Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Modification This feature was introduced on the Cisco 2600 series, Cisco 3600 series and Cisco 3700 series router. This feature was integrated into Cisco IOS Release 12.2(8)T. This feature was supported in Cisco IOS Release 12.2(11)T.
This feature module describes the 16- and 36-Port Cisco EtherSwitch Network Module (NM-16ESW and NM-36ESW) for Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers in Cisco IOS Release 12.2(2)XT and Cisco IOS Release 12.2(8)T and above. This document includes the following sections:
Feature Overview, page 1 Supported Platforms, page 28 Supported Standards, MIBs, and RFCs, page 29 Prerequisites, page 30 Configuration Tasks, page 30 Configuration Examples, page 74 Command Reference, page 88 Glossary, page 177
Feature Overview
This document explains how to configure the 16- and 36-port Cisco EtherSwitch network modules. This network module is supported on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. The Cisco EtherSwitch network module is a modular, high density voice network module that provides layer 2 switching across Ethernet ports. The 16-port Cisco EtherSwitch network module has 16 10/100BASE-TX ports and an optional 10/100/1000BASE-T Gigabit Ethernet port. The 36-port Cisco EtherSwitch network module has 36 10/100BASE-TX ports and two optional 10/100/1000BASE-T
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Gigabit Ethernet ports. The gigabit Ethernet can be used as an uplink port to a server or, as a stacking link to another 16- or 36-port Cisco EtherSwitch network modules in the same system. The 36-port Cisco EtherSwitch network module requires a double-wide slot. An optional power module can also be added to provide inline power for IP telephones. The 16- and 36-port Cisco EtherSwitch network modules support the following:
Layer 2 Ethernet Interfaces, page 2 Switch Virtual Interfaces (SVI), page 4 VLAN Trunk Protocol, page 5 EtherChannel, page 7 Spanning Tree Protocol, page 8 Cisco Discovery Protocol, page 18 Switched Port Analyzer (SPAN), page 18 Quality of Service, page 20 Maximum Number of VLAN and Multicast Groups, page 22 IP Multicast Support, page 22 Storm-Control, page 23 Port Security, page 24 Ethernet Switching in Cisco AVVID Architecture, page 24 Stacking, page 25 Flow Control, page 26
Cisco EtherSwitch network modules support simultaneous, parallel connections between Layer 2 Ethernet segments. Switched connections between Ethernet segments last only for the duration of the packet. New connections can be made between different segments for the next packet. The Cisco EtherSwitch network module solves congestion problems caused by high-bandwidth devices and a large number of users by assigning each device (for example, a server) to its own 10-, 100-, or 1000-Mbps segment. Because each Ethernet interface on the switch represents a separate Ethernet segment, servers in a properly configured switched environment achieve full access to the bandwidth. Because collisions are a major bottleneck in Ethernet networks, an effective solution is full-duplex communication. Normally, Ethernet operates in half-duplex mode, which means that stations can either receive or transmit. In full-duplex mode, two stations can transmit and receive at the same time. When packets can flow in both directions simultaneously, effective Ethernet bandwidth doubles to 20 Mbps for 10-Mbps interfaces and to 200 Mbps for Fast Ethernet interfaces.
Switching Frames Between Segments
Each Ethernet interface on an Cisco EtherSwitch network module can connect to a single workstation or server, or to a hub through which workstations or servers connect to the network.
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
On a typical Ethernet hub, all ports connect to a common backplane within the hub, and the bandwidth of the network is shared by all devices attached to the hub. If two stations establish a session that uses a significant level of bandwidth, the network performance of all other stations attached to the hub is degraded. To reduce degradation, the switch treats each interface as an individual segment. When stations on different interfaces need to communicate, the switch forwards frames from one interface to the other at wire speed to ensure that each session receives full bandwidth. To switch frames between interfaces efficiently, the switch maintains an address table. When a frame enters the switch, it associates the MAC address of the sending station with the interface on which it was received.
Building the Address Table
The Cisco EtherSwitch network module builds the address table by using the source address of the frames received. When the switch receives a frame for a destination address not listed in its address table, it floods the frame to all interfaces of the same virtual local area network (VLAN) except the interface that received the frame. When the destination station replies, the switch adds its relevant source address and interface ID to the address table. The switch then forwards subsequent frames to a single interface without flooding to all interfaces. The address table can store at least 8,191 address entries without flooding any entries. The switch uses an aging mechanism, defined by a configurable aging timer; so if an address remains inactive for a specified number of seconds, it is removed from the address table.
Note
A trunk is a point-to-point link between one or more Ethernet switch interfaces and another networking device such as a router or a switch. Trunks carry the traffic of multiple VLANs over a single link and allow you to extend VLANs across an entire network and supports only one encapsulation on all Ethernet interfaces: 802.1Q-802.1Q is an industry-standard trunking encapsulation. You can configure a trunk on a single Ethernet interface or on an EtherChannel bundle. For more information about EtherChannel, see the Configuring Layer 2 EtherChannels (Port-Channel Logical Interfaces) section on page 41.
Layer 2 Interface Modes
Switchport mode access puts the interface into nontrunking mode. The interface will stay in access mode regardless of what the connected port mode is. Only access VLAN traffic will travel on the access port and untagged (802.3). Switchport mode trunk puts the interface into permanent trunking mode.
Table 1 Default Layer 2 Ethernet Interface Configuration
Feature Interface mode Trunk encapsulation Allowed VLAN range Default VLAN (for access ports) Native VLAN (for 802.1Q trunks)
Default Value switchport mode access / trunk switchport trunk encapsulation dot1q VLANs 1-1005 VLAN 1 VLAN 1
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Feature Spanning Tree Protocol (STP) STP port priority STP port cost
Default Value Enabled for all VLANs 128 100 for 10-Mbps Ethernet interfaces 19 for 10/100-Mbps Fast Ethernet interfaces 19 for 1000-Mbps Fast Ethernet interfaces
When you connect a Cisco switch to a device other than a Cisco device through an 802.1Q trunk, the Cisco switch combines the spanning tree instance of the VLAN trunk with the spanning tree instance of the other 802.1Q switch. However, spanning tree information for each VLAN is maintained by Cisco switches separated by a cloud of 802.1Q switches that are not Cisco switches. The 802.1Q cloud separating the Cisco switches that is not Cisco devised, is treated as a single trunk link between the switches. Make sure that the native VLAN for an 802.1Q trunk is the same on both ends of the trunk link. If the VLAN on one end of the trunk is different from the VLAN on the other end, spanning tree loops might result. Inconsistencies detected by a Cisco switch mark the line as broken and block traffic for the specific VLAN. Disabling spanning tree on the VLAN of an 802.1Q trunk without disabling spanning tree on every VLAN in the network can potentially cause spanning tree loops. Cisco recommends that you leave spanning tree enabled on the VLAN of an 802.1Q trunk or that you disable spanning tree on every VLAN in the network. Make sure that your network is loop-free before disabling spanning tree.
Layer 2 Interface Configuration Guidelines and Restrictions
Follow these guidelines and restrictions when configuring Layer 2 interfaces: In a network of Cisco switches connected through 802.1Q trunks, the switches maintain one instance of spanning tree for each VLAN allowed on the trunks. 802.1Q switches that are not Cisco switches, maintain only one instance of spanning tree for all VLANs allowed on the trunks.
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
A VTP domain (also called a VLAN management domain) is made up of one or more interconnected switches that share the same VTP domain name. A switch can be configured to be in one and only one VTP domain. You make global VLAN configuration changes for the domain using either the command-line interface (CLI) or Simple Network Management Protocol (SNMP). By default, the switch is in VTP server mode and is in an un-named domain state until the switch receives an advertisement for a domain over a trunk link or until you configure a management domain. You cannot create or modify VLANs on a VTP server until the management domain name is specified or learned. If the switch receives a VTP advertisement over a trunk link, it inherits the management domain name and the VTP configuration revision number. The switch ignores advertisements with a different management domain name or an earlier configuration revision number. If you configure the switch as VTP transparent, you can create and modify VLANs but the changes affect only the individual switch. When you make a change to the VLAN configuration on a VTP server, the change is propagated to all switches in the VTP domain. VTP advertisements are transmitted out all trunk connections using IEEE 802.1Q encapsulation. VTP maps VLANs dynamically across multiple LAN types with unique names and internal index associations. Mapping eliminates excessive device administration required from network administrators.
