cc/td/doc/product/lan/cat6000/sw5_1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

Numerics


10/100 port speed, setting          4-4

A


address table
switching          4-2

addresses
IP, see IP addresses
MAC, see MAC addresses

administration
overview          1-6
switch          13-1

advertisements, VTP          8-3

aliases, IP
syntax          2-5

All-Routes Explorers
maximum hops          8-21

authentication
local, disabling          11-9
TACACS+
configuration guidelines          11-8
default configuration          11-8
disabling          11-11
enabling          11-9
key, specifying          11-10
login attempts allowed          11-11
overview          11-7
timeout interval          11-11

autonegotiation
duplex          4-5
speed          4-4
trunks          6-1

B


Backbone Fast Convergence
See BackboneFast

BackboneFast
disabling          7-21
displaying statistics          7-21
enabling          7-20
overview          7-18

banner
See login banner

baud rate, setting          3-11

blocking state, STP          7-6

BOOT environment variable
clearing          3-13
default          3-10
displaying          3-13
overview          3-9
setting          3-13

boot field, setting          3-11

boot image, supervisor engine          3-15

booting
configuration register
setting          3-12
ignoring NVRAM          3-12

BOOTP server          3-6

BPDUs, overview          7-3

bridge forward delay, STP          7-15

bridge hello time, STP          7-15

bridge maximum aging time, STP          7-15

bridge priority, STP          7-15

bridge protocol data units
See BPDUs

broadcast suppression          12-7
disabling          12-8
enabling          12-8

C


CDP
configuring          10-9
overview          10-8

channel modes, EtherChannel (table)          5-2

checksum, verifying Flash file          14-21

Cisco Discovery Protocol
See CDP

CiscoWorks2000          10-4

classified frames          9-2

clear boot system flash command          3-13

CLI
help          2-4
ROM monitor          2-1
switch
accessing          2-2
help          2-4
history substitution          2-4
IP addresses, syntax          2-5
IP aliases, syntax          2-5
MAC addresses, syntax          2-5
operating          2-3
overview          2-2
ports, syntax          2-5

clock, setting          13-10

command line processing          2-3

community strings
defining          10-3
overview          10-2

configuration files
configuring from Flash          14-15
creating          14-13
downloading
preparation          14-13
TFTP          14-14
guidelines for creating          14-12
running configuration
downloading from TFTP          14-14
uploading to TFTP          14-16
uploading          14-16
preparation          14-15

configuration register
boot field, setting          3-11
default setting          3-10
ignoring NVRAM at boot          3-12
overview          3-9
ROM monitor console port baud rate          3-11
setting          3-12

console port
downloading software images
example PC download          14-9
example UNIX download          14-10
PC procedure          14-6
preparation          14-5
UNIX procedure          14-7
establishing a connection          3-3
redundant supervisor and          3-15
ROM monitor baud rate          3-11
SLIP and          3-6

contact, setting          13-9

conventions, documentation          xiii

CoS
drop thresholds
mapping          9-9
receive          9-2
transmit          9-3
for MAC/VLAN          9-3, 9-7
for port          9-2, 9-6
values          9-1
values from untrusted ports          9-2

D


date, setting          13-10

daylight saving time
disabling adjustment          13-14
enabling adjustment          13-14

default configuration
DNS          13-5
Ethernet          4-2
Fast Ethernet          4-2
Fast Ethernet trunks          6-3
Gigabit Ethernet          4-2
Gigabit Ethernet trunks          6-3
IP permit list          11-4
NTP          13-11
QoS          9-4
SNMP          10-3
spanning-tree          7-10
supervisor engine          3-1
supervisor engine boot configuration          3-10
system message logging          10-12
TACACS+ authentication          11-8
VLANs          8-17
VTP          8-5

default gateway, configuring          3-4

disabled state, STP          7-9

DNS
default configuration          13-5
disabling          13-7
domain
clearing          13-7
setting name          13-6
enabling          13-6
overview          13-5
server
clearing          13-6
specifying          13-6
setting up          13-6
system name and          13-7
system prompt and          13-7

document
conventions          xiii
organization          xii

documentation, related          xiv

domain name
clearing          13-7
setting          13-6

Domain Name System
See DNS

downloading
configuration files
preparation          14-13
TFTP          14-14
software images
overview          14-1
preparation          14-2

drop thresholds
CoS mapping          9-9
receive queue          9-2, 9-6
transmit queue          9-3, 9-7

