|
|
2
Use the set qos defaultcos command to define the default CoS value for the entire switch.
set qos defaultcos cos_value
Syntax Description
cos_value CoS value to use as the default CoS for the switch.
Defaults
The default CoS value for the entire switch is 0.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 4000 family switches and the Catalyst 2948G and
2980G switch.
Examples
This example shows how to set the switch default CoS to 7:
Console> (enable) set qos defaultcos 7 qos defaultcos set to 7 Console> (enable)
This example shows how to set the switch default CoS to 4:
Console> (enable) set qos defaultcos 4 qos defaultcos set to 4 Console> (enable)
Related Commands
Use the set qos ip-filter command to create access control entries (ACEs) with Layer 3 values or with both Layer 3 and 4 values.
set qos ip-filter cos {src_ip_addr_spec} {dest_ip_addr_spec} [before ACE# | modify ACE#]
Syntax Description
cos CoS to assign to packets matching this filter; valid values are from 0 to 7. src_ip_addr_ spec Source IP address. See "Usage Guidelines" for the format. dest_ip_addr_ spec Destination IP address. See "Usage Guidelines" for the format. before ACE# (Optional) Keyword and variable that specifies to insert an ACE in front of the specified ACE. modify ACE# (Optional) Keyword and variable that specifies to replace an ACE with the new ACE. protocol Type of protocol that the ACE matches; valid values are TCP, UDP, or any. src_port Number of the source port. dest_port Number of the destination port.
Defaults
This command has no default setting.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.
If you do not specify the before ACE# argument, the new entry is placed after the last. The ACE number of any entry is its current position in the list. These can be viewed by the show qos ip command.
If you do not enter the protocol variable, the set qos ip-filter command specifies an ACE that is independent of the Layer 4 protocol and port. If you enter the protocol variable, the command specifies an ACE that matches specific Layer 4 protocols and ports.
The dest_ip_addr_spec and src_ip_addr_spec variables are entered in the following format:
{any | {host ip_addr} | {ip_addr ip_addr_mask}}where:
Layer 4 ports can only be specified for unicast addresses. If the destination address specifies a multicast address, and you enter the set qos ip-filter {dest_ip_addr} {src_ip_addr mask} protocol [dst_port src_port] cos [before ACE#] command, an error is displayed. If the destination address includes multicast addresses and the same command is used, a message displays that the command only applies to unicast addresses.
If you enter a 0 for the src_port variable, it means any source port matches.
If you enter a 0 for the dest_port variable, it means any destination port matches.
Examples
This example shows how to create ACEs and an ACE within the list and verify the configuration using the show qos ip command:
Console>(enable)set qos ip-filter 7 100.100.1.1 255.255.255.0 200.200.1.1 255.255.255.0qos ip-filter is set successfully.Console> (enable)Console> (enable)show qos ipThere are 1 IP filter(s).ACE# Dest IP and Mask Src IP and Mask---- -------------------------------- --------------------------------1 100.100.1.1 255.255.255.0 200.200.1.1 255.255.255.0Protocol Dst Port Src Port CoS-------- -------- -------- ---both 0 0 7Console> (enable)Console> (enable)set qos ip-filter 4 tcp 120.100.1.1 255.255.255.0 47 210.210.1.1 255.255.255.0 23qos ip-filter is set successfully.Console> (enable)Console> (enable)show qos ipThere are 2 IP filter(s).ACE# Dest IP and Mask Src IP and Mask---- -------------------------------- --------------------------------1 100.100.1.1 255.255.255.0 200.200.1.1 255.255.255.0Protocol Dst Port Src Port CoS-------- -------- -------- ---both 0 0 72 120.100.1.1 255.255.255.0 210.210.1.1 255.255.255.0Protocol Dst Port Src Port CoS-------- -------- -------- ---tcp 23 47 4Console> (enable)Console> (enable)set qos ip-filter 1 20.20.20.1 255.0.0.0 30.30.1.1 255.0.0.0 before 1qos ip-filter is set successfully.Console> (enable)Console> (enable)show qos ipThere are 3 IP filter(s).ACE# Dest IP and Mask Src IP and Mask---- -------------------------------- --------------------------------1 20.20.20.1 255.0.0.0 30.30.1.1 255.0.0.0Protocol Dst Port Src Port CoS-------- -------- -------- ---both 0 0 12 100.100.1.1 255.255.255.0 200.200.1.1 255.255.255.0Protocol Dst Port Src Port CoS-------- -------- -------- ---both 0 0 73 120.100.1.1 255.255.255.0 210.210.1.1 255.255.255.0Protocol Dst Port Src Port CoS-------- -------- -------- ---tcp 23 47 4Console> (enable)
Related Commands
show qos ip
clear qos ip-filter
Use the set qos mac-cos command to map a CoS value to a MAC address and VLAN pair.
set qos mac-cos dest_mac vlan cos
Syntax Description
dest_mac MAC address of the destination host. vlan Number of the VLAN; valid values are 1 to 1001. cos CoS value; valid values are 0 to 7, with the higher numbers representing higher priority.
Defaults
This command has no default setting.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.
The set qos mac-cos command creates a permanent CAM entry that remains in the CAM table until the active supervisor is reset.
The port associated with the MAC address is learned when the first packet with this source MAC address is received. These entries are not aged out.
If you enter the show cam command, entries made with the set qos mac-cos command are displayed as dynamic. Entries made using the set qos mac-cos command do not age out.
Examples
This example shows how to map a CoS value to a MAC address and VLAN:
Console> (enable)set qos mac-cos 0f-ab-12-12-00-13 2 3CoS 3 is assigned to 0f-ab-12-12-00-13 vlan 2.Console> (enable)
Related Commands
clear qos mac-cos
show qos mac-cos
Use the set qos map command to associate CoS values to a transmit queue and drop threshold.
set qos map port_type q# threshold# cos coslist
Syntax Description
port_type The port_type is hardware-dependent. Use the show port capabilities command to determine the port_type for your hardware. The port type is defined by the number of transmit queues and the number of drop thresholds supported on the port. For example, the 1q4t port type supports one transmit queue and four drop thresholds. q# Transmit queue number. threshold# Drop threshold number. The higher the threshold number, the lower the chance traffic will be dropped. cos Keyword that specifies CoS values. coslist List of CoS values between 0 to 7. The higher the number the higher the priority.
Defaults
CoS value-to-drop threshold mapping | Catalyst 5000 family switches:
Catalyst 4000 family and 2948G switches:
|
CoS value-to-transmit queue mapping | Catalyst 5000 family switches:
Catalyst 4000 family and 2948G switches:
|
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches, Catalyst 4000 family switches, and the 2948G and 2980G switch.
On the Catalyst 5000 family switches, this command is supported only with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.
Examples
This example shows how to assign the CoS values 1 and 2 to the first transmit queue and the first drop threshold for that queue on a 1q4t port (Catalyst 5000 family switches):
Console> (enable) set qos map 1q4t 1 1 cos 1-2
Qos tx priority queue and threshold mapped to cos successfully.
Console> (enable)
This example shows how to assign the CoS values 4 through 7 to the first transmit queue and the second drop threshold for that queue on a 1q4t port (Catalyst 5000 family switches):
Console> (enable) set qos map 1q4t 1 2 cos 4-7
Qos tx priority queue and threshold mapped to cos successfully.