VTP Modes
You can configure a switch to operate in any one of these VTP modes:
Server-In VTP server mode, you can create, modify, and delete VLANs and specify other configuration parameters (such as VTP version) for the entire VTP domain. VTP servers advertise their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN configuration with other switches based on advertisements received over trunk links. VTP server is the default mode. Client-VTP clients behave the same way as VTP servers, but you cannot create, change, or delete VLANs on a VTP client. Transparent-VTP transparent switches do not participate in VTP. A VTP transparent switch does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, in VTP version 2, transparent switches do forward VTP advertisements that they receive out their trunk interfaces.
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
VTP Advertisements
Each switch in the VTP domain sends periodic advertisements out each trunk interface to a reserved multicast address. VTP advertisements are received by neighboring switches, which update their VTP and VLAN configurations as necessary. The following global configuration information is distributed in VTP advertisements:
VLAN IDs (801.Q) VTP domain name VTP configuration revision number VLAN configuration, including maximum transmission unit (MTU) size for each VLAN Frame format
VTP Version 2
If you use VTP in your network, you must decide whether to use VTP version 1 or version 2. VTP version 2 supports the following features not supported in version 1: Unrecognized Type-Length-Value (TLV) SupportA VTP server or client propagates configuration changes to its other trunks, even for TLVs it is not able to parse. The unrecognized TLV is saved in NVRAM. Version-Dependent Transparent ModeIn VTP version 1, a VTP transparent switch inspects VTP messages for the domain name and version, and forwards a message only if the version and domain name match. Since only one domain is supported in the NM-16ESW software, VTP version 2 forwards VTP messages in transparent mode, without checking the version. Consistency ChecksIn VTP version 2, VLAN consistency checks (such as VLAN names and values) are performed only when you enter new information through the CLI or SNMP. Consistency checks are not performed when new information is obtained from a VTP message, or when information is read from NVRAM. If the digest on a received VTP message is correct, its information is accepted without consistency checks.
VTP Configuration Guidelines and Restrictions
Follow these guidelines and restrictions when implementing VTP in your network:
All switches in a VTP domain must run the same VTP version. You must configure a password on each switch in the management domain when in secure mode. A VTP version 2-capable switch can operate in the same VTP domain as a switch running VTP version 1, provided that VTP version 2 is disabled on the VTP version 2-capable switch. (VTP version 2 is disabled by default). Do not enable VTP version 2 on a switch unless all switches in the same VTP domain are version 2-capable. When you enable VTP version 2 on a switch, all version 2-capable switches in the domain enable VTP version 2 The Cisco IOS end and Ctrl-Z commands are not supported in VLAN database mode. The VLAN database stored on internal flash is supported. Use the squeeze flash command to remove old copies of overwritten VLAN databases.
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
EtherChannel
EtherChannel bundles up to eight individual Ethernet links into a single logical link that provides bandwidth of up to 1600 Mbps (Fast EtherChannel full duplex) between the network module and another switch or host. A Cisco EtherSwitch network module system supports a maximum of six EtherChannels. All interfaces in each EtherChannel must have the same speed duplex and mode.
Load Balancing
EtherChannel balances traffic load across the links in a channel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel. EtherChannel load balancing can use MAC addresses, or IP addresses; either source or destination or both source and destination. The selected mode applies to all EtherChannels configured on the switch. Use the option that provides the greatest variety in your configuration. For example, if the traffic on a channel is going only to a single MAC address, using the destination MAC address always chooses the same link in the channel; using source addresses or IP addresses may result in better load balancing.
EtherChannel Configuration Guidelines and Restrictions
If improperly configured, some EtherChannel interfaces are disabled automatically to avoid network loops and other problems. Follow these guidelines and restrictions to avoid configuration problems:
All Ethernet interfaces on all modules support EtherChannel (maximum of eight interfaces) with no requirement that interfaces be physically contiguous or on the same module. Enable all interfaces in an EtherChannel. If you shut down an interface in an EtherChannel, it is treated as a link failure and its traffic is transferred to one of the remaining interfaces in the EtherChannel. An EtherChannel will not form if one of the interfaces is a Switched Port Analyzer (SPAN) destination port. Assign all interfaces in the EtherChannel to the same VLAN, or configure them as trunks.
Configure all interfaces in an EtherChannel to operate at the same speed and duplex mode.
An EtherChannel supports the same allowed range of VLANs on all interfaces in a trunking Layer 2 EtherChannel. If the allowed range of VLANs is not the same, the interfaces do not form an EtherChannel. Interfaces with different Spanning Tree Protocol (STP) port path costs can form an EtherChannel as long they are otherwise compatibly configured. Setting different STP port path costs does not, by itself, make interfaces incompatible for the formation of an EtherChannel. After you configure an EtherChannel, configuration that you apply to the port-channel interface affects the EtherChannel.
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
The stable active spanning tree topology of a switched network is determined by the following:
The unique bridge ID (bridge priority and MAC address) associated with each VLAN on each switch The spanning tree path cost to the root bridge The port identifier (port priority and MAC address) associated with each Layer 2 interface
The Bridge Protocol Data Units (BPDU) are transmitted in one direction from the root switch, and each switch sends configuration BPDUs to communicate and compute the spanning tree topology. Each configuration BPDU contains the following minimal information:
The unique bridge ID of the switch that the transmitting switch believes to be the root switch The spanning tree path cost to the root The bridge ID of the transmitting bridge Message age The identifier of the transmitting port Values for the hello, forward delay, and max-age protocol timers
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
When a switch transmits a bridge packet data unit (BPDU) frame, all switches connected to the LAN on which the frame is transmitted receive the BPDU. When a switch receives a BPDU, it does not forward the frame but instead uses the information in the frame to calculate a BPDU, and, if the topology changes, initiate a BPDU transmission. A BPDU exchange results in the following:
One switch is elected as the root switch. The shortest distance to the root switch is calculated for each switch based on the path cost. A designated bridge for each LAN segment is selected. This is the switch closest to the root bridge through which frames is forwarded to the root. A root port is selected. This is the port providing the best path from the bridge to the root bridge. Ports included in the spanning tree are selected. Election of the Root Bridge
For each VLAN, the switch with the highest bridge priority (the lowest numerical priority value) is elected as the root switch. If all switches are configured with the default priority (32768), the switch with the lowest MAC address in the VLAN becomes the root switch. The spanning tree root switch is the logical center of the spanning tree topology in a switched network. All paths that are not needed to reach the root switch from anywhere in the switched network are placed in spanning tree blocking mode. BPDUs contain information about the transmitting bridge and its ports, including bridge and MAC addresses, bridge priority, port priority, and path cost. Spanning tree uses this information to elect the root bridge and root port for the switched network, as well as the root port and designated port for each switched segment.
STP Timers
The following describe the STP timers that affect the entire spanning tree performance: Timer Hello timer Forward delay timer Maximum age timer Purpose Determines how often the switch broadcasts hello messages to other switches. Determines how long each of the listening and learning states will last before the port begins forwarding Determines the amount of time protocol information received on a port is stored by the switch.
Propagation delays can occur when protocol information passes through a switched LAN. As a result, topology changes can take place at different times and at different places in a switched network. When a Layer 2 interface transitions directly from nonparticipation in the spanning tree topology to the forwarding state, it can create temporary data loops. Ports must wait for new topology information to propagate through the switched LAN before starting to forward frames. They must allow the frame lifetime to expire for frames that have been forwarded using the old topology. Each Layer 2 interface on a switch using spanning tree exists in one of the following five states:
BlockingThe Layer 2 interface does not participate in frame forwarding. ListeningFirst transitional state after the blocking state when spanning tree determines that the Layer 2 interface should participate in frame forwarding.
