cc/td/doc/product/lan/cat5000/rel_5_2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

Numerics


10/100 port speed, setting     5-6

802.10 trunks
See IEEE 802.10 trunks

802.1Q
See IEEE 802.1Q

802.3 RAW-to-FDDI translation     38-12

A


Access Control Entry
See ACE

ACE
creating     15-11
Layer 4
port numbers     15-11
protocols     15-11
overview     15-5

addresses
IP
adding to IP permit list     19-2
aliases, creating     29-6
automatic assignment     3-2
clearing from IP permit list     19-4
designating     2-8
DHCP and     3-9
in-band (sc0) interface and     3-5
out-of-band management Ethernet (me1) interface and     3-6
SLIP (sl0) interface and     3-9
MAC
allocation     8-11
blocking     18-1
designating     2-8
filters, Token Ring     41-2
learning, FDDI/CDDI     38-13
port security and     18-1

address-recognized bit, Token Ring     40-9

administration
overview     1-8
switch     29-1, 36-1

administrative groups, EtherChannel     7-2

advertisements, VTP     10-2

aliases
command, creating     29-5
IP
creating     29-6
designating     2-8

All-Routes Explorers
maximum hops     11-11
reduction, Token Ring     40-10

APaRT, FDDI/CDDI and     38-12

audience     xix

authentication
example configuration     30-33
Kerberos
configuration guidelines     30-8
credentials forwarding, enabling     30-16
enabling     30-12
overview     30-4
realm, defining     30-13
servers, specifying     30-14
SRVTAB files     30-15
local
configuration guidelines     30-8
default configuration     30-7
disabling     30-10
enable password, setting     30-10
enabling     30-8
overview     30-2
password recovery     30-11
NTP     37-4
overview     30-2
RADIUS
configuration guidelines     30-8
deadtime, setting     30-24
default configuration     30-7
disabling     30-26
enabling     30-21
key, clearing     30-26
key, specifying     30-22
overview     30-2
retransmit count, setting     30-24
servers, clearing     30-25
servers, specifying     30-21
timeout, setting     30-23
TACACS+
configuration guidelines     30-8
default configuration     30-7
disabling     30-33
enabling     30-28
example configuration     30-33
key, specifying     30-29
login attempts allowed     30-30
overview     30-3
timeout interval     30-29

automatic packet recognition and translation
See APaRT

autonegotiation
duplex     5-6
speed     5-6
trunks     12-2

B


BackboneFast
disabling     9-9
displaying statistics     9-9
enabling     9-8
overview     9-6

banner
See login banner

blocking state, STP     8-6

BOOT environment variable
clearing     31-9, 31-12
default     31-5
displaying     31-12
overview     31-3, 31-4
setting     31-9, 31-10

boot field
overview     31-3
setting     31-5

booting
configuration register
setting value     31-8
ignoring NVRAM     31-8

BPDUs, overview     8-3

bridge forward delay, STP     8-18

bridge hello time, STP     8-18

bridge ID
MAC addresses and     8-11

bridge maximum aging time, STP     8-18

bridge priority, STP     8-17, 8-18, 8-19

bridge protocol data units
See BPDUs

broadcast suppression
bandwidth-based     17-2
disabling     17-5
enabling     17-4
hardware     17-2
overview     17-1
packet-based     17-3
software     17-3

C


CAM
FDDI/CDDI     38-12

Catalyst 2926G series, overview (table)     1-3

Catalyst 2948G, overview (table)     1-3

Catalyst 4000 family, overview (table)     1-2

Catalyst 5000 family
overview (table)     1-1

Catalyst 5500 series
redundant supervisor in     4-1

CDDI
APaRT, configuring     38-12
CAM     38-12
checking connectivity     38-15
default configuration     38-2, 39-3
example configurations
IEEE 802.10 trunking     39-4
multiswitch without trunking     38-16
single switch     38-15
ICMP unreachable messages     38-7
IEEE 802.10 trunks
configuration guidelines     39-3
configuring     39-4
overview     39-1
VTP and     39-2
IP fragmentation, configuring     38-6
IPX translations     38-10
LER
alarm, setting     38-7
cutoff, setting     38-8
MAC address learning, configuring     38-13
native VLAN, setting     38-5
neighbor notification frames     38-8
overview     38-1
PHY line state     38-9
port name, specifying     38-4
port priority, setting     38-5
TRequest parameter     38-10
TRT     38-10
user-data string, specifying     38-3

CDP
default configuration     22-2
disabling
globally     22-2
on ports     22-3
displaying neighbor information     22-4
enabling
globally     22-2
on ports     22-3
holdtime, setting     22-4
message interval, setting     22-4
overview     22-1

