cc/td/doc/product/voice/ics7750
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring the System Switch Processor

Configuring the System Switch Processor

This chapter explains how to configure the system switch processor (SSP) and contains the following sections:


Note   This guide describes the use of IOS commands that have been created or changed for use with the SSP that supports IOS Release 12.0(5.2)XU. The complete IOS Release 12.0 documentation is available through CCO by selecting Service and Support > Technical Documents > Documentation Home Page > Cisco IOS Software Configuration > Cisco IOS Release 12.0.


Note   For default settings on the SSP and more information on the commands described in this chapter, see the Cisco ICS 7750 Command Reference.

Overview

The SSP is an eight-port switching module in the Cisco ICS 7750. It has two external ports for connecting to the external network devices and six internal ports for connecting to the other cards in the Cisco ICS 7750.

The SSP card serves the following purposes:


Note   The Cisco ICS 7750 supports only one SSP, which is always installed in slot 7 of the chassis. For a complete description of the SSP components and SSP installation procedures, refer to the Cisco ICS 7750 Hardware Installation Guide.

Features

The SSP provides the following features:

Management Options

You can use the default settings shipped with the SSP, or you can customize the SSP settings through the following management options:

The Cisco ICS 7700 System Manager and the System Switch Processor Manager are the easiest interfaces to use for most of the SSP configuration and monitoring tasks. Using these interfaces, you can configure and monitor the SSP from anywhere on your intranet.


Note   For default settings on the SSP, refer to the Cisco ICS 7750 Command Reference.

Restrictions for CLI Usage


Caution The user is strongly recommended to use only the System Manager GUI interface to define and manipulate the SSP configurations that are supported by this interface. It is possible for a user with sufficient knowledge to change configurations by direct interaction with the system components through the CLI. However, if there are problems due to CLI configuration, you will not be able to use the System Manager to recover.

It is also recommended that the following list of tasks should not be done through the CLI, because they are configured through the System Manager and might conflict with its configurations:


Note   You can display the complete set of commands supported by the IOS software when configuring through the CLI and by issuing the show commands. However, even though these commands exist, you should not invoke all of these commands.


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

Accessing the SSP CLI

To configure the SSP through the CLI, you must access the SSP through the SAP. Refer to the chapter "Accessing the System" for more information on how to get the SSP CLI prompt.

Saving Configuration Changes

To prevent the loss of the SSP configuration, save the running-config file to the startup-config file by following these steps:

Command Purpose

Step 1 

SSP> enable

Password: <password>

SSP# 

Enter enable mode.

Enter the password.

You have entered enable mode when the prompt changes to SSP#.

Step 2 

SSP# copy running-config startup-config

Save the configuration changes to a startup-config file so that they are not lost during resets, power cycles, or power outages.

Configuring System Settings

This section contains the following subsections:

Managing the ARP Table

To communicate with a device (on Ethernet, for example), the software first must determine the 48-bit MAC or local data link address of that device. The process of determining the local data link address from an IP address is called address resolution.

The Address Resolution Protocol (ARP) is used to associate a host IP address with the corresponding media or MAC addresses and VLAN ID. Taking an IP address as input, ARP determines the associated media address. Once a media or MAC address is determined, the IP address/media address association is stored in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame and sent over the network. Encapsulation of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP). By default, standard Ethernet-style ARP encapsulation (represented by the arpa keyword) is enabled on the IP interface.

From the CLI, you can manually add entries to the ARP table; however, these entries do not age and must be manually removed.

For detailed CLI procedures, refer to the Cisco IOS Software Configuration > Cisco IOS Release 12.0 on the Documentation Home Page.

Setting the System Date and Time

Set the SSP date and time by:

Setting the System Date and Time

You can manually configure the current time and date after the system is restarted. The time will remain accurate until the next system restart.

For detailed CLI procedures, refer to the Cisco IOS Software Configuration > Cisco IOS Release 12.0 on the Documentation Home Page.

Configuring the Network Time Protocol

In complex networks it is often prudent to distribute time information from a central server. The NTP can distribute time information by responding to requests from clients or by broadcasting time information.

For detailed CLI procedures, refer to the Cisco IOS Software Configuration > Cisco IOS Release 12.0 on the Documentation Home Page.

Configuring the SSP as an NTP Client

You configure the SSP as an NTP client by entering the IP addresses of up to ten NTP servers and specifying which server should be used first. You can also enter an authentication key to be used as a password when requests for time information are sent to the server.

Enabling NTP Authentication

To ensure the validity of information received from NTP servers, you can authenticate NTP messages with public-key encryption. This procedure must be coordinated with the administrator of the NTP servers: the information you enter will be matched by the servers to authenticate it.

Configuring the SSP for NTP Broadcast-Client Mode

You can configure the SSP to receive NTP broadcast messages if there is an NTP broadcast server, such as a router, broadcasting time information on the network. You can also enter a delay to account for round-trip delay between the client and the NTP broadcast server.

Configuring Device Settings

This section contains the following subsections:

Configuring CDP on the SSP

The Cisco Discovery Protocol (CDP) enables the SSP to advertise its existence to other Cisco devices on the network. When CDP is enabled, the SSP and the network management applications have an accurate picture of the network at any time because CDP gathers information about device types, links between devices, and the number of interfaces on each device.

CDP is enabled for the SSP by default. Use the Cisco IOS CLI to change global CDP parameters and to display information about neighboring Cisco devices.

For detailed CLI procedures, refer to the Cisco IOS Software Configuration > Cisco IOS Release 12.0 on the Documentation Home Page.


Caution Do not disable CDP through the CLI because it might conflict with System Manager configurations.

Controlling IP Multicast Packets through CGMP

The Cisco Group Management Protocol (CGMP) reduces the unnecessary flooding of IP multicast packets by limiting the transmission of these packets to CGMP clients that request them. The Fast Leave feature accelerates the removal of unused CGMP groups. By default, CGMP is enabled, and the Fast Leave feature is disabled.

End stations issue join messages to become part of a CGMP group and issue leave messages to leave the group. The membership of these groups is managed by the SSP and by the connected CGMP-enabled routers through the further exchange of CGMP messages.

CGMP groups are maintained on a per-VLAN basis: a multicast IP address packet can be forwarded to one list of ports in one VLAN and to a different list of ports in another VLAN. When a CGMP group is added, it is added on a per-VLAN, per-group basis. When a CGMP group is removed, it is only removed in a given VLAN.

Changing the CGMP parameters includes the following tasks:

Enabling the Fast Leave Feature

The CGMP Fast Leave feature reduces the delay when group members leave groups. When an end station requests to leave a CGMP group, the group remains enabled for that VLAN until all members have requested to leave. With the Fast Leave feature enabled, the SSP immediately checks whether other members are attached to its ports in that group. If there are no other members, the SSP removes the port from the group. If there are no other ports in the group, the SSP sends a message to routers connected to the VLAN to delete the entire group.

The Fast Leave feature functions only if CGMP is enabled. The client must be running Internet Group Management Protocol (IGMP) version 2 for the Fast Leave feature to function properly.

Enabling the CGMP Fast Leave Feature

Beginning in privileged EXEC mode, follow these steps to enable the CGMP Fast Leave feature:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

cgmp leave-processing

Enable CGMP and CGMP Fast Leave.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show cgmp

Verify your entry.

Disabling the CGMP Fast Leave Feature

Beginning in privileged EXEC mode, follow these steps to disable the CGMP Fast Leave feature:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

no cgmp leave-processing

Disable CGMP and CGMP Fast Leave.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show cgmp

Verify your entry.

Changing the Router Hold-Time

The router hold-time is the number of seconds the SSP waits before removing (aging) a router entry and ceasing to exchange messages with it. If it is the last router entry on a VLAN, then all groups on that VLAN are removed. You can thus enter a lower number for the router hold-time to accelerate the removal of CGMP groups.

Beginning in privileged EXEC mode, follow these steps to change the router hold-time:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

cgmp holdtime 400

Configure the number of seconds the SSP is to wait before dropping a router entry.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show cgmp

Verify your entry.

Removing Multicast Groups

You can reduce the forwarding of IP multicast packets by removing groups from the Current Multicast Groups table. Each entry in the table consists of the VLAN, IGMP multicast address, and ports.

You can use the CLI to clear all CGMP groups, all CGMP groups in a VLAN, or all routers, their ports, and their expiration times.

Beginning in privileged EXEC mode, follow these steps to remove all multicast groups:

Command Purpose

Step 1 

clear cgmp group

Clear all CGMP groups on all VLANs on the SSP.

Step 2 

show cgmp

Verify your entry by displaying CGMP information.

Configuring the STP Parameters

Spanning Tree Protocol (STP) is an industry standard for avoiding loops in switched networks. The SSP supports STP on a maximum of 64 VLANs.

To change the STP parameters, perform the following tasks, which are described in the sections below:

Using STP to Support Redundant Connectivity

You can create a redundant backbone with STP by connecting the two SSP ports to another device or to two different devices. STP automatically disables one port, but enables it if the other port is lost. If one link is high-speed and the other low-speed, the low-speed link is always disabled. If the speed of the two links is the same, the port priority and port ID are added together, and STP disables the link with the lowest value.

You can also create redundant links between switches including the SSP by using EtherChannel port groups.

Accelerating Aging to Retain Connectivity

The default for aging dynamic addresses is 5 minutes. However, a reconfiguration of the spanning tree can cause many station locations to change. Because these stations could be unreachable for 5 minutes or more during a reconfiguration, the address-aging time is accelerated so that station addresses can be dropped from the address table and then relearned. The accelerated aging is the same as the forward-delay parameter value when STP reconfigures.

Because each VLAN is a separate instance of STP, the SSP accelerates aging on a per-VLAN basis. A reconfiguration of STP on one VLAN can cause the dynamic addresses learned on that VLAN to be subject to accelerated aging. Dynamic addresses on other VLANs can be unaffected and remain subject to the aging interval entered for the SSP.

Disabling STP on the SSP

STP is enabled by default. Disable STP only if you are sure there are no loops in the network topology. When STP is disabled and loops are present in the topology, excessive traffic and indefinite packet duplication can drastically reduce the network performance.

Beginning in privileged EXEC mode, follow these steps to disable STP protocol:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

no spanning-tree vlan stp-list

Disable STP on a VLAN.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entry.

Redundant Links Using STP UplinkFast

Switches including the SSP in hierarchical networks can be grouped into backbone switches, distribution switches, and access switches.

If a switch loses connectivity, the switch begins using the alternate paths as soon as STP selects a new root port. When STP reconfigures the new root port, other ports flood the network with multicast packets, one for each address that was learned on the port. You can limit these bursts of multicast traffic by reducing the max-update-rate parameter (the default for this parameter is 150 packets per second). However, if you enter zero, station-learning frames are not generated, so the STP topology converges more slowly after a loss of connectivity.

STP UplinkFast is an enhancement that accelerates the choice of a new root port when a link or switch fails or when STP reconfigures itself. The root port transitions to the forwarding state immediately without going through the listening and learning states, as it would do with normal STP procedures. UplinkFast is most useful in edge or access switches and might not be appropriate for backbone devices.

Enabling STP UplinkFast

When you enable UplinkFast, it is enabled for the SSP and cannot be enabled for individual VLANs.

Beginning in privileged EXEC mode, follow these steps to configure UplinkFast:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

spanning-tree uplinkfast max-update-rate pkts-per-second

Enable UplinkFast on the SSP.

The range is from 0 to 1000 packets per second; 150 is the default.