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
LearningThe Layer 2 interface prepares to participate in frame forwarding. ForwardingThe Layer 2 interface forwards frames. DisabledThe Layer 2 interface does not participate in spanning tree and is not forwarding frames. From initialization to blocking From blocking to listening or to disabled From listening to learning or to disabled From learning to forwarding or to disabled From forwarding to disabled
10
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Boot-up initialization
Blocking state
Listening state
Disabled state
Learning state
When you enable spanning tree, every port in the switch, VLAN, or network goes through the blocking state and the transitory states of listening and learning at power up. If properly configured, each Layer 2 interface stabilizes to the forwarding or blocking state. When the spanning tree algorithm places a Layer 2 interface in the forwarding state, the following process occurs:
1. 2. 3. 4.
The Layer 2 interface is put into the listening state while it waits for protocol information that suggests that it should go to the blocking state. The Layer 2 interface waits for the forward delay timer to expire, moves the Layer 2 interface to the learning state, and resets the forward delay timer. In the learning state, the Layer 2 interface continues to block frame forwarding as it learns end station location information for the forwarding database. The Layer 2 interface waits for the forward delay timer to expire and then moves the Layer 2 interface to the forwarding state, where both learning and frame forwarding are enabled.
S5691
Forwarding state
11
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Blocking State
A Layer 2 interface in the blocking state does not participate in frame forwarding, as shown in Figure 2. After initialization, a BPDU is sent out to each Layer 2 interface in the switch. A switch initially assumes it is the root until it exchanges BPDUs with other switches. This exchange establishes which switch in the network is the root or root bridge. If only one switch is in the network, no exchange occurs, the forward delay timer expires, and the ports move to the listening state. A port always enters the blocking state following switch initialization.
Figure 2 Interface 2 in Blocking State
Segment frames
Forwarding
BPDUs
Filtering database
System module
Frame forwarding
BPDUs
Data frames
Port 2
Blocking
Segment frames
Discards frames received from the attached segment. Discards frames switched from another interface for forwarding. Does not incorporate end station location into its address database. (There is no learning on a blocking Layer 2 interface, so there is no address database update.) Receives BPDUs and directs them to the system module. Does not transmit BPDUs received from the system module. Receives and responds to network management messages.
12
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Listening State
The listening state is the first transitional state a Layer 2 interface enters after the blocking state. The Layer 2 interface enters this state when STP determines that the Layer 2 interface should participate in frame forwarding. Figure 3 shows a Layer 2 interface in the listening state.
Figure 3 Interface 2 in Listening State
Forwarding
BPDUs
Filtering database
System module
Frame forwarding
Listening
Discards frames received from the attached segment. Discards frames switched from another interface for forwarding. Does not incorporate end station location into its address database. (There is no learning at this point, so there is no address database update.) Receives BPDUs and directs them to the system module. Receives, processes, and transmits BPDUs received from the system module. Receives and responds to network management messages.
13
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Learning State
A Layer 2 interface in the learning state prepares to participate in frame forwarding. The Layer 2 interface enters the learning state from the listening state. Figure 4 shows a Layer 2 interface in the learning state.
Figure 4 Interface 2 in Learning State
Forwarding
BPDUs
Filtering database
System module
Frame forwarding
BPDUs
Port 2
Learning
Discards frames received from the attached segment. Discards frames switched from another interface for forwarding. Incorporates end station location into its address database. Receives BPDUs and directs them to the system module. Receives, processes, and transmits BPDUs received from the system module. Receives and responds to network management messages.
14
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Forwarding State
A Layer 2 interface in the forwarding state forwards frames, as shown in Figure 5. The Layer 2 interface enters the forwarding state from the learning state.
Figure 5 Interface 2 in Forwarding State
Forwarding
BPDUs
Filtering database
System module
Frame forwarding
Station addresses
BPDUs
Port 2
Forwarding
Forwards frames received from the attached segment. Forwards frames switched from another Layer 2 interface for forwarding. Incorporates end station location information into its address database. Receives BPDUs and directs them to the system module. Processes BPDUs received from the system module. Receives and responds to network management messages.
15
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Disabled State
A Layer 2 interface in the disabled state does not participate in frame forwarding or spanning tree, as shown in Figure 6. A Layer 2 interface in the disabled state is virtually nonoperational.
Figure 6 Interface 2 in Disabled State
Forwarding
BPDUs
Filtering database
System module
Frame forwarding
Data frames
Disabled
Discards frames received from the attached segment. Discards frames switched from another Layer 2 interface for forwarding. Does not incorporate end station location into its address database. (There is no learning, so there is no address database update.) Does not receive BPDUs. Does not receive BPDUs for transmission from the system module.
The mac address allocation manager has a pool of MAC addresses that are used as the bridge IDs for the VLAN spanning trees. Platform 3640 or higher 3620 2600 Maximum number of VLANs allowed 64 VLANS 32 VLANs 32 VLANs
16
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
MAC addresses are allocated sequentially, with the first MAC address in the range assigned to VLAN 1, the second MAC address in the range assigned to VLAN 2, and so forth. For example, if the MAC address range is 00-e0-1e-9b-2e-00 to 00-e0-1e-9b-31-ff, the VLAN 1 bridge ID is 00-e0-1e-9b-2e-00, the VLAN 2 bridge ID is 00-e0-1e-9b-2e-01, the VLAN 3 bridge ID is 00-e0-1e-9b-2e-02, and so forth.
Default Spanning Tree Configuration
Spanning Tree Default Configuration Feature Enable state Bridge priority Spanning tree port priority (configurable on a per-interface basis; used on interfaces configured as Layer 2 access ports) Spanning tree port cost (configurable on a per-interface basis; used on interfaces configured as Layer 2 access ports) Default Value Spanning tree enabled for all VLANs 32768 128 Fast Ethernet: 19 Ethernet: 100 Gigabit Ethernet: 19 Spanning tree VLAN port priority (configurable on a 128 per-VLAN basis; used on interfaces configured as Layer 2 trunk ports) Spanning tree VLAN port cost (configurable on a per-VLAN basis; used on interfaces configured as Layer 2 trunk ports) Hello time Forward delay time Maximum aging time
Spanning Tree Port Priority
In the event of a loop, spanning tree considers port priority when selecting an interface to put into the forwarding state. You can assign higher priority values to interfaces that you want spanning tree to select first, and lower priority values to interfaces that you want spanning tree to select last. If all interfaces have the same priority value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks other interfaces. The possible priority range is 0 through 255, configurable in increments of 4 (the default is 128). Cisco IOS software uses the port priority value when the interface is configured as an access port and uses VLAN port priority values when the interface is configured as a trunk port.
Spanning Tree Port Cost
The spanning tree port path cost default value is derived from the media speed of an interface. In the event of a loop, spanning tree considers port cost when selecting an interface to put into the forwarding state. You can assign lower cost values to interfaces that you want spanning tree to select first and higher cost values to interfaces that you want spanning tree to select last. If all interfaces have the same cost value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks other interfaces. The possible cost range is 0 through 65535 (the default is media-specific).
17
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Spanning tree uses the port cost value when the interface is configured as an access port and uses VLAN port cost values when the interface is configured as a trunk port.
A Switched Port Analyzer (SPAN) session is an association of a destination interface with a set of source interfaces. You configure SPAN sessions using parameters that specify the type of network traffic to monitor. SPAN sessions allow you to monitor traffic on one or more interfaces and to send either ingress traffic, egress traffic, or both to one destination interface. You can configure one SPAN session with separate or overlapping sets of SPAN source interfaces or VLANs. Only switched interfaces can be configured as SPAN sources or destinations on the same network module. SPAN sessions do not interfere with the normal operation of the switch. You can enable or disable SPAN sessions with command-line interface (CLI) or SNMP commands. When enabled, a SPAN session might become active or inactive based on various events or actions, and this would be indicated by a syslog message. The show monitor session SPAN session number command displays the operational status of a SPAN session. A SPAN session remains inactive after system power-up until the destination interface is operational.