Console> (enable)
This example shows how to map CoS values 4 through 7 to the second transmit queue and the first drop threshold for that queue on a 2q1t port (Catalyst 4000 family, 2948G, and 2980G switches):
Console> (enable) set qos map 2q1t 2 1 cos 4-7 Qos tx priority queue and threshold mapped to cos successfully. Console> (enable)
Related Commands
Use the set qos policy-source command to set the QoS policy source.
set qos policy-source local | cops
Syntax Description
local Keyword that specifies to set the policy source to local NVRAM configuration. cops Keyword that specifies to set the policy source to COPS configuration.
Defaults
The default is all ports are set to local.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches.
When you set the policy source to local, the QoS policy is taken from local configuration stored in NVRAM. If you set the policy source to local after it was set to COPS, the QoS policy reverts back to the local configuration stored in NVRAM.
When you set the policy source to COPS, all configuration that is global to the device, such as the DSCP to marked-down DSCP, is taken from policy downloaded to the PEP by the PDP. Configuration of each physical port, however, is taken from COPS only if the policy source for that port has been set to COPS.
Examples
This example shows how to set the policy source to COPS:
Console> (enable)set qos policy-source copsQoS policy source for the switch set to COPS.Console> (enable)
This example shows how to set the policy source to local NVRAM:
Console> (enable)set qos policy-source localQoS policy source for the switch set to local.Console> (enable)
This example shows the output if you attempt to set the policy source to COPS and no COPS servers are available:
Console> (enable)set qos policy-source copsQoS policy source for the switch set to COPS.Warning: No COPS servers configured. Use the `set cops server' commandto configure COPS servers.Console> (enable)
Related Commands
clear qos config
show qos info
show qos policy-source
Use the set qos router-mac command to specify router MAC addresses for ACE-based classification.
set qos router-mac mac_address vlan
Syntax Description
mac_address MAC address contained in the packets to be filtered. You can enter this address in canonical format (00-11-33-44-55) or noncanonical format (00:11:22:33:44:55). vlan Number of the VLAN; valid values are 1 to 1005.
Defaults
This command has no default setting.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or
III G, or Supervisor Engine III or III F with the NFFC II.
This command is not supported by the MLS-RP.
Use this command to specify the MAC address of a router for which to perform ACE-based classification. For IPv4 traffic destined for a router, QoS can classify packets that match an Access-Control Entry (ACE) by setting the IP precedence bits (in the IP TOS header) and CoS value in the frame header.
If you are using MLS, QoS can perform ACE-based classification only for traffic that is switched using MLS. ACE-based classification is performed at the switch egress port as the flow is being multilayer switched. QoS cannot perform ACE-based classification on traffic that the MLS-RP routes off the switch. QoS learns the address of the MLS-RP automatically when MLS is configured on the switch.
Examples
This example shows how to set the router MAC address on a specific VLAN:
Console> (enable) set qos router-mac 00-40-0b-30-03-48 2Router MAC/Vlan is set for QoS.Console> (enable)
Related Commands
clear qos router-mac
show qos mac-cos
Use the set qos wred-threshold command to specify the transmit queue drop thresholds on all ports in the switch.
set qos wred-threshold port_type [rx | tx] queue {q# thr1 thr2 thr3 thr4}
Syntax Description
port_type Only valid value for port_type is 1q4t. rx (Optional) Keyword that specifies input queuing. This keyword is not tx (Optional) Keyword that specifies output queuing. queue Keyword that specifies the queue value. q# Number of queue. The only valid value is 1. thr# Value of threshold; valid values are 1 to 100 percent.
supported.
Defaults
The defaults are output queuing and the threshold values are 30%, 50%, 80%, and 100%.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported only on Catalyst 5000 family switches with Supervisor Engine II G or III G, or Supervisor Engine III or III F with the NFFC II.
The number preceding the t letter in the port_type (1q4t) determines the number of threshold values the hardware supports. For example, with 1q4t, the number of thresholds specified is four.
The number preceding the q letter in the port_type determines the number of the queues that the hardware supports. For example, with 1q4t, the number of queues specified is one.
The transmit drop threshold percentages specified select a buffer usage level where each threshold applies.
The percentages to buffer usage level are as follows:
Due to the granularity of programming the hardware, the values set in hardware will be close approximations of the values provided.
Examples
This example shows how to configure the transmit queue drop thresholds.
Console> (enable) set qos wred-threshold 1q4t tx queue 1 30 50 80 100
Transmit drop thresholds for queue 1 set at 30% 50% 80% 100%
Console> (enable)
Related Commands
Use the set radius deadtime command to set the time to skip RADIUS servers that do not reply.
set radius deadtime minutes
Syntax Description
minutes The length of time a RADIUS server does not respond to an authentication request; valid values are 0 to 1440 minutes.
Defaults
The default is 0 minutes.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If only one RADIUS server is configured or if all the configured servers are marked dead, deadtime will be ignored because there are no alternate servers available. By default, the deadtime will be 0 minutes, that is, the RADIUS servers will not be marked dead if they do not respond.
Examples
This example shows how to set the RADIUS deadtime to 10 minutes:
Console> (enable) set radius deadtime 10 Radius deadtime set to 10 minutes. Console> (enable)
Related Commands
Use the set radius key command to set the encryption and authentication for all communication between the RADIUS client and the server.
set radius key {key}Syntax Description
The command has no keywords or arguments.
Defaults
The default of the key is set to NULL.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The key you set must be the same one as configured in the RADIUS server. All leading spaces are ignored, spaces within and at the end of the key are not ignored. Double quotes are not required even if there are spaces in the key, unless the quotes themselves are part of the key. The length of the key is limited to 65 characters. It can include any printable ASCII character except tabs.
Examples
This example shows how to set the RADIUS encryption and authentication key to Make my day:
Console> (enable)set radius key Make my dayRadius key set to Make my day.Console> (enable)
Related Commands
Use the set radius retransmit command to specify the number of times the RADIUS servers are tried before giving up on the server.
set radius retransmit count
Syntax Description
count Number of times the RADIUS servers are tried before giving up on the server; valid values are 1 to 100.
Defaults
The default is two times (three attempts).
Command Types
Switch command.
Command Modes
Privileged.
Examples
This example shows how to set the retransmit attempts to 3:
Console> (enable) set radius retransmit 3 Radius retransmit count set to 3. Console> (enable)
Related Commands
Use the set radius server command to set up the RADIUS server.
set radius server ipaddr [auth-port port] [acct-port port][primary]
Syntax Description
ipaddr Number of the IP address or IP alias in dot notation a.b.c.d. auth-port (Optional) Keyword that specifies a destination UDP port for RADIUS messages. port Number of the destination UDP port number to which RADIUS messages should be sent. acct-port (Optional) Keyword that specifies a destination UDP port for RADIUS messages. port Number of the destination UDP port number to which RADIUS messages should be sent. primary (Optional) Keyword that specifies that this server be contacted first.
Defaults
The default auth-port is 1812. The default acct-port is 1813.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
You can add up to three RADIUS servers.