CGMP
disabling     16-7
enabling     16-4
joining multicast group     16-2
leave processing
disabling     16-7
enabling     16-5
leaving multicast group     16-2
multicast group
clearing     16-21
configuring     16-6, 16-11, 16-20
multicast router ports
clearing     16-21
specifying     16-20
overview     16-1
statistics, viewing     16-7

channel modes, EtherChannel (table)     7-3

checksum, verifying Flash file     32-9

CIDR
static routes and     29-7

Cisco Discovery Protocol
See CDP

Cisco Group Management Protocol
See CGMP

CiscoWorks2000     25-4

classified frames     15-4

Classless InterDomain Routing
See CIDR

clear boot system flash command     31-9

clearing the configuration     34-10

CLI
ROM monitor     2-8
switch
accessing     2-2
help     2-4
history substitution     2-5
IP addresses, designating     2-8
IP aliases, designating     2-8
MAC addresses, designating     2-8
modules, designating     2-7
operating     2-3
ports, designating     2-7
VLANs, designating     2-7
switch CLI
command aliases     2-7

clock, setting     29-4

command aliases     2-7

command aliases, creating     29-5

community strings
defining     25-3
overview     25-2

CONFIG_FILE variable
recurrence, setting     31-7

configuration files
creating     34-2
downloading
RCP     34-8
TFTP     34-4
via RCP     34-7, 34-8
via TFTP     34-4
guidelines for creating     34-1
running configuration
downloading via RCP     34-8
downloading via TFTP     34-4
uploading via RCP     34-9
uploading via TFTP     34-6
uploading
preparation     34-6, 34-9
to RCP server     34-9
to TFTP server     34-6

configuration loss thresholds, Token Ring     40-9

configuration register
boot field
switch, setting     31-5
CONFIG_FILE recurrence, setting     31-7
default setting     31-5
ignoring NVRAM at boot     31-8
overview     31-3
ROM monitor console port baud rate     31-6
setting     31-8

configuration, clearing     34-10

console port
downloading software images
example PC download     33-29
example UNIX download     33-30
PC procedure     33-27
preparation     33-26
UNIX procedure     33-28
establishing a connection     2-2
redundant supervisor and     4-2
ROM monitor baud rate     31-6
SLIP and     3-8
system message logging settings     35-5
user sessions
disconnecting     21-8
monitoring     21-7

contact, setting     29-3

content-addressable memory
See CAM

conventions, documentation     xxii

Copper Distributed Data Interface
See CDDI

CoS
ACE and     15-11
default switch CoS     15-9
drop thresholds
mapping     15-14
transmit     15-6
Layer 4 port numbers     15-11
Layer 4 protocols     15-11
MAC/VLAN and     15-5, 15-11
port and
configuring values     15-9
overview     15-4
reverting to default     15-10
values     15-3

CWSI Campus     25-4

D


database
VMPS
downloading     13-7
example configuration file     13-9

date, setting     29-4

daylight saving time
disabling adjustment     37-6
enabling adjustment     37-5

Dedicated Token Ring
See DTR

default configuration
CDDI     38-2, 39-3
CDP     22-2
DNS     36-1
dynamic port membership     13-2
EtherChannel     7-4
Ethernet     5-4
Fast EtherChannel     7-4
Fast Ethernet     5-4
Fast Ethernet trunks     12-5
FDDI     38-2, 39-3
Gigabit EtherChannel     7-4
Gigabit Ethernet     6-5
Gigabit Ethernet trunks     12-5
GMRP     16-13
IP permit list     19-2
Kerberos authentication     30-7
local authentication     30-7
NTP     37-2
protocol filtering     20-3
QoS     15-7
RADIUS authentication     30-7
SNMP     25-3
spanning-tree     8-12
supervisor engine     3-5
switch boot configuration     31-5
system message logging     35-4
TACACS+ authentication     30-7
Token Ring     40-4
UDLD     24-2
VLANs     11-6
VMPS     13-2
VTP     10-5

default gateway, configuring     3-6

DHCP
in-band (sc0) interface and     3-9
releasing lease     3-10
renewing lease     3-10

disabled state, STP     8-10

DISL
See DTP

DNS
default configuration     36-1
disabling     36-3
domain name
clearing     36-3
setting     36-2
enabling     36-2
overview     36-1
server
clearing     36-2
specifying     36-2
setting up     36-2
system name and     29-1
system prompt and     29-1

document conventions     xxii

document organization     xix

documentation, related     xxi

domain name
clearing     36-3
setting     36-2

Domain Name System
See DNS

downloading
configuration files
RCP     34-8
TFTP     34-4
via RCP     34-7, 34-8
via TFTP     34-4
software images
example, multiple module     33-10, 33-11, 33-23, 33-24
example, single module     33-9, 33-21, 33-22
example, supervisor     33-6, 33-7, 33-18, 33-20
overview     33-1, 33-14
preparation     33-2, 33-15
supervisor     33-3, 33-15
switching module     33-4, 33-16

drop thresholds
CoS mapping     15-14
transmit queue     15-5, 15-13

DTP
non-Cisco devices and     12-4
overview     12-2

DTR     40-4

duplex
Fast Ethernet     5-6
Token Ring     40-7

dynamic port VLAN membership
configuring     13-5
default configuration     13-2
example     13-10
overview     13-1
reconfirming     13-7
troubleshooting     13-8