If you set the rate to 0, station-learning frames are not generated, so the STP topology converges more slowly after a loss of connectivity.

Step 3 

exit

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entries.


Note   When UplinkFast is enabled, the bridge priority of all VLANs is set to 49152, and the path cost of all ports and VLAN trunks is increased by 3000. This change reduces the chance that the switch will become the root port. When UplinkFast is disabled, the bridge priorities of all VLANs and path costs of all ports are set to default values.

Changing the STP Parameters for a VLAN

To change the STP parameters for a VLAN, change the root parameters. The MAC Address field shows the MAC address of the switch currently acting as the root for each VLAN; the remaining parameters show the other STP settings for the root switch for each VLAN. The root switch is the switch with the highest priority and transmits topology frames to other switches in the spanning tree.

The following parameters define how your SSP responds when the STP reconfigures itself:

Protocol

Implementation of STP to use.

Options available are IBM or IEEE. The default is IEEE.

Priority

Value used to identify the root switch. The switch with the lowest value has the highest priority and is selected as the root.

Enter a number from 0 to 65535.

Max age

Number of seconds a switch waits without receiving STP configuration messages before attempting a reconfiguration. This parameter takes effect when a switch is operating as the root switch. Switches not acting as the root use the root-switch Max age parameter.

Enter a number from 6 to 200.

Hello Time

Number of seconds between the transmission of hello messages, which indicate that the switch is active. Switches not acting as a root switch use the root-switch Hello-time value.

Enter a number from 1 to 10.

Forward Delay

Number of seconds a port waits before changing from its STP learning and listening states to the forwarding state. This wait is necessary so that other switches on the network ensure no loop is formed before they allow the port to forward packets.

Enter a number from 4 to 200.

Changing the STP Implementation

Beginning in privileged EXEC mode, follow these steps to change the STP implementation:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

spanning-tree [vlan stp-list] protocol {ieee | ibm}

Specify the STP implementation to be used for a spanning-tree instance. The stp-list is the list of VLANs to which the STP command applies.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entry.

Changing the Switch Priority

Beginning in privileged EXEC mode, follow these steps to change the switch priority to determine which switch is the root switch.

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

spanning-tree [vlan stp-list] priority bridge-priority

Configure the switch priority for the specified spanning-tree instance. The stp-list is the list of VLANs to which the STP command applies.

Enter a number from 0 to 65535; the lower the number, the more likely the switch will be chosen as the root switch.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entry.

Changing the BPDU Message Interval

Beginning in privileged EXEC mode, follow these steps to change the BPDU message interval (max age time):

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

spanning-tree [vlan stp-list] max-age seconds

Specify the interval between messages the spanning tree receives from the root switch. The stp-list is the list of VLANs to which the STP command applies.

The maximum age is the number of seconds a switch waits without receiving STP configuration messages before attempting a reconfiguration. Enter a number from 6 to 200.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entry.

Changing the Hello BPDU Interval

Beginning in privileged EXEC mode, follow these steps to change the hello BPDU interval (hello time):

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

spanning-tree [vlan stp-list] hello-time seconds

Specify the interval between hello BPDUs.

Hello messages indicate that the switch is active. Enter a number from 1 to 10.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entry.

Changing the Forwarding Delay Time

Beginning in privileged EXEC mode, follow these steps to change the forwarding delay time:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

spanning-tree [vlan stp-list] forward-time seconds

Specify the forwarding time for the specified spanning-tree instance. The stp-list is the list of VLANs to which the STP command applies.

The forward delay is the number of seconds a port waits before changing from its STP learning and listening states to the forwarding state. Enter a number from 4 to 200.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show spanning-tree

Verify your entry.

STP Port Parameters

The following parameters describe the status of ports that are not forwarding because of STP:


Table 4-1: STP Port Parameters
Parameter Description

Port

The interface and port number. FastEthernet 0/1 refers to port 1X.

State

The current state of the port. A port can be in one of the following states:

  Blocking

Port is not participating in the frame-forwarding process and is not learning new addresses.

  Listening

Port is not participating in the frame-forwarding process, but is progressing towards a forwarding state. The port is not learning addresses.

  Learning

Port is not forwarding frames but is learning addresses.

  Forwarding

Port is forwarding frames and learning addresses.

  Disabled

Port has been removed from STP operation.

  Down

Port has no physical link.

  Broken

One end of the link is configured as an access port and the other end is configured as an 802.1Q trunk port. Or both ends of the link are configured as 802.1Q trunk ports but have different native VLAN IDs.

Enabling the Port Fast Feature

The Port Fast feature brings a port directly from a blocking state into a forwarding state. The only time a port with the Port Fast feature enabled goes through the normal cycle of STP status changes is when the SSP is restarted. Use this feature when an SSP port is connected to a workstation or server and cannot contribute to bridging loops.


Caution Enabling this feature on an SSP port connected to a switch or hub could prevent STP from detecting and disabling loops in your network.

Enabling STP Port Fast

Enabling this feature on an SSP port connected to a switch or hub could prevent STP from detecting and disabling loops in your network. Beginning in privileged EXEC mode, follow these steps to enable the Port Fast feature:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

spanning-tree portfast

Enable the Port Fast feature for the port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show spanning-tree

Verify your entry.


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

Changing the Path Cost

Beginning in privileged EXEC mode, follow these steps to change the path cost for STP calculations:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

spanning-tree [vlan stp-list] cost cost

Configure the path cost for the specified spanning-tree instance. The stp-list is the list of VLANs to which the STP command applies.

Enter a number from 1 to 65535.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show running-config

Verify your entry.


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

Changing the Port Priority

Beginning in privileged EXEC mode, follow these steps to change the port priority, used when two switches, including the SSP, tie for position as the root switch:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

spanning-tree [vlan stp-list] port-priority port-priority

Configure the port priority for a specified instance of STP. The stp-list is the list of VLANs to which the STP command applies.

Enter a number from 0 to 255. The lower the number, the higher the priority.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show running-config

Verify your entry.


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

Configuring STP Root Guard

The Layer 2 network of a service provider (SP) can include many connections to switches that are not owned by the SP. In such a topology, STP can reconfigure itself and select a customer switch as the STP root switch. You can avoid this possibility by configuring the root guard parameter on ports that connect to switches outside of your network. If a switch outside the network becomes the root switch, the port is blocked, and STP selects a new root switch.


Caution Misuse of this command can cause a loss of connectivity.

Root guard enabled on a port applies to all the VLANs that the port belongs to. Each VLAN has its own instance of STP.

Beginning in privileged EXEC mode, follow these steps to set root guard on a port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

spanning-tree rootguard

Enable root guard on the port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show spanning-tree

Verify that the port is configured for root guard.

Use the no version of the spanning-tree rootguard command to disable the root guard feature.

Configuring UniDirectional Link Detection

UniDirectional Link Detection (UDLD) is a Layer 2 protocol that detects and shuts down unidirectional links. You can configure UDLD on the entire switch or on an individual port.

Beginning in privileged EXEC mode, follow these steps to configure UDLD on a switch:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

udld enable

Enable UDLD.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show running-config

Verify the entry by displaying the running configuration.

Use the udld reset command to reset any port that has been shut down by UDLD.

Configuring Private VLAN Edge Ports

Some applications require that no traffic be forwarded by the Layer 2 protocol between ports on the same switch. In such an environment, there is no exchange of unicast, broadcast, or multicast traffic between ports on the switch, and traffic between ports on the same switch is forwarded through a Layer 3 device such as a router.

To meet this requirement, you can configure SSP ports as private VLAN edge ports. Private VLAN edge ports do not forward any traffic to private VLAN edge ports on the same switch. This means that all traffic passing between private VLAN edge ports—unicast, broadcast, and multicast—must be forwarded through a Layer 3 device. Private VLAN edge ports can forward any type of traffic to non-private VLAN edge ports, and they forward as usual to all ports on other switches.


Note   There could be times when unknown unicast traffic from a non-private VLAN edge port is flooded to a private VLAN edge port because a MAC address has timed out or has not been learned by the switch. Use the port block command to guarantee that no unicast and multicast traffic is flooded to the port in such a case. See the "Configuring Flooding Controls" section for more information.

Beginning in privileged EXEC mode, follow these steps to define a port as a private VLAN edge port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

port protected

Enable private VLAN edge port on the port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show port protected

Verify that the port has private VLAN edge port enabled.

Use the no version of the port protected command to disable private VLAN edge port.

Configuring Port Settings

This section describes how to change port settings and to monitor and configure the SSP ports. It contains the following subsections:


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

Monitoring and Configuring Ports

You can configure a single or multiple ports on the SSP and can display the settings for each port. Table 4-2 describes the parameters that you can monitor and configure.


Table 4-2: Port Configuration Parameters
Feature Description

Status

Administratively enable or disable the port.

Duplex

Set a port to full-duplex (Full), half-duplex (Half), or autonegotiate (Auto). The default is Auto.

Speed

Set a 10/100 port to 10 Mbps (10), 100 Mbps (100), or autonegotiate (Auto). The default is Auto.

802.1 p

Assign a class of service (CoS) priority to the port. CoS values range between zero for low-priority and seven for high-priority. For more information on this parameter see the "Configuring 802.1p Class of Service" section.

If STP is enabled, the SSP can take up to 30 seconds to check for loops when a port is reconfigured. The port LED is amber while STP reconfigures.


Caution Reconfiguring the port through which you are managing the SSP could cause a temporary loss of connectivity.

Connecting to Devices that Do Not Autonegotiate

To connect to a remote 100BaseT device that does not autonegotiate, set the duplex setting to Full or Half and the speed setting to Auto. Autonegotiation for the speed setting selects the correct speed even if the attached device does not autonegotiate, but the duplex setting must be explicitly set.

Setting Speed and Duplex Parameters

Beginning in privileged EXEC mode, follow these steps to set the speed and duplex parameters on a port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

speed {10 | 100 | auto}

Enter the speed parameter for the port.

Step 4 

duplex {full | half | auto}

Enter the duplex parameter for the port.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show running-config

Verify your entries.

Step 7 

copy running-config startup-config

(Optional) Save your entry in the configuration file. This retains the configuration when the SSP restarts.

Creating EtherChannel Port Groups

Fast EtherChannel port groups act as single logical ports for high-bandwidth connections between switches or between switches and servers.


Note   You can create port groups of 100BaseTX ports, but you cannot create a port group that contains both port speeds at the same time.

Understanding EtherChannel Port Grouping

This SSP supports two different types of port groups: source-based forwarding port groups and destination-based forwarding port groups.

Source-based forwarding port groups distribute packets forwarded to the group based on the source address of incoming packets. You can configure up to eight ports in a source-based forwarding port group. Source-based forwarding is enabled by default.

Destination-based port groups distribute packets forwarded to the group based on the destination address of incoming packets. You can configure an unlimited number of ports in a destination-based port group.

You can create up to 12 port groups of all source-based, all destination-based, or a combination of source- and destination-based ports. All ports in a group must be of the same type; for example, they must be all source based or all destination based. You can independently configure port groups that link switches, but you must consistently configure both ends of a port group.


Caution It is not recommended to configure the EtherChannelPort Grouping feature on the internal ports.

Port Group Restrictions on Static-Address Forwarding

The following restrictions apply to entering static addresses that are forwarded to port groups:

Creating EtherChannel Port Groups

Beginning in privileged EXEC mode, follow these steps to create a two-port group:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port of the first port to be added to the group.

Step 3 

port group 1 distribution destination

Assign the port to group 1 with destination-based forwarding.

Step 4 

interface interface

Enter the second port to be added to the group.

