|
|
Use the set rspan commands to create remote SPAN sessions.
set rspan disable source [rspan_vlan | all]
disable source | Keywords to disable remote SPAN source information. |
rspan_vlan | (Optional) Remote SPAN VLAN. |
all | (Optional) Keyword to disable all remote SPAN source or destination sessions. |
disable destination | Keywords to disable remote SPAN destination information. |
mod_num/port_num | (Optional) Remote SPAN destination port. |
mod/ports... | Monitored ports (remote SPAN source). |
vlans... | Monitored VLANs (remote SPAN source). |
sc0 | Keyword to specify the inband port is a valid source. |
rx | (Optional) Keyword to specify that information received at the source (ingress SPAN) is monitored. |
tx | (Optional) Keyword to specify that information transmitted from the source (egress SPAN) is monitored. |
both | (Optional) Keyword to specify that information both transmitted from the source (ingress SPAN) and received (egress SPAN) at the source are monitored. |
multicast enable | (Optional) Keywords to enable monitoring multicast traffic (egress traffic only). |
multicast disable | (Optional) Keywords to disable monitoring multicast traffic (egress traffic only). |
filter vlans | (Optional) Keywords to monitor traffic on selected VLANs on source trunk ports. |
create | (Optional) Keyword to create a new remote SPAN session instead of overwriting the previous SPAN session. |
inpkts enable | (Optional) Keywords to allow the the remote SPAN destination port to receive normal ingress traffic (from the network to the bus) while forwarding the remote SPAN traffic. |
inpkts disable | (Optional) Keywords to disable the receiving of normal inbound traffic on the remote SPAN destination port. |
learning enable | (Optional) Keywords to enable learning for the remote SPAN destination port. |
learning disable | (Optional) Keywords to disable learning for the remote SPAN destination port. |
The defaults are as follows:
Switch command.
Privileged.
The rspan_vlan variable is optional in the set rspan disable source command and required in the set rspan source and set rspan destination commands.
After SPAN is enabled, system defaults are used if no parameters were ever set. If you changed parameters, these are stored in NVRAM, and the new parameters are used.
Use a network analyzer to monitor ports.
Use the inpkts keyword with the enable option to allow the remote SPAN destination port to receive normal incoming traffic in addition to the traffic mirrored from the remote SPAN source. Use the disable option to prevent the remote SPAN destination port from receiving normal incoming traffic.
You can specify an MSM port as the remote SPAN source port. However, you cannot specify an MSM port as the remote SPAN destination port.
When you enable the inpkts option, a warning message notifies you that the destination port does not join STP and may cause loops if this option is enabled.
If you do not specify the keyword create and you have only one session, the session will be overwritten. If a matching rspan_vlan or destination port exists, the particular session will be overwritten (with or without specifying create). If you specify the keyword create and there is no matching rspan_vlan or destination port, the session will be created.
Each switch can source only one remote SPAN session (ingress, egress, or both). When a remote ingress or bidirectional SPAN session is configured in a source switch, the limit for local ingress or bidirectional SPAN session is reduced to one. There are no limits on the number of remote SPAN sessions carried across the network within the remote SPAN session limits.
You can configure any VLAN as a remote SPAN VLAN as long as these conditions are met:
This example shows how to disable all enabled source sessions:
Console> (enable)set rspan disable source allThis command will disable all remote span source session(s).Do you want to continue (y/n) [n]?yDisabled monitoring of all source(s) on the switch for remote span.Console> (enable)
This example shows how to disable one source session to a specific VLAN:
Console> (enable)set rspan disable source 903Disabled monitoring of all source(s) on the switch for rspan_vlan 903.Console> (enable)
This example shows how to disable all enabled destination sessions:
Console> (enable)set rspan disable destination allThis command will disable all remote span destination session(s).Do you want to continue (y/n) [n]?yDisabled monitoring of remote span traffic on ports 9/1,9/2,9/3,9/4,9/5,9/6.Console> (enable)
This example shows how to disable one destination session to a specific port:
Console> (enable)set rspan disable destination 4/1Disabled monitoring of remote span traffic on port 4/1.Console> (enable)
Use the set security acl ip commands to create a new entry in a standard IP VACL, and append the new entry at the end of VACL.
set security acl ip {acl_name} {permit | deny} {src_ip_spec} [before editbuffer_index |
acl_name | Unique name that identifies the lists to which the entry belongs. |
permit | Keyword to allow traffic from the source IP address. |
deny | Keyword to block traffic from the source IP address. |
src_ip_spec | Source IP address and the source mask. Refer to the "Usage Guidelines" section for the format. |
before editbuffer_index | (Optional) Keyword and variable to insert the new ACE in front of another ACE. |
modify editbuffer_index | (Optional) Keyword and variable to replace an ACE with the new ACE. |
redirect | Keyword to specify to which switched ports the packet is redirected. |
mod_num/port_num | Number of the module and port. |
protocol | Keyword or number of an IP protocol; valid numbers are from 0 to 255 representing an IP protocol number. Refer to the "Usage Guidelines" section for the list of valid keywords. |
dest_ip_spec | Destination IP address and the destination mask. Refer to the "Usage Guidelines" section for the format. |
precedence precedence | (Optional) Keyword and variable to specify the precedence level; valid values are from 0 to 7 or by name. Refer to the "Usage Guidelines" section for a list of valid names. |
tos tos | (Optional) Keyword and variable to specify the type of service level; valid values are from 0 to 15 or by name. Refer to the "Usage Guidelines" section for a list of valid names. |
ip | 0 | (Optional) Keyword or number to specify ICMP. |
icmp | 1 | (Optional) Keyword or number to specify ICMP. |
icmp-type | (Optional) ICMP message type name or a number; valid values are from |
icmp-code | (Optional) ICMP message code name or a number; valid values are from |
icmp-message | (Optional) ICMP message type name or ICMP message type and code name. Refer to the "Usage Guidelines" section for a list of valid names. |
igmp | 2 | (Optional) Keyword or number to specify IGMP. |
igmp-type | (Optional) IGMP message type or message name; valid message type numbers are from 0 to 15. Refer to the "Usage Guidelines" section for a list of valid names and corresponding numbers. |
tcp | 6 | (Optional) Keyword or number to specify TCP. |
operator | (Optional) Operands; valid values include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). |
port | (Optional) Number or name of a TCP or UDP port; valid port numbers are from 0 to 65535. Refer to the "Usage Guidelines" section for a list of valid names. |
established | (Optional) Keyword to specify an established connection; used only for TCP protocol. |
udp | 17 | (Optional) Keyword or number to specify UDP. |
There are no default ACLs and no default ACL-VLAN mappings.