The RADIUS server will not be used for authentication if the port number is set to 0.
Examples
This example shows how to add a primary server using an IP alias:
Console> (enable) set radius server tampa.users.com tampa.users.com added to RADIUS server table as primary server. Console> (enable)
Related Commands
Use the set radius timeout command to set the time between retransmissions to the RADIUS server.
set radius timeout seconds
Syntax Description
seconds Number of seconds to wait for a reply; valid values are 1 to 1000 seconds.
Defaults
The default timeout is 5 seconds.
Command Types
Switch command.
Command Modes
Privileged.
Examples
This example shows how to set the time between retransmissions to 7 seconds:
Console> (enable) set radius timeout 7 Radius timeout set to 7 seconds. Console> (enable)
Related Commands
Use the set rcp username command to specify your username for rcp file transfers.
set rcp username username
Syntax Description
username Username up to 14 characters long.
Defaults
There are no default settings for this command.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
Username must be different from "root" and not a null string. The only case where rcp username is not used is for the VMPS database. For the VMPS database, an rcp VMPS username is used.
Examples
This example shows how to set the username for rcp:
Console> (enable) set rcp username jdoe Console> (enable)
Related Commands
Use the set rgmp command to enable or disable the RGMP feature on the switch.
set rgmp {enable | disable}
Syntax Description
enable Keyword to enable RGMP on the switch. disable Keyword to disable RGMP on the switch.
Defaults
The default is RGMP is disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches.
RGMP is a global command. You cannot enable or disable RGMP on a per-VLAN basis.
The RGMP feature is operational only if IGMP snooping is enabled on the switch (see the set igmp command).
Examples
This example shows how to enable RGMP on the switch:
Console> (enable) set rgmp enable RGMP is enabled. Console> (enable)
This example shows how to disable RGMP on the switch:
Console> (enable) set rgmp disable
RGMP is disabled.
Console> (enable)
Related Commands
show rgmp group
show rgmp statistics
clear rgmp statistics
set igmp
set igmp fastleave
Use the set rsmautostate command to enable and disable line protocol state determination of the RSMs due to port state changes. When you enable rsmautostate, VLAN interfaces on the RSM are active only when there is at least one other active interface within the Catalyst 5000 family and 2926G series switches. This interface could be a physical end-user port, a trunk connection for which the VLAN is active, or another RSM with an equivalent VLAN interface.
set rsmautostate {enable | disable}
Syntax Description
enable Keyword that specifies to activate line protocol state determination. disable Keyword that specifies to deactivate line protocol state determination.
Defaults
The default configuration has line protocol state determination disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches.
This command is useful for discontinuing the advertisement of routing paths when access to them is severed (either through fault or administrative disabling).
If you disable rsmautostate, you might have to use the shutdown/no shutdown Cisco IOS command to disable and then restart the VLAN interface to bring the RSM back up.
Examples
This example shows how to enable the line protocol state determination of the RSM:
Console> (enable) set rsmautostate enable Console> (enable)
This example shows how to disable the line protocol state determination of the RSM:
Console> (enable) set rsmautostate disable Console> (enable)
Related Commands
Use the set snmp access command to define the access rights of an SNMP group with a specific security model in different security levels.
set snmp access {-hex} {groupname} {security-model {v1 | v2c}} [read {-hex} {readview}]
Syntax Description
-hex Keyword to display the groupname, readview, writeview and notifyview as a hexadecimal format. groupname Name of the SNMP group. security-model v1| v2c Keywords that specify security-model v1 or v2c. read readview (Optional) Keyword and variable that specify the name of the view that allows you to see the MIB objects write writeview (Optional) Keyword and variable that specify the name of the view that allows you to configure the contents of the agent. notify notifyview (Optional) Keyword and variable that specify the name of the view that allows you to send a trap about MIB objects. v3 Keyword that specifies security model v3. noauthentication Keyword that specifies the security model is not set to use the authentication protocol. authentication Keyword that specifies the type of authentication protocol. privacy Keyword that specifies the messages sent on behalf of the user are protected from disclosure. volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.
Defaults
The defaults are as follows:
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for groupname, readview, writeview, and notifyview (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
readview is assumed to be every object belonging to the Internet (1.3.6.1) OID space; you can use the read option to override this state.
For writeview, you must also configure write access.
For notifyview, if a view is specified, any notifications in that view are sent to all users associated with the group (an SNMP server host configuration must exist for the user).
Examples
This example shows how to set the SNMP access rights for a group:
Console> (enable) set snmp access cisco-group security-model v3 authentication SNMP access group was set to cisco-group version v3 level authentication, readview internet, nonvolatile. Console> (enable)
Related Commands
Use the set snmp community command to set SNMP communities and associated access types.
set snmp community {read-only | read-write | read-write-all} [community_string]
Syntax Description
read-only Keyword that specifies to assign read-only access to the specified SNMP community. read-write Keyword that specifies to assign read-write access to the specified SNMP community. read-write-all Keyword that specifies to assign read-write-all access to the specified SNMP community. community_string (Optional) Name of the SNMP community.
Defaults
The default configuration has the following communities and access types defined:
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
There are three configurable SNMP communities, one for each access type. If you do not specify the community string, the community string configured for that access type is cleared.
Examples
This example shows how to set read-write access to the SNMP community called yappledapple:
Console> (enable) set snmp community read-write yappledapple SNMP read-write community string set. Console> (enable)
This example shows how to clear the community string defined for read-only access:
Console> (enable) set snmp community read-only SNMP read-only community string cleared. Console> (enable)
Related Commands
Use the set snmp extendedrmon command to enable or disable the Network Analysis Module.
set snmp extendedrmon {enable | disable}
Syntax Description
enable Keyword that specifies to enable the Network Analysis Module. disable Keyword that specifies to disable the Network Analysis Module.
Defaults
The default is enabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.
Examples
This example shows how to enable the Network Analysis Module:
Console> (enable) set snmp extendedrmon enable Snmp extended RMON module enabled Console> (enable)
This example shows how to disable the Network Analysis Module:
Console> (enable) set snmp extendedrmon disable Snmp extended RMON module disabled Console> (enable)
Related Commands
Use the set snmp extendedrmon netflow command to enable or disable the Network Analysis Module to receive the NDE stream from an NFFC or NFFC II and present the resulting statistics on reserved ifIndex.3000.
set snmp extendedrmon netflow {enable password | disable}
Syntax Description
enable Keyword that specifies to allow the Network Analysis Module to receive the NDE stream from an NFFC or NFFC II installed in the Catalyst 5000 family and 2926G series switches. password NetFlow Monitor registration password. disable Keyword that specifies to prevent the Network Analysis Module from receiving the NDE stream.
Defaults
The default is SNMP-extended RMON NetFlow disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.
To enable the NetFlow Monitor option, you must purchase a NetFlow Monitor option license from your Cisco sales representative.
The option license has a registration key and URL on it. Access the URL and enter the registration key and the MAC address of the Network Analysis Module to generate the password for your Network Analysis Module.