Step 5 

port group 1 distribution destination

Assign the port to group 1 with destination-based forwarding.

Step 6 

end

Return to privileged EXEC mode.

Step 7 

show port group

Verify your entries.

Enabling SPAN

You can monitor traffic on a given port by forwarding incoming and outgoing traffic on the port to another port in the same VLAN. A Switch Port Analyzer (SPAN) port cannot monitor ports in a different VLAN, and a SPAN port must be a static-access port. Any number of ports can be defined as SPAN ports, and any combination of ports can be monitored.

Enabling and Disabling SPAN

Beginning in privileged EXEC mode, follow these steps to enable SPAN:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port that acts as the monitor port.

Step 3 

port monitor interface

Enable port monitoring on the port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show port monitor

Verify your entries.

Disabling SPAN

Beginning in privileged EXEC mode, follow these steps to disable SPAN:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port number of the monitor port.

Step 3 

no port monitor interface

Disable port monitoring on the port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show running-config

Verify your entries.

Configuring Flooding Controls

To block the forwarding of unnecessary flooded traffic, refer to the following sections:

Network Ports

Network ports are assigned per VLAN and can reduce flooded traffic on your network. The SSP forwards all traffic with unknown destination addresses to the network port instead of flooding the traffic to all ports in the VLAN.

When you configure a port as the network port, the SSP deletes all associated addresses from the address table and disables learning on the port. If you configure other ports in the VLAN as secure ports, the addresses on those ports are not aged. If you move a network port to a VLAN without a network port, it becomes the network port for the new VLAN.

You cannot change the settings for unicast and multicast flooding on a network port. You can assign only one network port per VLAN.

Enabling a Network Port

Beginning in privileged EXEC mode, follow these steps to define a port as the network port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

port network

Define the port as the network port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show port network

Verify your entry.

Disabling a Network Port

Beginning in privileged EXEC mode, follow these steps to disable the network port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

no port network

Disable the port as the network port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show port network

Verify your entry.

Enabling Storm Control

A packet storm occurs when a large number of broadcast, unicast, or multicast packets are received on a port. Forwarding these packets can cause the network to slow down or to time out. Storm control is configured for the SSP as a whole but operates on a per-port basis. By default, storm control is disabled.

Storm control uses specific high and low numbers of broadcast packets to block and then to restore forwarding of broadcast, unicast, or multicast packets. You can also set the SSP to shut down the port when the rising threshold is reached. The rising threshold is the number of broadcast packets that a SSP port can receive before forwarding is blocked. The falling threshold is the number of broadcast packets after which the SSP resumes normal forwarding of broadcast packets. In general, the higher the threshold, the less effective the protection against broadcast storms. The maximum half-duplex transmission on a 100BaseT link is 148,000 packets per second, but you can enter a threshold up to 4294967295 broadcast packets per second.

Enabling Storm Control

Beginning in privileged EXEC mode, follow these steps to enable broadcast-storm control:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3 

port storm-control [threshold {rising rising-number falling falling-number}]

Enter the rising and falling thresholds.

Make sure the rising threshold is greater than the falling threshold.

Step 4 

port storm-control filter

or

port storm-control trap

Disable the port during a broadcast storm, or generate an SNMP trap when the traffic on the port crosses the rising or falling threshold.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show port storm-control [interface]

Verify your entries.

Disabling Storm Control

Beginning in privileged EXEC mode, follow these steps to disable broadcast-storm control:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3 

no port storm-control

Disable port storm control.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show port storm-control [interface]

Verify your entries.

Blocking Flooded Traffic on a Port

By default, the SSP floods packets with unknown destination MAC addresses to all ports. Some configurations do not require flooding. For example, a port that has only manually assigned addresses has no unknown destinations, and flooding serves no purpose. Therefore, you can disable the flooding of unicast and multicast packets on a per-port basis. Ordinarily, flooded traffic does not cross VLAN boundaries.

Blocking Flooded Traffic on a Port

Beginning in privileged EXEC mode, follow these steps to disable the flooding of multicast and unicast packets to a port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3 

port block multicast

Block multicast forwarding to the port.

Step 4 

port block unicast

Block unicast flooding to the port.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show port block {multicast | unicast} interface

Verify your entries, entering the appropriate command once for the multicast option or once for the unicast option.

Resuming Normal Forwarding on a Port

Beginning in privileged EXEC mode, follow these steps to resume normal forwarding on a port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to configure.

Step 3 

no port block multicast

Enable multicast forwarding to the port.

Step 4 

no port block unicast

Enable unicast flooding to the port.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show port block {multicast | unicast} interface

Verify your entries, entering the appropriate command once for the multicast option or once for the unicast option.

Configuring Voice Ports

The SSP can receive and forward IP voice traffic.

Because the sound quality of an IP telephone call can deteriorate if the data is unevenly transmitted, this release of IOS supports QoS based on IEEE 802.1p class of service (CoS). QoS uses classification and scheduling to transmit network traffic from the SSP in a predictable manner. The Cisco IP Phones in the network are also configurable devices and can be configured to forward traffic with 802.1p priority. You can use the CLI to configure the SSP to honor or ignore a traffic priority assigned by a Cisco IP Phone.

Preparing a Port for IP Voice Traffic

Before you configure a SSP port to carry IP voice traffic, the port should be configured as an 802.1Q trunk and as a member of the voice VLAN (VVID).

See "Configuring a Trunk Port" section for instructions on configuring an 802.1Q trunk port.

Configuring a Port for IP Voice Traffic

The SSP ports can carry mixed traffic. There are three ways to configure the SSP ports for IP voice traffic:

Beginning in privileged EXEC mode, follow these steps to configure a port to instruct the phone to give voice traffic a higher priority and forward all traffic through the 802.1Q native VLAN:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

switchport voice vlan dot1p

Instruct the SSP to use 802.1p priority tagging for voice traffic and to use VLAN 0 (default native VLAN) to carry all traffic.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show interface interface switchport

Verify the port configuration.


Note   The show power inline command does not apply to the SSP.

Configuring a Port to Carry Voice and Data Traffic on Different VLANs

The Cisco IP Phone contains an integrated 3-port 10/100 switch that can connect to a PC or other device. You can configure a SSP port to instruct the phone to forward voice and data traffic on different VLANs.

In the following configuration, data traffic is carried by VLAN 1, and voice traffic is carried by
VLAN 2. In this configuration, all IP Phones and other voice-related devices must be connected to SSP ports that belong to VLAN 2.

Beginning in privileged EXEC mode, follow these steps to configure a port to receive voice and data from an IP Phone in different VLANs:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

switchport priority default (0)

Assign an 802.1p priority to untagged traffic that is received on the SSP port. The phone forwards this traffic through the native VLAN, VLAN 1.

Step 4 

switchport voice vlan (2)

Instruct the IP Phone to forward all voice traffic through
VLAN 2. The IP Phone forwards the traffic with an
802.1p priority of 5.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show interface interface switchport

Verify the configuration of the port.

Overriding the CoS Priority of Incoming Frames

A PC or other data device can connect to a port on the Cisco IP Phone. The PC can generate packets with a CoS value assigned, and there can be times when a network administrator would want to override that priority. You can use the SSP CLI to override the priority of frames arriving on the phone port from connected devices. You can also set the phone port to accept (trust) the priority of frames arriving on the port.

Beginning in privileged EXEC mode, follow these steps to override the CoS priority setting received from the PC-to-phone jack on the Cisco IP Phone:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be configured.

Step 3 

switchport priority extend cos 3

Set the phone port to override the priority received from PC or attached device and forward the received data with a priority of 3.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show interface interface switchport

Verify the change by displaying the setting as configured.

Use the no switchport priority extend command to return the port to its default setting.

Configuring VLAN Settings

A virtual LAN (VLAN) is a switched network that is logically segmented by function, project team, or application without regard to the physical locations of the users. Any SSP port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router or bridge as shown in Figure 4-1. Because a VLAN is considered a separate logical network, it contains its own bridge MIB information and can support its own implementation of the Spanning Tree Protocol (STP).

This section describes how to create and maintain VLANs through the command-line interface (CLI). It contains the following information:


Figure 4-1:
VLANs as Logically Defined Networks


VLANs are identified with a number between 1 and 1001. Only 64 possible instances of STP are supported on the SSP.

VLAN Port Membership Modes

You can configure a port to belong to a VLAN by assigning a membership mode, which determines the kind of traffic the port carries and the number of VLANs it can belong to. Table 4-3 lists the membership modes and characteristics.


Table 4-3: Port Membership Modes
Membership Mode VLAN Membership Characteristics

Static-access

A static-access port can belong to one VLAN and is manually assigned. By default, all ports are static-access ports assigned to VLAN 1.

Multi-VLAN

A multi-VLAN port can belong to up to 250 VLANs (some models only support 64 VLANs) and is manually assigned. You cannot configure a multi-VLAN port when a trunk is configured on the SSP. VLAN traffic on the multi-VLAN port is not encapsulated.

Trunk (ISL or
IEEE 802.1Q)

A trunk is a member of all VLANs in the VLAN database by default, but membership can be limited by configuring the allowed-VLAN list. You can also modify the pruning-eligible list to block flooded traffic to VLANs on trunk ports that are included in the list.

You can configure VTP, which maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP exchanges VLAN configuration messages with other switches over trunk links.

Dynamic access

A dynamic-access port can belong to one VLAN and is dynamically assigned by a VMPS. Cisco recommends using a Catalyst 5000 as a VMPS server where SSP acts as VMPS client.

When a port belongs to a VLAN, the SSP learns and manages the addresses associated with the port on a per-VLAN basis. For more information, see the "Managing the MAC Address Tables" section.

VLAN Membership Combinations

You can configure your SSP ports in various VLAN membership combinations as listed in Table 4-4.


Table 4-4: VLAN Combinations
Port Mode VTP Required? Configuration Procedure Comments

Static-access ports

No

"Assigning Static-Access Ports to a VLAN" section.

If you do not want to use VTP to globally propagate the VLAN configuration information, you can assign a static-access port to a VLAN and set the VTP mode to transparent to disable VTP.

Static-access and
multi-VLAN ports

No

"Overlapping VLANs and Multi-VLAN Ports" section.

"Assigning Static-Access Ports to a VLAN" section.

You must connect the multi-VLAN port to a router or server.

The SSP automatically transitions to VTP transparent mode (VTP is disabled). No VTP configuration is required.

Some restrictions apply to multi-VLAN ports.

Static-access and
trunk ports

Recommended

"Configuring VTP Server Mode" section.

Add, modify, or remove VLANs in the database as described in the "Configuring VLANs in the VTP Database" section.

"Assigning Static-Access Ports to a VLAN" section.

Make sure to configure at least one trunk port on the SSP and that this trunk port is connected to the trunk port of a connected switch.

Some restrictions apply to trunk ports. For more information, see the "Trunks Interacting with Other Features" section.

Optionally, you can change the VTP version on the SSP and enable VTP pruning.

Optionally, you can define the allowed-VLAN list, change the pruning-eligible list, and configure the native VLAN for untagged traffic on the trunk port.

Dynamic-access and
trunk ports

Required

"Entering the IP Address of the VMPS" section.

"Configuring Dynamic Ports on VMPS Clients" section.

You must connect the dynamic-access port to an end station and not to another switch.

Configure the VMPS and the client with the same VTP domain name.

Optionally, you can change the reconfirmation interval and the retry count on the VMPS client switch.

Optionally, you can define the allowed-VLAN list, change the pruning-eligible list, and configure the native VLAN for untagged traffic on the trunk port.

