cc/td/doc/product/lan/cat5000/rel_5_5
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

set qos defaultcos
set qos ip-filter
set qos mac-cos
set qos map
set qos policy-source
set qos router-mac
set qos wred-threshold
set radius deadtime
set radius key
set radius retransmit
set radius server
set radius timeout
set rcp username
set rgmp
set rsmautostate
set snmp access
set snmp community
set snmp extendedrmon
set snmp extendedrmon netflow
set snmp extendedrmon vlanagent
set snmp extendedrmon vlanmode
set snmp group
set snmp notify
set snmp rmon
set snmp targetaddr
set snmp targetparams
set snmp trap
set snmp user
set snmp view
set span
set spantree backbonefast
set spantree disable
set spantree enable
set spantree fwddelay
set spantree hello
set spantree maxage
set spantree multicast-address
set spantree portcost
set spantree portfast
set spantree portfast bpdu-guard
set spantree portpri
set spantree portstate
set spantree portvlancost
set spantree portvlanpri
set spantree priority

2

set qos defaultcos

Use the set qos defaultcos command to define the default CoS value for the entire switch.

set qos defaultcos cos_value

Syntax Description

cos_value

CoS value to use as the default CoS for the switch.

Defaults

The default CoS value for the entire switch is 0.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 4000 family switches and the Catalyst 2948G and
2980G switch.

Examples

This example shows how to set the switch default CoS to 7:

Console> (enable) set qos defaultcos 7
qos defaultcos set to 7
Console> (enable) 
 

This example shows how to set the switch default CoS to 4:

Console> (enable) set qos defaultcos 4
qos defaultcos set to 4
Console> (enable) 

Related Commands

show qos mac-cos

set qos ip-filter

Use the set qos ip-filter command to create access control entries (ACEs) with Layer 3 values or with both Layer 3 and 4 values.

set qos ip-filter cos {src_ip_addr_spec} {dest_ip_addr_spec} [before ACE# | modify ACE#]

set qos ip-filter cos protocol {src_ip_addr_spec} {src_port} {dest_ip_addr_spec}{dest_port}
[before ACE# | modify ACE#]

Syntax Description

cos

CoS to assign to packets matching this filter; valid values are from 0 to 7.

src_ip_addr_ spec

Source IP address. See "Usage Guidelines" for the format.

dest_ip_addr_ spec

Destination IP address. See "Usage Guidelines" for the format.

before ACE#

(Optional) Keyword and variable that specifies to insert an ACE in front of the specified ACE.

modify ACE#

(Optional) Keyword and variable that specifies to replace an ACE with the new ACE.

protocol

Type of protocol that the ACE matches; valid values are TCP, UDP, or any.

src_port

Number of the source port.

dest_port

Number of the destination port.

Defaults

This command has no default setting.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.

If you do not specify the before ACE# argument, the new entry is placed after the last. The ACE number of any entry is its current position in the list. These can be viewed by the show qos ip command.

If you do not enter the protocol variable, the set qos ip-filter command specifies an ACE that is independent of the Layer 4 protocol and port. If you enter the protocol variable, the command specifies an ACE that matches specific Layer 4 protocols and ports.

The dest_ip_addr_spec and src_ip_addr_spec variables are entered in the following format:

{any | {host ip_addr} | {ip_addr ip_addr_mask}}

where:

Layer 4 ports can only be specified for unicast addresses. If the destination address specifies a multicast address, and you enter the set qos ip-filter {dest_ip_addr} {src_ip_addr mask} protocol [dst_port src_port] cos [before ACE#] command, an error is displayed. If the destination address includes multicast addresses and the same command is used, a message displays that the command only applies to unicast addresses.

If you enter a 0 for the src_port variable, it means any source port matches.

If you enter a 0 for the dest_port variable, it means any destination port matches.

Examples

This example shows how to create ACEs and an ACE within the list and verify the configuration using the show qos ip command:

Console>(enable) set qos ip-filter 7 100.100.1.1 255.255.255.0 200.200.1.1 255.255.255.0
qos ip-filter is set successfully.
Console> (enable)
 
Console> (enable) show qos ip 
There are 1 IP filter(s).
ACE# Dest IP and Mask                     Src IP and Mask                    
---- -------------------------------- --------------------------------
   1 100.100.1.1 255.255.255.0        200.200.1.1 255.255.255.0       
     Protocol Dst Port Src Port CoS
     -------- -------- -------- ---
     both     0        0        7  
Console> (enable)
 
Console> (enable) set qos ip-filter 4 tcp 120.100.1.1 255.255.255.0 47 210.210.1.1 255.255.255.0 23
qos ip-filter is set successfully.
Console> (enable)
Console> (enable) show qos ip 
There are 2 IP filter(s).
ACE# Dest IP and Mask                     Src IP and Mask                    
---- -------------------------------- --------------------------------
   1 100.100.1.1 255.255.255.0        200.200.1.1 255.255.255.0       
     Protocol Dst Port Src Port CoS
     -------- -------- -------- ---
     both     0        0        7  
 
   2 120.100.1.1 255.255.255.0        210.210.1.1 255.255.255.0       
     Protocol Dst Port Src Port CoS
     -------- -------- -------- ---
     tcp      23       47       4  
Console> (enable)
 
Console> (enable) set qos ip-filter 1 20.20.20.1 255.0.0.0 30.30.1.1 255.0.0.0 before 1
qos ip-filter is set successfully.
Console> (enable)
 
Console> (enable) show qos ip 
There are 3 IP filter(s).
 
ACE# Dest IP and Mask                     Src IP and Mask                    
---- -------------------------------- --------------------------------
   1 20.20.20.1 255.0.0.0             30.30.1.1 255.0.0.0             
     Protocol Dst Port Src Port CoS
     -------- -------- -------- ---
     both     0        0        1  
 
   2 100.100.1.1 255.255.255.0        200.200.1.1 255.255.255.0       
     Protocol Dst Port Src Port CoS
     -------- -------- -------- ---
     both     0        0        7  
 
   3 120.100.1.1 255.255.255.0        210.210.1.1 255.255.255.0       
     Protocol Dst Port Src Port CoS
     -------- -------- -------- ---
     tcp      23       47       4 
Console> (enable) 

Related Commands

show qos ip
clear qos ip-filter

set qos mac-cos

Use the set qos mac-cos command to map a CoS value to a MAC address and VLAN pair.

set qos mac-cos dest_mac vlan cos

Syntax Description

dest_mac

MAC address of the destination host.

vlan

Number of the VLAN; valid values are 1 to 1001.

cos

CoS value; valid values are 0 to 7, with the higher numbers representing higher priority.

Defaults

This command has no default setting.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.

The set qos mac-cos command creates a permanent CAM entry that remains in the CAM table until the active supervisor is reset.

The port associated with the MAC address is learned when the first packet with this source MAC address is received. These entries are not aged out.

If you enter the show cam command, entries made with the set qos mac-cos command are displayed as dynamic. Entries made using the set qos mac-cos command do not age out.

Examples

This example shows how to map a CoS value to a MAC address and VLAN:

Console> (enable) set qos mac-cos 0f-ab-12-12-00-13 2 3
CoS 3 is assigned to 0f-ab-12-12-00-13 vlan 2.
Console> (enable) 

Related Commands

clear qos mac-cos
show qos mac-cos

set qos map

Use the set qos map command to associate CoS values to a transmit queue and drop threshold.

set qos map port_type q# threshold# cos coslist

Syntax Description

port_type

The port_type is hardware-dependent. Use the show port capabilities command to determine the port_type for your hardware. The port type is defined by the number of transmit queues and the number of drop thresholds supported on the port. For example, the 1q4t port type supports one transmit queue and four drop thresholds.

q#

Transmit queue number.

threshold#

Drop threshold number. The higher the threshold number, the lower the chance traffic will be dropped.

cos

Keyword that specifies CoS values.

coslist

List of CoS values between 0 to 7. The higher the number the higher the priority.