DTP
non-Cisco devices and          6-3
overview          6-1

duplex
Fast Ethernet          4-5
Gigabit Ethernet          4-5

Dynamic Trunking Protocol
See DTP

E


enable password          3-7

encapsulation, trunks (table)          6-2

error messages
see system message logging

EtherChannel
channel modes (table)          5-2
configuration guidelines          5-3
configuring          5-1, 5-4
overview          5-1
PAgP and          5-2

Ethernet
autonegotiation, speed          4-4
checking connectivity          4-5
default configuration          4-2
modules, overview          1-2
overview          4-1
port duplex, setting          4-5
port name, setting          4-3
port priority, setting          4-4
port speed, setting          4-4
protocol filtering
See protocol filtering
trunks
see trunks

examples, conventions          xiii

F


Fast Ethernet
checking connectivity          4-5
default configuration          4-2
Fast EtherChannel
See EtherChannel
modules, overview          1-2
overview          4-1
port duplex, setting          4-5
port name, setting          4-3
port priority, setting          4-4
port speed, setting          4-4
trunks
See trunks

features, new
hardware (table)          ix
software (table)          x

filters, port
See secure port filtering

Flash file system
checksum, verifying          14-21
copying files          14-18
default device, setting          14-17
deleting files          14-20
formatting device          14-21
listing files          14-17
overview          14-16
restoring deleted files          14-20
verifying file checksum          14-21

Flash PC card, formatting          14-21

Flash synchronization
examples          3-19

flow control
configuring          4-6
keywords (table)          4-6

formatting Flash devices          14-21

forward delay timer variable          7-2

forwarding state, STP          7-8

frame classification          9-2

G


gateway, configuring          3-4

Gigabit Ethernet
checking connectivity          4-5
default configuration          4-2
duplex          4-5
flow control          4-6
flow control keywords (table)          4-6
modules, overview          1-2
overview          4-1
port name, setting          4-3
port priority, setting          4-4
protocol filtering
See protocol filitering
trunks
See trunks

H


hardware, new features (table)          ix

hello time variable          7-2

help          2-4

history
switch CLI          2-4

hops, All-Routes Explorers and          8-21

I


ICMP
ping
executing          13-2
overview          13-2
testing connectivity with          4-5
time exceeded messages          13-3
traceroute and          13-3

IEEE 802.1Q
configuring          6-5
overview          6-1

IGMP snooping
configuration guidelines          12-2
disabling          12-5
enabling          12-2
multicast router ports
clearing          12-4
specifying          12-3
statistics, viewing          12-4

images
See software images

in-band (sc0) interface
see sc0 interface

inferior BPDU, BackboneFast and          7-18

interfaces
in-band (sc0)          3-2, 8-12
SLIP (sl0)          3-2

Internet Group Management Protocol
See IGMP snooping

Internet protocols, supported          1-7

IP
default gateway, configuring          3-4
static routes          3-5
subnetworks, VLANs and          8-12

IP addresses
adding to IP permit list          11-4
clearing from IP permit list          11-6
setting on supervisor          3-3
syntax          2-5

IP aliases, syntax          2-5

IP permit list
addresses, adding          11-4
clearing entries          11-6
default configuration          11-4
disabling          11-6
enabling          11-5
overview          11-3

IP supernetting          3-3

IP traceroute
executing          13-4
overview          13-3

ISL
configuring          6-4
example configuration          6-8
overview          6-1

K


Kermit
example downloads
PC procedure          14-9
UNIX procedure          14-10
PC software download procedure          14-6
preparing to download software images          14-5
UNIX software download procedure          14-7

key, TACACS+          11-10

keyboard shortcuts          2-3

L


learning state, STP          7-8

listening state, STP          7-7

load sharing, trunking and          6-9

location, setting          13-9

logging
see system message logging

login banner
clearing          13-10
configuring          13-9
overview          13-9