Examples
This example shows how to enable SNMP-extended RMON NetFlow support:
Console> (enable) set snmp extendedrmon netflow enable <password> Snmp extended RMON netflow enabled Console> (enable)
This example shows how to disable SNMP-extended RMON NetFlow support:
Console> (enable) set snmp extendedrmon netflow disable Snmp extended RMON netflow disabled Console> (enable)
Related Commands
Use the set snmp extendedrmon vlanagent command to enable or disable the VLANagent option. If the VLANagent option is enabled, the NAM aggregates statistics by VLAN as well as by port.
set snmp extendedrmon vlanagent {enable | disable}
Syntax Description
enable Keyword that specifies to activate SNMP-extended RMON VLANagent support. disable Keyword that specifies to deactivate SNMP-extended RMON VLANagent support.
Defaults
The default is SNMP-extended RMON VLANagent disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.
The VLANagent option imposes an increased load on the NAM and might not be suitable for use on a heavily loaded switch or when the switch is configured to analyze a high volume of network traffic.
Examples
This example shows how to enable extended RMON VLANagent support:
Console> (enable) set snmp extendedrmon vlanagent enable Snmp extended RMON vlanagent enabled Console> (enable)
This example shows how to disable extended RMON VLANagent support:
Console> (enable) set snmp extendedrmon vlanagent disable Snmp extended RMON vlanagent disabled Console> (enable)
Related Commands
Use the set snmp extendedrmon vlanmode command to enable or disable the VLAN monitor option. If the VLAN monitor option is enabled, the Network Analysis Module aggregates statistics by VLAN, instead of by source MAC address.
set snmp extendedrmon vlanmode {enable | disable}
Syntax Description
enable Keyword that activates SNMP-extended RMON VLAN mode support. disable Keyword that deactivates SNMP-extended RMON VLAN mode support.
Defaults
The default is SNMP-extended RMON VLAN mode disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches and the Catalyst 2926G series switches.
Examples
This example shows how to enable extended-RMON VLAN mode support:
Console> (enable) set snmp extendedrmon vlanmode enable Snmp extended RMON vlanmode enabled Console> (enable)
This example shows how to disable extended-RMON VLAN mode support:
Console> (enable) set snmp extendedrmon vlanmode disable Snmp extended RMON vlanmode disabled Console> (enable)
Related Commands
Use the set snmp group command to establish the relationship between an SNMP group and a user with a specific security model.
set snmp group {-hex} {groupname} user {-hex} {username} {security-model {v1 | v2c |
Syntax Description
-hex Keyword that displays the groupname and username as a hexadecimal format. groupname Name of the SNMP group that defines an access control; the maximum length is 32 bytes. user Keyword that specifies the SNMP group user name. username Name of the SNMP user that belongs to the SNMP group; the maximum length is 32 bytes. security-model v1 | v2c | v3 Keywords that specifies security-model v1, v2c, or v3. volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is turned off and on again.
Defaults
This command has no default settings.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for groupname or username (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
Examples
This example shows how to set the SNMP group:
Console> (enable) set snmp group cisco-group user joe security-model v3 SNMP group was set to cisco-group user joe and version v3,nonvolatile. Console> (enable)
Related Commands
clear snmp group
show snmp group
Use the set snmp notify command to set the notifyname in the snmpNotifyTable and set the notifytag in the snmpTargetAddrTable.
set snmp notify {-hex} {notifyname} tag {-hex} {notifytag} [trap | inform] [volatile |
Syntax Description
-hex Keyword that displays notifyname and notifytag as a hexadecimal format. notifyname Keyword that specifies a unique identifier to index the snmpNotifyTable. tag Keyword that specifies the tag name in the taglist. notifytag Keyword that specifies selected entries in the snmpTargetAddrTable. trap (Optional) Keyword that specifies all messages that contain snmpv2-Trap PDUs. inform (Optional) Keyword that specifies all messages that contain InfoRequest PDUs volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.
Defaults
The defaults are as follows:
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for the notifyname and notifytag (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
Examples
This example shows how to set the SNMP notify for a specific notifyname:
Console> (enable) set snmp notify hello tag world inform SNMP notify name was set to hello with tag world notifyType inform, and storageType nonvolatile. Console> (enable)
Related Commands
clear snmp notify
show snmp notify
Use the set snmp rmon command to enable or disable SNMP RMON support.
set snmp rmon {enable | disable}
Syntax Description
enable Keyword that specifies to activate SNMP RMON support. disable Keyword that specifies to deactivate SNMP RMON support.
Defaults
The default for RMON support is disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
RMON statistics are collected on a segment basis instead of a repeater-port basis for the Catalyst 5000 family, 4000 family, 2926G series, 2948G, and 2980G group switching Ethernet modules (WS-X5020 and WS-X5223).
The RMON feature deinstalls the domains for all of the interfaces on an Ethernet module that has been removed from the system.
RMON is supported on Ethernet, Fast Ethernet, Gigabit Ethernet, and Token Ring switch ports.
When RMON is enabled, the supported RMON groups for Ethernet ports are Statistics, History, Alarms, and Events, as specified in RFC 1757.
When RMON is enabled, the supported RMON groups for Token Ring ports are Mac-Layer Statistics, Promiscuous Statistics, Mac-Layer History, Promiscuous History, Ring Station Order Table, Alarms, and Events, as specified in RFC 1513 and RFC 1757.
Use of this command requires a separate software license.
Examples
This example shows how to enable RMON support:
Console> (enable) set snmp rmon enable SNMP RMON support enabled. Console> (enable)
This example shows how to disable RMON support:
Console> (enable) set snmp rmon disable SNMP RMON support disabled. Console> (enable)
Related Commands
Use the set snmp targetaddr command to configure the SNMP target address entries in the snmpTargetAddressTable.
set snmp targetaddr {-hex} {addrname} param {-hex} {paramsname}{ipaddr} [udpport
Syntax Description
-hex Keyword that displays addrname, paramsname, and taglist tagvalue as a hexadecimal format. addrname Arbitrary but unique name of the target agent; the maximum length is 32 bytes. param Keyword that specifies an entry in the snmpTargetParamsTable which provides parameters to be used when generating a message to the target; the maximum length is 32 bytes. paramsname Entry in the snmpTargetParamsTable; the maximum length is 32 bytes. ipaddr IP address of the target. udpport port (Optional) Keyword and variable that specify which UDP port of the target host to use. timeout value (Optional) Keyword and variable that specify the number of timeouts. retries value (Optional) Keyword and variable that specify the number of retries. volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled. taglist tag (Optional) Keyword and variable that specify a tag name in the taglist. tag tagvalue (Optional) Keyword and variable that specify the tag name.
Defaults
The defaults are as follows:
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for the addrname, paramsname, tag, and tagvalue (nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
The maximum tagvalue and taglist length is 255 bytes.