Defaults

CoS value-to-drop threshold mapping

Catalyst 5000 family switches:

  • Drop threshold 1: CoS 0-1

  • Drop threshold 2: CoS 2-3

  • Drop threshold 3: CoS 4-5

  • Drop threshold 4: CoS 6-7

Catalyst 4000 family and 2948G switches:

  • Drop threshold 1: CoS 0-7

CoS value-to-transmit queue mapping

Catalyst 5000 family switches:

  • Transmit queue 1: CoS 0-7

Catalyst 4000 family and 2948G switches:

  • Transmit queue 1: CoS 0-7

  • Transmit queue 2: None configured

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches, Catalyst 4000 family switches, and the 2948G and 2980G switch.

On the Catalyst 5000 family switches, this command is supported only with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.

Examples

This example shows how to assign the CoS values 1 and 2 to the first transmit queue and the first drop threshold for that queue on a 1q4t port (Catalyst 5000 family switches):

Console> (enable) set qos map 1q4t 1 1 cos 1-2
Qos tx priority queue and threshold mapped to cos successfully.
Console> (enable) 
 
 

This example shows how to assign the CoS values 4 through 7 to the first transmit queue and the second drop threshold for that queue on a 1q4t port (Catalyst 5000 family switches):

Console> (enable) set qos map 1q4t 1 2 cos 4-7
Qos tx priority queue and threshold mapped to cos successfully.
Console> (enable) 
 
 

This example shows how to map CoS values 4 through 7 to the second transmit queue and the first drop threshold for that queue on a 2q1t port (Catalyst 4000 family, 2948G, and 2980G switches):

Console> (enable) set qos map 2q1t 2 1 cos 4-7
Qos tx priority queue and threshold mapped to cos successfully.
Console> (enable)

Related Commands

clear qos map
show qos info

set qos policy-source

Use the set qos policy-source command to set the QoS policy source.

set qos policy-source local | cops

Syntax Description

local

Keyword that specifies to set the policy source to local NVRAM configuration.

cops

Keyword that specifies to set the policy source to COPS configuration.

Defaults

The default is all ports are set to local.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches.

When you set the policy source to local, the QoS policy is taken from local configuration stored in NVRAM. If you set the policy source to local after it was set to COPS, the QoS policy reverts back to the local configuration stored in NVRAM.

When you set the policy source to COPS, all configuration that is global to the device, such as the DSCP to marked-down DSCP, is taken from policy downloaded to the PEP by the PDP. Configuration of each physical port, however, is taken from COPS only if the policy source for that port has been set to COPS.

Examples

This example shows how to set the policy source to COPS:

Console> (enable) set qos policy-source cops
QoS policy source for the switch set to COPS.
Console> (enable) 
 

This example shows how to set the policy source to local NVRAM:

Console> (enable) set qos policy-source local
QoS policy source for the switch set to local.
Console> (enable) 
 

This example shows the output if you attempt to set the policy source to COPS and no COPS servers are available:

Console> (enable) set qos policy-source cops
QoS policy source for the switch set to COPS.
Warning: No COPS servers configured. Use the `set cops server' command
to configure COPS servers.
Console> (enable) 

Related Commands

clear qos config
show qos info
show qos policy-source

set qos router-mac

Use the set qos router-mac command to specify router MAC addresses for ACE-based classification.

set qos router-mac mac_address vlan

Syntax Description

mac_address

MAC address contained in the packets to be filtered. You can enter this address in canonical format (00-11-33-44-55) or noncanonical format (00:11:22:33:44:55).

vlan

Number of the VLAN; valid values are 1 to 1005.

Defaults

This command has no default setting.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or
III G, or Supervisor Engine III or III F with the NFFC II.

This command is not supported by the MLS-RP.

Use this command to specify the MAC address of a router for which to perform ACE-based classification. For IPv4 traffic destined for a router, QoS can classify packets that match an Access-Control Entry (ACE) by setting the IP precedence bits (in the IP TOS header) and CoS value in the frame header.

If you are using MLS, QoS can perform ACE-based classification only for traffic that is switched using MLS. ACE-based classification is performed at the switch egress port as the flow is being multilayer switched. QoS cannot perform ACE-based classification on traffic that the MLS-RP routes off the switch. QoS learns the address of the MLS-RP automatically when MLS is configured on the switch.

Examples

This example shows how to set the router MAC address on a specific VLAN:

Console> (enable) set qos router-mac 00-40-0b-30-03-48 2
Router MAC/Vlan is set for QoS.
Console> (enable) 

Related Commands

clear qos router-mac
show qos mac-cos

set qos wred-threshold

Use the set qos wred-threshold command to specify the transmit queue drop thresholds on all ports in the switch.

set qos wred-threshold port_type [rx | tx] queue {q# thr1 thr2 thr3 thr4}

Syntax Description

port_type

Only valid value for port_type is 1q4t.

rx

(Optional) Keyword that specifies input queuing. This keyword is not
supported.

tx

(Optional) Keyword that specifies output queuing.

queue

Keyword that specifies the queue value.

q#

Number of queue. The only valid value is 1.

thr#

Value of threshold; valid values are 1 to 100 percent.

Defaults

The defaults are output queuing and the threshold values are 30%, 50%, 80%, and 100%.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.

The number preceding the t letter in the port_type (1q4t) determines the number of threshold values the hardware supports. For example, with 1q4t, the number of thresholds specified is four.

The number preceding the q letter in the port_type determines the number of the queues that the hardware supports. For example, with 1q4t, the number of queues specified is one.

The transmit drop threshold percentages specified select a buffer usage level where each threshold applies.

The percentages to buffer usage level are as follows:

Due to the granularity of programming the hardware, the values set in hardware will be close approximations of the values provided.

Examples

This example shows how to configure the transmit queue drop thresholds.

Console> (enable) set qos wred-threshold 1q4t tx queue 1 30 50 80 100
Transmit drop thresholds for queue 1 set at 30% 50% 80% 100%
Console> (enable) 

Related Commands

show qos info

set radius deadtime

Use the set radius deadtime command to set the time to skip RADIUS servers that do not reply.

set radius deadtime minutes

Syntax Description

minutes

The length of time a RADIUS server does not respond to an authentication request; valid values are 0 to 1440 minutes.

Defaults

The default is 0 minutes.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If only one RADIUS server is configured or if all the configured servers are marked dead, deadtime will be ignored because there are no alternate servers available. By default, the deadtime will be 0 minutes, that is, the RADIUS servers will not be marked dead if they do not respond.

Examples

This example shows how to set the RADIUS deadtime to 10 minutes:

Console> (enable) set radius deadtime 10
Radius deadtime set to 10 minutes.
Console> (enable) 

Related Commands

show radius

set radius key

Use the set radius key command to set the encryption and authentication for all communication between the RADIUS client and the server.

set radius key {key}

Syntax Description

The command has no keywords or arguments.

Defaults

The default of the key is set to NULL.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The key you set must be the same one as configured in the RADIUS server. All leading spaces are ignored, spaces within and at the end of the key are not ignored. Double quotes are not required even if there are spaces in the key, unless the quotes themselves are part of the key. The length of the key is limited to 65 characters. It can include any printable ASCII character except tabs.

Examples

This example shows how to set the RADIUS encryption and authentication key to Make my day:

Console> (enable) set radius key Make my day
Radius key set to Make my day.
Console> (enable)

Related Commands

show radius

set radius retransmit

Use the set radius retransmit command to specify the number of times the RADIUS servers are tried before giving up on the server.

set radius retransmit count

Syntax Description

count

Number of times the RADIUS servers are tried before giving up on the server; valid values are 1 to 100.

Defaults

The default is two times (three attempts).

Command Types

Switch command.

Command Modes

Privileged.