Dynamic Trunking Protocol
See DTP

E


early token release, setting     40-8

enable password
recovering lost     30-11
setting     30-10

encapsulation type descriptions, trunks (table)     12-3

environment variables
BOOT
clearing     31-9
displaying     31-12
overview     31-3, 31-4
setting     31-9, 31-10

error messages
system message logging (syslog)     35-1
VMPS (table)     13-8

EtherChannel
administrative groups
configuring     7-6
overview     7-2
channel modes (table)     7-3
configuration example     7-11
configuration guidelines     7-4
configuring     7-5
default configuration     7-4
EtherChannel IDs     7-2
example configuration     7-14, 12-11, 12-14
frame distribution     7-3
hardware support     7-4
modes     7-3
overview     7-1
PAgP and     7-2
PAgP statistics, displaying     7-11
port costs     7-7
port-VLAN costs     7-8
statistics, displaying     7-10

Ethernet
802.3 RAW-to-FDDI translation     38-12
autonegotiation, speed     5-6
checking connectivity     5-8
default configuration     5-4
FDDI 802.2-to-Ethernet translation     38-11
FDDI SNAP-to-Ethernet translation     38-11
overview     5-1
port duplex, setting     5-6
port name, setting     5-5
port priority, setting     5-5
port speed, setting     5-6
protocol filtering
See protocol filtering

examples, conventions     xxiii

F


Fast EtherChannel
See EtherChannel

Fast Ethernet
autonegotiation, speed     5-6
checking connectivity     5-8
default configuration     5-4
EtherChannel
See EtherChannel
flow control
command keywords (table)     5-3
configuring     5-7
overview     5-2
link negotiation
configuring     5-7
overview     5-3
possible link states (table)     5-3
overview     5-1
port duplex, setting     5-6
port name, setting     5-5
port priority, setting     5-5
port speed, setting     5-6
protocol filtering
See protocol filtering
trunks
See trunks

FDDI
802.2-to-Ethernet translation     38-11
802.3 RAW-to-FDDI translation     38-12
APaRT, configuring     38-12
CAM     38-12
checking connectivity     38-15
default configuration     38-2, 39-3
example configurations
IEEE 802.10 trunking     39-4
multiswitch without trunking     38-16
single switch     38-15
ICMP unreachable messages     38-7
IEEE 802.10 trunks
configuration guidelines     39-3
configuring     39-4
example configuration     39-4
overview     39-1
VTP and     39-2
IP fragmentation, configuring     38-6
IPX translations     38-10
LER
alarm, setting     38-7
cutoff, setting     38-8
MAC address learning, configuring     38-13
native VLAN, setting     38-5
neighbor notification frames     38-8
overview     38-1
PHY line state     38-9
port name, specifying     38-4
port priority, setting     38-5
SNAP-to-Ethernet translation     38-11
TRequest parameter     38-10
TRT     38-10
user-data string, specifying     38-3

Fiber Distributed Data Interface
See FDDI

fiber-optic, detecting unidirectional links     24-1

filters
protocol
See protocol filtering
Token Ring
clearing     41-4
MAC address filter, adding     41-2
overview     41-1
protocol filter, adding     41-3

Flash file system
checksum, verifying     32-9
copying files     32-5
default device, setting     32-2
deleting files     32-8
formatting device     32-10
listing files     32-2, 32-4
overview     32-1
restoring deleted files     32-9
verifying file checksum     32-9

Flash synchronization
examples     4-12

flow control
Fast Ethernet
configuring     5-7
overview     5-2
Gigabit Ethernet
configuring     6-7
overview     6-2
keywords (table)     5-3, 6-2

formatting, Flash device     32-10

forward delay timer     8-3

forwarding state, STP     8-9

fragmentation, IP     38-6

frame classification     15-4

frame distribution, EtherChannel     7-3

frame priority, Token Ring     40-5

frame-copied bit, Token Ring     40-9

G


GARP Multicast Registration Protocol
See GMRP

GARP timers     14-7, 16-17

Gigabit EtherChannel
See EtherChannel

Gigabit Ethernet
checking connectivity     6-8
default configuration     6-5
flow control
command keywords (table)     6-2
configuring     6-7
overview     6-2
link negotiation
configuring     6-8
overview     6-3
possible link states (table)     6-3
port name, setting     6-6
port priority, setting     6-6
protocol filtering
See protocol filtering
trunks
See trunks

GMRP
default configuration     16-13
disabling
globally     16-19
per-port     16-14
enabling
globally     16-13
per-port     16-14
forward-all option
disabling     16-15
enabling     16-15
hardware and software requirements     16-13
overview     16-3
registration
fixed     16-16
forbidden     16-17
normal     16-16
statistics
clearing     16-19
viewing     16-18
timers     16-17

