Table of Contents
Index
- 10/100 port speed, setting 4-4
- address table
- switching 4-2
- addresses
- IP, see IP addresses
- MAC, see MAC addresses
- administration
- overview 1-6
- switch 13-1
- advertisements, VTP 8-3
- aliases, IP
- syntax 2-5
- All-Routes Explorers
- maximum hops 8-21
- authentication
- local, disabling 11-9
- TACACS+
- configuration guidelines 11-8
- default configuration 11-8
- disabling 11-11
- enabling 11-9
- key, specifying 11-10
- login attempts allowed 11-11
- overview 11-7
- timeout interval 11-11
- autonegotiation
- duplex 4-5
- speed 4-4
- trunks 6-1
- Backbone Fast Convergence
- See BackboneFast
- BackboneFast
- disabling 7-21
- displaying statistics 7-21
- enabling 7-20
- overview 7-18
- banner
- See login banner
- baud rate, setting 3-11
- blocking state, STP 7-6
- BOOT environment variable
- clearing 3-13
- default 3-10
- displaying 3-13
- overview 3-9
- setting 3-13
- boot field, setting 3-11
- boot image, supervisor engine 3-15
- booting
- configuration register
- setting 3-12
- ignoring NVRAM 3-12
- BOOTP server 3-6
- BPDUs, overview 7-3
- bridge forward delay, STP 7-15
- bridge hello time, STP 7-15
- bridge maximum aging time, STP 7-15
- bridge priority, STP 7-15
- bridge protocol data units
- See BPDUs
- broadcast suppression 12-7
- disabling 12-8
- enabling 12-8
- CDP
- configuring 10-9
- overview 10-8
- channel modes, EtherChannel (table) 5-2
- checksum, verifying Flash file 14-21
- Cisco Discovery Protocol
- See CDP
- CiscoWorks2000 10-4
- classified frames 9-2
- clear boot system flash command 3-13
- CLI
- help 2-4
- ROM monitor 2-1
- switch
- accessing 2-2
- help 2-4
- history substitution 2-4
- IP addresses, syntax 2-5
- IP aliases, syntax 2-5
- MAC addresses, syntax 2-5
- operating 2-3
- overview 2-2
- ports, syntax 2-5
- clock, setting 13-10
- command line processing 2-3
- community strings
- defining 10-3
- overview 10-2
- configuration files
- configuring from Flash 14-15
- creating 14-13
- downloading
- preparation 14-13
- TFTP 14-14
- guidelines for creating 14-12
- running configuration
- downloading from TFTP 14-14
- uploading to TFTP 14-16
- uploading 14-16
- preparation 14-15
- configuration register
- boot field, setting 3-11
- default setting 3-10
- ignoring NVRAM at boot 3-12
- overview 3-9
- ROM monitor console port baud rate 3-11
- setting 3-12
- console port
- downloading software images
- example PC download 14-9
- example UNIX download 14-10
- PC procedure 14-6
- preparation 14-5
- UNIX procedure 14-7
- establishing a connection 3-3
- redundant supervisor and 3-15
- ROM monitor baud rate 3-11
- SLIP and 3-6
- contact, setting 13-9
- conventions, documentation xiii
- CoS
- drop thresholds
- mapping 9-9
- receive 9-2
- transmit 9-3
- for MAC/VLAN 9-3, 9-7
- for port 9-2, 9-6
- values 9-1
- values from untrusted ports 9-2
- date, setting 13-10
- daylight saving time
- disabling adjustment 13-14
- enabling adjustment 13-14
- default configuration
- DNS 13-5
- Ethernet 4-2
- Fast Ethernet 4-2
- Fast Ethernet trunks 6-3
- Gigabit Ethernet 4-2
- Gigabit Ethernet trunks 6-3
- IP permit list 11-4
- NTP 13-11
- QoS 9-4
- SNMP 10-3
- spanning-tree 7-10
- supervisor engine 3-1
- supervisor engine boot configuration 3-10
- system message logging 10-12
- TACACS+ authentication 11-8
- VLANs 8-17
- VTP 8-5
- default gateway, configuring 3-4
- disabled state, STP 7-9
- DNS
- default configuration 13-5
- disabling 13-7
- domain
- clearing 13-7
- setting name 13-6
- enabling 13-6
- overview 13-5
- server
- clearing 13-6
- specifying 13-6
- setting up 13-6
- system name and 13-7
- system prompt and 13-7
- document
- conventions xiii
- organization xii
- documentation, related xiv
- domain name
- clearing 13-7
- setting 13-6
- Domain Name System
- See DNS
- downloading