Examples

This example shows how to set the retransmit attempts to 3:

Console> (enable) set radius retransmit 3
Radius retransmit count set to 3.
Console> (enable) 

Related Commands

show radius

set radius server

Use the set radius server command to set up the RADIUS server.

set radius server ipaddr [auth-port port] [acct-port port][primary]

Syntax Description

ipaddr

Number of the IP address or IP alias in dot notation a.b.c.d.

auth-port

(Optional) Keyword that specifies a destination UDP port for RADIUS messages.

port

Number of the destination UDP port number to which RADIUS messages should be sent.

acct-port

(Optional) Keyword that specifies a destination UDP port for RADIUS messages.

port

Number of the destination UDP port number to which RADIUS messages should be sent.

primary

(Optional) Keyword that specifies that this server be contacted first.

Defaults

The default auth-port is 1812. The default acct-port is 1813.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

You can add up to three RADIUS servers.

The RADIUS server will not be used for authentication if the port number is set to 0.

Examples

This example shows how to add a primary server using an IP alias:

Console> (enable) set radius server tampa.users.com
tampa.users.com added to RADIUS server table as primary server.
Console> (enable) 

Related Commands

show radius

set radius timeout

Use the set radius timeout command to set the time between retransmissions to the RADIUS server.

set radius timeout seconds

Syntax Description

seconds

Number of seconds to wait for a reply; valid values are 1 to 1000 seconds.

Defaults

The default timeout is 5 seconds.

Command Types

Switch command.

Command Modes

Privileged.

Examples

This example shows how to set the time between retransmissions to 7 seconds:

Console> (enable) set radius timeout 7 
Radius timeout set to 7 seconds.
Console> (enable) 

Related Commands

show radius

set rcp username

Use the set rcp username command to specify your username for rcp file transfers.

set rcp username username

Syntax Description

username

Username up to 14 characters long.

Defaults

There are no default settings for this command.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

Username must be different from "root" and not a null string. The only case where rcp username is not used is for the VMPS database. For the VMPS database, an rcp VMPS username is used.

Examples

This example shows how to set the username for rcp:

Console> (enable) set rcp username jdoe
Console> (enable) 

Related Commands

set vmps downloadmethod

set rgmp

Use the set rgmp command to enable or disable the RGMP feature on the switch.

set rgmp {enable | disable}

Syntax Description

enable

Keyword to enable RGMP on the switch.

disable

Keyword to disable RGMP on the switch.

Defaults

The default is RGMP is disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches.

RGMP is a global command. You cannot enable or disable RGMP on a per-VLAN basis.

The RGMP feature is operational only if IGMP snooping is enabled on the switch (see the set igmp command).

Examples

This example shows how to enable RGMP on the switch:

Console> (enable) set rgmp enable
RGMP is enabled.
Console> (enable)
 

This example shows how to disable RGMP on the switch:

Console> (enable) set rgmp disable
RGMP is disabled.
Console> (enable)

Related Commands

show rgmp group
show rgmp statistics
clear rgmp statistics
set igmp
set igmp fastleave

set rsmautostate

Use the set rsmautostate command to enable and disable line protocol state determination of the RSMs due to port state changes. When you enable rsmautostate, VLAN interfaces on the RSM are active only when there is at least one other active interface within the Catalyst 5000 family and 2926G series switches. This interface could be a physical end-user port, a trunk connection for which the VLAN is active, or another RSM with an equivalent VLAN interface.

set rsmautostate {enable | disable}

Syntax Description

enable

Keyword that specifies to activate line protocol state determination.

disable

Keyword that specifies to deactivate line protocol state determination.

Defaults

The default configuration has line protocol state determination disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches.

This command is useful for discontinuing the advertisement of routing paths when access to them is severed (either through fault or administrative disabling).

If you disable rsmautostate, you might have to use the shutdown/no shutdown Cisco IOS command to disable and then restart the VLAN interface to bring the RSM back up.

Examples

This example shows how to enable the line protocol state determination of the RSM:

Console> (enable) set rsmautostate enable
Console> (enable)
 

This example shows how to disable the line protocol state determination of the RSM:

Console> (enable) set rsmautostate disable
Console> (enable)

Related Commands

show rsmautostate

set snmp access

Use the set snmp access command to define the access rights of an SNMP group with a specific security model in different security levels.

set snmp access {-hex} {groupname} {security-model {v1 | v2c}} [read {-hex} {readview}]
[write {-hex} {writeview}] [notify {-hex} {notifyview}] [volatile | nonvolatile]

set snmp access {-hex} {groupname} {security-model v3 {noauthentication | authentication
| privacy}} [read {-hex} {readview}] [write {-hex} {writeview}] [notify {-hex}
{notifyview}] [volatile | nonvolatile]

Syntax Description

-hex

Keyword to display the groupname, readview, writeview and notifyview as a hexadecimal format.

groupname

Name of the SNMP group.

security-model v1| v2c

Keywords that specify security-model v1 or v2c.

read readview

(Optional) Keyword and variable that specify the name of the view that allows you to see the MIB objects

write writeview

(Optional) Keyword and variable that specify the name of the view that allows you to configure the contents of the agent.

notify notifyview

(Optional) Keyword and variable that specify the name of the view that allows you to send a trap about MIB objects.

v3

Keyword that specifies security model v3.

noauthentication

Keyword that specifies the security model is not set to use the authentication protocol.

authentication

Keyword that specifies the type of authentication protocol.

privacy

Keyword that specifies the messages sent on behalf of the user are protected from disclosure.

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.

Defaults

The defaults are as follows:

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for groupname, readview, writeview, and notifyview (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

readview is assumed to be every object belonging to the Internet (1.3.6.1) OID space; you can use the read option to override this state.

For writeview, you must also configure write access.

For notifyview, if a view is specified, any notifications in that view are sent to all users associated with the group (an SNMP server host configuration must exist for the user).

Examples

This example shows how to set the SNMP access rights for a group:

Console> (enable) set snmp access cisco-group security-model v3 authentication
SNMP access group was set to cisco-group version v3 level authentication, readview internet, nonvolatile.
Console> (enable) 

Related Commands

clear snmp access
show snmp

set snmp community

Use the set snmp community command to set SNMP communities and associated access types.

set snmp community {read-only | read-write | read-write-all} [community_string]

Syntax Description

read-only

Keyword that specifies to assign read-only access to the specified SNMP community.

read-write

Keyword that specifies to assign read-write access to the specified SNMP community.

read-write-all

Keyword that specifies to assign read-write-all access to the specified SNMP community.

community_string

(Optional) Name of the SNMP community.

Defaults

The default configuration has the following communities and access types defined:

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

There are three configurable SNMP communities, one for each access type. If you do not specify the community string, the community string configured for that access type is cleared.

Examples

This example shows how to set read-write access to the SNMP community called yappledapple:

Console> (enable) set snmp community read-write yappledapple
SNMP read-write community string set.
Console> (enable)
 

This example shows how to clear the community string defined for read-only access:

Console> (enable) set snmp community read-only
SNMP read-only community string cleared.
Console> (enable)

Related Commands

show snmp

set snmp extendedrmon

Use the set snmp extendedrmon command to enable or disable the Network Analysis Module.

set snmp extendedrmon {enable | disable}

Syntax Description

enable

Keyword that specifies to enable the Network Analysis Module.

disable

Keyword that specifies to disable the Network Analysis Module.

Defaults

The default is enabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.

