section.

Accelerating Aging to Retain Connectivity

The default for aging dynamic addresses is 5 minutes. However, a reconfiguration of the spanning tree can cause many station locations to change. Because these stations could be unreachable for 5 minutes or more during a reconfiguration, the address-aging time is accelerated so that station addresses can be dropped from the address table and then relearned. The accelerated aging is the same as the forward-delay parameter value when STP reconfigures.

Because each VLAN is a separate instance of STP, the switch accelerates aging on a per-VLAN basis. A reconfiguration of STP on one VLAN can cause the dynamic addresses learned on that VLAN to be subject to accelerated aging. Dynamic addresses on other VLANs can be unaffected and remain subject to the aging interval entered for the switch.

Disabling STP Protocol

STP is enabled by default. Disable STP only if you are sure there are no loops in the network topology.


Caution When STP is disabled and loops are present in the topology, excessive traffic and indefinite packet duplication can drastically reduce network performance.


Figure 4-31: STP Pop-up


CLI: Disabling STP

Beginning in privileged EXEC mode, follow these steps to disable STP:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

no spanning-tree vlan stp-list

Disable STP on a VLAN.

Step 3

end

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Configuring STP and UplinkFast in a Daisy-Chained Cluster

STP uses default values that can be reduced when configuring 2900 and 3500 XL switches in daisy-chained configurations. If an STP root switch is part of a cluster that is one switch from a daisy-chained stack, you can customize STP to reconverge more quickly after a switch failure. Figure 4-32 shows modular Catalyst 2900 XL and Catalyst 3500 XL switches in three daisy-chained clusters that use the GigaStack GBIC. Table 4-3 shows the default STP settings and those that are acceptable for these configurations.


Table 4-3: Default and Acceptable STP Parameter Settings (in Seconds)
STP Parameter STP Default (IEEE) Acceptable for Option 1 Acceptable for Option 2 Acceptable for Option 3

Hello Time

2

1

1

1

Max Age

20

6

10

6

Forwarding delay

15

4

7

4


Figure 4-32:
Gigabit Ethernet Clusters


Enabling UplinkFast on all switches in the cluster can further reduce the time it takes cluster switches to begin forwarding after a new root switch is selected.


Note If you have configured VLANs, each VLAN is a separate STP instance and needs to have its parameters changed. You can change all VLANs on a switch by using the stp-list parameter when you enter STP commands through the CLI. For more information, see the Cisco IOS Desktop Switching Command Reference available on Cisco Connection Online (CCO).

Configuring Redundant Links By Using STP UplinkFast

Switches in hierarchical networks can be grouped into backbone switches, distribution switches, and access switches. Figure 4-33 shows a complex network where distribution switches and access switches each have at least one redundant link that STP blocks to prevent loops.

If a switch looses connectivity, the switch begins using the alternate paths as soon as STP selects a new root port. When STP reconfigures the new root port, other ports flood the network with multicast packets, one for each address that was learned on the port. You can limit these bursts of multicast traffic by reducing the max-update-rate parameter (the default for this parameter is 150 packets per second). However, if you enter zero, station-learning frames are not generated, so the STP topology converges more slowly after a loss of connectivity.

STP UplinkFast is an enhancement that accelerates the choice of a new root port when a link or switch fails or when STP reconfigures itself. The root port transitions to the forwarding state immediately without going through the listening and learning states, as it would with normal STP procedures. UplinkFast is most useful in edge or access switches and might not be appropriate for backbone devices.

You can change STP parameters by using the UplinkFast tab of the Spanning Tree Protocol window or by using the CLI. The "Configuring the Spanning Tree Protocol" section describes the use of the Spanning Tree Protocol window.

To display this window, select Device>Spanning-Tree Protocol from the menu bar. Then click the UplinkFast tab.


Figure 4-33: Switches in a Hierarchical Network


CLI: Enabling STP UplinkFast

When you enable UplinkFast, it is enabled for the entire switch and cannot be enabled for individual VLANs.

Beginning in privileged EXEC mode, follow these steps to configure UplinkFast:
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

spanning-tree uplinkfast max-update-rate pkts-per-second

Enable UplinkFast on the switch.

The range is from 0 to 1000 packets per second; The default is 150.