Switch command.
Privileged.
Configurations you make by entering this command are saved to NVRAM and hardware only after you enter the commit command. Enter ACEs in batches and then enter the commit command to save them in NVRAM and in the hardware.
If you use the redirect keyword, the destination must be 255.255.255.255.
When you enter the ACL name, follow these naming conventions:
When you specify the source IP address and the source mask, use the form source_ip_address source_mask and follow these guidelines:
When you enter a destination IP address and the destination mask, use the form destination_ip_address destination_mask. The destination mask is required.
Valid names for precedence are critical, flash, flash-override, immediate, internet, network, priority and routine.
Valid names for tos are max-reliability, max-throughput, min-delay, min-monetary-cost, and normal.
Valid protocol keywords include: icmp (1), igmp (2), ip (0), ipinip (4), tcp (6), udp (17), igrp (9), eigrp (88), gre (47), nos (94), ospf (89), ahp (51), esp (50), pcp (108), and pim (103). The IP protocol number is displayed in parentheses. Use the keyword ip to match any Internet protocol.
ICMP packets that are matched by ICMP message type can also be matched by the ICMP message code.
Valid names for icmp_type and icmp_code are administratively-prohibited, alternate-address, conversion-error, dod-host-prohibited, dod-net-prohibited, echo, echo-reply, general-parameter-problem, host-isolated, host-precedence-unreachable, host-redirect, host-tos-redirect, host-tos-unreachable, host-unknown, host-unreachable, information-reply, information-request, mask-reply, mask-request, mobile-redirect, net-redirect, net-tos-redirect, net-tos-unreachable, net-unreachable, network-unknown, no-room-for-option, option-missing, packet-too-big, parameter-problem, port-unreachable, precedence-unreachable, protocol-unreachable, reassembly-timeout, redirect, router-advertisement, router-solicitation, source-quench, source-route-failed, time-exceeded, timestamp-reply, timestamp-request, traceroute, ttl-exceeded, and unreachable.
Valid names and corresponding numbers for igmp_message are dvmrp (3), host-query (1), host-report (2), pim (4), and trace (5).
If the operator is positioned after the source and source-wildcard, it must match the source port. If the operator is positioned after the destination and destination-wildcard, it must match the destination port. The range operator requires two port numbers. All other operators require one port number.
TCP port names can be used only when filtering TCP. Valid names for TCP ports are bgp, chargen, daytime, discard, domain, echo, finger, ftp, ftp-data, gopher, hostname, irc, klogin, kshell, lpd, nntp, pop2, pop3, smtp, sunrpc, syslog, tacacs-ds, talk, telnet, time, uucp, whois, and www.
UDP port names can be used only when filtering UDP. Valid names for UDP ports are biff, bootpc, bootps, discard, dns, dnsix, echo, mobile-ip, nameserver, netbios-dgm, netbios-ns, ntp, rip, snmp, snmptrap, sunrpc, syslog, tacacs-ds, talk, tftp, time, who, and xdmcp.
The number listed with the protocol type is the layer protocol number (for example, UDP | 17).
If no layer protocol number is entered, the following syntax can be used:
set security acl ip {acl_name} {permit | deny} {src_ip_spec} [before editbuffer_index | modify editbuffer_index]If a Layer 4 protocol is specified, the following syntax can be used:
set security acl ip {acl_name} {permit | deny | redirect mod_num/port_num} {protocol} {src_ip_spec} {dest_ip_spec} [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]For IP you can use the following syntax:
set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [IP | 0] {src_ip_spec} {dest_ip_spec} [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]For ICMP you can use the following syntax:
set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [ICMP | 1] {src_ip_spec} {dest_ip_spec} [icmp_type] [icmp_code] | [icmp_message]For IGMP you can use the following syntax:
set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [IGMP | 2] {src_ip_spec} {dest_ip_spec} [igmp_type] [precedence precedence] [tos tos]For TCP you can use the following syntax:
set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [TCP | 6] {src_ip_spec} [operator port [port]] {dest_ip_spec} [operator port [port]] [established] [precedence precedence] [tos tos] [before editbuffer_index | modify editbuffer_index]For UDP you can use the following syntax:
set security acl ip {acl_name} {permit | deny | redirect {mod_num/port_num}} [UDP | 17] {src_ip_spec} [operator port [port]] {dest_ip_spec} [operator port [port]]These examples show different ways to use the set security acl ip commands to configure IP security ACL:
Console> (enable)set security acl ip IPACL1 deny 1.2.3.4 0.0.0.0IPACL1 editbuffer modified. Use `commit' command to apply changes.Console> (enable)Console> (enable)set security acl ip IPACL1 deny host 171.3.8.2 before 2IPACL1 editbuffer modified. Use `commit' command to apply changes.Console> (enable)Console> (enable)set security acl ip IPACL1 permit any anyIPACL1 editbuffer modified. Use `commit' command to apply changes.Console> (enable)Console> (enable)set security acl ip IPACL1 redirect 3/1 ip 3.7.1.2 0.0.0.255 host 255.255.255.255 preedence 1 tos min-delayIPACL1 editbuffer modified. Use `commit' command to apply changes.Console> (enable)
clear security acl
clear security acl map
commit
show security acl
set security acl map
Use the set security acl ipx command to create a new entry in a standard IPX VACL and to append the new entry at the end of the VACL.