M


MAC addresses
address table          4-2
blocking          11-1
secure port filtering and          11-1
syntax          2-5

mask
see netmask

maximum age timer variable          7-2

message-of-the-day
See login banner

messages
see system message logging

metric values, Switch TopN Reports utility (table)          10-17

MIBs          1-8

modules
Ethernet, Fast Ethernet, Gigabit Ethernet
configuring          4-1
overview          1-2

MOTD
See login banner

multicast traffic
broadcast suppression          12-7
disabling          12-8
enabling          12-8
IGMP snooping          12-2
overview          1-5
router
clearing ports, IGMP snooping          12-4
IGMP snooping ports, specifying          12-3
SPAN and          10-7

N


name, setting port          4-3

netmask
assigning          3-3

network management          1-8
configuring          10-1
overview          1-4

network management system
see NMS

network security
See security

Network Time Protocol
See NTP

NMS          10-2
SNMP, configuring from          10-3
SPAN, configuring from          10-7

NTP
broadcast-client mode
configuring          13-12
disabling          13-15
client mode
configuring          13-13
disabling          13-15
daylight saving time adjustment
disabling          13-14
enabling          13-14
default configuration          13-11
disabling          13-15
overview          13-11
server
clearing          13-15
specifying          13-13
time zone
clearing          13-15
setting          13-14

NVRAM
ignoring content at boot          3-12
synchronization in redundant supervisor          3-15

P


PAgP          5-2

passwords
enable          3-7
privileged          3-7
user          3-7

PC card
see Flash PC card

PCMCIA
See Flash PC card

permit list
See IP permit list

ping
executing          13-2
overview          13-2
testing connectivity          4-5

Port Aggregation Protocol
See PAgP

PortFast, configuring          7-14

ports
capabilities, checking          13-4
cost, STP          7-12
duplex          4-5
filtering
See secure port filtering
name          4-3
port-VLAN cost, STP          7-13
priority          4-4
STP          7-11
speed
10/100 Ethernet          4-4
syntax          2-5
VLAN assignments          8-22
VLAN priority, STP          7-12

priority
Ethernet ports          4-4
Fast Ethernet ports          4-4
Gigabit Ethernet ports          4-4
STP          7-11

privileged password          3-7

prompt
configuring          13-8
overview          13-7

protocol filtering
configuring          4-10
overview          4-9
protocol support          4-10

pruning, VTP
See VTP, pruning

Q


QoS
configuring          9-1
CoS
drop thresholds, mapping          9-9
drop thresholds, receive          9-2
drop thresholds, transmit          9-3
for MAC/VLAN          9-3, 9-7
for port          9-2, 9-6
values          9-1
values from untrusted ports          9-2
default configuration          9-4
disabling          9-5
enabling          9-5
frame classification          9-2
information display command          9-10
overview          1-3
receive queue          9-2
drop thresholds          9-6
revert to defaults          9-5
statistics          9-9
transmit queue          9-3
bandwidth allocation          9-8
drop thresholds          9-7
size          9-8
trusted and untrusted ports          9-2, 9-6

Quality of Service
See QoS

R


receive queue          9-2
drop thresholds          9-6

redundant supervisor engine
See supervisor engine, redundant

Remote Monitoring
See RMON

Resource Manager Essentials          10-4

RMON
enabling          10-5
overview          10-5
viewing data          10-6

ROM monitor
BOOT environment variable and          3-9
boot process and          3-8
CLI          2-1
configuration register and          3-9
console port baud rate          3-11

root switch
parameters (table)          7-2
primary, configuring          7-14
secondary, configuring          7-15
STP and          7-2
STP stability and          7-3

router, multicast          12-3

runtime image          3-15

S


sc0 interface
IP address, assigning          3-3
overview          3-2
VLAN assignment          8-12

secure port filtering
configuring          11-2
disabling          11-2
overview          11-1

security
configuring          11-1
IP permit list          11-3
overview          1-5
passwords, configuring          3-7
secure port filtering          11-1
TACACS+ authentication          11-6

serial download
example PC software image download          14-9
example UNIX software image download          14-10
PC software image download procedure          14-6
preparing to download          14-5
UNIX software image download procedure          14-7