Destination Interface
A destination interface (also called a monitor interface) is a switched interface to which SPAN sends packets for analysis. You can have one SPAN destination interface. Once an interface becomes an active destination interface, incoming traffic is disabled. You cannot configure a SPAN destination interface to receive ingress traffic. The interface does not forward any traffic except that required for the SPAN session. An interface configured as a destination interface cannot be configured as a source interface. EtherChannel interfaces cannot be SPAN destination interfaces. Specifying a trunk interface as a SPAN destination interface stops trunking on the interface.
Source Interface
A source interface is an interface monitored for network traffic analysis. One or more source interfaces can be monitored in a single SPAN session with user-specified traffic types (ingress, egress, or both) applicable for all the source interfaces.
18
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
You can configure source interfaces in any VLAN. You can configure EtherChannel as source interfaces, which means that all interfaces in the specified VLANs are source interfaces for the SPAN session. Trunk interfaces can be configured as source interfaces and mixed with nontrunk source interfaces; however, the destination interface never encapsulates.
Traffic Types
Ingress SPAN (Rx) copies network traffic received by the source interfaces for analysis at the destination interface. Egress SPAN (Tx) copies network traffic transmitted from the source interfaces. Specifying the configuration option both copies network traffic received and transmitted by the source interfaces to the destination interface.
SPAN Traffic
Network traffic, including multicast, can be monitored using SPAN. Multicast packet monitoring is enabled by default. In some SPAN configurations, multiple copies of the same source packet are sent to the SPAN destination interface. For example, a bidirectional (both ingress and egress) SPAN session is configured for sources a1 and a2 to a destination interface d1. If a packet enters the switch through a1 and gets switched to a2, both incoming and outgoing packets are sent to destination interface d1; both packets would be the same (unless a Layer-3 rewrite had occurred, in which case the packets would be different).
Note
Enter the no monitor session session number command with no other parameters to clear the SPAN session number. EtherChannel interfaces can be SPAN source interfaces; they cannot be SPAN destination interfaces. If you specify multiple SPAN source interfaces, the interfaces can belong to different VLANs. Monitoring of VLANs is not supported Only one SPAN session may be run at any given time. Outgoing CDP and BPDU packets will not be replicated. SPAN destinations never participate in any spanning tree instance. SPAN includes BPDUs in the monitored traffic, so any BPDUs seen on the SPAN destination are from the SPAN source. Use a network analyzer to monitor interfaces. You can have one SPAN destination interface. You can mix individual source interfaces within a single SPAN session. You cannot configure a SPAN destination interface to receive ingress traffic. When enabled, SPAN uses any previously entered configuration. When you specify source interfaces and do not specify a traffic type (Tx, Rx, or both), both is used by default.
19
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Quality of Service
Understanding Quality of Service (QoS)
Typically, networks operate on a best-effort delivery basis, which means that all traffic has equal priority and an equal chance of being delivered in a timely manner. When congestion occurs, all traffic has an equal chance of being dropped. With the QoS feature configured on your switch, you can select specific network traffic, prioritize it according to its relative importance, and use congestion-management and congestion-avoidance techniques to provide preferential treatment. Implementing QoS in your network makes network performance more predictable and bandwidth utilization more effective. The QoS implementation for this release is based on the DiffServ architecture, an emerging standard from the Internet Engineering Task Force (IETF). This architecture specifies that each packet is classified upon entry into the network. The classification is carried in the IP packet header, using 6 bits from the deprecated IP type of service (ToS) field to carry the classification (class) information. Classification can also be carried in the Layer 2 frame. These special bits in the Layer 2 frame or a Layer 3 packet are described here and shown in Figure 7:
Prioritization values in Layer 2 frames: Layer 2 802.1Q frame headers have a 2-byte Tag Control Information field that carries the CoS value in the three most-significant bits, which are called the User Priority bits. On interfaces configured as Layer 2 802.1Q trunks, all traffic is in 802.1Q frames except for traffic in the native VLAN. Other frame types cannot carry Layer 2 CoS values. Layer 2 CoS values range from 0 for low priority to 7 for high priority. Prioritization bits in Layer 3 packets: Layer 3 IP packets can carry either an IP precedence value or a Differentiated Services Code Point (DSCP) value. QoS supports the use of either value, because DSCP values are backward-compatible with IP precedence values. IP precedence values range from 0 to 7. DSCP values range from 0 to 63.
20
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Figure 7
Layer 2 ISL Frame ISL header (26 bytes) Encapsulated frame 1... (24.5 KB) 3 bits used for CoS Layer 2 802.1Q and 802.1p Frame Preamble Start frame delimiter DA SA Tag PT Data FCS FCS (4 bytes)
Version length
ToS (1 byte)
Len
ID
Offset TTL
IP precedence or DSCP
Note
Layer 2 ISL Frame is not supported in this release. All switches and routers across the Internet rely on the class information to provide the same forwarding treatment to packets with the same class information and different treatment to packets with different class information. The class information in the packet can be assigned by end hosts or by switches or routers along the way, based on a configured policy, detailed examination of the packet, or both. Detailed examination of the packet is expected to happen closer to the edge of the network so that the core switches and routers are not overloaded. Switches and routers along the path can use the class information to limit the amount of resources allocated per traffic class. The behavior of an individual device when handling traffic in the DiffServ architecture is called per-hop behavior. If all devices along a path provide a consistent per-hop behavior, you can construct an end-to-end QoS solution. Implementing QoS in your network can be a simple or complex task and depends on the QoS features offered by your internetworking devices, the traffic types and patterns in your network, and the granularity of control you need over incoming and outgoing traffic. The Ethernet switch network module can function as a Layer 2 switch connected to a Layer 3 router. When a packet enters the Layer 2 engine directly from a switch port, it is placed into one of four queues in the dynamic, 32-MB shared memory buffer. The queue assignment is based on the dot1p value in the packet. Any voice bearer packets that come in from the Cisco IP phones on the voice VLAN are automatically placed in the highest priority (Queue 3) based on the 802.1p value generated by the IP phone. The queues are then serviced on a WRR basis. The control traffic, which uses a CoS or ToS of 3, is placed in Queue 2. Table 2 summarizes the queues, CoS values, and weights for Layer 2 QoS on the Ethernet switch network module network module.
21
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Table 2
Queue Number 3 2 1 0
Weight 255 64 16 1
The weights specify the number of packets that are serviced in the queue before moving on to the next queue. Voice Realtime Transport Protocol (RTP) bearer traffic marked with a CoS or ToS of 5 and Voice Control plane traffic marked with a CoS/ToS of 3 are placed into the highest priority Queues. If the queue has no packets to be serviced, it is skipped. Weighted Random Early Detection (WRED) is not supported on the Fast Ethernet ports. The WRR default values cannot be changed. There are currently no CLI commands to determine QoS information for WRR weights and queue mappings. You cannot configure port based QoS on the Layer 2 switch ports.
IP Multicast Support
The maximum number of multicast groups is related to the maximum number of VLANs. The product of the number of multicast groups and the number of VLANs cannot exceed 242.
In VLANs or subnets where you have configured IGMP support by enabling multicast routing on the Router and enabling PIM on the VLAN interfaces IGMP snooping manages multicast traffic at Layer2 dynamically forwarding multicast traffic only to those interfaces that want to receive it. IGMP snooping constrains traffic in MAC multicast groups 01-00-5e-00-00-01 to 01-00-5e-ff-ff-ff. IGMP snooping does not constrain Layer 2 multicasts generated by routing protocols.
Note
For more information on IP multicast and IGMP, refer to RFC 1112 and RFC 2236. IGMP (on a router) sends out periodic general IGMP queries. When you enable IGMP snooping, the switch responds at Layer 2 to the IGMP queries with only one IGMP join request per Layer 2 multicast group. The switch creates one entry per subnet in the Layer 2 forwarding table for each Layer 2 multicast group from which it receives an IGMP join request. All hosts interested in this multicast traffic send IGMP join requests and are added to the forwarding table entry.