set security acl ipx {acl_name} {permit | deny | redirect mod_num/port_num} {protocol} {src_net} [dest_net.[dest_node] [[dest_net_mask.]dest_node_mask]] [before editbuffer_index modify editbuffer_index]
acl_name | Unique name that identifies the list to which the entry belongs. |
permit | Keyword to allow traffic from the specified source IPX address. |
deny | Keyword to block traffic from the specified source IPX address. |
redirect | Keyword to redirect traffic from the specified source IPX address. |
mod_num/port_num | Number of the module and port. |
protocol | Keyword or number of an IPX protocol; valid values are from 0 to 255 representing an IPX protocol number. Refer to the "Usage Guidelines" section for a list of valid keywords amd corresponding numbers. |
src_net | Number of the network from which the packet is being sent. Refer to the "Usage Guidelines" section for format guidelines. |
dest_net. | (Optional) Number of the network from which the packet is being sent. |
.dest_node | (Optional) Node on destination-network to which the packet is being sent. |
dest_net_mask. | (Optional) Mask to be applied to the destination network. Refer to the "Usage Guidelines" section for format guidelines. |
dest_node_mask | (Optional) Mask to be applied to destination-node. Refer to the "Usage Guidelines" section for format guidelines. |
before editbuffer_index | (Optional) Keyword and variable to insert the new ACE in front of another ACE. |
modify editbuffer_index | (Optional) Keyword and variable to replace an ACE with the new ACE. |
There are no default ACLs and no default ACL-VLAN mappings.
Switch command.
Privileged.
Configurations you make by entering this command are saved to NVRAM and hardware only after you enter the commit command. Enter ACEs in batches and then enter the commit command to save all of them in NVRAM and in the hardware.
When you enter the ACL name, follow these naming conventions:
Valid protocol keywords include: ncp (17), netbios (20), rip (1), sap (4), and spx (5).
The src_net and dest_net variables are eight-digit hexadecimal numbers that uniquely identify network cable segments. When you specify the src_net or dest_net, use the following guidelines:
The .dest_node is a 48-bit value represented by a dotted triplet of 4-digit hexadecimal numbers (xxxx.xxxx.xxxx).
The dest_net_mask is an eight-digit hexadecimal mask. Place ones in the bit positions you want to mask. The mask must be immediately followed by a period, which must in turn be immediately followed by destination-node-mask. You can enter this value only when dest_node is specified.
The dest_node_mask is a 48-bit value represented as a dotted triplet of 4-digit hexadecimal numbers (xxxx.xxxx.xxxx). Place ones in the bit positions you want to mask. You can enter this value only when dest_node is specified.
The dest_net_mask is an eight-digit hexadecimal number that uniquely identifies network cable segment. It can be a number in the range 0 to FFFFFFFF. A network number of -1 or any matches all networks. You do not need to specify leading zeros in the network number. For example, for the network number 000000AA, you can enter AA. Following are dest_net_mask examples:
Use the show security acl command to display the list.
This example shows how to block traffic from a specified source IP address:
Console> (enable)set security acl ipx IPXACL1 deny 1.aIPXACL1 editbuffer modified. Use `commit' command to apply changes.Console> (enable)
clear security acl
clear security acl map
commit
show security acl
set security acl map
Use the set security acl mac command to create a new entry in a non-IP or non-IPX protocol VACL and to append the new entry at the end of the VACL.
set security acl mac {acl_name} {permit | deny} {src_mac_addr_spec} {dest_mac_addr_spec} [ether-type] [before editbuffer_index | modify editbuffer_index]
acl_name | Unique name that identifies the list to which the entry belongs. |
permit | Keyword to allow traffic from the specified source MAC address. |
deny | Keyword to block traffic from the specified source MAC address. |
src_mac_addr_spec | Source MAC address and mask in the form source_mac_address source_mac_address_mask. |
dest_mac_addr_spec | Destination MAC address and mask. |
ether-type | (Optional) Number or name that matches the ethertype for Ethernet-encapsulated packets; valid values are 0x0600, 0x0601, 0x0BAD, 0x0BAF, 0x6000-0x6009, 0x8038-0x8042, 0x809b, and 0x80f3. Refer to the "Usage Guidelines" section for a list of valid names. |
before editbuffer_index | (Optional) Keyword and variable to insert the new ACE in front of another ACE. |
modify editbuffer_index | (Optional) Keyword and variable to replace an ACE with the new ACE. |
There are no default ACLs and no default ACL-VLAN mappings.
Switch command.
Privileged.
Configurations you make by entering this command are saved to NVRAM and hardware only after you enter the commit command. Enter ACEs in batches and then enter the commit command to save all of them in NVRAM and in the hardware.