Simple Network Management Protocol
See SNMP

sl0 interface          3-2

SLIP
console port and          3-6
sl0 interface          3-2

SNMP
community strings
defining          10-3
overview          10-2
configuring          10-3
default configuration          10-3
MIBs          1-8
NMS and          10-3
overview          10-2

software images
downloading
overview          14-1
preparation          14-2
supervisor engine, description          1-1
uploading          14-11
preparation          14-11

software, new features (table)          x

SPAN
configuring          10-7
disabling          10-8
multicast traffic          10-7
NMS and          10-7
overview          10-6

spanning-tree backbone fast convergence
See BackboneFast

spanning-tree PortFast
See PortFast

Spanning-Tree Protocol
See STP

spanning-tree UplinkFast
See UplinkFast

speed
10/100 Ethernet port, setting          4-4

standby supervisor engine
See supervisor engine, redundant

static route, configuring          3-5

STP
BPDUs and          7-3
bridge forward delay, setting          7-15
bridge hello time, setting          7-15
bridge maximum aging time, setting          7-15
bridge priority, setting          7-15
default configuration          7-10
disabling          7-16
enabling          7-10
forward delay timer variable          7-2
hello time variable          7-2
maximum age timer variable          7-2
overview          1-3, 7-1
port cost, configuring          7-12
port priority, configuring          7-11
port states
blocking          7-6
disabled          7-9
forwarding          7-8
learning          7-8
listening          7-7
overview          7-4
port VLAN priority, configuring          7-12
PortFast, configuring          7-14
port-VLAN cost          7-13
root switch
election          7-2
parameters (table)          7-2
primary          7-14
secondary          7-15
stable topology and          7-3

subnet mask
see netmask

supervisor engine
BOOT environment variable
clearing          3-13
default          3-10
displaying          3-13
overview          3-9
setting          3-13
boot image, supervisor engine          3-15
BOOTP server and          3-6
configuration register
boot field, setting          3-11
ignore NVRAM, setting          3-12
overview          3-9
ROM monitor baud rate, setting          3-11
setting          3-12
configuring          3-1
console port
establishing connection          3-3
ROM monitor baud rate          3-11
SLIP and          3-6
default boot configuration          3-10
default configuration          3-1
default gateways          3-4
Flash file system
See Flash file system
IP address, setting          3-3
preparing to configure          3-2
redundant
configuration guidelines          3-17
console port and          3-15
Flash synchronization examples          3-19
forcing switchover to standby          3-19
NVRAM synchronization          3-15
overview          1-6, 3-14
slot assignment          3-14
verifying status          3-17
ROM monitor          3-8
software description          1-1
startup configuration          3-8
static routes          3-5
switchover          3-19
uploading software images          14-11

switch administration
overview          1-6
procedures          13-1

switch CLI
accessing          2-2
help          2-4
history substitution          2-4
IP addresses, syntax          2-5
IP aliases, syntax          2-5
MAC addresses, syntax          2-5
operating          2-3
overview          2-2
ports, syntax          2-5

switch software images
see software images

Switch TopN Reports utility
background execution          10-18
foreground execution          10-17
metric values (table)          10-17
overview          10-17
running          10-18
viewing          10-18

Switched Port Analyzer
See SPAN

switching address table          4-2

switchover
See supervisor engine, switchover

synchronization
see supervisor engine, redundant          3-16

syslog
configuring          10-12
daemon, configuring          10-13
default configuration          10-12
example configurations          10-15
facilities (table)          10-11
message format          10-12
message log, displaying          10-14
overview          10-10
server, configuring          10-13
severity levels (table)          10-11
Telnet logging          10-14

system clock, setting          13-10

system contact, setting          13-9

system location, setting          13-9

system message logging
configuring          10-12
daemon, configuring          10-13
default configuration          10-12
example configuration          10-15
facilities (table)          10-11
message format          10-12
message log, displaying          10-14
overview          10-10
server, configuring          10-13
severity levels (table)          10-11
syslog daemon, configuring          10-13
Telnet logging          10-14

system name
clearing          13-8
configuring          13-8
overview          13-7

system prompt
configuring          13-8
overview          13-7

T


TACACS+
configuration guidelines          11-8
default configuration          11-8
disabling          11-11
enabling          11-9
key, specifying          11-10
local authentication, disabling          11-9
login attempts allowed          11-11
overview          11-7
timeout interval          11-11

