cc/td/doc/product/lan/cat6000/sw_5_2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Index

Index

Numerics


10/100 port speed, setting     4-4

A


address table
switching     4-2

addresses
IP, see IP addresses
MAC, see MAC addresses

administration
overview     1-5
switch     14-1

advertisements, VTP     8-3

aliases, IP
syntax     2-5

All-Routes Explorers
maximum hops     8-27

authentication
local, disabling     11-9
TACACS+
configuration guidelines     11-8
default configuration     11-8
disabling     11-11
enabling     11-9
key, specifying     11-10
login attempts allowed     11-11
overview     11-7
timeout interval     11-11

autonegotiation
duplex     4-4
speed     4-4
trunks     6-1

B


Backbone Fast Convergence
See BackboneFast

BackboneFast
disabling     7-21
displaying statistics     7-21
enabling     7-20
overview     7-18

banner
See login banner

baud rate, setting     3-11

blocking state, STP     7-6

BOOT environment variable
clearing     3-13
default     3-10
displaying     3-13
overview     3-9
setting     3-13

boot field, setting     3-11

boot image, supervisor engine     3-15

booting
configuration register
setting     3-12
ignoring NVRAM     3-12

BOOTP server     3-6

BPDUs, overview     7-3

bridge forward delay, STP     7-15

bridge hello time, STP     7-15

bridge maximum aging time, STP     7-15

bridge priority, STP     7-15

bridge protocol data units
See BPDUs

broadcast suppression     13-1
disabling     13-3
enabling     13-3

C


CDP
configuring     10-9
overview     10-8

channel modes, EtherChannel (table)     5-2

checksum, verifying Flash file     15-21

Cisco Discovery Protocol
See CDP

CiscoWorks2000     10-4

classified frames     9-3

clear boot system flash command     3-13

CLI
help     2-4
ROM monitor     2-1
switch
accessing     2-2
help     2-4
history substitution     2-4
IP addresses, syntax     2-5
IP aliases, syntax     2-5
MAC addresses, syntax     2-5
operating     2-3
overview     2-2
ports, syntax     2-5

clock, setting     14-10

command line processing     2-3

community strings
defining     10-3
overview     10-2

configuration files
configuring from Flash     15-15
creating     15-13
downloading
preparation     15-13
TFTP     15-14
guidelines for creating     15-12
running configuration
downloading from TFTP     15-14
uploading to TFTP     15-16
uploading     15-16
preparation     15-15

configuration register
boot field, setting     3-11
default setting     3-10
ignoring NVRAM at boot     3-12
overview     3-9
ROM monitor console port baud rate     3-11
setting     3-12

console port
downloading software images
example PC download     15-9
example UNIX download     15-10
PC procedure     15-6
preparation     15-5
UNIX procedure     15-7
establishing a connection     3-3
redundant supervisor and     3-15
ROM monitor baud rate     3-11
SLIP and     3-6

contact, setting     14-9

conventions, documentation     xv

CoS
drop thresholds
mapping     9-10
receive     9-4
transmit     9-5
for MAC/VLAN     9-3, 9-9
for port     9-3, 9-8
values     9-3
values from untrusted ports     9-3

D


date, setting     14-10

daylight saving time
disabling adjustment     14-14
enabling adjustment     14-14

default configuration
DNS     14-5
Ethernet     4-2
Fast Ethernet     4-2
Fast Ethernet trunks     6-3
Gigabit Ethernet     4-2
Gigabit Ethernet trunks     6-3
IP permit list     11-4
NTP     14-11
QoS     9-6
SNMP     10-3
spanning-tree     7-10
supervisor engine     3-1
supervisor engine boot configuration     3-10
system message logging     10-12
TACACS+ authentication     11-8
VLANs     8-23
VTP     8-5

default gateway, configuring     3-4

disabled state, STP     7-9

DNS
default configuration     14-5
disabling     14-7
domain
clearing     14-7
setting name     14-6
enabling     14-6
overview     14-5
server
clearing     14-6
specifying     14-6
setting up     14-6
system name and     14-7
system prompt and     14-7

document
conventions     xv
organization     xiv

documentation, related     xvi

domain name
clearing     14-7
setting     14-6

Domain Name System
See DNS

downloading
configuration files
preparation     15-13
TFTP     15-14
software images
overview     15-1
preparation     15-2

drop thresholds
CoS mapping     9-10
receive queue     9-4, 9-8
transmit queue     9-5, 9-9