GVRP
disabling
globally     14-9
on 802.1Q ports     14-8
enabling
globally     14-3
on 802.1Q ports     14-3
registration
fixed     14-5
forbidden     14-6
normal     14-5
statistics
clearing     14-8
viewing     14-8
timers     14-7

H


Hello timer     8-3

history
switch CLI     2-5

hops, All-Routes Explorers and     11-11

I


ICMP
ping
executing     21-9
overview     21-8
time exceeded messages     21-9
traceroute and     21-9
unreachable messages, FDDI/CDDI and     38-7

IEEE 802.10 trunks
configuration guidelines     39-3
configuring     39-4
overview     39-1
VTP and     39-2

IEEE 802.1Q
configuring     12-7
example configuration     12-14, 12-24
mapping VLANs to ISL     11-12
overview     12-1
restrictions     12-5
spanning tree and     8-11
supported switches (table)     12-4

IGMP
configuration guidelines     16-4, 16-8
disabling     16-12
enabling     16-9
joining multicast group     16-2
leave processing
disabling     16-12
enabling     16-9
leaving multicast group     16-2
overview     16-1
statistics, viewing     16-11

images
See software images

in-band (sc0) interface
configuring     3-5
DHCP and     3-9
IP address, assigning     3-5
overview     3-1, 3-4
RARP and     3-9
VLAN assignment     11-2

inferior BPDU, BackboneFast and     9-6

interfaces
in-band (sc0)     3-4, 3-5, 11-2
out-of-band management (me1)     3-4, 3-6
SLIP (sl0)     3-4, 3-8

Internet Group Management Protocol
See IGMP

Internet protocols, supported     1-9

IP
CIDR and     29-7
default gateway, configuring     3-6
static routes     29-6
subnetworks, VLANs and     11-2

IP addresses
adding to IP permit list     19-2
aliases, creating     29-6
automatic assignment     3-2
clearing from IP permit list     19-4
designating     2-8
DHCP and     3-9
in-band (sc0) interface and     3-5
out-of-band management Ethernet (me1) interface and     3-6
RARP and     3-9
setting on supervisor     3-5, 3-6
SLIP (sl0) interface and     3-9

IP aliases
creating     29-6
designating     2-8

IP fragmentation, FDDI/CDDI and     38-6

IP multicast
CGMP and     16-4
GMRP and     16-12
group entries     16-19
IGMP snooping and     16-8
overview     16-1
router ports and     16-19

IP permit list
addresses, adding     19-2
clearing entries     19-4
default configuration     19-2
disabling     19-4
enabling     19-3
overview     19-1

IP traceroute
executing     21-10
overview     21-9

IPX
802.3 RAW-to-FDDI translation     38-12
FDDI 802.2-to-Ethernet translation     38-11
FDDI SNAP-to-Ethernet translation     38-11
FDDI/CDDI translations     38-10

ISL
configuring     12-6
example configuration     12-10, 12-11
mapping 802.1Q VLANs     11-12
overview     12-1
supported switches (table)     12-4

K


Kerberos
configuration guideliens     30-8
credentials forwarding, enabling     30-16
enabling     30-12
overview     30-4
realm, defining     30-13
servers, specifying     30-14
SRVTAB files, copying     30-15

Kermit
example downloads
PC procedure     33-29
UNIX procedure     33-30
PC software download procedure     33-27
preparing to download software images     33-26
UNIX software download procedure     33-28

key
RADIUS
clearing     30-26
specifying     30-22
TACACS+
clearing     30-32
specifying     30-29

L


Layer 4
port numbers     15-11
protocols     15-11

learning state, STP     8-8

leave processing, CGMP
disabling     16-7
enabling     16-5

leave processing, IGMP
disabling     16-12
enabling     16-9

LER
alarm, setting     38-7
cutoff, setting     38-8

link error rate
See LER

link negotiation
Fast Ethernet
configuring     5-7
overview     5-3
Gigabit Ethernet
configuring     6-8
overview     6-3

listening state, STP     8-7

load sharing, trunking and     12-18

local authentication
configuration guidelines     30-8
default configuration     30-7
disabling     30-10
enable password
setting     30-10
enabling     30-8
overview     30-2
password recovery     30-11

location, setting     29-3

login banner
clearing     29-5
configuring     29-4
overview     29-4

login password
recovering lost     30-11
setting     30-9

M


MAC addresses
allocation     8-11
blocking     18-1
designating     2-8
filters, Token Ring     41-2
learning, FDDI/CDDI     38-13
port security and     18-1

mapping VLANs     11-12

maximum age timer     8-3

me1 (out-of-band management) interface
configuring     3-6
IP address, assigning     3-6
overview     3-1

message-of-the-day
See login banner

metric values, switch TopN reports (table)     23-2

MIBs
Network Analysis Module and     26-3
overview     25-1
RMON/RMON2 support (table)     26-3
support list     1-10

minimal downtime software upgrade     4-8

modules
CDDI
configuring     38-1
checking status     21-1
designating on command-line     2-7
downloading software images     33-4, 33-16
Ethernet
configuring     5-1, 7-1, 20-1
Fast Ethernet
configuring     5-1, 7-1, 20-1
FDDI
configuring     38-1
Gigabit Ethernet
configuring     6-1, 7-1
Network Analysis Module
configuring     28-1
supervisor engine
configuring     3-1
Token Ring
configuring     40-1