Examples

This example shows how to enable the Network Analysis Module:

Console> (enable) set snmp extendedrmon enable
Snmp extended RMON module enabled
Console> (enable) 
 

This example shows how to disable the Network Analysis Module:

Console> (enable) set snmp extendedrmon disable
Snmp extended RMON module disabled
Console> (enable) 

Related Commands

show snmp

set snmp extendedrmon netflow

Use the set snmp extendedrmon netflow command to enable or disable the Network Analysis Module to receive the NDE stream from an NFFC or NFFC II and present the resulting statistics on reserved ifIndex.3000.

set snmp extendedrmon netflow {enable password | disable}

Syntax Description

enable

Keyword that specifies to allow the Network Analysis Module to receive the NDE stream from an NFFC or NFFC II installed in the Catalyst 5000 family and 2926G series switches.

password

NetFlow Monitor registration password.

disable

Keyword that specifies to prevent the Network Analysis Module from receiving the NDE stream.

Defaults

The default is SNMP-extended RMON NetFlow disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.

To enable the NetFlow Monitor option, you must purchase a NetFlow Monitor option license from your Cisco sales representative.

The option license has a registration key and URL on it. Access the URL and enter the registration key and the MAC address of the Network Analysis Module to generate the password for your Network Analysis Module.

Examples

This example shows how to enable SNMP-extended RMON NetFlow support:

Console> (enable) set snmp extendedrmon netflow enable <password>
Snmp extended RMON netflow enabled
Console> (enable) 
 

This example shows how to disable SNMP-extended RMON NetFlow support:

Console> (enable) set snmp extendedrmon netflow disable
Snmp extended RMON netflow disabled
Console> (enable) 

Related Commands

show snmp

set snmp extendedrmon vlanagent

Use the set snmp extendedrmon vlanagent command to enable or disable the VLANagent option. If the VLANagent option is enabled, the NAM aggregates statistics by VLAN as well as by port.

set snmp extendedrmon vlanagent {enable | disable}

Syntax Description

enable

Keyword that specifies to activate SNMP-extended RMON VLANagent support.

disable

Keyword that specifies to deactivate SNMP-extended RMON VLANagent support.

Defaults

The default is SNMP-extended RMON VLANagent disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.

The VLANagent option imposes an increased load on the NAM and might not be suitable for use on a heavily loaded switch or when the switch is configured to analyze a high volume of network traffic.

Examples

This example shows how to enable extended RMON VLANagent support:

Console> (enable) set snmp extendedrmon vlanagent enable
Snmp extended RMON vlanagent enabled
Console> (enable)
 

This example shows how to disable extended RMON VLANagent support:

Console> (enable) set snmp extendedrmon vlanagent disable
Snmp extended RMON vlanagent disabled
Console> (enable)

Related Commands

show snmp

set snmp extendedrmon vlanmode

Use the set snmp extendedrmon vlanmode command to enable or disable the VLAN monitor option. If the VLAN monitor option is enabled, the Network Analysis Module aggregates statistics by VLAN, instead of by source MAC address.

set snmp extendedrmon vlanmode {enable | disable}

Syntax Description

enable

Keyword that activates SNMP-extended RMON VLAN mode support.

disable

Keyword that deactivates SNMP-extended RMON VLAN mode support.

Defaults

The default is SNMP-extended RMON VLAN mode disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.

Examples

This example shows how to enable extended-RMON VLAN mode support:

Console> (enable) set snmp extendedrmon vlanmode enable
Snmp extended RMON vlanmode enabled
Console> (enable) 
 

This example shows how to disable extended-RMON VLAN mode support:

Console> (enable) set snmp extendedrmon vlanmode disable
Snmp extended RMON vlanmode disabled
Console> (enable)

Related Commands

show snmp

set snmp group

Use the set snmp group command to establish the relationship between an SNMP group and a user with a specific security model.

set snmp group {-hex} {groupname} user {-hex} {username} {security-model {v1 | v2c |
v3}} [volatile | nonvolatile]

Syntax Description

-hex

Keyword that displays the groupname and username as a hexadecimal format.

groupname

Name of the SNMP group that defines an access control; the maximum length is 32 bytes.

user

Keyword that specifies the SNMP group user name.

username

Name of the SNMP user that belongs to the SNMP group; the maximum length is 32 bytes.

security-model v1 | v2c | v3

Keywords that specifies security-model v1, v2c, or v3.

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is turned off and on again.

Defaults

This command has no default settings.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for groupname or username (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

Examples

This example shows how to set the SNMP group:

Console> (enable) set snmp group cisco-group user joe security-model v3
SNMP group was set to cisco-group user joe and version v3,nonvolatile.
Console> (enable)

Related Commands

clear snmp group
show snmp group

set snmp notify

Use the set snmp notify command to set the notifyname in the snmpNotifyTable and set the notifytag in the snmpTargetAddrTable.

set snmp notify {-hex} {notifyname} tag {-hex} {notifytag} [trap | inform] [volatile |
nonvolatile]

Syntax Description

-hex

Keyword that displays notifyname and notifytag as a hexadecimal format.

notifyname

Keyword that specifies a unique identifier to index the snmpNotifyTable.

tag

Keyword that specifies the tag name in the taglist.

notifytag

Keyword that specifies selected entries in the snmpTargetAddrTable.

trap

(Optional) Keyword that specifies all messages that contain snmpv2-Trap PDUs.

inform

(Optional) Keyword that specifies all messages that contain InfoRequest PDUs

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.

Defaults

The defaults are as follows:

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for the notifyname and notifytag (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

Examples

This example shows how to set the SNMP notify for a specific notifyname:

Console> (enable) set snmp notify hello tag world inform
SNMP notify name was set to hello with tag world notifyType inform, and storageType nonvolatile.
Console> (enable)

Related Commands

clear snmp notify
show snmp notify

set snmp rmon

Use the set snmp rmon command to enable or disable SNMP RMON support.

set snmp rmon {enable | disable}

Syntax Description

enable

Keyword that specifies to activate SNMP RMON support.

disable

Keyword that specifies to deactivate SNMP RMON support.

Defaults

The default for RMON support is disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

RMON statistics are collected on a segment basis instead of a repeater-port basis for the Catalyst 5000 family, 4000 family, 2926G series, 2948G, and 2980G group switching Ethernet modules (WS-X5020 and WS-X5223).

The RMON feature deinstalls the domains for all of the interfaces on an Ethernet module that has been removed from the system.

RMON is supported on Ethernet, Fast Ethernet, Gigabit Ethernet, and Token Ring switch ports.

When RMON is enabled, the supported RMON groups for Ethernet ports are Statistics, History, Alarms, and Events, as specified in RFC 1757.

When RMON is enabled, the supported RMON groups for Token Ring ports are Mac-Layer Statistics, Promiscuous Statistics, Mac-Layer History, Promiscuous History, Ring Station Order Table, Alarms, and Events, as specified in RFC 1513 and RFC 1757.

Use of this command requires a separate software license.

Examples

This example shows how to enable RMON support:

Console> (enable) set snmp rmon enable
SNMP RMON support enabled.
Console> (enable)
 

This example shows how to disable RMON support:

Console> (enable) set snmp rmon disable
SNMP RMON support disabled.
Console> (enable)

Related Commands

show snmp

set snmp targetaddr

Use the set snmp targetaddr command to configure the SNMP target address entries in the snmpTargetAddressTable.

set snmp targetaddr {-hex} {addrname} param {-hex} {paramsname}{ipaddr} [udpport
{port}] [timeout {value}] [retries {value}] [volatile | nonvolatile] [taglist {{-hex} tag}]
[{-hex} tag tagvalue]

Syntax Description

-hex

Keyword that displays addrname, paramsname, and taglist tagvalue as a hexadecimal format.

addrname

Arbitrary but unique name of the target agent; the maximum length is 32 bytes.

param

Keyword that specifies an entry in the snmpTargetParamsTable which provides parameters to be used when generating a message to the target; the maximum length is 32 bytes.

paramsname

Entry in the snmpTargetParamsTable; the maximum length is 32 bytes.

ipaddr

IP address of the target.

udpport port

(Optional) Keyword and variable that specify which UDP port of the target host to use.

timeout value

(Optional) Keyword and variable that specify the number of timeouts.

retries value

(Optional) Keyword and variable that specify the number of retries.