Examples
This example shows how to set the target address in the snmpTargetAddressTable:
Console> (enable) set snmp targetaddr foo param bar 10.1.2.4 udp 160 timeout 10 retries 3 taglist tag1 tag2 tag3 SNMP targetaddr name was set to foo with param bar ipAddr 10.1.2.4, udpport 160, timeout 10, retries 3, storageType nonvolatile with taglist tag1 tag2 tag3. Console> (enable)
Related Commands
clear snmp targetaddr
show snmp targetaddr
Use the set snmp targetparams command to configure the SNMP parameters used in the snmpTargetParamsTable when generating a message to a target.
set snmp targetparams {-hex} {paramsname} user {-hex} {username} {security-model
Syntax Description
-hex Keyword that displays the paramsname and username as a hexadecimal format. paramsname A unique identifier used to index the snmpTargetParamsTable; the maximum length is 32 bytes. user Keyword that specifies the SNMP group user name. username Name of the SNMP user that belongs to the SNMP group; the maximum length is 32 bytes. security-model Keywords that specify security-model v1 or v2c. message-processing Keywords that specify the version number used by the message processing model. security-model v3 Keywords that specify security-model v3. message-processing Keywords that specify version 3 is used by the message- processing model. noauthentication Keyword that specifies security model is not set to use authentication protocol. authentication Keyword that specifies the type of authentication protocol. privacy Keyword that specifies the messages sent on behalf of the user are protected from disclosure. volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.
v1 | v2c
v1 | v2c | v3
v3
Defaults
The default storage type is volatile.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for the paramsname and username(nonprintable delimiters for these parameters), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
Examples
This example shows how to set target parameters in the snmpTargetParamsTable:
Console> (enable) set snmp targetparams bar user joe security-model v3 message-processing v3 authentication SNMP target params was set to bar v3 authentication, message-processing v3, user joe nonvolatile. Console> (enable)
Related Commands
clear snmp targetparams
show snmp targetparams
Use the set snmp trap command to enable or disable the different SNMP traps on the system or to add an entry into the SNMP authentication trap receiver table.
set snmp trap {enable | disable} [all | module | chassis | bridge | repeater | auth | vtp |
Syntax Description
enable Keyword that specifies to activate SNMP traps. disable Keyword that specifies to deactivate SNMP traps. all (Optional) Keyword that specifies all trap types. module (Optional) Keyword that specifies the moduleUp and moduleDown traps from the CISCO-STACK-MIB. chassis (Optional) Keyword that specifies the ciscoSyslogMIB trap from the CISCO-SYSLOG-MIB. bridge (Optional) Keyword that specifies the newRoot and topologyChange traps from RFC 1493 (the BRIDGE-MIB). repeater (Optional) Keyword that specifies the rptrHealth, rptrGroupChange, and rptrResetEvent traps from RFC 1516 (the SNMP-REPEATER-MIB). auth (Optional) Keyword that specifies the authenticationFailure trap from RFC 1157. vtp (Optional) Keyword that specifies the VTP from the CISCO-VTP-MIB. ippermit (Optional) Keyword that specifies the IP Permit Denied access from the CISCO-STACK-MIB. vmps (Optional) Keyword that specifies the vmVmpsChange trap from the CISCO-VLAN-MEMBERSHIP-MIB. config (Optional) Keyword that specifies the sysConfigChange trap from the CISCO-STACK-MIB. entity (Optional) Keyword that specifies the entityMIB trap from the ENTITY-MIB. stpx (Optional) Keyword that specifies the STPX trap. syslog (Optional) Keyword that specifies the system log. rcvr_addr IP address or IP alias of the system to receive SNMP traps. rcvr_community Community string to use when sending authentication traps.
Defaults
The default configuration has SNMP traps disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
An IP permit trap is sent when unauthorized access based on the IP permit list is attempted.
Use the show snmp command to verify that the appropriate traps were configured.
Examples
This example shows how to enable SNMP chassis traps:
Console> (enable) set snmp trap enable chassis SNMP chassis alarm traps enabled. Console> (enable)
This example shows how to enable all traps:
Console> (enable) set snmp trap enable All SNMP traps enabled. Console> (enable)
This example shows how to disable SNMP chassis traps:
Console> (enable) set snmp trap disable chassis SNMP chassis alarm traps disabled. Console> (enable)
This example shows how to add an entry in the SNMP trap receiver table:
Console> (enable) set snmp trap 192.122.173.42 public SNMP trap receiver added. Console> (enable)
Related Commands
clear ip permit
clear port filter
set ip permit
show ip permit
show port counters
show snmp
test snmp trap
Use the set snmp user command to configure a new SNMP user.
set snmp user {-hex} {username} {remote {engineid}} [authentication {md5 | sha |
Syntax Description
-hex Keyword that displays username as a hexadecimal format. username Name of the SNMP user. remote engineid Keyword and variable that specify the remote SNMP engine ID. authentication (Optional) Keyword that specifies the authentication protocol. md5 Keyword that specifies HMAC-MD5-96 authentication protocol. sha Keyword that specifies HMAC-SHA-96 authentication protocol. authpassword Password for authentication. privacy privpassword (Optional) Keyword and variable that enable the host to encrypt the contents of the message sent to or from the agent; the maximum length is 32 bytes, password for privacy. volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is power cycled.
Defaults
The default storage type is volatile.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for username (nonprintable delimiters for this parameter), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
authpassword and privpassword must be hexadecimal characters without delimiters in between.
If authentication is not specified, the security level default will be noauthentication. If privacy is not specified, the default will be no privacy.
Examples
This example shows how to set a specific user name:
Console> (enable) set snmp user joe Snmp user was set to joe authProt no-auth privProt no-priv with engineid 00:00. Console> (enable)
This example shows how to set a specific user name, authentication, and authpassword:
Console> (enable) set snmp user John authentication md5 arizona2 Snmp user was set to John authProt md5 authPasswd arizona2. privProt no-priv wi. Console> (enable)
Related Commands
Use the set snmp view command to configure the SNMP MIB view.
set snmp view {-hex} {viewname} {subtree} [mask] [included | excluded] [volatile |
Syntax Description
-hex Keyword that displays the viewname as a hexadecimal format. viewname Name of a MIB view. subtree The MIB subtree. mask (Optional) Keyword that specifies that the bit mask is used with the subtree. A bit mask can be all one's, all zero's or any combination; the maximum length is 3 bytes. included | excluded (Optional) Keywords that specifies that the MIB subtree is included or excluded. volatile (Optional) Keyword that specifies that the storage type is defined as temporary memory and the content is deleted if the device is turned off. nonvolatile (Optional) Keyword that specifies that the storage type is defined as persistent memory and the content remains after the device is turned off and on again.
Defaults
The defaults are as follows:
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
If you use special characters for viewname (nonprintable delimiters for this parameter), you must use a hexadecimal keyword, which is one or two hexadecimal digits separated by a colon (:); for example, 00:ab:34.
A MOB subtree with a mask defines a view subtree. The MIB subtree can be in OID format or a text name mapped to a valid OID.