Assigning Static-Access Ports to a VLAN

By default, all ports are static-access ports assigned to VLAN 1, which is the default management VLAN.

You can assign a static-access port to a VLAN without having VTP globally propagate VLAN configuration information (VTP is disabled). Beginning in privileged EXEC mode, follow these steps to assign a static-access port to a VLAN:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vtp transparent

Configure the SSP for VTP transparent mode.

The default setting is VTP server.

This step disables VTP on the SSP.

Step 3 

exit

Return to privileged EXEC mode.

Step 4 

show vtp status

Verify the VTP configuration.

Step 5 

configure terminal

Enter global configuration mode.

Step 6 

interface interface

Enter interface configuration mode, and define the interface to be added to the VLAN.

Step 7 

switchport mode access

Define the VLAN membership mode for this port.

Step 8 

switchport access vlan 3

Assign the port to the VLAN.

Step 9 

exit

Return to privileged EXEC mode.

Step 10 

show interface interface-id switchport

Verify the VLAN configuration.

Overlapping VLANs and Multi-VLAN Ports

A multi-VLAN port connected to a router can link two or more VLANs. Intra-VLAN traffic stays within the boundaries of the respective VLANs as shown in Figure 4-2. Connectivity between VLANs is accomplished by using the router connected to the multi-VLAN port.

A multi-VLAN port performs normal switching functions in all its assigned VLANs. For example, when a multi-VLAN port receives an unknown MAC address, all the VLANs to which the port belongs learn the address. Multi-VLAN ports also respond to the STP messages generated by the different instances of STP in each VLAN.


Figure 4-2:
Two VLANs Sharing a Port Connected to a Router



Caution To avoid unpredictable STP behavior and a loss of connectivity, do not connect multi-VLAN ports to hubs or switches. Connect multi-VLAN ports to routers or servers.

Beginning in privileged EXEC mode, follow these steps to assign ports for multi-VLAN membership:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and enter the port to be added to the VLAN.

Step 3 

switchport mode multi

Enter the VLAN membership mode for multi-VLAN ports.

Step 4 

switchport multi vlan vlan-list

Assign the port to more than one VLAN.
Separate nonconsecutive VLAN IDs with a comma; use a hyphen to designate a range of IDs.

Configuring a SSP port for multi-VLAN mode causes VTP to transition to transparent mode, which disables VTP.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show interface interface-id switchport

Verify your entries.

Using the VLAN Trunk Protocol

VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and configuration inconsistencies that can cause several problems, such as duplicate VLAN names, incorrect VLAN-type specifications, and security violations.

Before you create VLANs, you must decide whether to use VTP in your network. Using VTP, you can make configuration changes centrally from the SSP and have those changes automatically communicated to all the other switches in the network. Without VTP, you cannot send information about VLANs to other switches.

The VTP Domain

A VTP domain (also called a VLAN management domain) consists of one switch such as the SSP or several interconnected switches under the same administrative responsibility. A switch can be in only one VTP domain. You make global VLAN configuration changes for the domain by using the CLI, SSP Manager, or Simple Network Management Protocol (SNMP).

By default, a SSP is in the no-management-domain state until it receives an advertisement for a domain over a trunk link (a link that carries the traffic of multiple VLANs) or you configure a domain name. The default VTP mode is server mode, but VLAN information is not propagated over the network until a domain name is specified or learned.

If the switch receives a VTP advertisement over a trunk link, it inherits the domain name and configuration revision number. The switch then ignores advertisements with a different domain name or an earlier configuration revision number.

When you make a change to the VLAN configuration on a VTP server, the change is propagated to all switches in the VTP domain. VTP advertisements are sent over all trunk connections, including Inter-Switch Link (ISL) and IEEE 802.1Q, IEEE 802.10.

If you configure a switch for VTP transparent mode, you can create and modify VLANs, but the changes are not transmitted to other switches in the domain, and they affect only the individual switch.

For VTP domain name and password configuration guidelines, see the "Domain Name" section.

VTP Modes and VTP Mode Transitions

You can configure the SSP to be in one of the VTP modes listed in Table 4-5:


Table 4-5: VTP Modes
VTP Mode Description

Server

In this mode, you can create, modify, and delete VLANs and specify other configuration parameters (such as VTP version) for the entire VTP domain. VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk links.

In VTP server mode, VLAN configurations are saved in nonvolatile memory. VTP server is the default mode.

Client

In this mode, a VTP client behaves like a VTP server, but you cannot create, change, or delete VLANs on a VTP client.

In VTP client mode, VLAN configurations are not saved in nonvolatile memory.

Transparent

In this mode, VTP transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, transparent switches do forward VTP advertisements that they receive from other switches. You can create, modify, and delete VLANs on a switch in VTP transparent mode.

In VTP transparent mode, VLAN configurations are saved in nonvolatile memory, but they are not advertised to other switches.

Two configurations can cause the SSP to automatically change its VTP mode:

The "VTP Configuration Guidelines" section provides tips and caveats for configuring VTP.

VTP Advertisements

Each switch including the SSP in the VTP domain sends periodic global configuration advertisements from each trunk port to a reserved multicast address. Neighboring switches receive these advertisements and update their VTP and VLAN configurations as necessary.


Note   Because trunk ports send and receive VTP advertisements, you must ensure that at least one trunk port is configured on the SSP and that this trunk port is connected to the trunk port of another switch. Otherwise, the SSP cannot receive any VTP advertisements.

VTP advertisements distribute the following global domain information in VTP advertisements:

VTP advertisements distribute the following VLAN information for each configured VLAN:

VTP Version 2

VTP version 2 supports the following features not supported in VTP version 1:

VTP Pruning

Without VTP pruning, the SSP floods broadcast, multicast, and unknown unicast traffic across all trunk links within a VTP domain even though receiving switches may discard them. This activity can consume valuable network bandwidth.

The SSP supports VTP pruning, an extension of VTP, which supports optimized flooding. Pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices.

VTP pruning blocks flooded traffic to VLANs on trunk ports that are included in the pruning-eligible list. Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning eligible on SSP trunk ports. If the VLANs are configured as pruning-ineligible, the flooding continues. In addition, VTP pruning is supported with VTP version 1 and version 2.

VTP Configuration Guidelines

The following sections describe the guidelines you should follow when configuring the VTP domain name and password, and the VTP version number.

Domain Name

When configuring VTP for the first time, you must always assign a domain name. In addition, all switches in the VTP domain must be configured with the same domain name. Switches including the SSP in VTP transparent mode do not exchange VTP messages with other switches, and you do not need to configure a VTP domain name for them.


Caution Do not configure a VTP domain if all switches including the SSP are operating in VTP client mode. If you configure the domain, it is impossible to make changes to the VLAN configuration of that domain. Therefore, make sure you configure at least one switch in the VTP domain for VTP server mode.

Passwords

You can configure a password for the VTP domain, but it is not required. All domain switches including the SSP must share the same password. Switches without a password or with the wrong password reject VTP advertisements.


Caution The domain does not function properly if you do not assign the same password to each switch in the domain.

If you configure a VTP password for a domain, an SSP that is booted without a VTP configuration does not accept VTP advertisements until you configure it with the correct password. After the configuration, the SSP accepts the next VTP advertisement that uses the same password and domain name in the advertisement.

If you are adding a new switch to an existing network that has VTP capability, the new switch learns the domain name only after the applicable password has been configured on the switch.

Upgrading from Previous Software Releases

When you upgrade from a software version that supports VLANs but does not support VTP, such as Cisco IOS Release 11.2(8)SA3, to a version that does support VTP, ports that belong to a VLAN retain their VLAN membership, and VTP enters transparent mode. The domain name becomes UPGRADE, and VTP does not propagate the VLAN configuration to other switches.

If you want the switch to propagate VLAN configuration information to other switches and to learn the VLANs enabled on the network, you must configure the switch with the correct domain name, the domain password, and change the mode to VTP server mode.

Guidelines

Follow these guidelines when deciding which VTP version to implement:

Default VTP Configuration

Table 4-6 shows the default VTP configuration.


Table 4-6: VTP Default Configuration
Feature Default Value

VTP domain name

Null

VTP mode

Server

VTP version 2 enable state

Version 2 is disabled

VTP password

None

VTP pruning

Disabled

Configuring VTP

After you configure VTP, you must configure a trunk port so that the SSP can send and receive VTP advertisements.

When you enter the exit command in VLAN database mode, it applies to all the commands that you entered. VTP messages are sent to other switches in the VTP domain, and you are returned to privileged EXEC mode.


Note   The Cisco IOS end and Ctrl-Z commands are not supported in VLAN database mode.

Configuring VTP Server Mode

When the SSP is in VTP server mode, you can change the VLAN configuration and have it propagated throughout the network.

Beginning in privileged EXEC mode, follow these steps to configure the SSP for VTP server mode:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vtp domain domain-name

Configure a VTP administrative-domain name.

The name can be from 1 to 32 characters.

All switches including the SSP operating in VTP server or client mode under the same administrative responsibility must be configured with the same domain name.

Step 3 

vtp password password-value

(Optional) Set a password for the VTP domain. The password can be from 8 to 64 characters.

If you configure a VTP password, the VTP domain will not function properly if you do not assign the same password to each switch in the domain.

Step 4 

vtp server

Configure the SSP for VTP server mode (the default).

Step 5 

exit

Return to privileged EXEC mode.

Step 6 

show vtp status

Verify the VTP configuration.

Configuring VTP Client Mode

When the SSP is in VTP client mode, you cannot change its VLAN configuration. The SSP receives VTP updates from a VTP server in the VTP domain and then modifies its configuration accordingly.


Caution Do not configure a VTP domain name if all switches including the SSP are operating in VTP client mode. If you do so, it is impossible to make changes to the VLAN configuration of that domain. Therefore, make sure you configure at least one switch as the VTP server.

Beginning in privileged EXEC mode, follow these steps to configure the SSP for VTP client mode:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vtp client

Configure the SSP for VTP client mode.

The default setting in VTP server.

Step 3 

vtp domain domain-name

Configure a VTP administrative-domain name.

The name can be from 1 to 32 characters.

All switches including the SSP operating in VTP server or client mode under the same administrative responsibility must be configured with the same domain name.

Do not configure a VTP domain name if all switches are operating in VTP client mode. If you configure the domain, it is impossible to make changes to the VLAN configuration of that domain. Therefore, make sure you configure at least one switch in the VTP domain for VTP server mode.

Step 4 

vtp password password-value

(Optional) Set a password for the VTP domain.

The password can be from 8 to 64 characters.

If you configure a VTP password, the VTP domain will not function properly if you do not assign the same password to each switch in the domain.

Step 5 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 6 

show vtp status

Verify the VTP configuration.

Disabling VTP (VTP Transparent Mode)

When you configure the SSP for VTP transparent mode, you disable VTP on the SSP. The SSP then does not send VTP updates and does not act on VTP updates received from other switches. However, the SSP in VTP transparent mode does forward received VTP advertisements on all of its trunk links.

Beginning in privileged EXEC mode, follow these steps to configure the SSP for VTP transparent mode:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vtp transparent

Configure the SSP for VTP transparent mode.

The default setting in VTP server.

This step disables VTP on the SSP.

Step 3 

exit

Return to privileged EXEC mode.

Step 4 

show vtp status

Verify the VTP configuration.

Enabling VTP Version 2

VTP version 2 is disabled by default on VTP version-2-capable switches including the SSP. When you enable VTP version 2 on a switch, every VTP version 2-capable switch in the VTP domain enables version 2.