DTP
non-Cisco devices and     6-3
overview     6-1

duplex
Fast Ethernet     4-4
Gigabit Ethernet     4-4

Dynamic Trunking Protocol
See DTP

E


enable password     3-7

encapsulation, trunks (table)     6-2

error messages
see system message logging

EtherChannel
channel modes (table)     5-2
configuration guidelines     5-3
configuring     5-1, 5-4
overview     5-1
PAgP and     5-2

Ethernet
autonegotiation, speed     4-4
checking connectivity     4-6
default configuration     4-2
flow control keywords (table)     4-5
modules, overview     1-2
overview     4-1
port duplex, setting     4-4
port name, setting     4-3
port speed, setting     4-4
protocol filtering
See protocol filtering
trunks
see trunks

examples, conventions     xv

F


Fast Ethernet
checking connectivity     4-6
default configuration     4-2
Fast EtherChannel
See EtherChannel
modules, overview     1-2
overview     4-1
port duplex, setting     4-4
port name, setting     4-3
port speed, setting     4-4
trunks
See trunks

features, new
hardware (table)     xi
software (table)     xii

filters, port
See secure port filtering

Flash file system
checksum, verifying     15-21
copying files     15-18
default device, setting     15-17
deleting files     15-20
formatting device     15-21
listing files     15-17
overview     15-16
restoring deleted files     15-20
verifying file checksum     15-21

Flash PC card, formatting     15-21

Flash synchronization
examples     3-19

flow control     4-5
configuring     4-5
keywords (table)     4-5

formatting Flash devices     15-21

forward delay timer variable     7-2

forwarding state, STP     7-8

frame classification     9-3

G


GARP VLAN Registration Protocol
See GVRP

gateway, configuring     3-4

Generic Attribute Registration Protocol (GARP)
see GMRP and GVRP

Gigabit Ethernet
checking connectivity     4-6
default configuration     4-2
duplex     4-4
flow control     4-5
modules, overview     1-2
overview     4-1
port name, setting     4-3
protocol filtering
See protocol filitering
trunks
See trunks

GMRP
disabling     12-9
enabling     12-3
forwarding     12-4
registration     12-5
fixed     12-6
forbidden     12-7
normal     12-5
statistics
clearing     12-9
viewing     12-8
timers     8-16, 12-7

GVRP     8-1, 8-11
disabling     8-13, 8-17
enabling     8-12
enabling on port     8-13
registration     8-14
fixed     8-15
forbidden     8-15
normal     8-14
statistics
clearing     8-17
viewing     8-17

H


hardware, new features (table)     xi

hello time variable     7-2

help     2-4

history
switch CLI     2-4

hops, All-Routes Explorers and     8-27

I


ICMP
ping
executing     14-2
overview     14-2
testing connectivity with     4-6
time exceeded messages     14-3
traceroute and     14-3

IEEE 802.1Q
configuring     6-5
overview     6-1

IGMP snooping
configuration guidelines     12-9
disabling     12-12
enabling     12-10
multicast router ports
clearing     12-12
specifying     12-10
statistics, viewing     12-11

images
See software images

in-band (sc0) interface
see sc0 interface

inferior BPDU, BackboneFast and     7-18

interfaces
in-band (sc0)     3-2, 8-19
SLIP (sl0)     3-2

Internet Group Management Protocol
See IGMP snooping

Internet protocols, supported     1-6

IP
default gateway, configuring     3-4
static routes     3-5
subnetworks, VLANs and     8-19

IP addresses
adding to IP permit list     11-4
clearing from IP permit list     11-6
setting on supervisor     3-3
syntax     2-5

IP aliases, syntax     2-5

IP permit list
addresses, adding     11-4
clearing entries     11-6
default configuration     11-4
disabling     11-6
enabling     11-5
overview     11-3