When you enter the ACL name, follow these naming conventions:
The src_mac_addr_spec is a 48-bit source MAC address and mask and entered in the form of source_mac_address source_mac_address_mask (for example, 08-11-22-33-44-55 ff-ff-ff-ff-ff-ff). Place ones in the bit positions you want to mask. When you specify the src_mac_addr_spec, follow these guidelines:
The dest_mac_spec is a 48-bit destination MAC address and mask and entered in the form of dest_mac_address dest_mac_address_mask (for example, 08-00-00-00-02-00/ff-ff-ff-00-00-00). Place ones in the bit positions you want to mask. The destination mask is mandatory. When you specify the dest_mac_spec, use the following guidelines:
Valid names for Ethertypes (and corresponding numbers) are Ethertalk (0x809B), AARP (0x8053), dec-mop-dump (0x6001), dec-mop-remote-console (0x6002), dec-phase-iv (0x6003), dec-lat (0x6004), dec-diagnostic-protocol (0x6005), dec-lavc-sca (0x6007), dec-amber (0x6008), dec-mumps (0x6009), dec-lanbridge (0x8038), dec-dsm (0x8039), dec-netbios (0x8040), dec-msdos (0x8041), banyan-vines-echo (0x0baf), xerox-ns-idp (0x0600), and xerox-address-translation (0x0601).
Use the show security acl command to display the list.
This example shows how to block traffic to an IP address:
Console> (enable)set security acl mac MACACL1 deny 01-02-02-03-04-05MACACL1 editbuffer modified. User `commit' command to apply changes.Console> (enable)
clear security acl
clear security acl map
commit
show security acl
set security acl map
Use the set security acl map command to map an existing VACL to a VLAN.
set security acl map acl_name vlan
acl_name | Unique name that identifies the list to which the entry belongs. |
vlan | Number of the VLAN to be mapped to the VACL. |
There are no default ACLs and no default ACL-VLAN mappings.
Switch command.
Privileged.
Configurations you make by entering this command are saved in NVRAM. This command does not require that you enter the commit command. Each VLAN can be mapped to only one ACL of each type (IP, IPX, and MAC). An ACL can be mapped to a VLAN only after you have committed the ACL.
When you enter the ACL name, follow these naming conventions:
This example shows how to map an existing VACL to a VLAN:
Console> (enable)set security acl map IPACL1 1ACL IPACL1 mapped to vlan 1Console> (enable)
This example shows the output if you try to map an ACL that has not been committed:
Console> (enable)set security acl map IPACL1 1Commit ACL IPACL1 before mapping.Console> (enable)
This example shows the output if you try to map an ACL that is already mapped to a VLAN for the ACL type (IP, IPX, or MAC):
Console> (enable)set security acl map IPACL2 1Mapping for this type already exists for this VLAN.Console> (enable)
clear security acl
clear security acl map
commit
show security acl
Use the set snmp community command to set SNMP communities and associated access types.
set snmp community {read-only | read-write | read-write-all} [community_string]
read-only | Keyword to assign read-only access to the specified SNMP community. |
read-write | Keyword to assign read-write access to the specified SNMP community. |
read-write-all | Keyword to assign read-write access to the specified SNMP community. |
community_string | (Optional) Name of the SNMP community. |
The default is the following communities and access types are defined:
Switch command.
Privileged.
There are three configurable SNMP communities, one for each access type. If you do not specify the community string, the community string configured for that access type is cleared.
This example shows how to set read-write access to the SNMP community called yappledapple:
Console> (enable) set snmp community read-write yappledapple SNMP read-write community string set. Console> (enable)
This example shows how to clear the community string defined for read-only access:
Console> (enable) set snmp community read-only SNMP read-only community string cleared. Console> (enable)
Use the set snmp rmon command to enable or disable SNMP RMON support.
set snmp rmon {enable | disable}
enable | Keyword to activate SNMP RMON support. |
disable | Keyword to deactivate SNMP RMON support. |
The default is RMON support is disabled.
Switch command.
Privileged.
RMON statistics are collected on a segment basis.
The RMON feature deinstalls all of the domains for all of the interfaces on an Ethernet module that has been removed from the system.
When RMON is enabled, the supported RMON groups for Ethernet ports are Statistics, History, Alarms, and Events as specified in RFC 1757.
Use of this command requires a separate software license.
This example shows how to enable RMON support:
Console> (enable) set snmp rmon enable SNMP RMON support enabled. Console> (enable)
This example shows how to disable RMON support:
Console> (enable) set snmp rmon disable SNMP RMON support disabled. Console> (enable)
Use the set snmp trap commands to enable or disable the different SNMP traps on the system or to add an entry into the SNMP authentication trap receiver table.
set snmp trap {enable | disable} [all | module | chassis | bridge | repeater | auth | vtp |
enable | Keyword to activate SNMP traps. |
disable | Keyword to deactivate SNMP traps. |
all | (Optional) Keyword to specify all trap types. |
module | (Optional) Keyword to specify the moduleUp and moduleDown traps from the CISCO-STACK-MIB. |
chassis | (Optional) Keyword to specify the chassisAlarmOn and chassisAlarmOff traps from the CISCO-STACK-MIB. |
bridge | (Optional) Keyword to specify the newRoot and topologyChange traps from RFC 1493 (the BRIDGE-MIB). |
repeater | (Optional) Keyword to specify the rptrHealth, rptrGroupChange, and rptrResetEvent traps from RFC 1516 (the SNMP-REPEATER-MIB). |
auth | (Optional) Keyword to specify the authenticationFailure trap from RFC 1157. |
vtp | (Optional) Keyword to specify the VTP from the CISCO-VTP-MIB. |
ippermit | (Optional) Keyword to specify the IP Permit Denied access from the CISCO-STACK-MIB. |
vmps | (Optional) Keyword to specify the vmVmpsChange trap from the CISCO-VLAN-MEMBERSHIP-MIB. |
config | (Optional) Keyword to specify the sysConfigChange trap from the CISCO-STACK-MIB. |
entity | (Optional) Keyword to specify the entityMIB trap from the ENTITY-MIB. |
stpx | (Optional) Keyword to specify the STPX trap. |
rcvr_addr | IP address or IP alias of the system to receive SNMP traps. |
rcvr_community | Community string to use when sending authentication traps. |
The default is SNMP traps are disabled.