MOTD
See login banner

multicast
CGMP and     16-4
GMRP and     16-12
groups
clearing     16-21
configuring     16-6, 16-11, 16-20
joining     16-2
leaving     16-2
IGMP snooping and     16-8
overview     1-8, 16-1
router
clearing ports     16-21
specifying port for     16-20
suppression
bandwidth-based     17-2
disabling     17-5
enabling     17-4
hardware     17-2
overview     17-1
packet-based     17-3
software     17-3

N


name, setting port     5-5, 6-6

native VLAN
802.1Q and     12-5
CDDI and     38-5
FDDI and     38-5

NDE
Network Analysis Module and     28-3

neighbor devices, displaying     22-4

neighbor notification frames, FDDI/CDDI and     38-8

NetFlow Data Export
See NDE

NetFlow Monitor Option     28-3

Network Analysis Module
configuring     28-2
default configuration     28-2
NDE     28-3
NetFlow Monitor Option     28-3
other commands     28-5
overview     28-1
SPAN     28-3
VLAN Agents Option     28-5
VLAN Monitor Option     28-4

network management
configuring     25-1, 26-1
overview     1-6

network security
See security

Network Time Protocol
See NTP

NFFC/NFFC II
IGMP snooping and     16-4, 16-8
protocol filtering and     20-1

NMS
SNMP, configuring     25-3

NTP
authentication     37-4
broadcast-client mode
configuring     37-3
disabling     37-7
client mode
configuring     37-3
disabling     37-7
daylight saving time adjustment
disabling     37-6
enabling     37-5
default configuration     37-2
disabling     37-7
overview     37-1
server
clearing     37-6
specifying     37-3
time zone
clearing     37-6
setting     37-5

NVRAM
ignoring content at boot     31-8

O


out-of-band management (me1) interface
configuring     3-6
IP address, assigning     3-6
overview     3-1

overview
Catalyst 2926G series switches (table)     1-3
Catalyst 2948G switch (table)     1-3
Catalyst 4000 family switches (table)     1-2
Catalyst 5000 family switches (table)     1-1
software features     1-4
supervisor engine software     1-4

P


PAgP
overview     7-2
statistics, displaying     7-11

passwords
enable     30-10
recovering lost
on switch     30-11

PC card, formatting     32-10

PCMCIA
See PC card

permit list
See IP permit list

PHY
line state, FDDI/CDDI     38-9

ping
executing     21-9
overview     21-8
testing connectivity     5-8, 6-8, 38-15

Port Aggregation Protocol
See PAgP

port cost
configuring     8-16
EtherChannel     7-7

port security
clearing
MAC addresses     18-4
configuration guidelines     18-2
configuring     18-1
age time, specifying     18-4
MAC addresses, specifying number     18-3
security violation action, specifying     18-5
shutdown time, specifying     18-5
disabling     18-6
monitoring     18-6
overview     18-1

PortFast, configuring     9-2

ports
capabilities, checking     21-5
checking status     21-3
cost, STP     8-16
designating on command-line     2-7
duplex
Ethernet     5-6
Fast Ethernet     5-6
Token Ring     40-7
dynamic VLAN membership
configuring     13-5
default configuration     13-2
example     13-10
overview     13-1
reconfirming     13-7
troubleshooting     13-8
name
CDDI     38-4
Ethernet     5-5
Fast Ethernet     5-5
FDDI     38-4
Gigabit Ethernet     6-6
Token Ring     40-5
port-VLAN cost, STP     8-17
priority
CDDI     38-5
Ethernet     5-5
Fast Ethernet     5-5
FDDI     38-5
Gigabit Ethernet     6-6
STP     8-15
Token Ring     40-5
speed
10/100 Fast Ethernet     5-6
Token Ring     40-6
state, Token Ring STP     8-19
transmission mode, Token Ring     40-7
VLAN assignments     11-11
VLAN priority, STP     8-15

port-VLAN cost
EtherChannel     7-8

priority
CDDI ports     38-5
Ethernet ports     5-5
Fast Ethernet ports     5-5
FDDI ports     38-5
Gigabit Ethernet ports     6-6
STP     8-15
Token Ring ports     40-5

prompt
configuring     29-2
overview     29-1

protocol filtering
configuring     20-3
default configuration     20-3
overview     20-1
protocol support     20-1
Token Ring     41-3