Caution VTP version 1 and VTP version 2 are not interoperable on switches in the same VTP domain. Every switch in the VTP domain must use the same VTP version. Do not enable VTP version 2 unless every switch in the VTP domain supports version 2.


Note   In a Token Ring environment, you must enable VTP version 2 for Token Ring VLAN switching to function properly.

For more information on VTP version configuration guidelines, see the "Guidelines" section.

Beginning in privileged EXEC mode, follow these steps to enable VTP version 2:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vtp v2-mode

Enable VTP version 2 on the SSP.

VTP version 2 is disabled by default on VTP version 2-capable switches.

Step 3 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 4 

show vtp status

Verify that VTP version 2 is enabled.

Disabling VTP Version 2

Beginning in privileged EXEC mode, follow these steps to disable VTP version 2:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

no vtp v2-mode

Disable VTP version 2.

Step 3 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 4 

show vtp status

Verify that VTP version 2 is disabled.

Enabling VTP Pruning

Pruning increases available bandwidth by restricting flooded traffic to those trunk links that the traffic must use to access the appropriate network devices.

Beginning in privileged EXEC mode, follow these steps to enable VTP pruning:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vtp pruning

Enable pruning in the VTP administrative domain.

By default, pruning is disabled. You need to enable pruning on only one switch in the domain.

Step 3 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 4 

show vtp status

Verify that your entries.

Pruning is supported with VTP version 1 and version 2. If you enable pruning on the VTP server, it is enabled for the entire VTP domain.

Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning-eligible on SSP trunk ports. For information, see the "Changing the Pruning-Eligible List" section.

Monitoring VTP

You monitor VTP by displaying its configuration information: the domain name, the current VTP revision, and the number of VLANs. You can also display statistics about the advertisements sent and received by the SSP.

Beginning in privileged EXEC mode, follow these steps to monitor VTP activity:

Command Purpose

Step 1 

show vtp status

Display the VTP switch configuration information.

Step 2 

show vtp counters

Display counters about VTP messages being sent and received.

VLANs in the VTP Database

You can set the following parameters when you add a new VLAN to or modify an existing VLAN in the VTP database:

The "Default VLAN Configuration" section lists the default values and possible ranges for each VLAN media type.

Token Ring VLANs

Although the SSP does not support Token Ring connections, a remote device such as a Catalyst 5000 series switch with Token Ring connections could be managed from the SSP. The SSP advertises information about the following Token Ring VLANs when running VTP version 2:

For more information on configuring Token Ring VLANs, see the Catalyst 5000 Series Software Configuration Guide.

VLAN Configuration Guidelines

Follow these guidelines when creating and modifying VLANs in your network:

Default VLAN Configuration

Table 4-7 through Table 4-11 show the default configuration for the different VLAN media types.


Note   The SSP supports Ethernet interfaces exclusively. Because FDDI and Token Ring VLANs are not locally supported, you configure FDDI and Token Ring media-specific characteristics only for VTP global advertisements to other switches.


Table 4-7: Ethernet VLAN Defaults and Ranges
Parameter Default Range

VLAN ID

1

1-1005

VLAN name

VLANxxxx, where xxxx is the VLAN ID

No range

802.10 SAID

100000+VLAN ID

1-4294967294

MTU size

1500

1500-18190

Translational bridge 1

0

0-1005

Translational bridge 2

0

0-1005

VLAN state

active

active, suspend


Table 4-8: FDDI VLAN Defaults and Ranges
Parameter Default Range

VLAN ID

1002

1-1005

VLAN name

VLANxxxx, where xxxx is the VLAN ID

No range

802.10 SAID

100000+VLAN ID

1-4294967294

MTU size

1500

1500-18190

Ring number

None

1-4095

Parent VLAN

0

0-1005

Translational bridge 1

0

0-1005

Translational bridge 2

0

0-1005

VLAN state

active

active, suspend


Table 4-9: FDDI-Net VLAN Defaults and Ranges
Parameter Default Range

VLAN ID

1004

1-1005

VLAN name

VLANxxxx, where xxxx is the VLAN ID

No range

802.10 SAID

100000+VLAN ID

1-4294967294

MTU size

1500

1500-18190

Bridge number

0

0-15

STP type

ieee

auto, ibm, ieee

Translational bridge 1

0

0-1005

Translational bridge 2

0

0-1005

VLAN state

active

active, suspend


Table 4-10: Token Ring (TrBRF) VLAN Defaults and Ranges
Parameter Default Range

VLAN ID

1005

1-1005

VLAN name

VLANxxxx, where xxxx is the VLAN ID

No range

802.10 SAID

100000+VLAN ID

1-4294967294

MTU size

VTPv1 1500; VTPv2 4472

1500-18190

Bridge number

VTPv1 0; VTPv2 user-specified

0-15

STP type

ibm

auto, ibm, ieee

Translational bridge 1

0

0-1005

Translational bridge 2

0

0-1005

VLAN state

active

active, suspend


Table 4-11: Token Ring (TrCRF) VLAN Defaults and Ranges
Parameter Default Range

VLAN ID

1003

1-1005

VLAN name

VLANxxxx, where xxxx is the VLAN ID

No range

802.10 SAID

100000+VLAN ID

1-4294967294

Ring Number

VTPv1 default 0; VTPv2 user-specified

1-4095

Parent VLAN

VTPv1 default 0; VTPv2 user-specified

0-1005

MTU size

VTPv1 default 1500; VTPv2 default 4472

1500-18190

Translational bridge 1

0

0-1005

Translational bridge 2

0

0-1005

VLAN state

active

active, suspend

Bridge mode

srb

srb, srt

ARE max hops

7

0-13

STE max hops

7

0-13

Backup CRF

disabled

disable; enable

Configuring VLANs in the VTP Database

You can add new VLANs, modify existing VLANs, and remove VLAN configurations from the VTP database by using the CLI vlan database command. VTP globally propagates these VLAN configurations throughout the VTP domain.

In VTP server or transparent mode, commands to add, change, and delete VLANs are written to the file vlan.dat, and you can display them by entering the privileged EXEC mode show vlan command. The vlan.dat file is stored in nonvolatile memory. The vlan.dat file is upgraded automatically.


Caution You can cause inconsistency in the VLAN database if you attempt to manually delete the vlan.dat file. If you want to modify the VLAN configuration or VTP, use the VLAN database commands described in the Cisco ICS 7750 Command Reference (online only).

You use the interface configuration command mode to define the port membership mode and add and remove ports from the VLAN. The execution of these commands changes the running-configuration file, and you can display the file by entering the privileged EXEC mode show running-config command.


Note   VLANs can be configured to support a number of parameters that are not discussed in detail in this section. For complete information on the commands and parameters that control VLAN configuration, refer to the Cisco ICS 7750 Command Reference (online only).

Adding an Ethernet VLAN

Each VLAN has a unique, 4-digit ID that can be a number from 1 to 1001. To add a VLAN to the VLAN database, assign a number and name to the VLAN. For the list of default parameters that are assigned when you add a VLAN, see the "Default VLAN Configuration" section.

If you do not specify the VLAN type, the VLAN is an Ethernet VLAN.

Beginning in privileged EXEC mode, follow these steps to add an Ethernet VLAN:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vlan vlan-id name vlan-name

Add an Ethernet VLAN by assigning a number to it. If no name is entered for the VLAN, the default is to append the vlan-id to the word VLAN. For example, VLAN0004 could be a default VLAN name.

Step 3 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 4 

show vlan name vlan-name

Verify the VLAN configuration.

Modifying an Ethernet VLAN

Beginning in privileged EXEC mode, follow these steps to modify an Ethernet VLAN:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

vlan vlan-id mtu mtu-size

Identify the VLAN, and change the MTU size.

Step 3 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 4 

show vlan vlan-id

Verify the VLAN configuration.

Deleting a VLAN from the Database

When you delete a VLAN from a switch including the SSP that is in VTP server mode, the VLAN is removed from all switches in the VTP domain. When you delete a VLAN from a switch including the SSP that is in VTP transparent mode, the VLAN is deleted only on that specific switch.

You cannot delete the default VLANs for the different media types: Ethernet VLAN 1 and FDDI or Token Ring VLANs 1002 to 1005.


Caution When you delete a VLAN, any ports assigned to that VLAN become inactive. They remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN.

Beginning in privileged EXEC mode, follow these steps to delete a VLAN on the SSP:

Command Purpose

Step 1 

vlan database

Enter VLAN configuration mode.

Step 2 

no vlan vlan-id

Remove the VLAN by using the VLAN ID.

Step 3 

exit

Update the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.

Step 4 

show vlan brief

Verify the VLAN removal.

Assigning Static-Access Ports to a VLAN

By default, all ports are static-access ports assigned to VLAN 1, which is the default management VLAN.

Beginning in privileged EXEC mode, follow these steps to assign a port to a VLAN in the VTP database:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode, and define the interface to be added to the VLAN.

Step 3 

switchport mode access

Define the VLAN membership mode for this port.

Step 4 

switchport access vlan 3

Assign the port to the VLAN.

Step 5 

exit

Return to privileged EXEC mode.

Step 6 

show interface interface-id switchport

Verify the VLAN configuration.

How VLAN Trunks Work

A trunk is a point-to-point link that transmits and receives traffic between switches including the SSP or between switches and routers. Trunks carry the traffic of multiple VLANs and can extend VLANs across an entire network. 100BaseT trunks use Cisco ISL (the default protocol) or industry-standard IEEE 802.1Q to carry traffic for multiple VLANs over a single link.

IEEE 802.1Q Configuration Considerations

IEEE 802.1Q trunks impose some limitations on the trunking strategy for a network. The following restrictions apply when using 802.1Q trunks:

Trunks Interacting with Other Features

ISL and IEEE 802.1Q interact with other SSP features as described in Table 4-12.


Table 4-12: Trunks Interacting with Other Features
SSP Feature Trunk Port Interaction

Port monitoring

A trunk port cannot be a monitor port. A static-access port can monitor the traffic of its VLAN on a trunk port.

Network port

When configured as a network port, a trunk port serves as the network port for all VLANs associated with the port. A network port receives all unknown unicast traffic on a VLAN.

Secure ports

A trunk port cannot be a secure port.

Blocking unicast and multicast packets on a trunk

The port block command can be used to block the forwarding of unknown unicast and multicast packets to VLANs on a trunk. However, if the trunk port is acting as a network port, unknown unicast packets cannot be blocked.

Port grouping

ISL and 802.1Q trunks can be grouped into EtherChannel port groups, but all trunks in the group must have the same configuration.

When a group is first created, all ports follow the parameters set for the first port to be added to the group. If you change the configuration of one of the following parameters, the SSP propagates the setting you entered to all ports in the group:

Configuring a Trunk Port

You cannot have multi-VLAN and trunk ports configured on the same switch. For information on trunk port interactions with other features, see the "Trunks Interacting with Other Features" section.


Note   Because trunk ports send and receive VTP advertisements, you must ensure that at least one trunk port is configured on the SSP and that this trunk port is connected to the trunk port of another switch. Otherwise, the SSP cannot receive any VTP advertisements.

Beginning in privileged EXEC mode, follow these steps to configure a port as an ISL or 802.1Q trunk port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface_id

Enter the interface configuration mode and the port to be configured for trunking.

Step 3 

switchport mode trunk

Configure the port as a VLAN trunk.

Step 4 

switchport trunk encapsulation {isl | dot1q}

Configure the port to support ISL or 802.1Q encapsulation.