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.

taglist tag

(Optional) Keyword and variable that specify a tag name in the taglist.

tag tagvalue

(Optional) Keyword and variable that specify the tag name.

Defaults

The defaults are as follows:

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for the addrname, paramsname, tag, and tagvalue (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

The maximum tagvalue and taglist length is 255 bytes.

Examples

This example shows how to set the target address in the snmpTargetAddressTable:

Console> (enable) set snmp targetaddr foo param bar 10.1.2.4 udp 160 timeout 10 retries 3 taglist tag1 tag2 tag3
SNMP targetaddr name was set to foo with param bar ipAddr 10.1.2.4, udpport 160, timeout 10, retries 3, storageType nonvolatile with taglist tag1 tag2 tag3.
Console> (enable)

Related Commands

clear snmp targetaddr
show snmp targetaddr

set snmp targetparams

Use the set snmp targetparams command to configure the SNMP parameters used in the snmpTargetParamsTable when generating a message to a target.

set snmp targetparams {-hex} {paramsname} user {-hex} {username} {security-model
{v1 | v2c}} {message-processing {v1 | v2c | v3}} [volatile | nonvolatile]

set snmp targetparams {-hex} {paramsname} user {-hex} {username} {security-model v3}
{message-processing v3 {noauthentication | authentication | privacy}} [volatile |
nonvolatile]

Syntax Description

-hex

Keyword that displays the paramsname and username as a hexadecimal format.

paramsname

A unique identifier used to index the snmpTargetParamsTable; the maximum length is 32 bytes.

user

Keyword that specifies the SNMP group user name.

username

Name of the SNMP user that belongs to the SNMP group; the maximum length is 32 bytes.

security-model
v1 | v2c

Keywords that specify security-model v1 or v2c.

message-processing
v1 | v2c | v3

Keywords that specify the version number used by the message processing model.

security-model v3

Keywords that specify security-model v3.

message-processing
v3

Keywords that specify version 3 is used by the message- processing model.

noauthentication

Keyword that specifies security model is not set to use authentication protocol.

authentication

Keyword that specifies the type of authentication protocol.

privacy

Keyword that specifies the messages sent on behalf of the user are protected from disclosure.

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.

Defaults

The default storage type is volatile.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for the paramsname and username(nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

Examples

This example shows how to set target parameters in the snmpTargetParamsTable:

Console> (enable) set snmp targetparams bar user joe security-model v3 message-processing v3 authentication
SNMP target params was set to bar v3 authentication, message-processing v3, user joe nonvolatile.
Console> (enable)

Related Commands

clear snmp targetparams
show snmp targetparams

set snmp trap

Use the set snmp trap command to enable or disable the different SNMP traps on the system or to add an entry into the SNMP authentication trap receiver table.

set snmp trap {enable | disable} [all | module | chassis | bridge | repeater | auth | vtp |
ippermit | vmps | config | entity | stpx | syslog]

set snmp trap rcvr_addr rcvr_community

Syntax Description

enable

Keyword that specifies to activate SNMP traps.

disable

Keyword that specifies to deactivate SNMP traps.

all

(Optional) Keyword that specifies all trap types.

module

(Optional) Keyword that specifies the moduleUp and moduleDown traps from the CISCO-STACK-MIB.

chassis

(Optional) Keyword that specifies the ciscoSyslogMIB trap from the CISCO-SYSLOG-MIB.

bridge

(Optional) Keyword that specifies the newRoot and topologyChange traps from RFC 1493 (the BRIDGE-MIB).

repeater

(Optional) Keyword that specifies the rptrHealth, rptrGroupChange, and rptrResetEvent traps from RFC 1516 (the SNMP-REPEATER-MIB).

auth

(Optional) Keyword that specifies the authenticationFailure trap from RFC 1157.

vtp

(Optional) Keyword that specifies the VTP from the CISCO-VTP-MIB.

ippermit

(Optional) Keyword that specifies the IP Permit Denied access from the CISCO-STACK-MIB.

vmps

(Optional) Keyword that specifies the vmVmpsChange trap from the CISCO-VLAN-MEMBERSHIP-MIB.

config

(Optional) Keyword that specifies the sysConfigChange trap from the CISCO-STACK-MIB.

entity

(Optional) Keyword that specifies the entityMIB trap from the ENTITY-MIB.

stpx

(Optional) Keyword that specifies the STPX trap.

syslog

(Optional) Keyword that specifies the system log.

rcvr_addr

IP address or IP alias of the system to receive SNMP traps.

rcvr_community

Community string to use when sending authentication traps.

Defaults

The default configuration has SNMP traps disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

An IP permit trap is sent when unauthorized access based on the IP permit list is attempted.

Use the show snmp command to verify that the appropriate traps were configured.

Examples

This example shows how to enable SNMP chassis traps:

Console> (enable) set snmp trap enable chassis
SNMP chassis alarm traps enabled.
Console> (enable) 
 

This example shows how to enable all traps:

Console> (enable) set snmp trap enable
All SNMP traps enabled.
Console> (enable) 
 

This example shows how to disable SNMP chassis traps:

Console> (enable) set snmp trap disable chassis
SNMP chassis alarm traps disabled.
Console> (enable) 
 

This example shows how to add an entry in the SNMP trap receiver table:

Console> (enable) set snmp trap 192.122.173.42 public
SNMP trap receiver added.
Console> (enable) 

Related Commands

clear ip permit
clear port filter
set ip permit
show ip permit
show port counters
show snmp
test snmp trap

set snmp user

Use the set snmp user command to configure a new SNMP user.

set snmp user {-hex} {username} {remote {engineid}} [authentication {md5 | sha |
authpassword}] [privacy {privpassword}] [volatile | nonvolatile]

Syntax Description

-hex

Keyword that displays username as a hexadecimal format.

username

Name of the SNMP user.

remote engineid

Keyword and variable that specify the remote SNMP engine ID.

authentication

(Optional) Keyword that specifies the authentication protocol.

md5

Keyword that specifies HMAC-MD5-96 authentication protocol.

sha

Keyword that specifies HMAC-SHA-96 authentication protocol.

authpassword

Password for authentication.

privacy privpassword

(Optional) Keyword and variable that enable the host to encrypt the contents of the message sent to or from the agent; the maximum length is 32 bytes, password for privacy.

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.

Defaults

The default storage type is volatile.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for username (nonprintable delimiters for this parameter), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

authpassword and privpassword must be hexadecimal characters without delimiters in between.

If authentication is not specified, the security level default will be noauthentication. If privacy is not specified, the default will be no privacy.

Examples

This example shows how to set a specific user name:

Console> (enable) set snmp user joe
Snmp user was set to joe authProt no-auth  privProt no-priv with engineid 00:00.
Console> (enable)
 

This example shows how to set a specific user name, authentication, and authpassword:

Console> (enable) set snmp user John authentication md5 arizona2
Snmp user was set to John authProt md5 authPasswd arizona2. privProt no-priv wi.
Console> (enable)

Related Commands

clear snmp user
show snmp user

set snmp view

Use the set snmp view command to configure the SNMP MIB view.

set snmp view {-hex} {viewname} {subtree} [mask] [included | excluded] [volatile |
nonvolatile]

Syntax Description

-hex

Keyword that displays the viewname as a hexadecimal format.

viewname

Name of a MIB view.

subtree

The MIB subtree.

mask

(Optional) Keyword that specifies that the bit mask is used with the subtree. A bit mask can be all one's, all zero's or any combination; the maximum length is 3 bytes.

included | excluded

(Optional) Keywords that specifies that the MIB subtree is included or excluded.

volatile

(Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off.

nonvolatile

(Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is turned off and on again.

Defaults

The defaults are as follows:

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

If you use special characters for viewname (nonprintable delimiters for this parameter), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.