IP supernetting     3-3

IP traceroute
executing     14-4
overview     14-3

ISL
configuring     6-4
example configuration     6-8
overview     6-1

K


Kermit
example downloads
PC procedure     15-9
UNIX procedure     15-10
PC software download procedure     15-6
preparing to download software images     15-5
UNIX software download procedure     15-7

key, TACACS+     11-10

keyboard shortcuts     2-3

L


learning state, STP     7-8

listening state, STP     7-7

load sharing, trunking and     6-9

location, setting     14-9

logging
see system message logging

login banner
clearing     14-10
configuring     14-9
overview     14-9

M


MAC addresses
address table     4-2
blocking     11-1
secure port filtering and     11-1
syntax     2-5

mask
see netmask

maximum age timer variable     7-2

message-of-the-day
See login banner

messages
see system message logging

metric values, Switch TopN Reports utility (table)     10-17

MIBs     1-7

modules
Ethernet, Fast Ethernet, Gigabit Ethernet
configuring     4-1
overview     1-2

MOTD
See login banner

multicast
GMRP and     12-2

multicast traffic
broadcast suppression
disabling     13-3
enabling     13-3
IGMP snooping     12-9
overview     1-5
router
clearing ports, IGMP snooping     12-12
IGMP snooping ports, specifying     12-10
SPAN and     10-7

N


name, setting port     4-3

netmask
assigning     3-3

network management     1-7
configuring     10-1
overview     1-4

network management system
see NMS

network security
See security

Network Time Protocol
See NTP

NMS     10-2
SNMP, configuring from     10-3
SPAN, configuring from     10-7

NTP
broadcast-client mode
configuring     14-12
disabling     14-15
client mode
configuring     14-13
disabling     14-15
daylight saving time adjustment
disabling     14-14
enabling     14-14
default configuration     14-11
disabling     14-15
overview     14-11
server
clearing     14-15
specifying     14-13
time zone
clearing     14-15
setting     14-14

NVRAM
ignoring content at boot     3-12
synchronization in redundant supervisor     3-15

P


PAgP     5-2

passwords
enable     3-7
privileged     3-7
user     3-7

PC card
see Flash PC card

PCMCIA
See Flash PC card

permit list
See IP permit list

ping
executing     14-2
overview     14-2
testing connectivity     4-6

Port Aggregation Protocol
See PAgP

PortFast, configuring     7-14

ports
capabilities, checking     14-4
cost, STP     7-12
duplex     4-4
filtering
See secure port filtering
name     4-3
port-VLAN cost, STP     7-13
priority
STP     7-11
speed
10/100 Ethernet     4-4
syntax     2-5
VLAN assignments     8-28
VLAN priority, STP     7-12

priority
STP     7-11

privileged password     3-7

prompt
configuring     14-8
overview     14-7

protocol filtering
configuring     4-10
overview     4-9
protocol support     4-9

pruning, VTP
See VTP, pruning

Q


QoS
configuring     9-1
CoS
drop thresholds, mapping     9-10
drop thresholds, receive     9-4
drop thresholds, transmit     9-5
for MAC/VLAN     9-3, 9-9
for port     9-3, 9-8
values     9-3
values from untrusted ports     9-3
default configuration     9-6
disabling     9-13
enabling     9-7
frame classification     9-3
information display command     9-11
overview     1-4
receive queue     9-4
drop thresholds     9-8
revert to defaults     9-13
statistics     9-12
transmit queue     9-5
bandwidth allocation     9-9
drop thresholds     9-9
size     9-10
trusted and untrusted ports     9-3, 9-7

quality of service
See QoS

R


receive queue     9-4
drop thresholds     9-8

redundant supervisor engine
See supervisor engine, redundant

Remote Monitoring
See RMON

Resource Manager Essentials     10-4

RMON
enabling     10-5
overview     10-5
viewing data     10-6

ROM monitor
BOOT environment variable and     3-9
boot process and     3-8
CLI     2-1
configuration register and     3-9
console port baud rate     3-11

root switch
parameters (table)     7-2
primary, configuring     7-14
secondary, configuring     7-15
STP and     7-2
STP stability and     7-3

router, multicast     12-10

runtime image     3-15

S


sc0 interface
IP address, assigning     3-3
overview     3-2
VLAN assignment     8-19

secure port filtering
configuring     11-2
disabling     11-2
overview     11-1

security
configuring     11-1
IP permit list     11-3
overview     1-5
passwords, configuring     3-7
secure port filtering     11-1
TACACS+ authentication     11-6

serial download
example PC software image download     15-9
example UNIX software image download     15-10
PC software image download procedure     15-6
preparing to download     15-5
UNIX software image download procedure     15-7