- configuration files
- preparation 14-13
- TFTP 14-14
- software images
- overview 14-1
- preparation 14-2
- drop thresholds
- CoS mapping 9-9
- receive queue 9-2, 9-6
- transmit queue 9-3, 9-7
- DTP
- non-Cisco devices and 6-3
- overview 6-1
- duplex
- Fast Ethernet 4-5
- Gigabit Ethernet 4-5
- Dynamic Trunking Protocol
- See DTP
- enable password 3-7
- encapsulation, trunks (table) 6-2
- error messages
- see system message logging
- EtherChannel
- channel modes (table) 5-2
- configuration guidelines 5-3
- configuring 5-1, 5-4
- overview 5-1
- PAgP and 5-2
- Ethernet
- autonegotiation, speed 4-4
- checking connectivity 4-5
- default configuration 4-2
- modules, overview 1-2
- overview 4-1
- port duplex, setting 4-5
- port name, setting 4-3
- port priority, setting 4-4
- port speed, setting 4-4
- protocol filtering
- See protocol filtering
- trunks
- see trunks
- examples, conventions xiii
- Fast Ethernet
- checking connectivity 4-5
- default configuration 4-2
- Fast EtherChannel
- See EtherChannel
- modules, overview 1-2
- overview 4-1
- port duplex, setting 4-5
- port name, setting 4-3
- port priority, setting 4-4
- port speed, setting 4-4
- trunks
- See trunks
- features, new
- hardware (table) ix
- software (table) x
- filters, port
- See secure port filtering
- Flash file system
- checksum, verifying 14-21
- copying files 14-18
- default device, setting 14-17
- deleting files 14-20
- formatting device 14-21
- listing files 14-17
- overview 14-16
- restoring deleted files 14-20
- verifying file checksum 14-21
- Flash PC card, formatting 14-21
- Flash synchronization
- examples 3-19
- flow control
- configuring 4-6
- keywords (table) 4-6
- formatting Flash devices 14-21
- forward delay timer variable 7-2
- forwarding state, STP 7-8
- frame classification 9-2
- gateway, configuring 3-4
- Gigabit Ethernet
- checking connectivity 4-5
- default configuration 4-2
- duplex 4-5
- flow control 4-6
- flow control keywords (table) 4-6
- modules, overview 1-2
- overview 4-1
- port name, setting 4-3
- port priority, setting 4-4
- protocol filtering
- See protocol filitering
- trunks
- See trunks
- hardware, new features (table) ix
- hello time variable 7-2
- help 2-4
- history
- switch CLI 2-4
- hops, All-Routes Explorers and 8-21
- ICMP
- ping
- executing 13-2
- overview 13-2
- testing connectivity with 4-5
- time exceeded messages 13-3
- traceroute and 13-3
- IEEE 802.1Q
- configuring 6-5
- overview 6-1
- IGMP snooping
- configuration guidelines 12-2
- disabling 12-5
- enabling 12-2
- multicast router ports
- clearing 12-4
- specifying 12-3
- statistics, viewing 12-4
- images
- See software images
- in-band (sc0) interface
- see sc0 interface
- inferior BPDU, BackboneFast and 7-18
- interfaces
- in-band (sc0) 3-2, 8-12
- SLIP (sl0) 3-2
- Internet Group Management Protocol
- See IGMP snooping
- Internet protocols, supported 1-7
- IP
- default gateway, configuring 3-4
- static routes 3-5
- subnetworks, VLANs and 8-12
- IP addresses
- adding to IP permit list 11-4
- clearing from IP permit list 11-6
- setting on supervisor 3-3
- syntax 2-5
- IP aliases, syntax 2-5
- IP permit list
- addresses, adding 11-4
- clearing entries 11-6
- default configuration 11-4
- disabling 11-6
- enabling 11-5
- overview 11-3
- IP supernetting 3-3
- IP traceroute
- executing 13-4
- overview 13-3
- ISL
- configuring 6-4
- example configuration 6-8
- overview 6-1
- Kermit
- example downloads
- PC procedure 14-9
- UNIX procedure 14-10
- PC software download procedure 14-6
- preparing to download software images 14-5
- UNIX software download procedure 14-7
- key, TACACS+ 11-10
- keyboard shortcuts 2-3
- learning state, STP 7-8
- listening state, STP 7-7
- load sharing, trunking and 6-9
- location, setting 13-9
- logging
- see system message logging
- login banner