A MOB subtree with a mask defines a view subtree. The MIB subtree can be in OID format or a text name mapped to a valid OID.

Examples

This example shows how to assign a subtree to the view public:

Console> (enable) set snmp view public 1.3.6.1 included
Snmp view name was set to public with subtree 1.3.6.1 included, nonvolatile.
Control> (enable)

This example shows the response when the subtree is incorrect:

Console> (enable) set snmp view stats statistics excluded
Statistics is not a valid subtree OID
Control> (enable)

Related Commands

clear snmp view
show snmp view

set span

Use the set span command to enable or disable SPAN and to set up the switch port and VLAN analyzer for multiple SPAN sessions.

set span disable [dest_mod/dest_port | all]

set span {src_mod/src_ports... | src_vlan... | sc0} {dest_mod/dest_port} [rx | tx | both]
[inpkts {enable | disable}] [learning {enable | disable}] [multicast {enable | disable}]
[create]

Syntax Description

disable

Keyword that specifies to disable SPAN.

dest_mod

(Optional) Monitoring module (SPAN destination).

dest_port

(Optional) Monitoring port (SPAN destination).

all

(Optional) Keyword that specifies to disable the spanning for all VLANs.

src_mod

Monitored module (SPAN source).

src_ports...

Monitored ports (SPAN source).

src_vlan...

Monitored VLAN (SPAN source).

sc0

Keyword that specifies the in-band interface.

rx

(Optional) Keyword that specifies that information received at the source is monitored.

tx

(Optional) Keyword that specifies that information transmitted from the source is monitored.

both

(Optional) Keyword that specifies that information both transmitted from the source and received at the source is monitored.

inpkts enable

(Optional) Keywords that specify to enable the receiving of normal inbound traffic on the SPAN destination port.

inpkts disable

(Optional) Keywords that specify to disable the receiving of normal inbound traffic on the SPAN destination port.

learning enable

(Optional) Keywords that specify to learn the packet's source address.

learning disable

(Optional) Keywords that specify to not learn the packet's source address.

multicast enable

(Optional) Keywords that specify to enable the receiving multicast packets on the SPAN destination port.

multicast disable

(Optional) Keywords that specify to disable the receiving multicast packets on the SPAN destination port.

create

(Optional) Keyword that specifies to create a new SPAN session.

Defaults

The default has no SPAN set up.

learning is enabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

You can configure multiple SPAN sessions to run at the same time. One ingress span session (RX or Both direction) and four egress span sessions (TX direction only) can be configured.

A trunk port can be configured as a source or destination port. If the destination port is a trunk port, the outgoing packets through the SPAN port will carry ISL or 802.1Q VLAN headers.

If SPAN is enabled, and you change the VLAN configuration of the SPAN port (destination), you must disable SPAN before the new configuration will be in effect.

If SPAN is enabled, and you disable a source or destination port, the SPAN function will not work until you enable SPAN on both ports.

You can configure a disabled port to be a source or destination port, but the SPAN function will not work until you enable SPAN on both ports.

If SPAN is enabled for monitoring a particular VLAN, the number of ports being monitored changes when you move a switched port into or out of the specified monitored VLAN.

FDDI port can also be a source port.

Source and destination ports cannot be the same port.

After SPAN is enabled, if no parameters were ever set, the first configured SPAN is used as a reference.

You can configure additional SPAN ports which monitor VLANs only. These ports support a source of one or more VLANs and require the destination port to be a trunk-capable port. This port will filter all traffic except traffic from the configured VLAN for that port.

For monitoring inbound traffic, only one ingress session (or both direction) SPAN is allowed regardless of the port-based SPAN. An egress SPAN can coexist with other SPAN sessions.

Use either a dedicated RMON probe (such as the Catalyst 5000 family Network Analysis Module) or a network analyzer to monitor ports.

Use the inpkts keyword with the enable option to allow the SPAN destination port to receive normal incoming traffic in addition to the traffic mirrored from the SPAN source. Use the disable option to prevent the SPAN destination port from receiving normal incoming traffic.

The keyword learning is dependent on the inpkts option. If the inpkts option is disabled, learning will not take effect. The inpkts option must be set to enable to use learning.

When the keyword learning is enabled, the dont_learn control bit is disabled, allowing the system to learn a packet's source address. When learning is disabled, the packet is forwarded to its destination as usual.

You can specify an RSM port as the SPAN source port. However, you cannot specify an RSM port as the SPAN destination port. The source and destination ports have to be within the module.

If you are configuring SPAN on the Catalyst 5000 family and 2926G series Gigabit EtherChannel switching module, the source and destination ports must be on the same module. This restriction does not apply to the following:

If you are configuring the Gigabit EtherChannel switching module VLAN, only the both argument is allowed, you cannot specify tx or rx.

Catalyst 4000 family, 2948G, 2980G switches do not support the sc0 keyword.

Catalyst 4000 family, 2948G, 2980G switches do not permit you to disable multicast on SPAN ports.

The Token Ring port can be a source or destination port. When monitoring the tx direction, only one source port is allowed, and the Token Ring module does not support the inpkts option. A Token Ring port can only monitor another Token Ring port.

If you are running a supervisor engine software release prior to release 4.5(1), we recommend that you configure only a single source port to be monitored. With the supervisor engine software release 4.5(1) and later, a single source port will be the standard Token Ring SPAN configuration.

You cannot monitor a VLAN to which none of the ports belong.

Examples

This example shows how to configure SPAN so that both the transmit traffic and receive traffic on the source port (1/1) is mirrored to the destination port (2/1), and how to verify SPAN configuration:

Console> (enable) set span 1/1 2/1
Enabled monitoring of Port 1/1 transmit/receive traffic by Port 2/1
Console> (enable) show span
Status          : enabled
Admin Source    : Port 1/1
Oper Source     : Port 1/1
Destination     : Port 2/1
Direction       : transmit/receive
Incoming Packets: disabled
Console> (enable)
 

This example shows how to set VLAN 522 as the SPAN source and port 2/1 as the SPAN destination:

Console> (enable) set span 522 2/1
Enabled monitoring of VLAN 522 transmit/receive traffic by Port 2/1
Console> (enable) show span
Status          : enabled
Admin Source    : VLAN 522
Oper Source     : Port 3/1-2
Destination     : Port 2/1
Direction       : transmit/receive
Incoming Packets: disabled
Console> (enable)
 

This example shows how to set VLAN 522 as the SPAN source and port 2/12 as the SPAN destination:

Console> (enable) set span 522 2/12 tx inpkts enable
SPAN destination port incoming packets enabled.
Enabled monitoring of VLAN 522 transmit traffic by Port 2/12
Console> (enable) show span
Status          : enabled
Admin Source    : VLAN 522
Oper Source     : Port 2/1-2
Destination     : Port 2/12
Direction       : transmit
Incoming Packets: enabled
Console> (enable)
 

This example shows how to enable learning on the SPAN source and port 1/1:

Console> (enable) set span 522 1/1 learning enable 
Overwrote Port 1/1 to monitor transmit/receive traffic of VLAN 522
Incoming Packets disabled. Learning enabled. Multicast enabled.
Console> (enable)
 

This example shows how to disable learning on the SPAN source and port 1/1:

Console> (enable) set span 522 1/1 learning disable
Overwrote Port 1/1 to monitor transmit/receive traffic of VLAN 522
Incoming Packets disabled. Learning disabled. Multicast enabled.
Console> (enable) 

Related Commands

clear config
show span

set spantree backbonefast

Use the set spantree backbonefast command to enable or disable the spanning-tree Backbone Fast Convergence feature.

set spantree backbonefast {enable | disable}

Syntax Description

enable

Keyword that specifies to enable Backbone Fast Convergence.

disable

Keyword that specifies to disable Backbone Fast Convergence.