Simple Network Management Protocol
See SNMP

sl0 interface     3-2

SLIP
console port and     3-6
sl0 interface     3-2

SNMP
community strings
defining     10-3
overview     10-2
configuring     10-3
default configuration     10-3
MIBs     1-7
NMS and     10-3
overview     10-2

software images
downloading
overview     15-1
preparation     15-2
supervisor engine, description     1-1
uploading     15-11
preparation     15-11

software, new features (table)     xii

SPAN
configuring     10-7
disabling     10-8
multicast traffic     10-7
NMS and     10-7
overview     10-6

spanning-tree backbone fast convergence
See BackboneFast

spanning-tree PortFast
See PortFast

Spanning-Tree Protocol
See STP

spanning-tree UplinkFast
See UplinkFast

speed
10/100 Ethernet port, setting     4-4

standby supervisor engine
See supervisor engine, redundant

static route, configuring     3-5

STP
BPDUs and     7-3
bridge forward delay, setting     7-15
bridge hello time, setting     7-15
bridge maximum aging time, setting     7-15
bridge priority, setting     7-15
default configuration     7-10
disabling     7-16
enabling     7-10
forward delay timer variable     7-2
hello time variable     7-2
maximum age timer variable     7-2
overview     1-3, 7-1
port cost, configuring     7-12
port priority, configuring     7-11
port states
blocking     7-6
disabled     7-9
forwarding     7-8
learning     7-8
listening     7-7
overview     7-4
port VLAN priority, configuring     7-12
PortFast, configuring     7-14
port-VLAN cost     7-13
root switch
election     7-2
parameters (table)     7-2
primary     7-14
secondary     7-15
stable topology and     7-3

subnet mask
see netmask

supervisor engine
BOOT environment variable
clearing     3-13
default     3-10
displaying     3-13
overview     3-9
setting     3-13
boot image, supervisor engine     3-15
BOOTP server and     3-6
configuration register
boot field, setting     3-11
ignore NVRAM, setting     3-12
overview     3-9
ROM monitor baud rate, setting     3-11
setting     3-12
configuring     3-1
console port
establishing connection     3-3
ROM monitor baud rate     3-11
SLIP and     3-6
default boot configuration     3-10
default configuration     3-1
default gateways     3-4
Flash file system
See Flash file system
IP address, setting     3-3
preparing to configure     3-2
redundant
configuration guidelines     3-17
console port and     3-15
Flash synchronization examples     3-19
forcing switchover to standby     3-19
NVRAM synchronization     3-15
overview     1-6, 3-14
slot assignment     3-14
verifying status     3-17
ROM monitor     3-8
software description     1-1
startup configuration     3-8
static routes     3-5
switchover     3-19
uploading software images     15-11

switch administration
overview     1-5
procedures     14-1

switch CLI
accessing     2-2
help     2-4
history substitution     2-4
IP addresses, syntax     2-5
IP aliases, syntax     2-5
MAC addresses, syntax     2-5
operating     2-3
overview     2-2
ports, syntax     2-5

switch software images
see software images

Switch TopN Reports utility
background execution     10-18
foreground execution     10-17
metric values (table)     10-17
overview     10-17
running     10-18
viewing     10-18