22
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Layer 2 multicast groups learned through IGMP snooping are dynamic. When a host connected to a Layer 2 interface wants to join an IP multicast group, it sends an IGMP join request specifying the IP multicast group it wants to join. When hosts want to leave a multicast group, they can either ignore the periodic general IGMP queries, or they can send an IGMP leave message. When the switch receives an IGMP leave message from a host, it sends out a group-specific IGMP query to determine if any devices connected to that interface are interested in traffic for the specific multicast group. The switch then updates the table entry for that Layer 2 multicast group so that only those hosts interested in receiving multicast traffic for the group are listed. IGMP Snooping is enabled on a switchport only when the SVI is configured for PIM. IGMP snooping is disabled by default.
Fast-Leave Processing
IGMP snooping fast-leave processing allows the switch to remove an interface from the forwarding-table entry without first sending out group specific queries to the interface. The VLAN interface is pruned from the multicast tree for the multicast group specified in the original leave message. Fast-leave processing ensures optimal bandwidth management for all hosts on a switched network, even when multiple multicast groups are in use simultaneously. When a switch with IGMP snooping enabled receives an IP group-specific IGMPv2 leave message, it sends a group-specific query out the interface where the leave message was received to determine if there are any other hosts attached to that interface that are interested in the MAC multicast group. If the switch does not receive an IGMP join message within the query-response-interval and none of the other 31 IP groups corresponding to the MAC group are interested in the multicast traffic for that MAC group and no multicast routers have been learned on the interface, then the interface is removed from the portmask of the (mac-group, vlan) entry in the L2 forwarding table. With fast-leave enabled on the VLAN, an interface can be removed immediately from the portmask of the L2 entry when the IGMP leave message is received, unless a multicast router was learned on the port
Note
Use fast-leave processing only on VLANs where only one host is connected to each interface. If fast-leave is enabled in VLANs where more than one host is connected to an interface, some hosts might be dropped inadvertently. Fast leave processing is supported only with IGMP version 2 hosts.
Storm-Control
Understanding Storm-Control
Storm-control prevents switchports on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the interfaces. A LAN storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. Errors in the protocol-stack implementation or in the network configuration can cause a storm. Storm-control monitors incoming traffic statistics over a time period and compares the measurement with a predefined suppression level threshold. The threshold represents the percentage of the total available bandwidth of the port. If the threshold of a traffic type is reached, further traffic of that type is suppressed until the incoming traffic falls below the threshold level. Storm-control is disabled by default. The switch supports storm-control for broadcast, multicast, and unicast traffic. This example of broadcast suppression can also be applied to multicast and unicast traffic. The graph in Figure 8 shows broadcast traffic patterns on an interface over a given period of time. In this example, the broadcast traffic exceeded the configured threshold between time intervals T1 and T2 and between T4 and T5. When the amount of specified traffic exceeds the threshold, all traffic of that kind is dropped. Therefore, broadcast traffic is blocked during those intervals. At the next time interval, if broadcast traffic does not exceed the threshold, it is again forwarded.
23
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Figure 8
Forwarded traffic Blocked traffic Total number of broadcast packets or bytes Threshold
T1
T2
T3
T4
T5
Time
When storm-control is enabled, the switch monitors packets passing from an interface to the switching bus and determines if the packet is unicast, multicast, or broadcast. The switch monitors the number of broadcast, multicast, or unicast packets received within the 1-second time interval, and when a threshold for one type of traffic is reached, that type of traffic is dropped. This threshold is specified as a percentage of total available bandwidth that can be used by broadcast (multicast or unicast) traffic. The combination of broadcast suppression threshold numbers and the 1-second time interval control the way the suppression algorithm works. A higher threshold allows more packets to pass through. A threshold value of 100 percent means that no limit is placed on the traffic.
Note
Because packets do not arrive at uniform intervals, the 1-second time interval during which traffic activity is measured can affect the behavior of storm-control. The switch continues to monitor traffic on the port, and when the utilization level is below the threshold level, the type of traffic that was dropped is forwarded again. You use the storm-control broadcast, storm-control multicast, and storm-control unicast interface configuration commands to set up the storm-control threshold value.
Port Security
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.
24
46651
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Configuring the Ethernet switch network module for Cisco AVVID/IP Telephony, page 25 Default Switch Configuration, page 25
Configuring the Ethernet switch network module for Cisco AVVID/IP Telephony
The Ethernet switch network module has sixteen 10/100 switched Ethernet ports with integrated inline power and QoS features that make it an ideal choice for extending Cisco AVVID (Architecture for Voice, Video and Integrated Data) based voice-over-IP (VoIP) networks to small branch offices. As an access gateway switch, the Ethernet switch network module can be deployed as a component of a centralized call-processing network using a centrally deployed Cisco CallManager (CCM). Instead of deploying and managing key systems or PBXs in small branch offices, applications are centrally located at the corporate headquarters or data center and are accessed via the IP WAN.
Default Switch Configuration
By default, the Ethernet switch network module provides the following settings with respect to Cisco AVVID:
All switch ports are in access VLAN 1. All switch ports are static access ports, not 802.1Q trunk ports. Default voice VLAN is not configured on the switch. Inline power is automatically supplied on the 10/100 ports.
Stacking
Multiple switch modules may be installed simultaneously by connecting the Gigabit Ethernet (GE) ports of the Cisco EtherSwitch network module. This connection sustains a line-rate traffic similar to the switch fabric found in Cisco Catalyst switches and forms a single VLAN consisting of all ports in multiple Cisco EtherSwitch network modules. The stacking port must be configured for multiple switch modules to operate correctly in the same chassis.
MAC address entries learned via intrachassis stacking are not displayed. Link status of intrachassis stacked ports are filtered.
For more details about the requirements for installing and connecting Cisco EtherSwitch network modules in a single chassis, go to the following URL: http://www.cisco.com/en/US/docs/routers/access/interfaces/nm/hardware/installation/guide/connswh.h tml
25
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Feature Overview
Flow Control
Flow-control is a feature that Gigabit Ethernet ports use to inhibit the transmission of incoming packets. If a buffer on a Gigabit Ethernet port runs out of space, the port transmits a special packet that requests remote ports to delay sending packets for a period of time. This special packet is called a pause frame.
Description Enables a local port to send pause frames to a remote port. Use send on when a remote port is set to receive on or receive desired. Prevents a local port from sending pause frames to a remote port. Use send off when a remote port is set to receive off or receive desired. Indicates preference to send pause frames, but autonegotiates flow control. You can use send desired when a remote port is set to receive on, receive off, or receive desired. Enables a local port to process pause frames that a remote port sends. Use receive on when a remote port is set to send on or send desired. Prevents a local port from processing pause frames. Use receive off when a remote port is set to send off or send desired. Indicates preference to process pause frames, but autonegotiates flow control. You can use receive desired when a remote port is set to send on, send off, or send desired.
Benefits
Statistical gains by combining multiple traffic types over a common IP infrastructure. Long distance savings Support for Intra-chassis stacking Voice connectivity over data applications IPSEC, ACL, VPN and Firewall options New broadband WAN options
Identical commands can be entered once for a range of interfaces, rather than being entered separately for each interface. Interface ranges can be saved as macros.