pruning, VTP
See VTP, pruning

Q


QoS
ACEs     15-5
classification     15-4
CoS
ACE and     15-11
drop thresholds, mapping     15-14
drop thresholds, transmit     15-6
Layer 4 port numbers     15-11
Layer 4 protocols     15-11
MAC/VLAN and     15-5, 15-11
ports, configuring values     15-9
ports, overview     15-4
reverting to port default     15-10
values     15-3
default configuration     15-7
disabling     15-17
enabling     15-9
frame classification     15-4
information display command     15-16
labels     15-3
overview     15-1
revert to defaults     15-17
router address     15-13
statistics     15-15
traffic flow
Catalyst 4000 and 2948G (Figure)     15-3
Catalyst 5000 (Figure)     15-2
traffic flow (figure)     15-2, 15-3
traffic marking     15-4
transmit queue
drop thresholds     15-13
overview     15-5

Quality of Service
See QoS

R


RADIUS
configuration guidelines     30-8
deadtime, setting     30-24
default configuration     30-7
disabling     30-26
enabling     30-21
key
clearing     30-26
specifying     30-22
overview     30-2
retransmit count, setting     30-24
servers
clearing     30-25
specifying     30-21
timeout, setting     30-23

RARP
in-band (sc0) interface and     3-9

rcp
downloading configuration files     34-8
downloading software images
supervisor engine     33-15
switching modules     33-14
downloading switching module images     33-16
uploading configuration files     34-9

redundant supervisor engine
See supervisor engine, redundant

related documentation     xxi

Remote Monitoring
See RMON

Resource Manager Essentials     25-4

RMON
enabling     26-2
overview     26-1
supported MIB objects     26-3
viewing data     26-2

ROM monitor
BOOT environment variable and     31-3, 31-4
boot process and     31-2
CLI     2-8
configuration register and     31-3
console port baud rate     31-6

root switch
configuring     8-13
overview     8-2
parameters (table)     8-3
secondary     8-14
STP and     8-2
STP stability and     8-4

router address for QoS     15-13

router, multicast     16-20

S


sc0 (in-band) interface
configuring     3-5
IP address, assigning     3-5
overview     3-1
VLAN assignment     11-2

security
configuring     19-1
IP permit list     19-1
overview     1-6
passwords, configuring     30-10

serial download
example PC software image download     33-29
example UNIX software image download     33-30
PC software image download procedure     33-27
preparing to download     33-26
UNIX software image download procedure     33-28

Simple Network Management Protocol
See SNMP

sl0 (SLIP) interface
configuring     3-8
overview     3-1

SLIP
console port and     3-8
sl0 interface     3-4

SLIP (sl0) interface
configuring     3-8
overview     3-1

SNMP
community strings
defining     25-3
overview     25-2
configuring     25-3
default configuration     25-3
NMS and     25-3
overview     25-1
supported RMON MIB objects     26-3

software images
downloading
example, multiple module     33-10, 33-11, 33-23, 33-24
example, single module     33-9, 33-21, 33-22
example, supervisor     33-6, 33-7, 33-18, 33-20
overview     33-1, 33-14
preparation     33-2, 33-15
supervisor     33-3, 33-15
switching module     33-4, 33-16
supervisor engine, description     1-4
uploading
preparation     33-13, 33-25
supervisor     33-13, 33-25

software upgrade
minimal downtime     4-8

source-route bridging
See SRB

source-route switching, Token Ring and     40-3

source-route transparent bridging
See SRT bridging

SPAN
configuration guidelines     27-2
configuring     27-3
disabling     27-4
overview     27-1

spanning tree
BPDUs     8-3
EtherChannel port costs     7-7
EtherChannel port-VLAN costs     7-8
forward delay timer     8-3
Hello timer     8-3
IEEE 802.1Q and     8-11
MAC address allocation     8-11
maximum age timer     8-3
root switch     8-14
configuring     8-13
overview     8-2
timers     8-3
UplinkFast
dummy MAC addresses and     9-4

spanning-tree backbone fast convergence
See BackboneFast

spanning-tree PortFast
See PortFast

Spanning-Tree Protocol
See STP

spanning-tree UplinkFast
See UplinkFast

speed
10/100 Fast Ethernet port, setting     5-6
Token Ring port, setting     40-6