Examples
This example shows how to assign a subtree to the view public:
Console> (enable) set snmp view public 1.3.6.1 included Snmp view name was set to public with subtree 1.3.6.1 included, nonvolatile. Control> (enable)
This example shows the response when the subtree is incorrect:
Console> (enable) set snmp view stats statistics excluded Statistics is not a valid subtree OID Control> (enable)
Related Commands
Use the set span command to enable or disable SPAN and to set up the switch port and VLAN analyzer for multiple SPAN sessions.
set span disable [dest_mod/dest_port | all]
Syntax Description
disable Keyword that specifies to disable SPAN. dest_mod (Optional) Monitoring module (SPAN destination). dest_port (Optional) Monitoring port (SPAN destination). all (Optional) Keyword that specifies to disable the spanning for all VLANs. src_mod Monitored module (SPAN source). src_ports... Monitored ports (SPAN source). src_vlan... Monitored VLAN (SPAN source). sc0 Keyword that specifies the in-band interface. rx (Optional) Keyword that specifies that information received at the source is monitored. tx (Optional) Keyword that specifies that information transmitted from the source is monitored. both (Optional) Keyword that specifies that information both transmitted from the source and received at the source is monitored. inpkts enable (Optional) Keywords that specify to enable the receiving of normal inbound traffic on the SPAN destination port. inpkts disable (Optional) Keywords that specify to disable the receiving of normal inbound traffic on the SPAN destination port. learning enable (Optional) Keywords that specify to learn the packet's source address. learning disable (Optional) Keywords that specify to not learn the packet's source address. multicast enable (Optional) Keywords that specify to enable the receiving multicast packets on the SPAN destination port. multicast disable (Optional) Keywords that specify to disable the receiving multicast packets on the SPAN destination port. create (Optional) Keyword that specifies to create a new SPAN session.
Defaults
The default has no SPAN set up.
learning is enabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
You can configure multiple SPAN sessions to run at the same time. One ingress span session (RX or Both direction) and four egress span sessions (TX direction only) can be configured.
A trunk port can be configured as a source or destination port. If the destination port is a trunk port, the outgoing packets through the SPAN port will carry ISL or 802.1Q VLAN headers.
If SPAN is enabled, and you change the VLAN configuration of the SPAN port (destination), you must disable SPAN before the new configuration will be in effect.
If SPAN is enabled, and you disable a source or destination port, the SPAN function will not work until you enable SPAN on both ports.
You can configure a disabled port to be a source or destination port, but the SPAN function will not work until you enable SPAN on both ports.
If SPAN is enabled for monitoring a particular VLAN, the number of ports being monitored changes when you move a switched port into or out of the specified monitored VLAN.
FDDI port can also be a source port.
Source and destination ports cannot be the same port.
After SPAN is enabled, if no parameters were ever set, the first configured SPAN is used as a reference.
You can configure additional SPAN ports which monitor VLANs only. These ports support a source of one or more VLANs and require the destination port to be a trunk-capable port. This port will filter all traffic except traffic from the configured VLAN for that port.
For monitoring inbound traffic, only one ingress session (or both direction) SPAN is allowed regardless of the port-based SPAN. An egress SPAN can coexist with other SPAN sessions.
Use either a dedicated RMON probe (such as the Catalyst 5000 family Network Analysis Module) or a network analyzer to monitor ports.
Use the inpkts keyword with the enable option to allow the SPAN destination port to receive normal incoming traffic in addition to the traffic mirrored from the SPAN source. Use the disable option to prevent the SPAN destination port from receiving normal incoming traffic.
The keyword learning is dependent on the inpkts option. If the inpkts option is disabled, learning will not take effect. The inpkts option must be set to enable to use learning.
When the keyword learning is enabled, the dont_learn control bit is disabled, allowing the system to learn a packet's source address. When learning is disabled, the packet is forwarded to its destination as usual.
You can specify an RSM port as the SPAN source port. However, you cannot specify an RSM port as the SPAN destination port. The source and destination ports have to be within the module.
If you are configuring SPAN on the Catalyst 5000 family and 2926G series Gigabit EtherChannel switching module, the source and destination ports must be on the same module. This restriction does not apply to the following:
If you are configuring the Gigabit EtherChannel switching module VLAN, only the both argument is allowed, you cannot specify tx or rx.
Catalyst 4000 family, 2948G, 2980G switches do not support the sc0 keyword.
Catalyst 4000 family, 2948G, 2980G switches do not permit you to disable multicast on SPAN ports.
The Token Ring port can be a source or destination port. When monitoring the tx direction, only one source port is allowed, and the Token Ring module does not support the inpkts option. A Token Ring port can only monitor another Token Ring port.
If you are running a supervisor engine software release prior to release 4.5(1), we recommend that you configure only a single source port to be monitored. With the supervisor engine software release 4.5(1) and later, a single source port will be the standard Token Ring SPAN configuration.
You cannot monitor a VLAN to which none of the ports belong.
Examples
This example shows how to configure SPAN so that both the transmit traffic and receive traffic on the source port (1/1) is mirrored to the destination port (2/1), and how to verify SPAN configuration:
Console> (enable) set span 1/1 2/1 Enabled monitoring of Port 1/1 transmit/receive traffic by Port 2/1 Console> (enable) show span Status : enabled Admin Source : Port 1/1 Oper Source : Port 1/1 Destination : Port 2/1 Direction : transmit/receive Incoming Packets: disabled Console> (enable)
This example shows how to set VLAN 522 as the SPAN source and port 2/1 as the SPAN destination:
Console> (enable) set span 522 2/1 Enabled monitoring of VLAN 522 transmit/receive traffic by Port 2/1 Console> (enable) show span Status : enabled Admin Source : VLAN 522 Oper Source : Port 3/1-2 Destination : Port 2/1 Direction : transmit/receive Incoming Packets: disabled Console> (enable)
This example shows how to set VLAN 522 as the SPAN source and port 2/12 as the SPAN destination:
Console> (enable) set span 522 2/12 tx inpkts enable SPAN destination port incoming packets enabled. Enabled monitoring of VLAN 522 transmit traffic by Port 2/12 Console> (enable) show span Status : enabled Admin Source : VLAN 522 Oper Source : Port 2/1-2 Destination : Port 2/12 Direction : transmit Incoming Packets: enabled Console> (enable)
This example shows how to enable learning on the SPAN source and port 1/1:
Console> (enable) set span 522 1/1 learning enable Overwrote Port 1/1 to monitor transmit/receive traffic of VLAN 522 Incoming Packets disabled. Learning enabled. Multicast enabled. Console> (enable)
This example shows how to disable learning on the SPAN source and port 1/1:
Console> (enable) set span 522 1/1 learning disable Overwrote Port 1/1 to monitor transmit/receive traffic of VLAN 522 Incoming Packets disabled. Learning disabled. Multicast enabled. Console> (enable)
Related Commands
Use the set spantree backbonefast command to enable or disable the spanning-tree Backbone Fast Convergence feature.
set spantree backbonefast {enable | disable}
Syntax Description
enable Keyword that specifies to enable Backbone Fast Convergence. disable Keyword that specifies to disable Backbone Fast Convergence.
Defaults
The default configuration has Backbone Fast Convergence disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
Backbone Fast Convergence is not supported on Token Ring VLANs.
For Backbone Fast Convergence to work, you must enable it on all switches in the network.
Examples
This example shows how to enable Backbone Fast Convergence:
Console> (enable) set spantree backbonefast enable Backbonefast enabled for all VLANs. Console> (enable)
Related Commands
Use the set spantree disable command to disable the spanning-tree algorithm for all VLANs.
set spantree disable all
Syntax Description
all Keyword that specifies to disable the spanning-tree algorithm for all VLANs.
Defaults
The default configuration has all spanning trees enabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The all option is supported only on systems configured with a Supervisor Engine III, Supervisor Engine III FSX, or Supervisor Engine III FLX and an NFFC or NFFC II. You cannot enable or disable spanning tree on a per-VLAN basis.