26
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Feature Overview
Restrictions
The following features are not supported in this release:
Enable or disable per port based on unknown unicast or multicast flooding CGMP client, CGMP fast-leave Dynamic access ports Dynamic trunk protocol Dynamic VLANs GARP, GMRP and GVRP Inter-chassis stacking ISL tagging, the chip does not support ISL. Layer 3 switching onboard Monitoring of VLANs Multi-VLAN ports Network Port Shared STP instances STP backbone fast STP uplink fast for clusters VLAN-based SPAN VLAN Query Protocol VTP pruning protocol Web-based management interface
Related Documents
For information about installing voice network modules and voice interface cards in Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers see these publications:
Cisco 2600 Series Modular Routers Quick Start Guide Cisco 2600 Series Hardware Installation Guide Quick Start Guides for Cisco 3600 series routers Cisco 3600 Series Hardware Installation Guide Quick start guides for Cisco 3700 series routers Hardware installation documents for Cisco 3700 series WAN Interface Card Hardware Installation Guide
27
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Supported Platforms
For information about configuring Voice over IP features, see these publications:
Cisco 2600 Series Software Configuration Guide Cisco IOS Voice, Video, and Fax Configuration Guide, Release 12.2 Cisco IOS Voice, Video, and Fax Command Reference, Release 12.2 Configuring Gigabit Ethernet Switching
Supported Platforms
Cisco IOS software is packaged in feature sets that support specific platforms. To get updated information regarding platform support for this feature, access Cisco Feature Navigator. Cisco Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature. Cisco Feature Navigator is a web-based tool that enables you to determine which Cisco IOS software images support a specific set of features and which features are supported in a specific Cisco IOS image. You can search by feature or release. Under the release section, you can compare releases side by side to display both the features unique to each software release and the features in common. To access Cisco Feature Navigator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions at http://www.cisco.com/register. Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology releases occur. For the most current information, go to the Cisco Feature Navigator home page at the following URL: http://www.cisco.com/go/fn
Availability of Cisco IOS Software Images
Platform support for particular Cisco IOS software releases is dependent on the availability of the software images for those platforms. Software images for some platforms may be deferred, delayed, or changed without prior notice. For updated information about platform support and availability of software images for each Cisco IOS software release, refer to the online release notes or, if supported, Cisco Feature Navigator.
28
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Supported Standards, MIBs, and RFCs
MIBs
RFC 1213 IF MIB RFC 2037 ENTITY MIB CISCO-CDP-MIB CISCO-IMAGE-MIB CISCO-FLASH-MIB OLD-CISCO-CHASSIS-MIB CISCO-VTP-MIB CISCO-HSRP-MIB OLD-CISCO-TS-MIB CISCO-ENTITY-ASSET-MIB CISCO-ENTITY-FRU-CONTROL-MIB BRIDGE MIB (RFC 1493) CISCO-VLAN-MEMBERSHIP-MIB CISCO-VLAN-IFINDEX-RELATIONSHIP-MIB RMON1-MIB PIM-MIB CISCO-STP-EXTENSIONS-MIB OSPF MIB (RFC 1253) CISCO-VLAN-BRIDGE-MIB IPMROUTE-MIB CISCO-MEMORY-POOL-MIB ETHER-LIKE-MIB (RFC 1643) CISCO-ENTITY-FRU-CONTROL-MIB.my CISCO-RTTMON-MIB CISCO-PROCESS-MIB CISCO-COPS-CLIENT-MIB
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at the following URL: http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
29
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Prerequisites
RFCs
Prerequisites
Cisco IOS Release 12.2 or later release Basic configuration of the Cisco 2600 series, Cisco 3600 series, or Cisco 3700 series router Configure IP routing For more information on IP routing, refer to the Cisco IOS IP Configuration Guide, Release 12.2. Set up the call agents For more information on setting up call agents, refer to the documentation that accompanies the call agents used in your network configuration.
Configuration Tasks
See the following sections for configuration tasks for the Ethernet switch network module.
Configuring Layer 2 Interfaces, page 31 Configuring VLANs, page 36 Configuring VLAN Trunking Protocol (VTP), page 39 Configuring Layer 2 EtherChannels (Port-Channel Logical Interfaces), page 41 Configuring Spanning Tree, page 44 Configuring Mac Table Manipulation Port Security, page 49 Configuring Cisco Discovery Protocol (CDP), page 51 Configuring Switched Port Analyzer (SPAN), page 54 Configuring Power Management on the Interface, page 55 Configuring IP Multicast Layer 3 Switching, page 56 Configuring Storm-Control, page 59 Configuring Separate Voice and Data VLANs, page 61 Configuring Intrachassis Stacking, page 73 Configuring Flow Control on Gigabit Ethernet Ports, page 73
30
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Configuring a Range of Interfaces (required) Defining a Range Macro (optional) Configuring Layer 2 Optional Interface Features (optional) Configuring an Ethernet Interface as a Layer 2 Trunk (optional) Configuring an Ethernet Interface as a Layer 2 Access (optional)
The space before the dash is required. For example, the command interface range fastethernet 1 - 5 is valid; the command interface range fastethernet 1-5 is not valid. You can enter one macro or up to five comma-separated ranges. Comma-separated ranges can include both VLANs and physical interfaces. You are not required to enter spaces before or after the comma. The interface range command only supports VLAN interfaces that are configured with the interface vlan command.
31
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Use the show running-configuration command to show the defined interface-range macro configuration, as illustrated below:
Router# show running-configuration | include define define interface-range enet_list FastEthernet5/1 - 4
Interface Speed and Duplex Configuration Guidelines, page 32 Configuring the Interface Speed, page 32 Configuring the Interface Duplex Mode, page 33 Configuring a Description for an Interface, page 34 Configuring an Ethernet Interface as a Layer 2 Trunk, page 34 Configuring an Ethernet Interface as a Layer 2 Access, page 35
If both ends of the line support autonegotiation, Cisco highly recommends the default autonegotiation settings. If one interface supports autonegotiation and the other end does not, configure duplex and speed on both interfaces; do not use the auto setting on the supported side. Both ends of the line need to be configured to the same setting. For example, both hard-set or both auto-negotiate. Mismatched settings are not supported.
Caution
Changing the interface speed and duplex mode configuration might shut down and reenable the interface during the reconfiguration.
Purpose Select the interface to be configured. Set the interface speed of the interface.
Note
If you set the interface speed to auto on a 10/100-Mbps Ethernet interface, both speed and duplex are autonegotiated.
32
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Purpose Selects the interface to be configured. Sets the duplex mode of the interface.
Note
If you set the port speed to auto on a 10/100-Mbps Ethernet interface, both speed and duplex are autonegotiated. You cannot change the duplex mode of autonegotiation interfaces. The following example shows how to set the interface duplex mode to full on Fast Ethernet interface 5/4:
Router(config)# interface fastethernet 5/4 Router(config-if)# duplex full
Use the show interfaces command to verify the interface speed and duplex mode configuration for an interface, as illustrated below:
Router# show interfaces fastethernet 1/4 FastEthernet1/4 is up, line protocol is down Hardware is Fast Ethernet, address is 0000.0000.0c89 (bia 0000.0000.0c89) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Auto-duplex, Auto-speed ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output never, output hang never Last clearing of "show interface" counters never Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 input packets with dribble condition detected 3 packets output, 1074 bytes, 0 underruns(0/0/0) 0 output errors, 0 collisions, 5 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier 0 output buffer failures, 0 output buffers swapped out Router#
33
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Purpose Selects the interface to configure. (Optional) Shuts down the interface to prevent traffic flow until configuration is complete.
Note
Router(config-if)# switch port mode trunk Router(config-if)# switch port trunk native vlan vlan_num Router(config-if)# switch port trunk allowed vlan {add | except | none | remove} vlan1[,vlan[,vlan[,...]] Router(config-if)# no shutdown
Configures the interface as a Layer 2 trunk. For 802.1Q trunks, specifies the native VLAN. (Optional) Configures the list of VLANs allowed on the trunk. All VLANs are allowed by default. You cannot remove any of the default VLANs from a trunk. Activates the interface. (Required only if you shut down the interface.) Exits configuration mode.
Step 6 Step 7
Router(config-if)# end
Note
Ports do not support Dynamic Trunk Protocol (DTP). Ensure that the neighboring switch is set to a mode that will not send DTP.