You must configure each end of the link with the same encapsulation type.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show interface interface-id switchport

Verify your entries.

Step 7 

copy running-config startup-config

Save the configuration.


Note   This software release does not support trunk negotiation through the Dynamic Trunk Protocol (DTP), formerly known as Dynamic ISL (DISL). If you are connecting a trunk port to a Catalyst 5000 switch or other DTP device, use the non-negotiate option on the DTP-capable device to configure the SSP port to not generate DTP frames.

Disabling a Trunk Port

You can disable trunking on a port by returning it to its default static-access mode.

Beginning in privileged EXEC mode, follow these steps to disable trunking on a port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface_id

Enter the interface configuration mode and the port to be added to the VLAN.

Step 3 

no switchport mode

Return the port to its default static-access mode.

Step 4 

end

Return to privileged EXEC.

Step 5 

show interface interface-id switchport

Verify your entries.

Defining the Allowed VLANs on a Trunk

By default, a trunk port sends to and receives traffic from all VLANs in the VLAN database. All VLANs, 1 to 1005, are allowed on each trunk. However, you can remove VLANs from the allowed list, preventing traffic from those VLANs from passing over the trunk. To restrict the traffic a trunk carries, use the remove vlan-list parameter to remove specific VLANs from the allowed list.

A trunk port can become a member of a VLAN only if the VLAN is enabled and VTP knows of the VLAN. When VTP detects a newly enabled VLAN and the VLAN is in the allowed list for a trunk port, the trunk port automatically becomes a member of the enabled VLAN and forwards traffic to or receives traffic from it. When VTP detects a new enabled VLAN and the VLAN is not in the allowed list for a trunk port, the trunk port does not become a member of the VLAN and does not forward traffic to it.

Beginning in privileged EXEC mode, follow these steps to modify the allowed list of an ISL or 802.1Q trunk:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface_id

Enter interface configuration mode and the port to be added to the VLAN.

Step 3 

switchport mode trunk

Configure the VLAN membership mode for trunks.

Step 4 

switchport trunk allowed vlan remove vlan-list

Define the VLANs that are not allowed to transmit and receive on the port.

The vlan-list parameter is a range of VLAN IDs separated by a hyphen or specific VLAN IDs separated by commas.

VLANs 1 and 1002 to 1005 are reserved and cannot be removed.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show interface interface-id switchport allowed-vlan

Verify your entries.

Step 7 

copy running-config startup-config

Save the configuration.

Changing the Pruning-Eligible List

The pruning-eligible list applies only to trunk ports. Each trunk port has its own eligibility list.

Beginning in privileged EXEC mode, follow these steps to remove VLANs from the pruning-eligible list on a trunk port:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface-id

Enter interface configuration mode, and select the trunk port for which VLANs should be pruned.

Step 3 

switchport trunk pruning vlan remove vlan-id

Enter the VLANs to be removed from the pruning-eligible list.

Separate nonconsecutive VLAN IDs with a comma and no spaces; use a hyphen to designate a range of IDs. Valid IDs are from 2 to 1001.

VLANs that are pruning-ineligible receive flooded traffic.

Step 4 

exit

Return to privileged EXEC mode.

Step 5 

show interface interface-id switchport

Verify your settings.

Make sure you have enabled VTP pruning. For more information, see the "Enabling VTP Pruning" section.

Configuring the Native VLAN for Untagged Traffic

A trunk port configured with 802.1Q tagging can receive both tagged and untagged traffic. By default, the SSP forwards untagged traffic with the native VLAN configured for the port. The native VLAN is VLAN 1 by default.

For information about 802.1Q configuration issues, see the "IEEE 802.1Q Configuration Considerations" section.

Beginning in privileged EXEC mode, follow these steps to configure the native VLAN on an 802.1Q trunk:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface-id

Enter interface configuration mode, and define the interface that is configured as the 802.1Q trunk.

Step 3 

switchport trunk native vlan vlan-id

Configure the VLAN that is sending and receiving untagged traffic on the trunk port.

Valid IDs are from 1 to 1001.

Step 4 

show interface interface-id switchport

Verify your settings.

If a packet has a VLAN ID equal to the outgoing port's native VLAN ID, the packet is transmitted untagged; otherwise, the SSP transmits the packet with a tag.

Configuring 802.1p Class of Service

The SSP provides QoS-based IEEE 802.1p class of service (CoS) values. QoS uses classification and scheduling to transmit network traffic from the SSP in a predictable manner. QoS classifies frames by assigning priority-indexed CoS values to them and gives preference to higher-priority traffic such as telephone calls.

How Class of Service Works

Before you set up 802.1p CoS on the SSP that would operate with the Catalyst 6000 family of switches, refer to the Catalyst 6000 documentation. There are differences in the 802.1p implementation, and they should be understood to ensure compatibility.

Port Priority

Frames received from users in the administratively defined VLANs are classified or tagged for transmission to other devices. Based on rules you define, a unique identifier (the tag) is inserted in each frame header before it is forwarded. The tag is examined and understood by each device before any broadcasts or transmissions to other switches, routers, or end stations. When the frame reaches the last switch or router, the tag is removed before the frame is transmitted to the target end station. VLANs that are assigned on trunk or access ports without identification or a tag are called native or untagged frames.

For ISL or IEEE 802.1Q frames with tag information, the priority value from the header frame is used. For native frames, the default priority of the input port is used.

Port Scheduling

Each port on the SSP has a single receive queue buffer (the ingress port) for incoming traffic. When an untagged frame arrives, it is assigned the value of the port as its port default priority. You assign this value by using the CLI or SSP Manager. A tagged frame continues to use its assigned CoS value when it passes through the ingress port.

CoS configures each transmit port (the egress port) with a normal-priority transmit queue and a high-priority transmit queue, depending on the frame tag or the port information. Frames in the normal-priority queue are forwarded only after frames in the high-priority queue are forwarded.

For the SSP, frames with a priority value of 0 through 3 are sent to a normal-priority queue and frames with a priority value of 4 through 7 are sent to a high-priority queue.

Configuring the CoS Port Priorities

Beginning in privileged EXEC mode, follow these steps to set the port priority for untagged (native) Ethernet frames:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter the interface to be configured.

Step 3 

switchport priority default default-priority-id

Set the port priority on the interface.

If you assign a priority level from 0 to 3, frames are forwarded to the normal priority queue of the output port.

If you assign a priority level from 4 to 7, frames are forwarded to the high-priority queue of the output port.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show interface interface-id switchport

Verify your entries.

Load Sharing Using STP

Load sharing divides the bandwidth supplied by parallel trunks connecting switches including the SSP. To avoid loops, STP normally blocks all but one parallel link between switches. With load sharing, you divide the traffic between the links according to which VLAN the traffic belongs.

The following sections describe load sharing on trunk ports by using STP port priorities or STP path costs.

Load Sharing Using STP Port Priorities

When two ports on the same switch form a loop to share a VLAN, the port priority setting determines which port is enabled and which port is in standby mode. You can set the priorities on a parallel trunk port so that the port carries all the traffic for a given VLAN. The trunk port with the higher priority (lower values) for a VLAN is forwarding traffic for that VLAN. The trunk port with the lower priority (higher values) for the same VLAN remains in a blocking state for that VLAN. One trunk port transmits or receives all traffic for the VLAN.

Figure 4-3 shows two trunks connecting the SSP and a Catalyst switch. In this example, the SSP and the switch are configured as follows:

In this way, trunk 1 carries traffic for VLANs 8 through 10, and trunk 2 carries traffic for VLANs 3 through 6. If the active trunk fails, the trunk with the lower priority takes over and carries the traffic for all of the VLANs. No duplication of traffic occurs over any trunk port.


Figure 4-3:
Load Sharing by Using STP Port Priorities


Configuring STP Port Priorities and Load Sharing

Beginning in privileged EXEC mode, follow these steps to configure the network shown in Figure 4-3:

Command Purpose

Step 1 

vlan database

On Switch 1, enter VLAN configuration mode.

Step 2 

vtp domain domain-name

Configure a VTP administrative domain.

The domain name can be from 1 to 32 characters.

Step 3 

vtp server

Configure Switch 1 as the VTP server.

Step 4 

exit

Return to privileged EXEC mode.

Step 5 

show vtp status

Verify the VTP configuration on both Switch 1 and Switch 2.

Step 6 

show vlan

Verify that the VLANs exist in the database on Switch 1.

Step 7 

configure terminal

Enter global configuration mode.

Step 8 

interface fa0/1

Enter interface configuration mode, and define Fa0/1 as the interface to be configured as a trunk.

Step 9 

switchport mode trunk

Configure the port as a trunk port.

The trunk defaults to ISL trunking.

Step 10 

end

Return to privileged EXEC mode.

Step 11 

show interface fa0/1 switchport

Verify the VLAN configuration.

Step 12 

Repeat Steps 7 through 11 on Switch 1 for interface Fa0/2.

Step 13 

Repeat Steps 7 through 11 on Switch 2 to configure the trunk ports on interface Fa0/1 and Fa0/2.

Step 14 

show vlan

When the trunk links come up, VTP passes the VTP and VLAN information to Switch 2. Verify the Switch 2 has learned the VLAN configuration.

Step 15 

configure terminal

Enter global configuration mode on Switch 1.

Step 16 

interface fa0/1

Enter interface configuration mode, and define the interface to set the STP port priority.

Step 17 

spanning-tree vlan 8 9 10 port-priority 10

Assign the port priority of 10 for VLANs 8, 9, and 10.

Step 18 

end

Return to global configuration mode.

Step 19 

interface fa0/2

Enter interface configuration mode, and define the interface to set the STP port priority.

Step 20 

spanning-tree vlan 3 4 5 6 port priority 10

Assign the port priority of 10 for VLANs 3, 4, 5, and 6.

Step 21 

exit

Return to privileged EXEC mode.

Step 22 

show spanning-tree

Verify your entries.

Load Sharing Using STP Path Cost

You can configure parallel trunks to share VLAN traffic by setting different path costs on a trunk and associating the path costs with different sets of VLANs. The VLANs keep the traffic separate, STP does not disable a port because no loops exist, and redundancy is maintained in the event of a lost link.

In Figure 4-4, trunk ports 1 and 2 are 100BaseT ports. The path costs for the VLANs are assigned as follows:


Figure 4-4: Load Sharing Trunks with Traffic Distributed by Path Cost
Configuring STP Path Costs and Load Sharing

Beginning in privileged EXEC mode, follow these steps to configure STP path costs and load sharing:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode on Switch 1.

Step 2 

interface fa0/1

Enter interface configuration mode, and define Fa0/1 as the interface to be configured as a trunk.

Step 3 

switchport mode trunk

Configure the port as a trunk port.

The trunk defaults to ISL trunking.

Step 4 

end

Return to global configuration mode.

Step 5 

Repeat Steps 2 through 4 on Switch 1 interface Fa0/2.

Step 6 

show running-config

Verify your entries.

In the display, make sure that interface Fa0/1 and Fa0/2 are configured as trunk ports.

Step 7 

show vlan

When the trunk links come up, Switch 1 receives the VTP information from the other switches. Verify that Switch 1 has learned the VLAN configuration.

Step 8 

configure terminal

Enter global configuration mode.

Step 9 

interface fa0/1

Enter interface configuration mode, and define Fa0/1 as the interface to set the STP cost.

Step 10 

spanning-tree vlan 2 3 4 cost 30

Set the spanning-tree path cost to 30 for VLANs 2, 3, and 4.

Step 11 

end

Return to global configuration mode.