Switch command.
Privileged.
An IP permit trap is sent when unauthorized access based on the IP permit list is attempted.
Use the show snmp command to verify the appropriate traps were configured.
This example shows how to enable SNMP chassis traps:
Console> (enable) set snmp trap enable chassis SNMP chassis alarm traps enabled. Console> (enable)
This example shows how to enable all traps:
Console> (enable) set snmp trap enable All SNMP traps enabled. Console> (enable)
This example shows how to disable SNMP chassis traps:
Console> (enable) set snmp trap disable chassis SNMP chassis alarm traps disabled. Console> (enable)
This example shows how to add an entry in the SNMP trap receiver table:
Console> (enable) set snmp trap 192.122.173.42 public SNMP trap receiver added. Console> (enable)
clear ip permit
set ip permit
show ip permit
show port counters
show snmp
test snmp trap
Use the set span commands to configure and display SPAN.
set span disable [dest_mod/dest_port | all]
disable | Keyword to disable SPAN. |
dest_mod | (Optional) Monitoring module (SPAN destination). |
dest_port | (Optional) Monitoring port (SPAN destination). |
all | (Optional) Keyword to disable all SPAN sessions. |
src_mod | Monitored module (SPAN source). |
src_ports | Monitored ports (SPAN source). |
src_vlans | Monitored VLANs (SPAN source). |
sc0 | Keyword to specify the inband port is a valid source. |
rx | (Optional) Keyword to specify that information received at the source (ingress SPAN) is monitored. |
tx | (Optional) Keyword to specify that information transmitted from the source (egress SPAN) is monitored. |
both | (Optional) Keyword to specify that information both transmitted from the source (ingress SPAN) and received (egress SPAN) at the source are monitored. |
inpkts enable | (Optional) Keywords to enable the receiving of normal inbound traffic on the SPAN destination port. |
inpkts disable | (Optional) Keywords to disable the receiving of normal inbound traffic on the SPAN destination port. |
learning enable | (Optional) Keywords to enable learning for the SPAN destination port. |
learning disable | (Optional) Keywords to disable learning for the SPAN destination port. |
multicast enable | (Optional) Keywords to enable monitoring multicast traffic (egress traffic only). |
multicast disable | (Optional) Keywords to disable monitoring multicast traffic (egress traffic only). |
filter vlans | (Optional) Keyword and variable to monitor traffic on selected VLANs on source trunk ports. |
create | (Optional) Keyword to create a SPAN port. |
The default is SPAN is disabled, no VLAN filtering, multicast is enabled, input packets are disabled, nd learning is enabled.
Switch command.
Privileged.
After SPAN is enabled, system defaults are used if no parameters were ever set. If you changed parameters, these are stored in NVRAM, and the new parameters are used.
Use a network analyzer to monitor ports.
If you specify multiple SPAN source ports, the ports can belong to different VLANs.
A maximum of two rx or both SPAN sessions and four tx SPAN sessions can exist simultaneously. If a remote SPAN station is used, the maximum number of rx or both SPAN sessions is one.
Use the inpkts keyword with the enable option to allow the SPAN destination port to receive normal incoming traffic in addition to the traffic mirrored from the SPAN source. Use the disable option to prevent the SPAN destination port from receiving normal incoming traffic.
You can specify an MSM port as the SPAN source port. However, you cannot specify an MSM port as the SPAN destination port.
When you enable the inpkts option, a warning message notifies you that the destination port does not join STP and may cause loops if this option is enabled.
When you configure multiple SPAN sessions, the destination module number/port number must be known to index the particular SPAN session.
If you do not specify the keyword create and you have only one session, the session will be overwritten. If a matching destination port exists, the particular session will be overwritten (with or without specifying create). If you specify the keyword create and there is no matching destination port, the session will be created.
This example shows how to configure SPAN so that both transmit and receive traffic from port 1/1 (the SPAN source) is mirrored on port 2/1 (the SPAN destination):
Console> (enable)set span 1/1 2/1Enabled monitoring of Port 1/1 transmit/receive traffic by Port 2/1Console> (enable)
This example shows how to set VLAN 522 as the SPAN source and port 2/1 as the SPAN destination:
Console> (enable)set span 522 2/1Enabled monitoring of VLAN 522 transmit/receive traffic by Port 2/1Console> (enable)
This example shows how to set VLAN 522 as the SPAN source and port 3/12 as the SPAN destination. Only transmit traffic is monitored. Normal incoming packets on the SPAN destination port are allowed:
Console> (enable)set span 522 2/12 tx inpkts enableSPAN destination port incoming packets enabled.Enabled monitoring of VLAN 522 transmit traffic by Port 2/12Console> (enable)
This example shows how to set port 3/2 as the SPAN source and port 2/2 as the SPAN destination:
Console> (enable)set span 3/2 2/2 tx createEnabled monitoring of port 3/2 transmit traffic by Port 2/1Console> (enable)
This example shows what happens if you try to enter the set span disable command (without the destination module number/port number defined) and multiple SPAN sessions are defined:
Console> (enable) set span disable Multiple active span sessions. Please specify span destination to disable. Console> (enable)
Use the set spantree backbonefast command to enable or disable the spanning-tree Backbone Fast Convergence feature.
set spantree backbonefast {enable | disable}
enable | Keyword to enable Backbone Fast Convergence. |
disable | Keyword to disable Backbone Fast Convergence. |
The default is Backbone Fast Convergence is disabled.