Use the show commands to verify the configuration of an Ethernet interface as a Layer 2 trunk, as illustrated below:
Router# show running-config interface fastethernet 5/8 Building configuration... Current configuration: ! interface FastEthernet5/8 no ip address
34
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Step 2
Router# show interfaces fastethernet 5/8 switchport Name: Fa5/8 Switchport: Enabled Administrative Mode: static access Operational Mode: static access Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: native Negotiation of Trunking: Disabled Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Trunking VLANs Enabled: ALL Pruning VLANs Enabled: 2-1001 Protected: false Unknown unicast blocked: false Unknown multicast blocked: false Broadcast Suppression Level: 100 Multicast Suppression Level: 100 Unicast Suppression Level: 100 Voice VLAN: none Appliance trust: none
Step 3
Router# show interfaces fastethernet 5/8 trunk Port Fa1/15 Port Fa1/15 Port Fa1/15 Port Fa1/15 Mode Encapsulation Status Native vlan off 802.1q not-trunking 1 Vlans allowed on trunk 1 Vlans allowed and active in management domain 1 Vlans in spanning tree forwarding state and not pruned 1
Purpose Selects the interface to configure. (Optional) Shuts down the interface to prevent traffic flow until configuration is complete. Encapsulation is always dot1q. Configures the interface as a Layer 2 access. For access ports, specifies the access vlan. Activates the interface. (Required only if you shut down the interface.) Exits configuration mode.
Router(config-if)# switchport mode access Router(config-if)# switchport access vlan vlan_num Router(config-if)# no shutdown
Router(config-if)# end
35
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Use the show running-config interface command to verify the running configuration of the interface, as illustrated below:
Router# show running-config interface {ethernet | fastethernet} slot/port
Step 1
Use the show interfaces command to verify the switch port configuration of the interface, as illustrated below:
Router# show interfaces [ethernet | fastethernet] slot/port switchport
Configuring VLANs
This section describes how to configure the VLANs on the Ethernet switch network modules, and contains the following sections:
Configuring VLANs (optional) Configuring SVIs, page 37 Deleting a VLAN from the Database (optional)
Configuring VLANs
To configure an Ethernet Interface as a Layer 2 access, use the following commands beginning in EXEC mode: Command
Step 1 Step 2 Step 3
Router# vlan database Router(vlan)# vlan vlan_id Router(vlan)# exit
Purpose Enters VLAN configuration mode. Adds an Ethernet VLAN. Updates the VLAN database, propagates it throughout the administrative domain, and returns to privileged EXEC mode.
Use the show vlan name command to verify the VLAN configuration, as illustrated below:
Router# show vlan name VLAN0003 VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------1 default active Fa1/0, Fa1/1, Fa1/2, Fa1/3 Fa1/4, Fa1/5, Fa1/6, Fa1/7 Fa1/8, Fa1/9, Fa1/10, Fa1/11 Fa1/12, Fa1/13, Fa1/14, Fa1/15 1002 fddi-default active 1003 token-ring-default active 1004 fddinet-default active
36
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
1005 trnet-default VLAN Type ---- ----1 enet 1002 fddi 1003 tr 1004 fdnet 1005 trnet Router# SAID ---------100001 101002 101003 101004 101005 MTU ----1500 1500 1500 1500 1500 Parent -----1005 -
active RingNo -----0 BridgeNo -------1 1 Stp ---ibm ibm BrdgMode -------srb Trans1 -----1002 1 1 0 0 Trans2 -----1003 1003 1002 0 0
Configuring SVIs
Use the following commands, beginning in global configuration mode, to configure an SVI for Layer 3 processing: Command
Step 1 Step 2 Step 3
Router(config)#interface Vlan vlan_num Router(config-if)#ip address ip_address subnet_mask Router(config-if)#end
Purpose Adds an SVI interface for the specified VLAN. (Optional) Adds an IP address for Layer 3 routing capability. Exits configuration mode.
Note
If the layer 2 physical interface go down, then the VLAN to the routing or briding function will also go down. These physical interface must remain up at all times for the SVI to function properly.
Note
One or more switch interfaces must be configured to belong to the VLAN for the SVI to be operational.
37
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 packets output, 0 bytes, 0 underruns 0 output errors, 3 interface resets 0 output buffer failures, 0 output buffers swapped out Router#
Purpose Enters VLAN configuration mode. Deletes the VLAN. Updates the VLAN database, propagate it throughout the administrative domain, and return to privileged EXEC mode.
Use the show vlan-switch brief command to verify that a VLAN has been deleted from a switch, as illustrated below:
Router# show vlan-switch brief VLAN Name ---- -------------------------------1 default 2 VLAN0002 3 VLAN0003 4 VLAN0004 5 VLAN0005 40 VLAN0040 50 VLAN0050 1000 VLAN1000 1002 fddi-default 1003 token-ring-default 1004 fddinet-default 1005 trnet-default Router# Status --------active active active active active active active active active active active active Ports ------------------------------Fa0/2, Fa0/9, Fa0/14, Gi0/0 Fa0/4, Fa0/5, Fa0/10, Fa0/11 Fa0/6, Fa0/7, Fa0/12, Fa0/13 Fa0/15
38
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Configuring VTP Server, page 39 Configuring a VTP Client, page 39 Disabling VTP (VTP Transparent Mode), page 40 Configuring VTP version 2, page 40
Purpose Enters VLAN configuration mode. Configures the switch as a VTP server. Defines the VTP domain name, which can be up to 32 characters long. (Optional) Sets a password, which can be from 8 to 64 characters long, for the VTP domain. Exits VLAN configuration mode.
Router(vlan)# exit
Purpose Enters VLAN configuration mode. Configures the switch as a VTP client. Exits VLAN configuration mode.
39
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Purpose Enters VLAN configuration mode. Configures VTP transparent mode. Exits VLAN configuration mode.
Purpose Enters VLAN configuration mode. Enables VTP version 2. Use the no keyword to disable VTP version 2. Exits VLAN configuration mode.
Verifying VTP
Step 1
Use the show vtp status to verify VTP status, as illustrated below:
Router# show vtp status VTP Version : 2 Configuration Revision : 247 Maximum VLANs supported locally : 1005 Number of existing VLANs : 33 VTP Operating Mode : Client VTP Domain Name : Lab_Network VTP Pruning Mode : Enabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0x45 0x52 0xB6 0xFD 0x63 0xC8 0x49 0x80 Configuration last modified by 0.0.0.0 at 8-12-99 15:04:49 Router#
40
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Configuring Layer 2 EtherChannels (Port-Channel Logical Interfaces), page 41 Configuring EtherChannel Load Balancing, page 43 Removing an Interface from an EtherChannel, page 43 Configuring Removing an EtherChannel, page 44
Note
Cisco IOS software creates port-channel interfaces for Layer 2 EtherChannels when you configure Layer 2 Ethernet interfaces with the channel-group command. You cannot put Layer 2 Ethernet interfaces into a manually created port-channel interface.
Note
Layer 2 interfaces must be connected and functioning for Cisco IOS software to create port-channel interfaces for Layer 2 EtherChannels. To configure Layer 2 Ethernet interfaces as a Layer 2 EtherChannel, use the following commands beginning in global configuration mode for each interface:
Command
Step 1 Step 2 Step 3
Router(config)# interface fastethernet slot/port Router(config-if)# channel-group port_channel_number mode {on} Router(config-if)# end
Purpose Selects a physical interface to configure. Configures the interface in a port-channel. Exits configuration mode.
41
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Step 2
Router# show interfaces fastethernet 5/6 etherchannel Port state Channel group Port-channel Port indx Flags: = = = = EC-Enbld Up In-Bndl Usr-Config 2 Mode = Desirable Po2 GC = 0x00020001 1 Load = 0x55
Gcchange = 0
S - Device is sending Slow hello. C - Device is in Consistent state. A - Device is in Auto mode. P - Device learns on physical port. Timers: H - Hello timer is running. Q - Quit timer is running. S - Switching timer is running. I - Interface timer is running. Local information: Hello Partner PAgP Learning Group Port Flags State Timers Interval Count Priority Method Ifindex Fa5/6 SC U6/S7 30s 1 128 Any 56 Partners information: Partner Name JAB031301 Partner Device ID 0050.0f10.230c Partner Port 2/47 Partner Group Age Flags Cap. 18s SAC 2F
Port Fa5/6
Step 3
Router# show running-config interface port-channel 2 Building configuration... Current configuration: ! interface Port-channel2 no ip address switchport switchport access vlan 10 switchport mode access end Router#
Step 4
Router# show etherchannel 2 port-channel Port-channels in the group: ---------------------Port-channel: Po2 -----------Age of the Port-channel = 00h:23m:33s Logical slot/port = 10/2 Number of ports in agport = 2 GC = 0x00020001 HotStandBy port = null Port state = Port-channel Ag-Inuse Ports in the Port-channel: Index Load Port ------------------1 55 Fa5/6 0 AA Fa5/7
42
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
00h:23m:33s
Fa5/6
Purpose Configures EtherChannel load balancing, use the no form of this command to return EtherChannel load balancing to the default configuration. Exits configuration mode.