Step 12 

Repeat Steps 9 through 11 on Switch 1 interface Fa0/2, and set the spanning-tree path cost to 30 for VLANs 8, 9, and 10.

Step 13 

exit

Return to privileged EXEC mode.

Step 14 

show spanning-tree

Verify your entries.

In the display, verify that the path costs are set correctly for interface Fa0/1 and Fa0/2.

How the VMPS Works

The SSP acts as a client switch to the VMPS and communicates with it through the VLAN Query Protocol (VQP ). When the VMPS receives a VQP request from a client switch, it searches its database for a MAC address-to-VLAN mapping. The server response is based on this mapping and whether or not the server is in secure mode. Secure mode determines whether the server shuts down the port when a VLAN is not allowed on it or just denies the port access to the VLAN.

In response to a request, the VMPS takes one of the following actions:

If the SSP receives an access-denied response from the VMPS, it continues to block traffic from the MAC address to or from the port. The SSP continues to monitor the packets directed to the port and sends a query to the VMPS when it identifies a new address. If the SSP receives a port-shutdown response from the VMPS, it disables the port. The port must be manually reenabled by using the CLI, SSP Manager, or SNMP.

You can also use an explicit entry in the configuration table to deny access to specific MAC addresses for security reasons. If you enter the --NONE-- keyword for the VLAN name, the VMPS sends an access-denied or port-shutdown response.

Dynamic Port VLAN Membership

A dynamic (nontrunking) port on the SSP can belong to only one VLAN. When the link comes up, the SSP does not forward traffic to or from this port until the VMPS provides the VLAN assignment. The VMPS receives the source MAC address from the first packet of a new host connected to the dynamic port and attempts to match the MAC address to a VLAN in the VMPS database.

If there is a match, the VMPS sends the VLAN number for that port. If the client switch was not previously configured, it uses the domain name from the first VTP packet it receives on its trunk port from the VMPS. If the client switch was previously configured, it includes its domain name in the query packet to the VMPS to obtain its VLAN number. The VMPS verifies that the domain name in the packet matches its own domain name before accepting the request and responds to the client with the client's assigned VLAN number.

If there is no match, the VMPS either denies the request or shuts down the port (depending on the VMPS secure mode setting). For more information on possible VMPS responses, see the "How the VMPS Works" section.

Multiple hosts (MAC addresses) can be active on a dynamic port if they are all in the same VLAN; however, the VMPS shuts down a dynamic port if more than 20 hosts are active on the port.

If the link goes down on a dynamic port, the port returns to an isolated state and does not belong to a VLAN. Any hosts that come online through the port are checked again with the VMPS before the port is assigned to a VLAN.

VMPS Database Configuration File

The VMPS contains a database configuration file that you create. This ASCII text file is stored on a TFTP server accessible to the switch that functions as a VMPS server. The file contains VMPS information, such as the domain name, the backup VLAN name, and the MAC address-to-VLAN mapping. The SSP cannot act as the VMPS. Use a Catalyst 5000 series switch as the VMPS.

The VMPS database configuration file on the server must use the SSP convention for naming ports. For example, Fa0/1 is fixed-port number 1.

You can configure a backup VLAN name. If you connect a device with a MAC address that is not in the database, the VMPS sends the backup VLAN name to the client. If you do not configure a backup VLAN and the MAC address does not exist in the database, the VMPS sends an access-denied response. If the VMPS is in secure mode, it sends a port-shutdown response.

The following example shows a sample VMPS database configuration file as it appears on a Catalyst 5000 series switch.

!vmps domain <domain-name>
! The VMPS domain must be defined.
!vmps mode { open | secure }
! The default mode is open.
!vmps fallback <vlan-name>
!vmps no-domain-req { allow | deny }
!
! The default value is allow.
vmps domain WBU
vmps mode open
vmps fallback default
vmps no-domain-req deny
!
!
!MAC Addresses
!
vmps-mac-addrs
!
! address <addr> vlan-name <vlan_name>
!
address 0012.2233.4455 vlan-name hardware
address 0000.6509.a080 vlan-name hardware
address aabb.ccdd.eeff vlan-name Green
address 1223.5678.9abc vlan-name ExecStaff
address fedc.ba98.7654 vlan-name --NONE--
address fedc.ba23.1245 vlan-name Purple
!
!Port Groups
!
!vmps-port-group <group-name>
! device <device-id> { port <port-name> | all-ports }
!
vmps-port-group WiringCloset1
 device 198.92.30.32 port Fa1/3
 device 172.20.26.141 port Fa1/4
vmps-port-group "Executive Row"
 device 198.4.254.222 port es5%Fa0/1
 device 198.4.254.222 port es5%Fa0/2
 device 198.4.254.223 all-ports
!
!VLAN groups
!
!vmps-vlan-group <group-name>
! vlan-name <vlan-name>
!
vmps-vlan-group Engineering
vlan-name hardware
vlan-name software
!
!VLAN port Policies
!
!vmps-port-policies {vlan-name <vlan_name> | vlan-group <group-name> }
! { port-group <group-name> | device <device-id> port <port-name> }
!
vmps-port-policies vlan-group Engineering
 port-group WiringCloset1
vmps-port-policies vlan-name Green
 device 198.92.30.32 port Fa0/9
vmps-port-policies vlan-name Purple
 device 198.4.254.22 port Fa0/10
 port-group "Executive Row"

VMPS Configuration Guidelines

The following guidelines and restrictions apply to dynamic port VLAN membership:

  You must turn off trunking on the port before the dynamic access setting takes effect.

Default VMPS Configuration

Table 4-13 shows the default VMPS and dynamic port configuration on client switches including the SSP.


Table 4-13: Default VMPS Client and Dynamic Port Configuration
Feature Default Configuration

VMPS domain server

None

VMPS reconfirm interval

60 minutes

VMPS server retry count

3

Dynamic ports

None configured

Configuring Dynamic VLAN Membership

You configure dynamic VLANs by using the VMPS server information. You also need to assign the port connected to the end station for dynamic VLAN membership and the port connected to the VMPS server for trunking.

Entering the IP Address of the VMPS

You must enter the IP address of the other device acting as the VMPS (such as a Catalyst switch) to configure the SSP as a client.

Beginning in privileged EXEC mode, follow these steps to enter the IP address of the VMPS:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

vmps server ipaddress primary

Enter the IP address of the switch acting as the primary VMPS server.

Step 3 

vmps server ipaddress

Enter the IP address for the switch acting as a secondary VMPS server.

You can enter up to three secondary server addresses.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show vmps

Verify the VMPS server entry.

Configuring Dynamic Ports on VMPS Clients

If you are configuring a port on the SSP as a dynamic port, first login to the SSP by using the privileged EXEC rcommand command. For more information on how to use this command, refer to the Cisco ICS 7750 Command Reference.


Caution Dynamic port VLAN membership is for end stations. Connecting dynamic ports to other switches can cause a loss of connectivity.

Beginning in privileged EXEC mode, follow these steps to configure dynamic ports on the SSP:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode and the SSP port that is connected to the end station.

Step 3 

switchport mode access

Set the port to access mode.

Step 4 

switchport access vlan dynamic

Configure the port as eligible for dynamic VLAN membership.

The dynamic-access port must be connected to an end station.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show interface interface switchport

Verify the entry.

Configure the SSP port that is connected to the VMPS server for trunking. For more information, see the "Configuring a Trunk Port" section.

Reconfirming VLAN Memberships

Beginning in privileged EXEC mode, follow these steps to confirm the dynamic port VLAN membership assignments that the SSP has received from the VMPS:

Command Purpose

Step 1 

vmps reconfirm

Reconfirm dynamic port VLAN membership.

Step 2 

show vmps

Verify the dynamic VLAN reconfirmation status.

Changing the Reconfirmation Interval

VMPS clients periodically reconfirm the VLAN membership information received from the VMPS. You can set the interval after which the reconfirmation occurs.

Beginning in privileged EXEC mode, follow these steps to change the reconfirmation interval:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

vmps reconfirm minutes

Enter the number of minutes between reconfirmations of the dynamic VLAN membership.

Enter a number from 1 to 120. The default is 60 minutes.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show vmps

Verify the dynamic VLAN reconfirmation status.

Changing the Retry Count

Beginning in privileged EXEC mode, follow these step to change the number of times that the SSP attempts to contact the VMPS before querying the next server:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

vmps retry count

Change the retry count.

The retry range is from 1 to 10; the default is 3.

Step 3 

exit

Return to privileged EXEC mode.

Step 4 

show vmps

Verify your entry.

Administering and Monitoring the VMPS

You can display information about the VMPS by using the privileged EXEC show vmps command. The SSP displays the following information about the VMPS:

VMPS VQP Version

The version of VQP used to communicate with the VMPS. The SSP queries the VMPS using version 1 of VQP.

Reconfirm Interval

The number of minutes the SSP waits before reconfirming the VLAN-to-MAC-address assignments.

Server Retry Count

The number of times VQP resends a query to the VMPS. If no response is received after this many tries, the SSP starts to query the secondary VMPS.

VMPS domain server

The IP address of the configured VLAN membership policy servers. The SSP currently sends queries to the one marked current. The one marked primary is the primary server.

VMPS Action

The result of the most-recent reconfirmation attempt. This can happen automatically when the reconfirmation interval expired, or you can force it by entering the privileged EXEC vmps reconfirm command or its SSP Manager or SNMP equivalent.

Troubleshooting Dynamic Port VLAN Membership

The VMPS shuts down a dynamic port under these conditions:

To reenable a shut-down dynamic port, enter the interface configuration mode
no shutdown command.

Configuring Security Settings

This section contains the following subsection:

Managing the MAC Address Tables

The SSP uses the MAC address tables to forward traffic between ports. All MAC addresses in the address tables are associated with one or more ports. These MAC tables include the following types of addresses:

The address tables list the destination MAC address and the associated VLAN ID, and port number associated with the address. Figure 4-5 shows an example list of addresses as they would appear in the dynamic, secure, or static address table.


Figure 4-5: Contents of the Address Table


MAC Addresses and VLANs

All addresses are associated with a VLAN. An address can exist in more than one VLAN and have different destinations in each. Multicast addresses, for example, could be forwarded to port 1 in VLAN 1 and ports 2, 5, and 8 in VLAN 5.

Each VLAN maintains its own logical address table. A known address in one VLAN is unknown in another until it is learned or statically associated with a port in the other VLAN. An address can be secure in one VLAN and dynamic in another. Addresses that are static in one VLAN must be static addresses in all other VLANs.

Changing the Address Aging Time

Dynamic addresses are source MAC addresses that the SSP learns and then drops when they are not in use. Use the Aging Time field to define how long the SSP retains unused addresses in the table. This parameter applies to all VLANs.

Beginning in privileged EXEC mode, follow these steps to configure the dynamic address table aging time:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

mac-address-table aging-time seconds

Enter the number of seconds that dynamic addresses are to be retained in the address table. You can enter a number from 10 to 1000000.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show mac-address-table aging-time

Verify your entry.

Setting too short an aging time can cause addresses to be prematurely removed from the table. Then when the SSP receives a packet for an unknown destination, it floods the packet to all ports in the same VLAN as the receiving port. This unnecessary flooding can impact performance. Setting too long an aging time can cause the address table to be filled with unused addresses; it can cause delays when a workstation is moved to a new port.

Removing Dynamic Address Entries

Beginning in privileged EXEC mode, follow these steps to remove a dynamic address entry:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

no mac-address-table dynamic hw-addr

Enter the MAC address to be removed from dynamic MAC address table.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show mac-address-table

Verify your entry.