- clearing 13-10
- configuring 13-9
- overview 13-9
- MAC addresses
- address table 4-2
- blocking 11-1
- secure port filtering and 11-1
- syntax 2-5
- mask
- see netmask
- maximum age timer variable 7-2
- message-of-the-day
- See login banner
- messages
- see system message logging
- metric values, Switch TopN Reports utility (table) 10-17
- MIBs 1-8
- modules
- Ethernet, Fast Ethernet, Gigabit Ethernet
- configuring 4-1
- overview 1-2
- MOTD
- See login banner
- multicast traffic
- broadcast suppression 12-7
- disabling 12-8
- enabling 12-8
- IGMP snooping 12-2
- overview 1-5
- router
- clearing ports, IGMP snooping 12-4
- IGMP snooping ports, specifying 12-3
- SPAN and 10-7
- name, setting port 4-3
- netmask
- assigning 3-3
- network management 1-8
- configuring 10-1
- overview 1-4
- network management system
- see NMS
- network security
- See security
- Network Time Protocol
- See NTP
- NMS 10-2
- SNMP, configuring from 10-3
- SPAN, configuring from 10-7
- NTP
- broadcast-client mode
- configuring 13-12
- disabling 13-15
- client mode
- configuring 13-13
- disabling 13-15
- daylight saving time adjustment
- disabling 13-14
- enabling 13-14
- default configuration 13-11
- disabling 13-15
- overview 13-11
- server
- clearing 13-15
- specifying 13-13
- time zone
- clearing 13-15
- setting 13-14
- NVRAM
- ignoring content at boot 3-12
- synchronization in redundant supervisor 3-15
- PAgP 5-2
- passwords
- enable 3-7
- privileged 3-7
- user 3-7
- PC card
- see Flash PC card
- PCMCIA
- See Flash PC card
- permit list
- See IP permit list
- ping
- executing 13-2
- overview 13-2
- testing connectivity 4-5
- Port Aggregation Protocol
- See PAgP
- PortFast, configuring 7-14
- ports
- capabilities, checking 13-4
- cost, STP 7-12
- duplex 4-5
- filtering
- See secure port filtering
- name 4-3
- port-VLAN cost, STP 7-13
- priority 4-4
- STP 7-11
- speed
- 10/100 Ethernet 4-4
- syntax 2-5
- VLAN assignments 8-22
- VLAN priority, STP 7-12
- priority
- Ethernet ports 4-4
- Fast Ethernet ports 4-4
- Gigabit Ethernet ports 4-4
- STP 7-11
- privileged password 3-7
- prompt
- configuring 13-8
- overview 13-7
- protocol filtering
- configuring 4-10
- overview 4-9
- protocol support 4-10
- pruning, VTP
- See VTP, pruning
- QoS
- configuring 9-1
- CoS
- drop thresholds, mapping 9-9
- drop thresholds, receive 9-2
- drop thresholds, transmit 9-3
- for MAC/VLAN 9-3, 9-7
- for port 9-2, 9-6
- values 9-1
- values from untrusted ports 9-2
- default configuration 9-4
- disabling 9-5
- enabling 9-5
- frame classification 9-2
- information display command 9-10
- overview 1-3
- receive queue 9-2
- drop thresholds 9-6
- revert to defaults 9-5
- statistics 9-9
- transmit queue 9-3
- bandwidth allocation 9-8
- drop thresholds 9-7
- size 9-8
- trusted and untrusted ports 9-2, 9-6
- Quality of Service
- See QoS
- receive queue 9-2
- drop thresholds 9-6
- redundant supervisor engine
- See supervisor engine, redundant
- Remote Monitoring
- See RMON
- Resource Manager Essentials 10-4
- RMON
- enabling 10-5
- overview 10-5
- viewing data 10-6
- ROM monitor
- BOOT environment variable and 3-9
- boot process and 3-8
- CLI 2-1
- configuration register and 3-9
- console port baud rate 3-11
- root switch
- parameters (table) 7-2
- primary, configuring 7-14
- secondary, configuring 7-15
- STP and 7-2
- STP stability and 7-3
- router, multicast 12-3
- runtime image 3-15
- sc0 interface
- IP address, assigning 3-3
- overview 3-2
- VLAN assignment 8-12
- secure port filtering
- configuring 11-2
- disabling 11-2
- overview 11-1
- security
- configuring 11-1
- IP permit list 11-3
- overview 1-5
- passwords, configuring 3-7
- secure port filtering 11-1
- TACACS+ authentication 11-6
- serial download
- example PC software image download 14-9
- example UNIX software image download 14-10