If you set the rate to 0, station-learning frames are not generated, so the STP topology converges more slowly after a loss of connectivity.

Step 3

exit

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entries.

When UplinkFast is enabled, the bridge priority of all VLANs is set to 49152, and the path cost of all ports and VLAN trunks is increased by 3000. This change reduces the chance that the switch will become the root port. When UplinkFast is disabled, the bridge priorities of all VLANs and path costs of all ports are set to default values.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Changing STP Parameters for a VLAN

To change STP parameters for a VLAN, select Device>Spanning Tree Protocol from the menu bar, select the VLAN ID of the STP instance to change, and click Root Parameters.


Figure 4-34: Spanning Tree Protocol Current Root Tab


In Figure 4-34, the parameters under the heading Current Spanning-Tree Root are read-only. The MAC Address field shows the MAC address of the switch currently acting as the root for each VLAN; the remaining parameters show the other STP settings for the root switch for each VLAN. The root switch is the switch with the highest priority and transmits topology frames to other switches in the spanning tree.

In the Spanning Tree Protocol window (Figure 4-35), you can change the root parameters for the VLANs on a selected switch. The following fields (Figure 4-35) define how your switch responds when STP reconfigures itself.

Protocol

Implementation of STP to use.

Select one of the menu bar items: IBM, or IEEE. The default is IEEE.

Priority

Value used to identify the root switch. The switch with the lowest value has the highest priority and is selected as the root.

Enter a number from 0 to 65535.

Max age

Number of seconds a switch waits without receiving STP configuration messages before attempting a reconfiguration. This parameter takes effect when a switch is operating as the root switch. Switches not acting as the root use the root-switch Max age parameter.

Enter a number from 6 to 200.

Hello Time

Number of seconds between the transmission of hello messages, which indicate that the switch is active. Switches not acting as a root switch use the root-switch Hello-time value.

Enter a number from 1 to 10.

Forward Delay

Number of seconds a port waits before changing from its STP learning and listening states to the forwarding state. This wait is necessary so that other switches on the network ensure no loop is formed before they allow the port to forward packets.

Enter a number from 4 to 200.


Figure 4-35: Spanning Tree Protocol Root Parameters Tab


CLI: Changing the STP Implementation

Beginning in privileged EXEC mode, follow these steps to change the STP implementation. The stp-list is the list of VLANs to which the STP command applies.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

spanning-tree [vlan stp-list] protocol {ieee | ibm}

Specify the STP implementation to be used for a spanning-tree instance.

Step 3

end

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Changing the Switch Priority

Beginning in privileged EXEC mode, follow these steps to change the switch priority and affect which switch is the root switch. The stp-list is the list of VLANs to which the STP command applies.
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

spanning-tree [vlan stp-list] priority bridge-priority

Configure the switch priority for the specified spanning-tree instance.

Enter a number from 0 to 65535; the lower the number, the more likely the switch will be chosen as the root switch.

Step 3

end

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Changing the BPDU Message Interval

Beginning in privileged EXEC mode, follow these steps to change the BPDU message interval (max age time). The stp-list is the list of VLANs to which the STP command applies.
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

spanning-tree [vlan stp-list] max-age seconds

Specify the interval between messages the spanning tree receives from the root switch.

The maximum age is the number of seconds a switch waits without receiving STP configuration messages before attempting a reconfiguration. Enter a number from 6 to 200.

Step 3

end

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Changing the Hello BPDU Interval

Beginning in privileged EXEC mode, follow these steps to change the hello BPDU interval (hello time). The stp-list is the list of VLANs to which the STP command applies.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

spanning-tree [vlan stp-list] hello-time seconds

Specify the interval between hello BPDUs.

Hello messages indicate that the switch is active. Enter a number from 1 to 10.

Step 3

end

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Changing the Forwarding Delay Time

Beginning in privileged EXEC mode, follow these steps to change the forwarding delay time. The stp-list is the list of VLANs to which the STP command applies.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

spanning-tree [vlan stp-list] forward-time seconds

Specify the forwarding time for the specified spanning-tree instance.

The forward delay is the number of seconds a port waits before changing from its STP learning and listening states to the forwarding state. Enter a number from 4 to 200.

Step 3

end

Return to privileged EXEC mode.