Switch command.
Privileged.
For Backbone Fast Convergence to work, you must enable it on all switches in the network.
This example shows how to enable Backbone Fast Convergence:
Console> (enable) set spantree backbonefast enable Backbonefast enabled for all VLANs. Console> (enable)
Use the set spantree disable command to disable the spanning-tree algorithm for all VLANs or a specific VLAN.
set spantree disable [vlan | all]
vlan | (Optional) Number of the VLAN. |
all | (Optional) Keyword to specify all VLANs. |
The default is spanning tree is enabled.
Switch command.
Privileged.
This example shows how to disable the spanning-tree algorithm for VLAN 1:
Console> (enable) set spantree disable 1 VLAN 1 bridge spanning tree disabled. Console> (enable)
set spantree enable
show spantree
Use the set spantree enable command to enable the spanning-tree algorithm for all VLANs or a specific VLAN.
set spantree enable [vlan | all]
vlan | (Optional) Number of the VLAN. |
all | (Optional) Keyword to specify all VLANs. |
The default is spanning tree is enabled.
Switch command.
Privileged.
This example shows how to activate the spanning-tree algorithm for VLAN 1:
Console> (enable) set spantree enable 1 VLAN 1 bridge spanning tree enabled. Console> (enable)
set spantree disable
show spantree
Use the set spantree fwddelay command to set the bridge forward delay for a VLAN.
set spantree fwddelay delay [vlan]
delay | Number of seconds (4 to 30) for the bridge forward delay. |
vlan | (Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed. |
The default is the bridge forward delay is set to 15 seconds for all VLANs.
Switch command.
Privileged.
This example shows how to set the bridge forward delay for VLAN 100 to 16 seconds:
Console> (enable) set spantree fwddelay 16 100 Spantree 100 forward delay set to 16 seconds. Console> (enable)
Use the set spantree hello command to set the bridge hello time for a VLAN.
set spantree hello interval [vlan]
interval | Number of seconds (1 to 10) the system waits before sending a bridge hello message (a multicast message indicating that the system is active). |
vlan | (Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed. |
The default is the bridge hello time is set to 2 seconds for all VLANs.
Switch command.
Privileged.
This example shows how to set the spantree hello time for VLAN 100 to 3 seconds:
Console> (enable) set spantree hello 3 100 Spantree 100 hello time set to 3 seconds. Console> (enable)
Use the set spantree maxage command to set the bridge maximum aging time for a VLAN.
set spantree maxage agingtime [vlan]
agingtime | Maximum number of seconds (6 to 40) that the system retains the information received from other bridges through Spanning-Tree Protocol. |
vlan | (Optional) Number of the VLAN; if a VLAN number is not specified, VLAN 1 is assumed. |
The default configuration is 20 seconds for all VLANs.
Switch command.
Privileged.
This example shows how to set the maximum aging time for VLAN 1000 to 25 seconds:
Console> (enable) set spantree maxage 25 1000 Spantree 1000 max aging time set to 25 seconds. Console> (enable)
Use the set spantree portcost command to set the path cost for a port.
set spantree portcost {mod_num/port_num} cost
mod_num | Number of the module. |
port_num | Number of the port on the module. |
cost | Number from 0 to 65535 that indicates the cost of the path; 0 is low cost and 65535 is high cost. |
The default is portcost is 4.
Switch command.
Privileged.
The Spanning-Tree Protocol uses port path costs to determine which port to select as a forwarding port. You should assign lower numbers to ports attached to faster media (such as full duplex) and higher numbers to ports attached to slower media. The possible range is from 0 to 65535.
The following example shows how to set the port cost for port 12 on module 2 to 19:
Console> (enable) set spantree portcost 2/12 19 Spantree port 2/12 path cost set to 19. Console> (enable)
Use the set spantree portfast command to allow a port that is connected to a single workstation or PC to start faster when it is connected.
set spantree portfast {mod_num/port_num} {enable | disable}
mod_num | Number of the module. |
port_num | Number of the port on the module. |
enable | Keyword to enable the spanning-tree port fast-start feature on the port. |
disable | Keyword to disable the spanning-tree port fast-start feature on the port. |
The default is the port fast-start feature is disabled.
Switch command.
Privileged.
When a port configured with the spantree portfast enable command is connected, the port immediately enters the spanning-tree forwarding state rather than going through the normal spanning-tree states such as listening and learning. Use this command on ports that are connected to a single workstation or PC only; do not use it on ports that are connected to networking devices such as hubs, routers, switches, bridges, or concentrators.
This example shows how to enable the spanning-tree port fast-start feature on port 2 on module 1:
Console> (enable) set spantree portfast 1/2 enable Warning: Spantree port fast start should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc. to a fast start port can cause temporary spanning tree loops. Use with caution. Spantree port 1/2 fast start enabled. Console> (enable)
Use the set spantree portpri command to set the bridge priority for a spanning-tree port or TrCRF.
set spantree portpri {mod_num/port_num} | trcrf [priority | trcrf_priority]
mod_num | Number of the module. |
port_num | Number of the port on the module. |
trcrf | Keyword to specify the number of the TrCRF for which you are setting the bridge priority. |
priority | (Optional) Number that represents the cost of a link in a spanning-tree bridge. The priority level is from 0 (high) to 63 (low). |
trcrf_priority | (Optional) Number that represents the cost of the TrCRF. The priority level is from 0 to 7, with 0 indicating high priority and 7, low priority. |
The default is all ports with bridge priority are set to 32.
Switch command.