Defaults

The default configuration has Backbone Fast Convergence disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

Backbone Fast Convergence is not supported on Token Ring VLANs.

For Backbone Fast Convergence to work, you must enable it on all switches in the network.

Examples

This example shows how to enable Backbone Fast Convergence:

Console> (enable) set spantree backbonefast enable
Backbonefast enabled for all VLANs.
Console> (enable) 

Related Commands

show spantree

set spantree disable

Use the set spantree disable command to disable the spanning-tree algorithm for all VLANs.

set spantree disable all

Syntax Description

all

Keyword that specifies to disable the spanning-tree algorithm for all VLANs.

Defaults

The default configuration has all spanning trees enabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The all option is supported only on systems configured with a Supervisor Engine III, Supervisor Engine III FSX, or Supervisor Engine III FLX and an NFFC or NFFC II. You cannot enable or disable spanning tree on a per-VLAN basis.

Examples

This example shows how to disable the spanning-tree algorithm:

Console> (enable) set spantree disable al1
VLAN 1 bridge spanning tree disabled.
Console> (enable) 

Related Commands

set spantree enable
show spantree

set spantree enable

Use the set spantree enable command to enable the spanning-tree algorithm for a VLAN or all VLANs.

set spantree enable all

Syntax Description

all

Keyword that specifies to enable the spanning-tree algorithm for all VLANs.

Defaults

The default configuration has all spanning trees enabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The all option is supported only on systems configured with a Supervisor Engine III, Supervisor Engine III FSX, or Supervisor Engine III FLX and an NFFC or NFFC II. You cannot enable or disable spanning tree on a per VLAN basis.

Examples

This example shows how to activate the spanning-tree algorithm 1:

Console> (enable) set spantree enable all
VLAN 1 bridge spanning tree enabled.
Console> (enable) 

Related Commands

set spantree disable
show spantree

set spantree fwddelay

Use the set spantree fwddelay command to set the bridge forward delay for a VLAN.

set spantree fwddelay delay [vlan]

Syntax Description

delay

Number of seconds for the bridge forward delay; valid values are 4 to 30 seconds.

vlan

(Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed; valid values are 1 to 1005.

Defaults

The default configuration has the bridge forward delay set to 15 seconds for all VLANs.

Command Types

Switch command.

Command Modes

Privileged.

Examples

This example shows how to set the bridge forward delay for VLAN 100 to 16 seconds:

Console> (enable) set spantree fwddelay 16 100
Spantree 100 forward delay set to 16 seconds.
Console> (enable)

Related Commands

show spantree

set spantree hello

Use the set spantree hello command to set the bridge hello time for a VLAN.

set spantree hello interval [vlan]

Syntax Description

interval

Number of seconds the system waits before sending a bridge hello message (a multicast message indicating that the system is active); valid values are 1 to 10.

vlan

(Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed; valid values are 1 to 1005.

Defaults

The default configuration has the bridge hello time set to two seconds for all VLANs.

Command Types

Switch command.

Command Modes

Privileged.

Examples

This example shows how to set the spantree hello time for VLAN 100 to three seconds:

Console> (enable) set spantree hello 3 100
Spantree 100 hello time set to 3 seconds.
Console> (enable)

Related Commands

show spantree

set spantree maxage

Use the set spantree maxage command to set the bridge maximum aging time for a VLAN.

set spantree maxage agingtime [vlan]

Syntax Description

agingtime

Maximum number of seconds that the system retains the information received from other bridges through Spanning-Tree Protocol; valid values are 6 to 40 seconds.

vlan

(Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed; valid values are 1 to 1005.

Defaults

The default configuration is 20 seconds for all VLANs.

Command Types

Switch command.

Command Modes

Privileged.

Examples

This example shows how to set the maximum aging time for VLAN 1000 to 25 seconds:

Console> (enable) set spantree maxage 25 1000
Spantree 1000 max aging time set to 25 seconds.
Console> (enable)

Related Commands

show spantree

set spantree multicast-address

Use the set spantree multicast-address command to specify the bridge functional address instead of the IEEE Spanning-Tree Protocol address when you configure a TrBRF to use the IEEE Spanning-Tree Protocol.

set spantree multicast-address trbrf_num {ieee | ibm}

Syntax Description

trbrf_num

Number of the TrBRF for which you are setting the address.

ieee

Keyword that specifies use of the IEEE Spanning-Tree Protocol address.

ibm

Keyword that specifies use of the IBM Spanning-Tree Protocol address.

Defaults

The default configuration has IEEE.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches.

This command applies only to Token Ring modules and only to a TrBRF that runs IEEE Spanning-Tree Protocol.

Examples

The following example shows how to specify the bridge functional address to be used:

Console> (enable) set spantree multicast-address 1 ibm

Related Commands

show spantree

set spantree portcost

Use the set spantree portcost command to set the path cost for a port or TrCRF.

set spantree portcost {mod_num/port_num | trcrf} cost

Syntax Description

mod_num

Number of the module.

port_num

Number of the port on the module.

trcrf

Number of the TrCRF for which you are setting the path cost.

cost

Number that indicates the cost of the path; valid values are 1 to 65535, with zero (0) the low cost and 65535 the high cost.

Defaults

The default configuration is as follows:

10-Gbps module port cost = 2

1-Gbp module port cost = 4

622-Mbps module port cost = 6

155-Mbps module port cost = 14

100-Mbps module port cost = 19

45-Mbps module port cost = 39

16-Mbp module port cost = 80

10-Mbps module port cost = 100

4-Mbps module port cost = 250

10/100-Mbps module port cost = See "Usage Guidelines"

4/16-Mbps module port cost = See "Usage Guidelines"

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The Spanning-Tree Protocol uses port path costs to determine which port to select as a forwarding port. You should assign lower numbers to ports attached to faster media (such as full duplex) and higher numbers to ports attached to slower media. The possible range is 0 to 65535.

For 10/100 and 4/16 modules, the default port cost is set automatically depending on the current speed of the port. For example, if a 10/100 port is working at 10 Mbps, the port cost is 100. If the port speed changes to 100 Mbps, the port cost adjusts automatically to 19.

The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.

Examples

The following example shows how to set the port cost for port 12 on module 2 to 19:

Console> (enable) set spantree portcost 2/12 19
Spantree port 2/12 path cost set to 19.
Console> (enable) 

Related Commands

show spantree

set spantree portfast

Use the set spantree portfast command to allow a port that is connected to a single workstation or PC to start faster when it is connected.

set spantree portfast mod_num/port_num {enable | disable}

Syntax Description

mod_num

Number of the module.

port_num

Number of the port on the module.

enable

Keyword that specifies to enable the spanning-tree port fast-start feature on the port.

disable

Keyword that specifies to disable the spanning-tree port fast-start feature on the port.

Defaults

The default configuration has the port fast-start feature disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.

When a port configured with the spantree portfast enable command is connected, the port immediately enters the spanning-tree forwarding state instead of going through the normal spanning-tree states such as listening and learning. Use this command on ports that are connected to a single workstation or PC only; do not use it on ports that are connected to networking devices such as hubs, routers, switches, bridges, or concentrators.

Examples

This example shows how to enable the spanning-tree port fast-start feature on port 2 on module 1:

Console> (enable) set spantree portfast 1/2 enable
 
Warning: Spantree port fast start should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc. to a fast start port can cause temporary spanning tree loops. Use with caution.
Spantree port 1/2 fast start enabled.
Console> (enable)

Related Commands

show spantree

set spantree portfast bpdu-guard

Use the set spantree portfast bpdu-guard command to enable and disable BPDU Guard on the switch. You can prevent loops by moving a non-trunking port configured for PortFast into an ErrDisable state when a BPDU is received on that port.

set spantree portfast bpdu-guard {enable | disable}

Syntax Description

enable

Keyword that specifies to enable the spanning-tree PortFast BPDU-Guard.

disable

Keyword that specifies to disable the spanning-tree PortFast BPDU-Guard.