Step 4

show spanning-tree

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Changing STP Port Parameters

The ports listed on this window (Figure 4-36) belong to the VLAN selected in the VLAN ID list above the table of parameters. To change STP port options, select Device>Spanning Tree Protocol from the menu bar, select the VLAN ID, and click Modify STP Parameters.

Use the following fields (Figure 4-36) to check the status of ports that are not forwarding due to STP:

Port

The interface and port number. FastEthernet0/1 refers to port 1x.

State

The current state of the port. A port can be in one of the following states:

Blocking

Port is not participating in the frame-forwarding process and is not learning new addresses.

Listening

Port is not participating in the frame-forwarding process, but is progressing towards a forwarding state. The port is not learning addresses.

Learning

Port is not forwarding frames but is learning addresses.

Forwarding

Port is forwarding frames and learning addresses.

Disabled

Port has been removed from STP operation.

Down

Port has no physical link.

Broken

One end of the link is configured as an access port and the other end is configured as an 802.1Q trunk port. Or both ends of the link are configured as 802.1Q trunk ports but have different native VLAN IDs.


Figure 4-36: Spanning Tree Protocol Port Parameters Tab


Enabling the Port Fast Feature

The Port Fast feature brings a port directly from a blocking state into a forwarding state. This feature is useful when a connected server or workstation times out because its port is going through the normal cycle of STP status changes. The only time a port with Port Fast enabled goes through the normal cycle of STP status changes is when the switch is restarted.

To enable the Port Fast feature on the Port Configuration pop-up (Figure 4-37), select a row in the Port Parameters tab, and click Modify.


Caution Enabling this feature on a port connected to a switch or hub could prevent STP from detecting and disabling loops in your network, and this could cause broadcast storms and address-learning problems.


Figure 4-37: STP Port Configuration Pop-up


You can modify the following parameters and enable the Port Fast feature by selecting a row on the Port Parameters tab and clicking Modify.

Port Fast

Enable to bring the port more quickly to an STP forwarding state.

Path Cost

A lower path cost represents higher-speed transmission. This can affect which port remains enabled in the event of a loop.

Enter a number from 1 to 65535. The default is 100 for 10 Mbps, 19 for 100 Mbps, 14 for 155 Mbps (ATM), 4 for 1 Gbps, 2 for
10 Gbps, and 1 for interfaces with speeds greater than 10 Gbps.

Priority

Number used to set the priority for a port. A higher number has higher priority. Enter a number from 0 to 65535.

CLI: Enabling STP Port Fast

Enabling this feature on a port connected to a switch or hub could prevent STP from detecting and disabling loops in your network. Beginning in privileged EXEC mode, follow these steps to enable the Port Fast feature:
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

spanning-tree portfast

Enable the Port Fast feature for the port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Changing the Path Cost

Beginning in privileged EXEC mode, follow these steps to change the path cost for STP calculations. The STP command applies to the stp-list.
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

spanning-tree [vlan stp-list] cost cost

Configure the path cost for the specified spanning-tree instance.

Enter a number from 1 to 65535.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Changing the Port Priority

Beginning in privileged EXEC mode, follow these steps to change the port priority, which is used when two switches tie for position as the root switch. The stp-list is the list of VLANs to which the STP command applies.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

spanning-tree [vlan stp-list] port-priority port-priority

Configure the port priority for a specified instance of STP.

Enter a number from 0 to 255. The lower the number, the higher the priority.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify your entry.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Configuring STP Root Guard

The Layer 2 network of a service provider (SP) can include many connections to switches that are not owned by the SP. In such a topology, STP can reconfigure itself and select a customer switch as the STP root switch, as shown in Figure 4-38. You can avoid this possibility by configuring the root guard parameter on ports that connect to switches outside of your network. If a switch outside the network becomes the root switch, the port is blocked, and STP selects a new root switch.


Caution Misuse of this command can cause a loss of connectivity.


Figure 4-38: STP in a Service Provider Network


Root guard enabled on a port applies to all the VLANs that the port belongs to. Each VLAN has its own instance of STP.

Beginning in privileged EXEC mode, follow these steps to set root guard on a port:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

spanning-tree rootguard

Enable root guard on the port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show running-config

Verify that the port is configured for root guard.