Privileged.
This example shows how to set the priority of port 1 on module 4 to 63:
Console> (enable) set spantree portpri 4/1 63 Bridge port 4/1 priority set to 63. Console> (enable)
Use the set spantree portstate command to manually set the state of a TrCRF.
set spantree portstate trcrf {block | forward | auto} [trbrf]
trcrf | Number of the TrCRF for which you are manually setting the state. |
block | forward | auto | Keywords to set the TrCRF to a blocked state (block), forwarding state (forward), or to have the Spanning-Tree Protocol determine the correct state automatically (auto). |
trbrf | (Optional) Number of the parent TrBRF. |
There is no default configuration for this command.
Switch command.
Privileged.
Use this command only to set the port state when the TrCRF is in SRT mode and the TrBRF is running the IBM Spanning-Tree Protocol, or the TrCRF is in SRB mode and the TrBRF is running the IEEE Spanning-Tree Protocol.
When you enable Spanning-Tree Protocol, every switch in the network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, the ports then stabilize to the forwarding or blocking state. However, with TrBRFs and TrCRFs, there are two exceptions to this rule that require you to manually set the state of the logical ports of a TrBRF:
If either condition exists, use the set spantree portstate command to manually set the state of a TrCRF to blocked or forwarding mode or set the Spanning-Tree Protocol to determine the correct state automatically.
This example shows the manual setting of TrCRF 900 to a forwarding state:
Console> (enable) set spantree portstate 900 forward reserve_nvram : requested by block = 0 reserve_nvram : granted to block = 0 release_nvram : releasing block = 0 Console> (enable)
Use the set spantree portvlancost command to assign a lower path cost to a set of VLANs on a port.
set spantree portvlancost {mod_num/port_num} [cost cost] [vlan_list]
mod_num | Number of the module. |
port_num | Number of the port. |
cost cost | (Optional) Keyword to indicate the path cost. The portvlancost applies only to trunk ports. |
vlan_list | (Optional) If you do not list a VLAN explicitly, the VLANs listed in prior invocations of this command are affected. If no cost is listed explicitly, and previous cost values are specified in prior invocations, then the portvlancost is set to 1 less than the current port cost for a port. However, this may not assure load balancing in all cases. |
The default is portvlancost is 3.
Switch command.
Privileged.
The value specified is used as the path cost of the port for the specified set of VLANs. The rest of the VLANs have a path cost equal to the port path cost, set via the set spantree portcost command (if not set, the value is the default path cost of the port).
These examples show various ways to use the set spantree portvlancost command:
Console> (enable) set spantree portvlancost 2/10 cost 25 1-20 Cannot set portvlancost to a higher value than the port cost, 10, for port 2/10. Console> (enable) Console> (enable) set spantree portvlancost 2/10 1-20 Port 2/10 VLANs 1-20 have a path cost of 9. Console> (enable) Console> (enable) set spantree portvlancost 2/10 cost 4 1-20 Port 2/10 VLANs 1-20 have path cost 4. Port 2/10 VLANs 21-1000 have path cost 10. Console> (enable) Console> (enable) set spantree portvlancost 2/10 cost 6 21 Port 2/10 VLANs 1-21 have path cost 6. Port 2/10 VLANs 22-1000 have path cost 10. Console> (enable)
These examples show how to use the set spantree portvlancost command without explicitly specifying cost:
Console> (enable) set spantree portvlancost 1/2 Port 1/2 VLANs 1-1005 have path cost 3100. Console> (enable) Console> (enable) set spantree portvlancost 1/2 21 Port 1/2 VLANs 1-20,22-1005 have path cost 3100. Port 1/2 VLANs 21 have path cost 3099. Console> (enable)
Use the set spantree portvlanpri command to set the port priority for a subset of VLANs in the trunk port.
set spantree portvlanpri {mod_num/port_num} priority [vlans]
mod_num | Number of the module. |
port_num | Number of the port. |
priority | Number that represents the cost of a link in a spanning-tree bridge. The priority level is from 0 to 63, with 0 indicating high priority and 63 indicating low priority. |
vlans | (Optional) VLANs that use the specified priority level. |
The default is the port VLAN priority is set to 0, with no VLANs specified.
Switch command.
Privileged.
Use this command to add VLANs to a specified port priority level. Subsequent calls to this command do not replace VLANs that are already set at a specified port priority level.
This feature is not supported for the MSM.
The set spantree portvlanpri command applies only to trunk ports. If you enter this command, you see this message:
Port xx is not a trunk-capable port
This example shows how to set the port priority for module 1, port 2, on VLANs 21 to 40:
Console> (enable) set spantree portvlanpri 1/2 16 21-40 Port 1/2 vlans 3,6-20,41-1000 using portpri 32 Port 1/2 vlans 1-2,4-5,21-40 using portpri 16 Console> (enable)
clear spantree portvlancost
show spantree
Use the set spantree priority command to set the bridge priority for a VLAN.
set spantree priority bridge_priority [vlan]
bridge_priority | Number representing the priority of the bridge. The priority level is from 0 to 65535, with 0 indicating high priority and 65535, low priority. |
vlan | (Optional) Number of the VLAN. If you do not specify a VLAN number, VLAN 1 is used. |
The default is the bridge priority is set to 32768.
Switch command.
Privileged.
This feature is not supported for the MSM.