Switched Port Analyzer
See SPAN

switching address table     4-2

switchover
See supervisor engine, switchover

synchronization
see supervisor engine, redundant     3-16

syslog
configuring     10-12
daemon, configuring     10-13
default configuration     10-12
example configurations     10-15
facilities (table)     10-11
message format     10-12
message log, displaying     10-14
overview     10-10
server, configuring     10-13
severity levels (table)     10-11
Telnet logging     10-14

system clock, setting     14-10

system contact, setting     14-9

system location, setting     14-9

system message logging
configuring     10-12
daemon, configuring     10-13
default configuration     10-12
example configuration     10-15
facilities (table)     10-11
message format     10-12
message log, displaying     10-14
overview     10-10
server, configuring     10-13
severity levels (table)     10-11
syslog daemon, configuring     10-13
Telnet logging     10-14

system name
clearing     14-8
configuring     14-8
overview     14-7

system prompt
configuring     14-8
overview     14-7

T


TACACS+
configuration guidelines     11-8
default configuration     11-8
disabling     11-11
enabling     11-9
key, specifying     11-10
local authentication, disabling     11-9
login attempts allowed     11-11
overview     11-7
timeout interval     11-11

Telnet
accessing CLI     2-2, 14-1

TFTP
downloading configuration files     15-13
uploading configuration files     15-15, 15-16
uploading software images     15-11

time zone
clearing     14-15
setting     14-14

time, setting     14-10

tip command     3-3

Token Ring
VLANs
overview     8-20
TrBRF     8-20
TrCRF     8-21
VTP version 2     8-3

TopN reports
See Switch TopN Reports utility

ToS     9-3

traceroute
See IP traceroute

transmit queue
bandwidth allocation     9-9
drop thresholds     9-9
size     9-10

TrBRF
creating     8-25
modifying     8-25
overview     8-20

TrCRF
All-Routes Explorer maximum hops     8-27
backup     8-27
creating     8-26
modifying     8-26
overview     8-21

troubleshooting
IP permit list (Caution)     11-5, 11-6
system message logging and     10-10
TACACS+ local authentication (Caution)     11-9

trunks
allowed VLANs     6-6
autonegotiation     6-1
default configuration     6-3
disabling     6-7
encapsulations (table)     6-2
example configurations
ISL     6-8
load sharing     6-9
IEEE 802.1Q, configuring     6-5
ISL, configuring     6-4
ISL/802.1Q negotiating, configuring     6-6
modes (table)     6-2
overview     6-1
possible configurations (table)     6-2
VLANs, allowed     6-6

trusted port     9-3, 9-7

type of service
See ToS

U


UDLD protocol
disabling     4-7
enabling     4-7

unclassified frames     9-3

UniDirectional Link Detection protocol
see UDLD protocol

UNIX workstation
software image download examples     15-10
software image download procedure     15-7

untrusted port     9-3, 9-7

UplinkFast
configuring     7-17
overview     7-16
uplink groups     7-16

UplinkFast Switchover
See UplinkFast

uploading
configuration files
preparation     15-15
running configuration     15-16
software images     15-11
preparation     15-11

user password     3-7

V


virtual LAN
See VLANs

VLAN Trunk Protocol
See VTP

VLAN trunks
See trunks

VLANs
allowed on trunk     6-6
assigning ports to     8-28
bridge forward delay     7-15
bridge hello time     7-15
bridge maximum aging time     7-15
bridge priority     7-15
configuration guidelines     8-23
cost     7-13
default configuration     8-23
deleting     8-29
Ethernet     8-24
FDDI     8-25
in-band interface assignment     8-19
IP subnetworks and     8-19
overview     1-3, 8-18
port VLAN priority     7-12
ports, assigning to     8-28
protocol filtering and     4-9
sc0 interface assignment     8-19
Token Ring
All-Routes Explorer maximum hops     8-27
backup     8-27
creating     8-25, 8-26
modifying     8-25, 8-26
overview     8-20
TrBRF     8-20
TrCRF     8-21
TrBRF     8-25
TrCRF
backup     8-27
creating     8-26
trunks
See trunks
VTP domain and     8-18

VTP
advertisements     8-3
client, enabling     8-6
configuration guidelines     8-5
default configuration     8-5
disabling     8-7
domains     8-2
modes
client     8-2
server     8-2
transparent     8-2
monitoring     8-10
overview     8-1
pruning
configuring     8-9
disabling     8-10
overview     8-3
server, enabling     8-6
statistics     8-10
Token Ring     8-3
transparent mode, enabling     8-7
version 2
disabling     8-8
enabling     8-8
overview     8-3
VLANs and     8-18

VTP pruning
See VTP, pruning

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Apr 8 14:20:47 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.