SRB, Token Ring and     40-3

SRT bridging, Token Ring and     40-3

standby supervisor engine
See supervisor engine, redundant

static route, configuring     29-6

STP
BPDUs and     8-3
bridge forward delay, setting     8-18
bridge hello time, setting     8-18
bridge maximum aging time, setting     8-18
bridge priority, setting     8-17, 8-18, 8-19
default configuration     8-12
disabling     8-20
enabling     8-13
overview     1-4, 8-1
port cost, configuring     8-16
port priority, configuring     8-15
port states
blocking     8-6
disabled     8-10
forwarding     8-9
learning     8-8
listening     8-7
overview     8-4
port VLAN priority, configuring     8-15
PortFast, configuring     9-2
port-VLAN cost     8-17
root switch
election     8-2
parameters (table)     8-3
stable topology and     8-4
Token Ring
overview     8-11
port state, setting     8-19
TrBRF     8-19
TrBRF functional address, setting     8-20

supervisor engine
BOOT environment variable
clearing     31-9, 31-12
displaying     31-12
overview     31-3, 31-4
setting     31-9, 31-10
configuration register
boot field, setting     31-5
ignore NVRAM, setting     31-8
overview     31-3
ROM monitor baud rate, setting     31-6
setting     31-8
configuring     3-1
console port
establishing connection     2-2
ROM monitor baud rate     31-6
SLIP and     3-8
default boot configuration     31-5
default configuration     3-5
default gateways     3-6
downloading software images     33-3, 33-15
Flash file system
See Flash file system
IP address, setting     3-5, 3-6
management interfaces
me1 (out-of-band), configuring     3-6
overview     3-1
sc0 (in-band), configuring     3-5
sl0 (SLIP), configuring     3-8
me1 (out-of-band management) interface     3-6
preparing to configure     3-4
redundant
configuration guidelines     4-4
console port and     4-2
Flash synchronization     4-12
forcing switchover to standby     4-6
overview     1-9, 4-1
slot assignment     4-2
Supervisor Engine III     4-2
uplink ports, configuring     4-7
verifying status     4-5
ROM monitor     31-2
sc0 (in-band) interface     3-5
sl0 (SLIP) interface     3-8
software description     1-4
software images
downloading     33-3, 33-15
overview     1-4
startup, specifying     31-1
uploading     33-13, 33-25
startup configuration     31-1
static routes     29-6
switchover     4-6
uplink ports, standby, configuring     4-7
uploading software images     33-13, 33-25

switch administration
modules, checking status     21-1
overview     1-8
ports, checking status     21-3
procedures     29-1, 36-1

switch CLI
accessing     2-2
command aliases     2-7
help     2-4
history substitution     2-5
IP addresses, designating     2-8
IP aliases, designating     2-8
MAC addresses, designating     2-8
modules, designating     2-7
operating     2-3
ports, designating     2-7
VLANs, designating     2-7

switch management interfaces
See supervisor engine, management interfaces

switch TopN reports
background execution     23-2
foreground execution     23-2
metric values (table)     23-2
overview     23-1
running     23-3
viewing     23-3

Switched Port Analyzer
See SPAN

switching modules
See modules

switchover
See supervisor engine, switchover

syslog
buffer size, setting     35-6
configuration, displaying     35-8
configuring     35-4
daemon, configuring     35-7
default configuration     35-4
facilities (table)     35-2
logging levels, setting     35-5
message format     35-3
message log, displaying     35-9
overview     35-1
server, configuring     35-7
session settings, setting     35-4
severity levels (table)     35-3
timestamp, changing enable state     35-6

system clock, setting     29-4

system contact, setting     29-3

system image
switch
downloading     33-3, 33-15
overview     1-4
startup, specifying     31-1
uploading     33-13, 33-25

system location, setting     29-3

system message logging
buffer size, setting     35-6
configuration, displaying     35-8
configuring     35-4
daemon, configuring     35-7
default configuration     35-4
facilities (table)     35-2
logging levels, setting     35-5
message format     35-3
message log, displaying     35-9
overview     35-1
server, configuring     35-7
session settings, setting     35-4
severity levels (table)     35-3
syslog daemon, configuring     35-7
timestamp, changing enable state     35-6

system name
clearing     29-3
configuring     29-2
overview     29-1

system prompt
configuring     29-2
overview     29-1

T


TACACS+
configuration guidelines     30-8
default configuration     30-7
disabling     30-33
enabling     30-28
example configuration     30-33
key, specifying     30-29
login attempts allowed     30-30
overview     30-3
timeout interval     30-29

Telnet
system message logging settings     35-5
user sessions
disconnecting     21-8
monitoring     21-7

Telnet, executing     21-6

TFTP
downloading software images
example, multiple module     33-10, 33-11, 33-23, 33-24
example, single module     33-9, 33-21, 33-22
example, supervisor     33-6, 33-7, 33-18, 33-20
supervisor engine     33-3, 33-15
switching modules     33-4, 33-16
uploading configuration files     34-6
uploading software images     33-13, 33-25

time zone
clearing     37-6
setting     37-5

time, setting     29-4

Token Ring
address-recognized bit     40-9
All-Routes Explorer reduction     40-10
configuration loss thresholds, setting     40-9
default configuration     40-4
DTR     40-4
duplex, setting     40-7
early token release, setting     40-8
filters
clearing     41-4
MAC address filter, adding     41-2
overview     41-1
protocol filter, adding     41-3
frame priority, setting     40-5
frame-copied bit     40-9
overview     40-1
port name, setting     40-5
port transmission mode, setting     40-7
source-route switching     40-3
speed, setting on port     40-6
SRB     40-3
SRT bridging     40-3
STP
See STP, Token Ring
supported features     40-2
TrBRF
functional address, setting     8-20
STP and     8-19
VLANs
overview     11-3
TrBRF     11-3
TrCRF     11-4