Examples
This example shows how to disable the spanning-tree algorithm:
Console> (enable) set spantree disable al1 VLAN 1 bridge spanning tree disabled. Console> (enable)
Related Commands
set spantree enable
show spantree
Use the set spantree enable command to enable the spanning-tree algorithm for a VLAN or all VLANs.
set spantree enable all
Syntax Description
all Keyword that specifies to enable the spanning-tree algorithm for all VLANs.
Defaults
The default configuration has all spanning trees enabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The all option is supported only on systems configured with a Supervisor Engine III, Supervisor Engine III FSX, or Supervisor Engine III FLX and an NFFC or NFFC II. You cannot enable or disable spanning tree on a per VLAN basis.
Examples
This example shows how to activate the spanning-tree algorithm 1:
Console> (enable) set spantree enable all VLAN 1 bridge spanning tree enabled. Console> (enable)
Related Commands
set spantree disable
show spantree
Use the set spantree fwddelay command to set the bridge forward delay for a VLAN.
set spantree fwddelay delay [vlan]
Syntax Description
delay Number of seconds for the bridge forward delay; valid values are 4 to 30 seconds. vlan (Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed; valid values are 1 to 1005.
Defaults
The default configuration has the bridge forward delay set to 15 seconds for all VLANs.
Command Types
Switch command.
Command Modes
Privileged.
Examples
This example shows how to set the bridge forward delay for VLAN 100 to 16 seconds:
Console> (enable) set spantree fwddelay 16 100 Spantree 100 forward delay set to 16 seconds. Console> (enable)
Related Commands
Use the set spantree hello command to set the bridge hello time for a VLAN.
set spantree hello interval [vlan]
Syntax Description
interval Number of seconds the system waits before sending a bridge hello message (a multicast message indicating that the system is active); valid values are 1 to 10. vlan (Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed; valid values are 1 to 1005.
Defaults
The default configuration has the bridge hello time set to two seconds for all VLANs.
Command Types
Switch command.
Command Modes
Privileged.
Examples
This example shows how to set the spantree hello time for VLAN 100 to three seconds:
Console> (enable) set spantree hello 3 100 Spantree 100 hello time set to 3 seconds. Console> (enable)
Related Commands
Use the set spantree maxage command to set the bridge maximum aging time for a VLAN.
set spantree maxage agingtime [vlan]
Syntax Description
agingtime Maximum number of seconds that the system retains the information received from other bridges through Spanning-Tree Protocol; valid values are 6 to 40 seconds. vlan (Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed; valid values are 1 to 1005.
Defaults
The default configuration is 20 seconds for all VLANs.
Command Types
Switch command.
Command Modes
Privileged.
Examples
This example shows how to set the maximum aging time for VLAN 1000 to 25 seconds:
Console> (enable) set spantree maxage 25 1000 Spantree 1000 max aging time set to 25 seconds. Console> (enable)
Related Commands
Use the set spantree multicast-address command to specify the bridge functional address instead of the IEEE Spanning-Tree Protocol address when you configure a TrBRF to use the IEEE Spanning-Tree Protocol.
set spantree multicast-address trbrf_num {ieee | ibm}
Syntax Description
trbrf_num Number of the TrBRF for which you are setting the address. ieee Keyword that specifies use of the IEEE Spanning-Tree Protocol address. ibm Keyword that specifies use of the IBM Spanning-Tree Protocol address.
Defaults
The default configuration has IEEE.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches.
This command applies only to Token Ring modules and only to a TrBRF that runs IEEE Spanning-Tree Protocol.
Examples
The following example shows how to specify the bridge functional address to be used:
Console> (enable) set spantree multicast-address 1 ibm
Related Commands
Use the set spantree portcost command to set the path cost for a port or TrCRF.
set spantree portcost {mod_num/port_num | trcrf} cost
Syntax Description
mod_num Number of the module. port_num Number of the port on the module. trcrf Number of the TrCRF for which you are setting the path cost. cost Number that indicates the cost of the path; valid values are 1 to 65535, with zero (0) the low cost and 65535 the high cost.
Defaults
The default configuration is as follows:
10-Gbps module port cost = 2
1-Gbp module port cost = 4
622-Mbps module port cost = 6
155-Mbps module port cost = 14
100-Mbps module port cost = 19
45-Mbps module port cost = 39
16-Mbp module port cost = 80
10-Mbps module port cost = 100
4-Mbps module port cost = 250
10/100-Mbps module port cost = See "Usage Guidelines"
4/16-Mbps module port cost = See "Usage Guidelines"
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The Spanning-Tree Protocol uses port path costs to determine which port to select as a forwarding port. You should assign lower numbers to ports attached to faster media (such as full duplex) and higher numbers to ports attached to slower media. The possible range is 0 to 65535.
For 10/100 and 4/16 modules, the default port cost is set automatically depending on the current speed of the port. For example, if a 10/100 port is working at 10 Mbps, the port cost is 100. If the port speed changes to 100 Mbps, the port cost adjusts automatically to 19.
The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.
Examples
The following example shows how to set the port cost for port 12 on module 2 to 19:
Console> (enable) set spantree portcost 2/12 19 Spantree port 2/12 path cost set to 19. Console> (enable)
Related Commands
Use the set spantree portfast command to allow a port that is connected to a single workstation or PC to start faster when it is connected.
set spantree portfast mod_num/port_num {enable | disable}
Syntax Description
mod_num Number of the module. port_num Number of the port on the module. enable Keyword that specifies to enable the spanning-tree port fast-start feature on the port. disable Keyword that specifies to disable the spanning-tree port fast-start feature on the port.
Defaults
The default configuration has the port fast-start feature disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.
When a port configured with the spantree portfast enable command is connected, the port immediately enters the spanning-tree forwarding state instead of going through the normal spanning-tree states such as listening and learning. Use this command on ports that are connected to a single workstation or PC only; do not use it on ports that are connected to networking devices such as hubs, routers, switches, bridges, or concentrators.
Examples
This example shows how to enable the spanning-tree port fast-start feature on port 2 on module 1:
Console> (enable) set spantree portfast 1/2 enable Warning: Spantree port fast start should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc. to a fast start port can cause temporary spanning tree loops. Use with caution. Spantree port 1/2 fast start enabled. Console> (enable)
Related Commands
Use the set spantree portfast bpdu-guard command to enable and disable BPDU Guard on the switch. You can prevent loops by moving a non-trunking port configured for PortFast into an ErrDisable state when a BPDU is received on that port.
set spantree portfast bpdu-guard {enable | disable}
Syntax Description
enable Keyword that specifies to enable the spanning-tree PortFast BPDU-Guard. disable Keyword that specifies to disable the spanning-tree PortFast BPDU-Guard.
Defaults
The default configuration has PortFast BPDU-Guard disabled.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.
When you enable PortFast BPU-Guard, a non-trunking PortFast-enabled port is moved into an ErrDisable state when a BPDU is received on that port. When PortFast BPDU Guard is disabled, a PortFast enabled non-trunking port will stay up when it receives BPDUs, which may cause spanning-tree loops.