Use the no version of the spanning-tree rootguard command to disable the root guard feature.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Configuring UniDirectional Link Detection

UniDirectional Link Detection (UDLD) is a Layer 2 protocol that detects and shuts down unidirectional links. You can configure UDLD on the entire switch or on an individual port.

Beginning in privileged EXEC mode, follow these steps to configure UDLD on a switch:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

udld enable

Enable UDLD.

Step 3

end

Return to privileged EXEC mode.

Step 4

show running-config

Verify the entry by displaying the running configuration.

Use the udld reset command to reset any port that has been shut down by UDLD.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Configuring Private VLAN Edge Ports

Some applications require that no traffic be forwarded by the Layer 2 protocol between ports on the same switch. In such an environment, there is no exchange of unicast, broadcast, or multicast traffic between ports on the switch, and traffic between ports on the same switch is forwarded through a Layer 3 device such as a router.

To meet this requirement, you can configure 2900 and 3500 XL ports as private VLAN edge ports. Private VLAN edge ports do not forward any traffic to private VLAN edge ports on the same switch. This means that all traffic passing between private VLAN edge ports---unicast, broadcast, and multicast---must be forwarded through a Layer 3 device. Private VLAN edge ports can forward any type of traffic to non-private VLAN edge ports, and they forward as usual to all ports on other switches.


Note There could be times when unknown unicast traffic from a non-private VLAN edge port is flooded to a private VLAN edge port because a MAC address has timed out or has not been learned by the switch. Use the port block command to guarantee that no unicast and multicast traffic is flooded to the port in such a case. See the "Configuring Flooding Controls" section for more information.

Beginning in privileged EXEC mode, follow these steps to define a port as a private VLAN edge port:
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

port protected

Enable private VLAN edge port on the port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show port protected

Verify that the port has private VLAN edge port enabled.

Use the no version of the port protected command to disable private VLAN edge port.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Configuring TACACS+

The Terminal Access Controller Access Control System Plus (TACACS+) provides the means to manage network security (authentication, authorization, and accounting [AAA]) from a server. This section describes how TACACS+ works and how you can configure it. For complete syntax and usage information for the commands described in this chapter, refer to the
Cisco IOS Release 12.0 Security Command Reference.

You can only configure this feature by using the CLI; you cannot configure it through the Cluster Management Suite.

Understanding TACACS+

In large enterprise networks, the task of administering passwords on each device can be simplified by centralizing user authentication on a server. TACACS+ is an access-control protocol that allows a switch to authenticate all login attempts through a central server. The network administrator configures the switch with the address of the TACACS+ server, and the switch and the server exchange messages to authenticate each user before allowing access to the management console.

TACACS+ consists of three services: authentication, authorization, and accounting. Authentication determines who the user is and whether or not the user is allowed access to the switch. Authorization is the action of determining what the user is allowed to do on the system. Accounting is the action of collecting data related to resource usage.

CLI Procedures for Configuring TACACS+

The TACACS+ feature is disabled by default. However, you can enable and configure it by using the CLI. You can access the CLI through the console port or through Telnet. To prevent a lapse in security, you cannot configure TACACS+ through a network-management application. When enabled, TACACS+ can authenticate users accessing the switch through the CLI.


Note Although the TACACS+ configuration is performed through the CLI, the TACACS+ server authenticates HTTP connections that have been configured with a privilege level of 15.

CLI: Configuring the TACACS+ Server Host

Use the tacacs-server host command to specify the names of the IP host or hosts maintaining an AAA/TACACS+ server. On TACACS+ servers, you can configure the following additional options:

Beginning in privileged EXEC mode, follow these steps to configure the TACACS+ server:
Command Purpose

Step 1

tacacs-server host name [timeout integer] [key string]

Define a TACACS+ host.

Entering the timeout and key parameters with this command overrides the global values that you can enter with the tacacs-server timeout (Step 3) and the tacacs-server key commands (Step 5).

Step 2

tacacs-server retransmit retries

Enter the number of times the server searches the list of TACACS+ servers before stopping.

The default is two.

Step 3

tacacs-server timeout seconds

Set the interval that the server waits for a TACACS+ server host to reply.

The default is 5 seconds.

Step 4

tacacs-server attempts count

Set the number of login attempts that can be made on the line.