Token Ring Timer
See TRT

TopN reports
See switch TopN reports

traceroute
See IP traceroute

translation, IPX on FDDI/CDDI     38-10

transmit queue
drop thresholds     15-13

TrBRF
creating     11-8
functional address, setting     8-20
modifying     11-8
overview     11-3
STP, configuring     8-19

TrCRF
All-Routes Explorer maximum hops     11-11
backup     11-10
creating     11-9
modifying     11-9
overview     11-4

TRequest, FDDI/CDDI and     38-10

troubleshooting
system message logging and     35-1
VMPS     13-8

TRT, FDDI/CDDI and     38-10

trunks
allowed VLANs     12-8
autonegotiation     12-2
default configuration     12-5
disabling     12-9
encapsulation types
descriptions (table)     12-3
switch support matrix (table)     12-4
example configurations
802.1Q     12-14
IEEE 802.1Q     12-24
ISL     12-10, 12-11
load sharing     12-18
IEEE 802.1Q
configuring     12-7
restrictions     12-5
ISL, configuring     12-6
ISL/802.1Q negotiating, configuring     12-8
modes (table)     12-2
overview     12-1
possible configurations (table)     12-3
VLANs, allowed     12-8

U


UDLD
configuration, displaying     24-4
default configuration     24-2
disabling globally     24-4
disabling on ports     24-3
enabling globally     24-3
enabling on ports     24-3
overview     24-1
software and hardware requirements     24-2

unclassified frames     15-4

UniDirectional Link Detection protocol
See UDLD

upgrading
minimal downtime     4-8

uplink ports, standby, configuring     4-7

UplinkFast
configuring     9-4
dummy MAC addresses and     9-4
overview     9-3

uploading
configuration files
preparation     34-6, 34-9
running configuration     34-6, 34-9
TFTP     34-6
software images
preparation     33-13, 33-25
supervisor     33-13, 33-25

user sessions
disconnecting     21-8
monitoring     21-7

user-data string, FDDI/CDDI     38-3

V


virtual LAN
See VLANs

VLAN Agents Option     28-5

VLAN Management Policy Server
See VMPS

VLAN Monitor Option     28-4

VLAN Trunk Protocol
See VTP

VLAN trunks
See trunks

VLANs
allowed on trunk     12-8
assigning ports to     11-11
bridge forward delay     8-18
bridge hello time     8-18
bridge maximum aging time     8-18
bridge priority     8-17, 8-18, 8-19
configuration guidelines     11-6
cost     8-17
default configuration     11-6
deleting     11-13
designating on command-line     2-7
Ethernet     11-7
FDDI     11-8
in-band (sc0) interface assignment     11-2
IP subnetworks and     11-2
mapping 802.1Q to ISL     11-12
native
802.1Q and     12-5
FDDI/CDDI     38-5
overview     1-5, 11-1
port VLAN priority     8-15
ports, assigning to     11-11
protocol filtering and     20-1
sc0 (in-band) interface assignment     11-2
Token Ring
All-Routes Explorer maximum hops     11-11
backup     11-10
creating     11-8, 11-9
modifying     11-8, 11-9
overview     11-3
TrBRF     11-3
TrCRF     11-4
TrBRF     11-8
TrCRF
backup     11-10
creating     11-9
trunks
See trunks
VTP domain and     11-1

VMPS
administering     13-6
configuring     13-5
database
creating     13-4
downloading     13-7
example configuration file     13-9
default configuration     13-2
disabling     13-5
dynamic port membership
configuring     13-5
example     13-10
overview     13-1
reconfirming     13-7
troubleshooting     13-8
error messages (table)     13-8
example configurations
database configuration file     13-9
dynamic port VLAN membership     13-10
monitoring     13-6
overview     13-1
reconfirming membership     13-7
troubleshooting     13-8

VTP
advertisements     10-2
client, configuring     10-7
configuration guidelines     10-5
default configuration     10-5
disabling     10-7
domains     10-2
IEEE 802.10 trunks and     39-2
modes
client     10-2
server     10-2
transparent     10-2
monitoring     10-10
overview     10-1
pruning
configuring     10-9
disabling     10-10
overview     10-3
server, configuring     10-6
statistics     10-10
transparent mode, configuring     10-7
version 2
disabling     10-9
enabling     10-8
overview     10-3
VLANs and     11-1

VTP pruning
configuring     10-9
disabling     10-10
overview     10-3

hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Oct 1 13:29:46 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.