You can remove all dynamic entries by using the clear mac-address-table dynamic command in privileged EXEC mode.

Adding Secure Addresses

The secure address table contains secure MAC addresses and their associated ports and VLANs. A secure address is a manually entered unicast address that is forwarded to only one port per VLAN. If you enter an address that is already assigned to another port, the SSP reassigns the secure address to the new port.

You can enter a secure port address even when the port does not yet belong to a VLAN. When the port is later assigned to the VLAN, packets destined for that address are forwarded to the port.

Adding Secure Addresses

Beginning in privileged EXEC mode, follow these steps to add a secure address: 

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

mac-address-table secure hw-addr interface
vlan vlan-id

Enter the MAC address, its associated port, and the VLAN ID.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show mac-address-table secure

Verify your entry.

Removing Secure Addresses

Beginning in privileged EXEC mode, follow these steps to remove a secure address: 

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

no mac-address-table secure hw-addr vlan vlan-id

Enter the secure MAC address, its associated port, and the VLAN ID to be removed.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show mac-address-table secure

Verify your entry.

You can remove all secure addresses by using the clear mac-address-table secure command in privileged EXEC mode.

Adding and Removing Static Addresses

A static address has the following characteristics:

You can determine how a port that receives a packet forwards it to another port for transmission. Because all ports are associated with at least one VLAN, the SSP acquires the VLAN ID for the address from the ports that you select on the forwarding map.

A static address in one VLAN must be a static address in other VLANs. A packet with a static address that arrives on a VLAN where it has not been statically entered is flooded to all ports and not learned.

Configuring Static Addresses for EtherChannel Port Groups

Follow these rules if you are configuring a static address to forward to ports in an EtherChannel port group:

Adding Static Addresses

Static addresses are entered in the address table with an in-port-list, an out-port-list, and a VLAN ID, if needed. Packets received from the in-port are forwarded to ports listed in the out-port-list.


Note   If the in-port and out-port-list parameters are all access ports in a single VLAN, you can omit the VLAN ID. In this case, the SSP recognizes the VLAN as that associated with the in-port VLAN. Otherwise, you must supply the VLAN ID.

Beginning in privileged EXEC mode, follow these steps to add a static address:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

mac-address-table static hw-addr in-port out-port-list vlan vlan-id

Enter the MAC address, the input port, the ports to which it can be forwarded, and the VLAN ID of those ports.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show mac-address-table static

Verify your entry.

Removing Static Addresses

Beginning in privileged EXEC mode, follow these steps to remove a static address:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

no mac-address-table static hw-addr in-port in-port out-port-list out-port-list vlan vlan-id

Enter the static MAC address, the input port, the ports to which it can be forwarded, and the VLAN ID to be removed.

Step 3 

end

Return to privileged EXEC mode.

Step 4 

show mac-address-table static

Verify your entry.

You can remove all secure addresses by using the clear mac-address-table static command in privileged EXEC mode.

Port Security

You can enable port security on a port and define the actions that take place when a security violation occurs. As part of securing the port, you can also define the size of the address table for the port.

Secured ports restrict a port to a user-defined group of stations. When you assign secure addresses to a secure port, the SSP does not forward any packets with source addresses outside the group of addresses you have defined. If you define the address table of a secure port to contain only one address, the workstation or server attached to that port is guaranteed the full bandwidth of the port.

Secured ports generate address-security violations under the following conditions:

Limiting the number of devices that can connect to a secure port has the following advantages:

The following parameters validate port security or indicate security violations:

Parameters
Description

Interface

Port to secure.

Security

Enable port security on the port.

Trap

Issue a trap when an address-security violation occurs.

Shutdown Port

Disable the port when an address-security violation occurs.

Secure Addresses

Number of addresses in the address table for this port. Secure ports have at least one in this field.

Max Addresses

Number of addresses that the address table for the port can contain.

Security Rejects

The number of unauthorized addresses seen on the port.

A secure port can have from 1 to 132 associated secure addresses. Setting one address in the MAC address table for the port ensures the attached device has the full bandwidth of the port.

Enabling Port Security

Beginning in privileged EXEC mode, follow these steps to enable port security:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode for the port you want to secure.

Step 3 

port security max-mac-count 1

Secure the port and set the address table to one address.

Step 4 

port security action shutdown

Set the port to shutdown when a security violation occurs.

Step 5 

end

Return to privileged EXEC mode.

Step 6 

show port security

Verify the entry.


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

Disabling Port Security

Beginning in privileged EXEC mode, follow these steps to disable port security:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

interface interface

Enter interface configuration mode for the port you want to unsecure.

Step 3 

no port security

Disable port security.

Step 4 

end

Return to privileged EXEC mode.

Step 5 

show port security

Verify the entry.


Caution It is strongly recommended that you do not configure the internal SSP ports (Fast Ethernet 0/3 to 0/8) through the CLI. The SSP internal ports are configured by the ICS cards attached to them. Any configuration changes done on the internal ports are not saved and are deleted when the Cisco ICS 7750 reboots.

TACACS+

The Terminal Access Controller Access Control System Plus (TACACS+) provides the means to manage network security (authentication, authorization, and accounting [AAA]) from a server. This section describes how TACACS+ works and how you can configure it. For complete syntax and usage information for the commands described in this chapter, refer to the Cisco IOS Release 12.0 Security Command Reference and the Cisco ICS 7750 Command Reference.


Note   You can configure this feature by using only the SSP CLI; you cannot configure it through the System Manager.

Understanding TACACS+

In large enterprise networks, the task of administering passwords on each device can be simplified by centrally performing the user authentication on a server. TACACS+ is an access-control protocol that allows the SSP to authenticate all login attempts through a central authentication server. The network administrator configures the SSP with the address of the TACACS+ server, and the SSP and the server exchange messages to authenticate each user before allowing access to the management console.

TACACS+ consists of three services: authentication authorization, and accounting. Authentication is the action of determining who the user is and whether the user is allowed access to the SSP. Authorization is the action of determining what the user is allowed to do on the system. Accounting is the action of collecting data related to resource usage.

Configuring TACACS+

The TACACS+ feature is disabled by default. To prevent a lapse in security, you cannot configure TACACS+ through the SSP Manager. When enabled, TACACS+ can authenticate users accessing the SSP through the CLI.


Note   Although the TACACS+ configuration is performed using the CLI, the TACACS+ server will authenticate HTTP connections that have been configured with a privilege level of 15.

Configuring the TACACS+ Server Host

Use the tacacs-server host command to specify the names of the IP host or hosts maintaining an AAA/TACACS+ server. On TACACS+ servers, you can configure the following additional options:

Beginning in privileged EXEC mode, follow these steps to configure the TACACS+ server:

Command Purpose

Step 1 

tacacs-server host name [timeout integer] [key string]

Define a TACACS+ host.

Entering the timeout and key parameters with this command overrides the global values that you can enter with the tacacs-server timeout (Step 3) and the tacacs-server key commands (Step 5).

Step 2 

tacacs-server retransmit retries

Enter the number of times the server searches the list of TACACS+ servers before stopping.

The default is two.

Step 3 

tacacs-server timeout seconds

Set the interval the server waits for a TACACS+ server host to reply.

The default is 5 seconds.

Step 4 

tacacs-server attempts count

Set the number of login attempts that can be made on the line.

Step 5 

tacacs-server key string

Define a set of encryption keys for all TACACS+ and communication between the access server and the TACACS daemon.

Repeat the command for each encryption key.

Step 6 

exit

Return to privileged EXEC mode.

Step 7 

show tacacs

Verify your entries.

Configuring Login Authentication

Beginning in privileged EXEC mode, follow these steps to configure login authentication using AAA/TACACS+:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

aaa new-model

Enable AAA/TACACS+.

Step 3 

aaa authentication login {default | list-name} method1 [method2...]

Enable authentication at login, and create one or more lists of authentication methods.

Step 4 

line [aux | console | tty | vty] line-number [ending-line-number]

Enter line configuration mode, and configure the lines to which you want to apply the authentication list.

Step 5 

login authentication {default | list-name}

Apply the authentication list to a line or set of lines.

Step 6 

exit

Return to privileged EXEC mode.

Step 7 

show running-config

Verify your entries.

The variable list-name is any character string used to name the list you are creating. The method variable refers to the actual method the authentication algorithm tries, in the sequence entered. You can choose one of the following methods:

Method
Description

line

Uses the line password for authentication. You must define a line password before you can use this authentication method. Use the password password line configuration mode command.

local

Uses the local username database for authentication. You must enter username information into the database. Use the username password global configuration command.

tacacs+

Uses TACACS+ authentication. You must configure the TACACS+ server before you can use this authentication method. For more information, see the "Configuring the TACACS+ Server Host" section.

To create a default list that is used if no list is specified in the login authentication command, use the default keyword followed by the methods you want used in default situations.

The additional methods of authentication are used only if the previous method returns an error, not if it fails. To specify that the authentication succeed even if all methods return an error, specify none as the final method in the command line.

Specifying TACACS+ Authorization for EXEC Access and Network Services

You can use the aaa authorization command with the tacacs+ keyword to set parameters that restrict a user's network access to Cisco IOS privilege mode (EXEC access) and to network services such as Serial Line Internet Protocol (SLIP), Point to Point Protocol (PPP) with Network Control Protocols (NCPs), and AppleTalk Remote Access (ARA).

The aaa authorization exec tacacs+ local command sets the following authorization parameters:


Note   Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been configured.

Beginning in privileged EXEC mode, follow these steps to specify TACACS+ authorization for EXEC access and network services:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

aaa authorization network tacacs+

Configure the SSP for user TACACS+ authorization for all network-related service requests, including SLIP, PPP NCPs, and ARA protocol.

Step 3 

aaa authorization exec tacacs+

Configure the SSP for user TACACS+ authorization to determine if the user is allowed EXEC access.

The exec keyword might return user profile information (such as autocommand information).

Step 4 

exit

Return to privileged EXEC mode.

Starting TACACS+ Accounting

You use the aaa accounting command with the tacacs+ keyword to turn on TACACS+ accounting for each Cisco IOS privilege level and for network services.

Beginning in privileged EXEC mode, follow these steps to enable TACACS+ accounting:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

aaa accounting exec start-stop tacacs+

Enable TACACS+ accounting to send a start-record accounting notice at the beginning of an EXEC process and a stop-record at the end.

Step 3 

aaa accounting network start-stop tacacs+

Enable TACACS+ accounting for all network-related service requests, including SLIP, PPP, and PPP NCPs.

Step 4 

exit

Return to privileged EXEC mode.


Note   This command is documented in the "Accounting and Billing Commands" chapter of the Security Command Reference.

Configuring the SSP for Local AAA

You can configure AAA to operate without a server by setting the SSP to implement AAA in local mode. Authentication and authorization are then handled by the SSP. No accounting is available in this configuration.

Beginning in privileged EXEC mode, follow these steps to configure the SSP for local AAA:

Command Purpose

Step 1 

configure terminal

Enter global configuration mode.

Step 2 

aaa new-model

Enable AAA.

Step 3 

aaa authentication login default local

Set the login authorization to default to local.

Step 4 

aaa authorization exec local

Configure user AAA authorization for all network-related service requests, including SLIP, PPP NCPs, and ARA protocol.

Step 5 

aaa authorization network local

Configure user AAA authorization to determine if the user is allowed to run an EXEC shell.

Step 6 

username name password password privilege level

Enter the local database.

Repeat this command for each user.

Where to Go Next

At this point you can proceed to the following:


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Oct 2 13:57:12 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.