Step 5

tacacs-server key key

Define a set of encryption keys for all of TACACS+ and communication between the access server and the TACACS daemon.

Repeat the command for each encryption key.

Step 6

exit

Return to privileged EXEC mode.

Step 7

show tacacs

Verify your entries.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Configuring Login Authentication

Beginning in privileged EXEC mode, follow these steps to configure login authentication by using AAA/TACACS+:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

aaa new-model

Enable AAA/TACACS+.

Step 3

aaa authentication login {default | list-name} method1 [method2...]

Enable authentication at login, and create one or more lists of authentication methods.

Step 4

line [aux | console | tty | vty] line-number [ending-line-number]

Enter line configuration mode, and configure the lines to which you want to apply the authentication list.

Step 5

login authentication {default | list-name}

Apply the authentication list to a line or set of lines.

Step 6

exit

Return to privileged EXEC mode.

Step 7

show running-config

Verify your entries.

The variable list-name is any character string used to name the list you are creating. The method variable refers to the actual methods the authentication algorithm tries, in the sequence entered. You can choose one of the following methods:

line

Uses the line password for authentication. You must define a line password before you can use this authentication method. Use the password password line configuration mode command.

local

Uses the local username database for authentication. You must enter username information into the database. Use the username password global configuration command.

tacacs+

Uses TACACS+ authentication. You must configure the TACACS+ server before you can use this authentication method. For more information, see the "CLI: Configuring the TACACS+ Server Host" section.

To create a default list that is used if no list is specified in the login authentication command, use the default keyword followed by the methods you want used in default situations.

The additional methods of authentication are used only if the previous method returns an error, not if it fails. To specify that the authentication succeed even if all methods return an error, specify none as the final method in the command line.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Specifying TACACS+ Authorization for EXEC Access and Network Services

You can use the aaa authorization command with the tacacs+ keyword to set parameters that restrict a user's network access to Cisco IOS privilege mode (EXEC access) and to network services such as Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP) with Network Control Protocols (NCPs), and AppleTalk Remote Access (ARA).

The aaa authorization exec tacacs+ local command sets the following authorization parameters:


Note Authorization is bypassed for authenticated users who login through the CLI even if authorization has been configured.

Beginning in privileged EXEC mode, follow these steps to specify TACACS+ authorization for EXEC access and network services:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

aaa authorization network tacacs+

Configure the switch for user TACACS+ authorization for all network-related service requests, including SLIP, PPP NCPs, and ARA protocols.

Step 3

aaa authorization exec tacacs+

Configure the switch for user TACACS+ authorization to determine if the user is allowed EXEC access.

The exec keyword might return user profile information (such as autocommand information).

Step 4

exit

Return to privileged EXEC mode.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Starting TACACS+ Accounting

You use the aaa accounting command with the tacacs+ keyword to turn on TACACS+ accounting for each Cisco IOS privilege level and for network services.

Beginning in privileged EXEC mode, follow these steps to enable TACACS+ accounting:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

aaa accounting exec start-stop tacacs+

Enable TACACS+ accounting to send a start-record accounting notice at the beginning of an EXEC process and a stop-record at the end.

Step 3

aaa accounting network start-stop tacacs+

Enable TACACS+ accounting for all network-related service requests, including SLIP, PPP, and PPP NCPs.

Step 4

exit

Return to privileged EXEC mode.


Note These commands are documented in the "Accounting and Billing Commands" chapter of the Cisco IOS Release 12.0 Security Command Reference.

CLI: Configuring a Switch for Local AAA

You can configure AAA to operate without a server by setting the switch to implement AAA in local mode. Authentication and authorization are then handled by the switch. No accounting is available in this configuration.

Beginning in privileged EXEC mode, follow these steps to configure the switch for local AAA:
Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

aaa new-model

Enable AAA.

Step 3

aaa authentication login default local

Set the login authorization to default to local.

Step 4

aaa authorization exec local

Configure user AAA authorization for all network-related service requests, including SLIP, PPP NCPs, and ARA protocols.

Step 5

aaa authorization network local

Configure user AAA authorization to determine if the user is allowed to run an EXEC shell.

Step 6

username name password password privilege level

Enter the local database.