Examples
This example shows how to enable the spanning-tree PortFast BPDU-Guard:
Console> (enable) set spantree portfast bpdu-guard enable Spantree portfast bpdu-guard enabled on this switch. Console> (enable)
This example shows how to disable the spanning-tree PortFast BPDU-Guard:
Console> (enable) set spantree portfast bpdu-guard disable Spantree portfast bpdu-guard disabled on this switch. Console> (enable)
Related Commands
Use the set spantree portpri command to set the bridge priority for a spanning-tree port or TrCRF.
set spantree portpri {mod_num/port_num | trcrf} [priority | trcrf_priority]
Syntax Description
mod_num Number of the module. port_num Number of the port on the module. trcrf Keyword that specifies the number of the TrCRF for which you are setting the bridge priority. priority (Optional) Number that represents the cost of a link in a spanning-tree bridge; valid values are 0 (high) to 63 (low). trcrf_priority (Optional) Number that represents the cost of the TrCRF; valid values are 0 (high) to 7 (low).
Defaults
The default configuration has all ports with bridge priority set to 32.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.
The specified bridge priority on an ATM port applies to all emulated LANs on that port.
Examples
This example shows how to set the priority of port 1 on module 4 to 63:
Console> (enable) set spantree portpri 4/1 63 Bridge port 4/1 priority set to 63. Console> (enable)
Related Commands
Use the set spantree portstate command to manually set the state of a TrCRF.
set spantree portstate trcrf {block | forward | auto} [trbrf]
Syntax Description
trcrf Number of the TrCRF for which you are manually setting the state. block | forward | auto Keywords that specify to set the TrCRF to a blocked state (block), forwarding state (forward), or to have the Spanning-Tree Protocol determine the correct state automatically (auto). trbrf (Optional) Number of the parent TrBRF.
Defaults
There is no default configuration for this command.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This command is supported by the Catalyst 5000 family switches.
Use this command only to set the port state when the TrCRF is in SRT mode and the TrBRF is running the IBM Spanning-Tree Protocol, or the TrCRF is in SRB mode and the TrBRF is running the IEEE Spanning-Tree Protocol.
When you enable Spanning-Tree Protocol, every switch in the network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, the ports then stabilize to the forwarding or blocking state. However, with TrBRFs and TrCRFs, there are two exceptions to this rule that require you to manually set the state of the logical ports of a TrBRF:
If either condition exists, use the set spantree portstate command to manually set the state of a TrCRF to blocked or forwarding mode or set the Spanning-Tree Protocol to determine the correct state automatically.
Examples
This example shows the manual setting of TrCRF 900 to a forwarding state:
Console> (enable) set spantree portstate 900 forward reserve_nvram : requested by block = 0 reserve_nvram : granted to block = 0 release_nvram : releasing block = 0 Console> (enable)
Related Commands
show spantree
show spantree portstate
Use the set spantree portvlancost command to assign a lower path cost to a set of VLANs on a port.
set spantree portvlancost mod_num/port_num [cost cost_value] [preferred_vlans]
Syntax Description
mod_num Number of the module. port_num Number of the port. cost cost_value (Optional) Keyword to indicate the path cost. The portvlancost applies only to trunk ports; valid values are 1 to 65535. preferred_vlans (Optional) If you do not list a VLAN explicitly, the VLANs listed in prior invocations of this command are affected. If no cost is listed explicitly, and previous cost values are specified in prior invocations, then the portvlancost is set to 1 less than the current port cost for a port. However, this may not assure load balancing in all cases. Valid values are 1 to 1005.
Defaults
The value specified is used as the path cost of the port for the specified set of VLANs. The rest of the VLANs have a path cost equal to the port path cost, set via the set spantree portcost command (if not set, the value is the default path cost of the port).
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.
Examples
These examples show various ways to use the set spantree portvlancost command:
Console> (enable) set spantree portvlancost 2/10 cost 25 1-20 Cannot set portvlancost to a higher value than the port cost, 10, for port 2/10. Console> (enable) Console> (enable) set spantree portvlancost 2/10 1-20 Port 2/10 VLANs 1-20 have a path cost of 9. Console> (enable) Console> (enable) set spantree portvlancost 2/10 cost 4 1-20 Port 2/10 VLANs 1-20 have path cost 4. Port 2/10 VLANs 21-1000 have path cost 10. Console> (enable) Console> (enable) set spantree portvlancost 2/10 cost 6 21 Port 2/10 VLANs 1-21 have path cost 6. Port 2/10 VLANs 22-1000 have path cost 10. Console> (enable)
These examples show how to use the set spantree portvlancost command without explicitly
specifying cost:
Console> (enable) set spantree portvlancost 1/2 Port 1/2 VLANs 1-1005 have path cost 3100. Console> (enable) Console> (enable) set spantree portvlancost 1/2 21 Port 1/2 VLANs 1-20,22-1005 have path cost 3100. Port 1/2 VLANs 21 have path cost 3099. Console> (enable)
Related Commands
show spantree
clear spantree portvlancost
Use the set spantree portvlanpri command to set the port priority for a subset of VLANs in the trunk port.
set spantree portvlanpri mod_num/port_num priority [vlans]
Syntax Description
mod_num Number of the module. port_num Number of the port. priority Number that represents the cost of a link in a spanning-tree bridge. The priority level is from 0 to 63, with 0 indicating high priority and 63 indicating low priority. vlans (Optional) VLANs that use the specified priority level.
Defaults
The default configuration has the port VLAN priority set to 0, with no VLANs specified.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
The Catalyst 2948G and 2980G switches are fixed configuration switches. Ports are located on module 2 for the 2948G and on modules 2 and 3 for the 2980G; for this reason, if you enter 1/N for the module/port number, an error message is displayed.
Use this command to add VLANs to a specified port priority level. Subsequent calls to this command do not replace VLANs that are already set at a specified port priority level.
This feature is not supported for the RSM.
The set spantree portvlanpri command applies only to trunk ports. Do not use Token Ring ports as trunk ports. If you enter this command, you see this message:
Port xx is not a trunk-capable port
Examples
This example shows how to set the port priority for module 1, port 2, on VLANs 21 to 40:
Console> (enable) set spantree portvlanpri 1/2 16 21-40 Port 1/2 vlans 3,6-20,41-1000 using portpri 32 Port 1/2 vlans 1-2,4-5,21-40 using portpri 16 Console> (enable)
Related Commands
clear spantree portvlanpri
show spantree
Use the set spantree priority command to set the bridge priority for a VLAN.
set spantree priority bridge_priority [vlan]
Syntax Description
bridge_priority Number representing the priority of the bridge. The priority level is from 0 to 65535, with 0 indicating high priority and 65535 indicating low priority. vlan (Optional) Number of the VLAN. If you do not specify a VLAN number, VLAN 1 is used; valid values are 1 to 1005.
Defaults
The default configuration has the bridge priority set to 32768.
Command Types
Switch command.
Command Modes
Privileged.
Usage Guidelines
This feature is not supported for the RSM.
Examples
This example shows how to set the bridge priority of VLAN 1 to 4096:
Console> (enable) set spantree priority 4096 VLAN 1 bridge priority set to 4096. Console> (enable)
Related Commands
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Sun Jun 11 11:23:57 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.