This example shows how to set the bridge priority of VLAN 1 to 4096:
Console> (enable) set spantree priority 4096 VLAN 1 bridge priority set to 4096. Console> (enable)
Use the set spantree root command to set the primary or secondary root for specific VLANs or for all VLANs of the switch.
set spantree root [secondary] [vlan_list] [dia network_diameter] [hello hello_time]
secondary | (Optional) Keyword to designate this switch as a secondary root, should the primary root fail. |
vlan_list | (Optional) Number of the VLAN. If you do not specify a VLAN number, VLAN 1 is used. |
dia network_diameter | (Optional) Keyword to specify the maximum number of bridges between any two points of attachment of end stations; valid values are from 1 through 7. |
hello hello_time | (Optional) Keyword to specify in seconds, the duration between the generation of configuration messages by the root switch. |
If the secondary keyword is not specified, the default is to make the switch the primary root.
The default value of the network diameter is 7.
If not specified, the current value of hello_time from the NVRAM is used.
This command is run on backbone or distribution switches.
You can run the secondary root many times to create backup switches in case of a root failure.
The secondary command reduces the bridge priority value to 16384.
This command increases path costs to a value greater than 3000.
Switch command.
Privileged.
This example shows how to use the set spantree root command:
Console> (enable) set spantree root 1-10 dia 4 VLANs 1-10 bridge priority set to 8192 VLANs 1-10 bridge max aging time set to 14 seconds. VLANs 1-10 bridge hello time set to 2 seconds. VLANs 1-10 bridge forward delay set to 9 seconds. Switch is now the root switch for active VLANs 1-6. Console> (enable)
This example shows that setting the bridge priority to 8192 was not sufficient to make this switch the root. So, the priority was further reduced to 7192 (100 less than the current root switch) to make this switch the root switch. However, reducing it to this value did not make it the root switch for active VLANs 16 and 17.
Console> (enable) set spantree root 11-20. VLANs 11-20 bridge priority set to 7192 VLANs 11-10 bridge max aging time set to 20 seconds. VLANs 1-10 bridge hello time set to 2 seconds. VLANs 1-10 bridge forward delay set to 13 seconds. Switch is now the root switch for active VLANs 11-15,18-20. Switch could not become root switch for active VLAN 16-17. Console> (enable) Console> (enable) set spantree root secondary 22,24 dia 5 hello 1 VLANs 22,24 bridge priority set to 16384. VLANs 22,24 bridge max aging time set to 10 seconds. VLANs 22,24 bridge hello time set to 1 second. VLANs 22,24 bridge forward delay set to 7 seconds. Console> (enable)
Use the set spantree uplinkfast command to enable fast switchover to alternate ports when the root port fails. This command applies to a switch, not to a WAN.
set spantree uplinkfast {enable | disable} [rate station_update_rate] [all-protocols off | on]
enable | Keyword to enable fast switchover. |
disable | Keyword to disable fast switchover. |
rate | (Optional) Keyword to specify the number of multicast packets transmitted per 100 ms when an alternate port is chosen after the root port goes down. |
station_update_rate | (Optional) Number of multicast packets transmitted per 100 ms when an alternate port is chosen after the root port goes down. |
all-protocols | (Optional) Keyword to specify whether or not to generate multicast packets for all protocols (IP, IPX, AppleTalk, and Layer 2 packets). |
off | (Optional) Keyword to turn off the all-protocols feature. |
on | (Optional) Keyword to turn on the all-protocols feature. |
The default station_update_rate is 15 packets per 100 ms.
Switch command.
Privileged.
The set spantree uplinkfast enable command has the following results:
If you run set spantree uplinkfast enable on a switch that has this feature already enabled, only the station update rate is updated. The rest of the parameters are not modified.
If you run set spantree uplinkfast disable on a switch, the UplinkFast feature is disabled but the switch priority and port cost values are not reset to the factory defaults. To reset the values to the factory defaults, enter the clear spantree uplinkfast command.
The default station_update_rate value is 15 packets per 100 ms, which is equivalent to a 1 percent load on a 10-Mbps Ethernet. If this value is specified as 0, the generation of these packets is turned off.
You do not have to turn on the all-protocols feature on Catalyst 6000 family switches that have both the UplinkFast and protocol filtering features enabled. The all-protocols feature should be used only on Catalyst 6000 family switches that have uplinkfast but do not have protocol filtering; upstream switches in the network use protocol filtering. Since the switch with uplinkfast does not have protocol filtering, you must enter the all-protocols option to inform the uplinkfast task whether or not to generate multicast packets for all protocols.
This example shows how to enable spantree UplinkFast and specify the number of multicast packets transmitted to 40 packets per 100 ms:
Console> (enable) set spantree uplinkfast enable rate 40 VLANs 1-1000 bridge priority set to 49152. The port cost and portvlancost of all ports increased to above 3000. Station update rate set to 40 packets/100ms. uplinkfast turned on for bridge. Console> (enable)
This example shows how to disable spantree UplinkFast:
Console> (enable) set spantree uplinkfast disable Uplinkfast disabled for switch. Use clear spantree uplinkfast to return stp parameters to default. Console> (enable) clear spantree uplink This command will cause all portcosts, portvlancosts, and the bridge priority on all vlans to be set to default. Do you want to continue (y/n) [n]? y VLANs 1-1005 bridge priority set to 32768. The port cost of all bridge ports set to default value. The portvlancost of all bridge ports set to default value. uplinkfast disabled for bridge. Console> (enable)
This example shows how to turn on the all-protocols feature:
Console> (enable) set spantree uplinkfast enable all-protocols on uplinkfast update packets enabled for all protocols. uplinkfast already enabled for bridge. Console> (enable)
This example shows how to turn off the all-protocols feature:
Console> (enable) set spantree uplinkfast enable all-protocols off uplinkfast all-protocols field set to off. uplinkfast already enabled for bridge. Console> (enable)
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Dec 31 11:00:18 PST 1999
Copyright 1989-1999©Cisco Systems Inc.