Repeat this command for each user.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

Configuring Voice Ports

The 2900 and 3500 XL switches can connect to a Cisco 7960 IP Phone and carry IP voice traffic. If necessary, the Catalyst 3524-PWR XL can supply electrical power to the circuit connecting it to the Cisco 7960 IP Phone.

Because the sound quality of an IP telephone call can deteriorate if the data is unevenly transmitted, this release of IOS supports quality of service (QoS) based on IEEE 802.1p class of service (CoS). QoS uses classification and scheduling to transmit network traffic from the switch in a predictable manner. The Cisco 7960 IP Phone itself is also a configurable device, and it can be configured to forward traffic with an 802.1p priority. You can use the CLI to configure the Catalyst 3524-PWR XL to honor or ignore a traffic priority assigned by a Cisco 7960 IP Phone.

The Cisco 7960 IP Phone contains an integrated 3-port 10/100 switch. The ports are dedicated to connect to the following devices:

Figure 4-39 shows one way to configure a Cisco 7960 IP Phone.


Figure 4-39: Cisco 7960 IP Phone Connected to a Catalyst 3524-PWR XL Switch


Preparing a Port for a Cisco 7960 IP Phone Connection

Before you configure a Catalyst 3524-PWR XL port to carry IP voice traffic, the port should be configured as an 802.1Q trunk and as a member of the voice VLAN (VVID).

See "Configuring a Trunk Port" section for instructions on configuring an 802.1Q trunk port.

CLI: Configuring a Port to Connect to a Cisco 7960 IP Phone

Because a Cisco 7960 IP Phone also supports connection to a PC or other device, a port connecting a Catalyst 3524-PWR XL switch to a Cisco 7960 IP Phone can carry a mix of traffic. There are three ways to configure a port connected to a Cisco 7960 IP Phone:

Beginning in privileged EXEC mode, follow these steps to configure a port to instruct the phone to give voice traffic a higher priority and forward all traffic through the 802.1Q native VLAN.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

switchport voice vlan dot1p

Instruct the switch to use 802.1p priority tagging for voice traffic and to use VLAN 0 (default native VLAN) to carry all traffic.

Step 4

end

Return to privileged EXEC mode.

Step 5

show interface interface switchport

Verify the port configuration.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Configuring Inline Power on a Catalyst 3524-PWR Switch

The Catalyst 3524-PWR XL can supply inline power to the
Cisco 7960 IP Phone if necessary. The Cisco 7960 IP Phone can also be connected to an AC power source and supply its own power to the voice circuit. When the Cisco 7960 IP Phone is supplying its own power, any 2900 or 3500 XL can forward IP voice traffic to and from the phone.

A detection mechanism on the Catalyst 3524-PWR XL determines if it is connected to a Cisco 7960 IP Phone. If the switch senses that there is no power on the circuit, the switch supplies the power. If there is power on the circuit, the switch does not supply it.

You can configure the switch to never supply power to the Cisco 7960 IP Phone and to disable the detection mechanism.

Beginning in privileged EXEC mode, follow these steps to configure a port to never supply power to Cisco 7960 IP Phones.

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

power inline never

Permanently disable inline power on the port.

Step 4

end

Return to privileged EXEC mode.

Step 5

show power inline interface configured

Verify the change by displaying the setting as configured.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.

CLI: Overriding the CoS Priority of Incoming Frames

A PC or other data device can connect to a port on the Cisco 7960 IP Phone. The PC can generate packets with a CoS value assigned, and there can be times when a network administrator would want to override that priority. You can use the Catalyst 3524-PWR XL CLI to override the priority of frames arriving on the phone port from connected devices. You can also set the phone port to accept (trust) the priority of frames arriving on the port.

Beginning in privileged EXEC mode, follow these steps to override the CoS priority setting received from the non-voice port on the Cisco 7960 IP Phone:

Command Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3

switchport priority extend cos 3

Set the phone port to override the priority received from PC or attached device and forward the received data with a priority of 3.

Step 4

end

Return to privileged EXEC mode.

Step 5

show interface interface switchport

Verify the change by displaying the setting as configured.

Use the no switchport priority extend command to return the port to its default setting.

The "Finding More Information About IOS Commands" section contains the path to the complete IOS documentation.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed May 3 17:20:44 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.