- PC software image download procedure 14-6
- preparing to download 14-5
- UNIX software image download procedure 14-7
- Simple Network Management Protocol
- See SNMP
- sl0 interface 3-2
- SLIP
- console port and 3-6
- sl0 interface 3-2
- SNMP
- community strings
- defining 10-3
- overview 10-2
- configuring 10-3
- default configuration 10-3
- MIBs 1-8
- NMS and 10-3
- overview 10-2
- software images
- downloading
- overview 14-1
- preparation 14-2
- supervisor engine, description 1-1
- uploading 14-11
- preparation 14-11
- software, new features (table) x
- SPAN
- configuring 10-7
- disabling 10-8
- multicast traffic 10-7
- NMS and 10-7
- overview 10-6
- spanning-tree backbone fast convergence
- See BackboneFast
- spanning-tree PortFast
- See PortFast
- Spanning-Tree Protocol
- See STP
- spanning-tree UplinkFast
- See UplinkFast
- speed
- 10/100 Ethernet port, setting 4-4
- standby supervisor engine
- See supervisor engine, redundant
- static route, configuring 3-5
- STP
- BPDUs and 7-3
- bridge forward delay, setting 7-15
- bridge hello time, setting 7-15
- bridge maximum aging time, setting 7-15
- bridge priority, setting 7-15
- default configuration 7-10
- disabling 7-16
- enabling 7-10
- forward delay timer variable 7-2
- hello time variable 7-2
- maximum age timer variable 7-2
- overview 1-3, 7-1
- port cost, configuring 7-12
- port priority, configuring 7-11
- port states
- blocking 7-6
- disabled 7-9
- forwarding 7-8
- learning 7-8
- listening 7-7
- overview 7-4
- port VLAN priority, configuring 7-12
- PortFast, configuring 7-14
- port-VLAN cost 7-13
- root switch
- election 7-2
- parameters (table) 7-2
- primary 7-14
- secondary 7-15
- stable topology and 7-3
- subnet mask
- see netmask
- supervisor engine
- BOOT environment variable
- clearing 3-13
- default 3-10
- displaying 3-13
- overview 3-9
- setting 3-13
- boot image, supervisor engine 3-15
- BOOTP server and 3-6
- configuration register
- boot field, setting 3-11
- ignore NVRAM, setting 3-12
- overview 3-9
- ROM monitor baud rate, setting 3-11
- setting 3-12
- configuring 3-1
- console port
- establishing connection 3-3
- ROM monitor baud rate 3-11
- SLIP and 3-6
- default boot configuration 3-10
- default configuration 3-1
- default gateways 3-4
- Flash file system
- See Flash file system
- IP address, setting 3-3
- preparing to configure 3-2
- redundant
- configuration guidelines 3-17
- console port and 3-15
- Flash synchronization examples 3-19
- forcing switchover to standby 3-19
- NVRAM synchronization 3-15
- overview 1-6, 3-14
- slot assignment 3-14
- verifying status 3-17
- ROM monitor 3-8
- software description 1-1
- startup configuration 3-8
- static routes 3-5
- switchover 3-19
- uploading software images 14-11
- switch administration
- overview 1-6
- procedures 13-1
- switch CLI
- accessing 2-2
- help 2-4
- history substitution 2-4
- IP addresses, syntax 2-5
- IP aliases, syntax 2-5
- MAC addresses, syntax 2-5
- operating 2-3
- overview 2-2
- ports, syntax 2-5
- switch software images
- see software images
- Switch TopN Reports utility
- background execution 10-18
- foreground execution 10-17
- metric values (table) 10-17
- overview 10-17
- running 10-18
- viewing 10-18
- Switched Port Analyzer
- See SPAN
- switching address table 4-2
- switchover
- See supervisor engine, switchover
- synchronization
- see supervisor engine, redundant 3-16
- syslog
- configuring 10-12
- daemon, configuring 10-13
- default configuration 10-12
- example configurations 10-15
- facilities (table) 10-11
- message format 10-12
- message log, displaying 10-14
- overview 10-10
- server, configuring 10-13
- severity levels (table) 10-11
- Telnet logging 10-14
- system clock, setting 13-10
- system contact, setting 13-9
- system location, setting 13-9