Telnet
accessing CLI          2-2, 13-1

TFTP
downloading configuration files          14-13
uploading configuration files          14-15, 14-16
uploading software images          14-11

time zone
clearing          13-15
setting          13-14

time, setting          13-10

tip command          3-3

Token Ring
VLANs
overview          8-13
TrBRF          8-14
TrCRF          8-15
VTP version 2          8-3

TopN reports
See Switch TopN Reports utility

traceroute
See IP traceroute

transmit queue
bandwidth allocation          9-8
drop thresholds          9-7
size          9-8

TrBRF
creating          8-19
modifying          8-19
overview          8-14

TrCRF
All-Routes Explorer maximum hops          8-21
backup          8-21
creating          8-20
modifying          8-20
overview          8-15

troubleshooting
IP permit list (Caution)          11-5, 11-6
system message logging and          10-10
TACACS+ local authentication (Caution)          11-9

trunks
allowed VLANs          6-6
autonegotiation          6-1
default configuration          6-3
disabling          6-7
encapsulations (table)          6-2
example configurations
ISL          6-8
load sharing          6-9
IEEE 802.1Q, configuring          6-5
ISL, configuring          6-4
ISL/802.1Q negotiating, configuring          6-6
modes (table)          6-2
overview          6-1
possible configurations (table)          6-2
VLANs, allowed          6-6

trusted port          9-2, 9-6

U


UDLD protocol
disabling          4-8
enabling          4-7

unclassified frames          9-2

UniDirectional Link Detection protocol
see UDLD protocol

UNIX workstation
software image download examples          14-10
software image download procedure          14-7

untrusted port          9-2, 9-6

UplinkFast
configuring          7-17
overview          7-16
uplink groups          7-16

UplinkFast Switchover
See UplinkFast

uploading
configuration files
preparation          14-15
running configuration          14-16
software images          14-11
preparation          14-11

user password          3-7

V


virtual LAN
See VLANs

VLAN Trunk Protocol
See VTP

VLAN trunks
See trunks

VLANs
allowed on trunk          6-6
assigning ports to          8-22
bridge forward delay          7-15
bridge hello time          7-15
bridge maximum aging time          7-15
bridge priority          7-15
configuration guidelines          8-17
cost          7-13
default configuration          8-17
deleting          8-23
Ethernet          8-18
FDDI          8-19
in-band interface assignment          8-12
IP subnetworks and          8-12
overview          1-3, 8-11
port VLAN priority          7-12
ports, assigning to          8-22
protocol filtering and          4-9
sc0 interface assignment          8-12
Token Ring
All-Routes Explorer maximum hops          8-21
backup          8-21
creating          8-19, 8-20
modifying          8-19, 8-20
overview          8-13
TrBRF          8-14
TrCRF          8-15
TrBRF          8-19
TrCRF
backup          8-21
creating          8-20
trunks
See trunks
VTP domain and          8-12

VTP
advertisements          8-3
client, configuring          8-7
configuration guidelines          8-6
default configuration          8-5
disabling          8-8
domains          8-2
modes
client          8-2
server          8-2
transparent          8-2
monitoring          8-11
overview          8-1
pruning
configuring          8-9
disabling          8-10
overview          8-4
server, configuring          8-6
statistics          8-11
Token Ring          8-3
transparent mode, configuring          8-8
version 2
disabling          8-9
enabling          8-8
overview          8-3
VLANs and          8-12

VTP pruning
See VTP, pruning

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Feb 4 18:18:10 PST 1999
Copyright 1989-1999©Cisco Systems Inc.