Defaults

The default configuration has PortFast BPDU-Guard disabled.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.

When you enable PortFast BPU-Guard, a non-trunking PortFast-enabled port is moved into an ErrDisable state when a BPDU is received on that port. When PortFast BPDU Guard is disabled, a PortFast enabled non-trunking port will stay up when it receives BPDUs, which may cause spanning-tree loops.

Examples

This example shows how to enable the spanning-tree PortFast BPDU-Guard:

Console> (enable) set spantree portfast bpdu-guard enable
Spantree portfast bpdu-guard enabled on this switch.
Console> (enable) 
 

This example shows how to disable the spanning-tree PortFast BPDU-Guard:

Console> (enable) set spantree portfast bpdu-guard disable
Spantree portfast bpdu-guard disabled on this switch.
Console> (enable) 

Related Commands

show spantree summary

set spantree portpri

Use the set spantree portpri command to set the bridge priority for a spanning-tree port or TrCRF.

set spantree portpri {mod_num/port_num | trcrf} [priority | trcrf_priority]

Syntax Description

mod_num

Number of the module.

port_num

Number of the port on the module.

trcrf

Keyword that specifies the number of the TrCRF for which you are setting the bridge priority.

priority

(Optional) Number that represents the cost of a link in a spanning-tree bridge; valid values are 0 (high) to 63 (low).

trcrf_priority

(Optional) Number that represents the cost of the TrCRF; valid values are 0 (high) to 7 (low).

Defaults

The default configuration has all ports with bridge priority set to 32.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.

The specified bridge priority on an ATM port applies to all emulated LANs on that port.

Examples

This example shows how to set the priority of port 1 on module 4 to 63:

Console> (enable) set spantree portpri 4/1 63
Bridge port 4/1 priority set to 63.
Console> (enable)

Related Commands

show spantree

set spantree portstate

Use the set spantree portstate command to manually set the state of a TrCRF.

set spantree portstate trcrf {block | forward | auto} [trbrf]

Syntax Description

trcrf

Number of the TrCRF for which you are manually setting the state.

block | forward | auto

Keywords that specify to set the TrCRF to a blocked state (block), forwarding state (forward), or to have the Spanning-Tree Protocol determine the correct state automatically (auto).

trbrf

(Optional) Number of the parent TrBRF.

Defaults

There is no default configuration for this command.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This command is supported by the Catalyst 5000 family switches.

Use this command only to set the port state when the TrCRF is in SRT mode and the TrBRF is running the IBM Spanning-Tree Protocol, or the TrCRF is in SRB mode and the TrBRF is running the IEEE Spanning-Tree Protocol.

When you enable Spanning-Tree Protocol, every switch in the network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, the ports then stabilize to the forwarding or blocking state. However, with TrBRFs and TrCRFs, there are two exceptions to this rule that require you to manually set the state of the logical ports of a TrBRF:

If either condition exists, use the set spantree portstate command to manually set the state of a TrCRF to blocked or forwarding mode or set the Spanning-Tree Protocol to determine the correct state automatically.

Examples

This example shows the manual setting of TrCRF 900 to a forwarding state:

Console> (enable) set spantree portstate 900 forward
reserve_nvram : requested by block = 0
reserve_nvram : granted to block = 0
release_nvram : releasing block = 0
Console> (enable)

Related Commands

show spantree
show spantree portstate

set spantree portvlancost

Use the set spantree portvlancost command to assign a lower path cost to a set of VLANs on a port.

set spantree portvlancost mod_num/port_num [cost cost_value] [preferred_vlans]

Syntax Description

mod_num

Number of the module.

port_num

Number of the port.

cost cost_value

(Optional) Keyword to indicate the path cost. The portvlancost applies only to trunk ports; valid values are 1 to 65535.

preferred_vlans

(Optional) If you do not list a VLAN explicitly, the VLANs listed in prior invocations of this command are affected. If no cost is listed explicitly, and previous cost values are specified in prior invocations, then the portvlancost is set to 1 less than the current port cost for a port. However, this may not assure load balancing in all cases. Valid values are 1 to 1005.

Defaults

The value specified is used as the path cost of the port for the specified set of VLANs. The rest of the VLANs have a path cost equal to the port path cost, set via the set spantree portcost command (if not set, the value is the default path cost of the port).

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.

Examples

These examples show various ways to use the set spantree portvlancost command:

Console> (enable) set spantree portvlancost 2/10 cost 25 1-20
Cannot set portvlancost to a higher value than the port cost, 10, for port 2/10.
Console> (enable)
 
Console> (enable) set spantree portvlancost 2/10 1-20
Port 2/10 VLANs 1-20 have a path cost of 9.
Console> (enable)
 
Console> (enable) set spantree portvlancost 2/10 cost 4 1-20
Port 2/10 VLANs 1-20 have path cost 4.
Port 2/10 VLANs 21-1000 have path cost 10.
Console> (enable)
Console> (enable) set spantree portvlancost 2/10 cost 6 21
Port 2/10 VLANs 1-21 have path cost 6.
Port 2/10 VLANs 22-1000 have path cost 10.
Console> (enable) 
 

These examples show how to use the set spantree portvlancost command without explicitly
specifying cost:

Console> (enable) set spantree portvlancost 1/2
Port 1/2 VLANs 1-1005 have path cost 3100.
Console> (enable)
 
Console> (enable) set spantree portvlancost 1/2 21
Port 1/2 VLANs 1-20,22-1005 have path cost 3100.
Port 1/2 VLANs 21 have path cost 3099.
Console> (enable) 

Related Commands

show spantree
clear spantree portvlancost

set spantree portvlanpri

Use the set spantree portvlanpri command to set the port priority for a subset of VLANs in the trunk port.

set spantree portvlanpri mod_num/port_num priority [vlans]

Syntax Description

mod_num

Number of the module.

port_num

Number of the port.

priority

Number that represents the cost of a link in a spanning-tree bridge. The priority level is from 0 to 63, with 0 indicating high priority and 63 indicating low priority.

vlans

(Optional) VLANs that use the specified priority level.

Defaults

The default configuration has the port VLAN priority set to 0, with no VLANs specified.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.

Use this command to add VLANs to a specified port priority level. Subsequent calls to this command do not replace VLANs that are already set at a specified port priority level.

This feature is not supported for the RSM.

The set spantree portvlanpri command applies only to trunk ports. Do not use Token Ring ports as trunk ports. If you enter this command, you see this message:

Port xx is not a trunk-capable port

Examples

This example shows how to set the port priority for module 1, port 2, on VLANs 21 to 40:

Console> (enable) set spantree portvlanpri 1/2 16 21-40
Port 1/2 vlans 3,6-20,41-1000 using portpri 32
Port 1/2 vlans 1-2,4-5,21-40 using portpri 16
Console> (enable)

Related Commands

clear spantree portvlanpri
show spantree

set spantree priority

Use the set spantree priority command to set the bridge priority for a VLAN.

set spantree priority bridge_priority [vlan]

Syntax Description

bridge_priority

Number representing the priority of the bridge. The priority level is from 0 to 65535, with 0 indicating high priority and 65535 indicating low priority.

vlan

(Optional) Number of the VLAN. If you do not specify a VLAN number, VLAN 1 is used; valid values are 1 to 1005.

Defaults

The default configuration has the bridge priority set to 32768.

Command Types

Switch command.

Command Modes

Privileged.

Usage Guidelines

This feature is not supported for the RSM.

Examples

This example shows how to set the bridge priority of VLAN 1 to 4096:

Console> (enable) set spantree priority 4096
VLAN 1 bridge priority set to 4096.
Console> (enable)

Related Commands

show spantree


hometocprevnextglossaryfeedbacksearchhelp
Posted: Sun Jun 11 11:23:57 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.