- system message logging
- configuring 10-12
- daemon, configuring 10-13
- default configuration 10-12
- example configuration 10-15
- facilities (table) 10-11
- message format 10-12
- message log, displaying 10-14
- overview 10-10
- server, configuring 10-13
- severity levels (table) 10-11
- syslog daemon, configuring 10-13
- Telnet logging 10-14
- system name
- clearing 13-8
- configuring 13-8
- overview 13-7
- system prompt
- configuring 13-8
- overview 13-7
- TACACS+
- configuration guidelines 11-8
- default configuration 11-8
- disabling 11-11
- enabling 11-9
- key, specifying 11-10
- local authentication, disabling 11-9
- login attempts allowed 11-11
- overview 11-7
- timeout interval 11-11
- Telnet
- accessing CLI 2-2, 13-1
- TFTP
- downloading configuration files 14-13
- uploading configuration files 14-15, 14-16
- uploading software images 14-11
- time zone
- clearing 13-15
- setting 13-14
- time, setting 13-10
- tip command 3-3
- Token Ring
- VLANs
- overview 8-13
- TrBRF 8-14
- TrCRF 8-15
- VTP version 2 8-3
- TopN reports
- See Switch TopN Reports utility
- traceroute
- See IP traceroute
- transmit queue
- bandwidth allocation 9-8
- drop thresholds 9-7
- size 9-8
- TrBRF
- creating 8-19
- modifying 8-19
- overview 8-14
- TrCRF
- All-Routes Explorer maximum hops 8-21
- backup 8-21
- creating 8-20
- modifying 8-20
- overview 8-15
- troubleshooting
- IP permit list (Caution) 11-5, 11-6
- system message logging and 10-10
- TACACS+ local authentication (Caution) 11-9
- trunks
- allowed VLANs 6-6
- autonegotiation 6-1
- default configuration 6-3
- disabling 6-7
- encapsulations (table) 6-2
- example configurations
- ISL 6-8
- load sharing 6-9
- IEEE 802.1Q, configuring 6-5
- ISL, configuring 6-4
- ISL/802.1Q negotiating, configuring 6-6
- modes (table) 6-2
- overview 6-1
- possible configurations (table) 6-2
- VLANs, allowed 6-6
- trusted port 9-2, 9-6
- UDLD protocol
- disabling 4-8
- enabling 4-7
- unclassified frames 9-2
- UniDirectional Link Detection protocol
- see UDLD protocol
- UNIX workstation
- software image download examples 14-10
- software image download procedure 14-7
- untrusted port 9-2, 9-6
- UplinkFast
- configuring 7-17
- overview 7-16
- uplink groups 7-16
- UplinkFast Switchover
- See UplinkFast
- uploading
- configuration files
- preparation 14-15
- running configuration 14-16
- software images 14-11
- preparation 14-11
- user password 3-7
- virtual LAN
- See VLANs
- VLAN Trunk Protocol
- See VTP
- VLAN trunks
- See trunks
- VLANs
- allowed on trunk 6-6
- assigning ports to 8-22
- bridge forward delay 7-15
- bridge hello time 7-15
- bridge maximum aging time 7-15
- bridge priority 7-15
- configuration guidelines 8-17
- cost 7-13
- default configuration 8-17
- deleting 8-23
- Ethernet 8-18
- FDDI 8-19
- in-band interface assignment 8-12
- IP subnetworks and 8-12
- overview 1-3, 8-11
- port VLAN priority 7-12
- ports, assigning to 8-22
- protocol filtering and 4-9
- sc0 interface assignment 8-12
- Token Ring
- All-Routes Explorer maximum hops 8-21
- backup 8-21
- creating 8-19, 8-20
- modifying 8-19, 8-20
- overview 8-13
- TrBRF 8-14
- TrCRF 8-15
- TrBRF 8-19
- TrCRF
- backup 8-21
- creating 8-20
- trunks
- See trunks
- VTP domain and 8-12
- VTP
- advertisements 8-3
- client, configuring 8-7
- configuration guidelines 8-6
- default configuration 8-5
- disabling 8-8
- domains 8-2
- modes
- client 8-2
- server 8-2
- transparent 8-2
- monitoring 8-11
- overview 8-1
- pruning
- configuring 8-9
- disabling 8-10
- overview 8-4
- server, configuring 8-6
- statistics 8-11
- Token Ring 8-3
- transparent mode, configuring 8-8
- version 2
- disabling 8-9
- enabling 8-8
- overview 8-3
- VLANs and 8-12
- VTP pruning
- See VTP, pruning
Posted: Thu Feb 4 18:18:10 PST 1999
Copyright 1989-1999©Cisco Systems Inc.