Step 2
Note
For new load balancing to take affect, the EtherChannel must be first configured to the default configuration.
Use the show etherchannel load-balance to verify Layer 2 EtherChannel load balancing, as illustrated below:
Router# show etherchannel load-balance Source XOR Destination IP address Router#
Purpose Configures EtherChannel load balancing. Use the no keyword to return EtherChannel load balancing to the default configuration. Exits configuration mode.
Step 2
43
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Use the show etherchannel summary command to verify that the Etherchannel is removed, as illustrated below:
Router# show etherchannel summary Flags: D - down P - in port-channel I - stand-alone s - suspended R - Layer3 S - Layer2 U - in use Group Port-channel Ports -----+------------+----------------------------------------------------------Router#
Enabling Spanning Tree, page 44 Configuring Spanning Tree Port Priority, page 45 Configuring Spanning Tree Port Cost, page 46 Configuring the Bridge Priority of a VLAN, page 47 Configuring the Hello Time, page 47 Configuring the Forward-Delay Time for a VLAN, page 48 Configuring the Maximum Aging Time for a VLAN, page 48 Disabling Spanning Tree, page 49
44
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Use the show spanning-tree vlan to verify spanning tree configuration, as illustrated below:
Router# show spanning-tree vlan 200 VLAN200 is executing the ieee compatible Spanning Tree protocol Bridge Identifier has priority 32768, address 0050.3e8d.6401 Configured hello time 2, max age 20, forward delay 15 Current root has priority 16384, address 0060.704c.7000 Root port is 264 (FastEthernet5/8), cost of root path is 38 Topology change flag not set, detected flag not set Number of topology changes 0 last change occurred 01:53:48 ago Times: hold 1, topology change 24, notification 2 hello 2, max age 14, forward delay 10 Timers: hello 0, topology change 0, notification 0
Port 264 (FastEthernet5/8) of VLAN200 is forwarding Port path cost 19, Port priority 128, Port Identifier 129.9. Designated root has priority 16384, address 0060.704c.7000 Designated bridge has priority 32768, address 00e0.4fac.b000 Designated port id is 128.2, designated path cost 19 Timers: message age 3, forward delay 0, hold 0 Number of transitions to forwarding state: 1 BPDU: sent 3, received 3417 Router#
Step 2
Configures the port priority for an interface. The of port_priority value can be from 1 to 255 in increments of 4. Use the no form of this command to restore the defaults. Configures the VLAN port priority for an interface. The port_priority value can be from 1 to 255 in increments of 4. Use the no form of this command to restore the defaults. Exits configuration mode.
Step 3
Step 4
Router(config-if)# end
45
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Use the show spanning-tree interface to verify spanning-tree interface and the spanning-tree port priority configuration, as illustrated below:
Router# show spanning-tree interface fastethernet 5/8 Port 264 (FastEthernet5/8) of VLAN200 is forwarding Port path cost 19, Port priority 100, Port Identifier 129.8. Designated root has priority 32768, address 0010.0d40.34c7 Designated bridge has priority 32768, address 0010.0d40.34c7 Designated port id is 128.1, designated path cost 0 Timers: message age 2, forward delay 0, hold 0 Number of transitions to forwarding state: 1 BPDU: sent 0, received 13513 Router#
Step 2
Configures the port cost for an interface. The value of port_cost can be from 1 to 200,000,000 (1 to 65,535 in Cisco IOS Releases 12.1(2)E and earlier). Use the no form of this command to restore the defaults. Configures the VLAN port cost for an interface. The value port_cost can be from 1 to 65,535. Use the no form of this command to restore the defaults. Exits configuration mode.
Step 3
Step 4
Router(config-if)# end
Use the show spanning-tree vlan to verify the spanning-tree port cost configuration, as illustrated below:
Router# show spanning-tree vlan 200 ! ! ! Port 264 (FastEthernet5/8) of VLAN200 is forwarding Port path cost 17, Port priority 64, Port Identifier 129.8. Designated root has priority 32768, address 0010.0d40.34c7 Designated bridge has priority 32768, address 0010.0d40.34c7 Designated port id is 128.1, designated path cost 0
46
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Timers: message age 2, forward delay 0, hold 0 Number of transitions to forwarding state: 1 BPDU: sent 0, received 13513 ! ! ! Router#
Exercise care when using this command. For most situations spanning-tree vlan vlan_ID root primary and the spanning-tree vlan vlan_ID root secondary are the preferred commands to modify the bridge priority. To configure the spanning tree bridge priority of a VLAN, use the following command in global configuration mode:
Command
Step 1
Router(config)# [no] spanning-tree vlan vlan_ID priority bridge_priority
Purpose Configures the bridge priority of a VLAN. The bridge_priority value can be from 1 to 65535. Use the no keyword to restore the defaults. Exits configuration mode.
Step 2
Router(config)# end
Use the show spanning-tree vlan bridge command to verify the bridge priority, as illustrated below:
Router# show spanning-tree vlan 200 bridge brief Hello Max Fwd Vlan Bridge ID Time Age Delay ---------------- -------------------- ---- ---- ----VLAN200 33792 0050.3e8d.64c8 2 20 15 Router#
Protocol -------ieee
Purpose Configures the hello time of a VLAN. The hello_time value can be from 1 to 10 seconds. Use the no form of this command to restore the defaults. Exits configuration mode.
Step 2
Router(config)# end
47
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Purpose Configures the forward time of a VLAN. The value of forward_time can be from 4 to 30 seconds. Use the no form of this command to restore the defaults. Exits configuration mode.
Step 2
Router(config)# end
Purpose Configures the maximum aging time of a VLAN. The value of max_age can be from 6 to 40 seconds. Use the no form of this command to restore the defaults. Exits configuration mode.
Step 2
Router(config)# end
Note
Note The root switch for each instance of spanning tree should be a backbone or distribution switch. Do not configure an access switch as the spanning tree primary root.
48
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Use the diameter keyword to specify the Layer 2 network diameter (that is, the maximum number of bridge hops between any two end stations in the Layer 2 network). When you specify the network diameter, the switch automatically picks an optimal hello time, forward delay time, and maximum age time for a network of that diameter, which can significantly reduce the spanning tree convergence time. You can use the hello keyword to override the automatically calculated hello time.
Note
Note We recommend that you avoid configuring the hello time, forward delay time, and maximum age time manually after configuring the switch as the root bridge. To configure the switch as the root, use the following command in global configuration mode:
Command
Step 1
Router(config)# [no] spanning-tree vlan vlan_ID root primary [diameter hops [hello-time seconds]] Router(config)# end
Purpose Configures a switch as the root switch. Use the no form of this command to restore the defaults. Exits configuration mode.
Step 2
Use the show spanning-tree vlan to verify the that the spanning tree is disabled, as illustrated below:
Router# show spanning-tree vlan 200 <...output truncated...> Spanning tree instance for VLAN 200 does not exist. Router#
Enabling Known MAC Address Traffic, page 50 Creating a Static or Dynamic Entry in the MAC Address Table, page 50 Configuring aging-timer, page 51
49
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Purpose Enters global configuration mode. Secures the MAC address traffic on the port. Exits configuration mode.
Use the show mac-address-table secure to verify the configuration, as illustrated below:
Router# show mac-address-table secure Secure Address Table: Destination Address Address Type VLAN Destination Port ------------------- ------------ ---- -------------------0003.0003.0003 Secure 1 FastEthernet 2/8
Purpose Enters global configuration mode. Creates static or dynamic entry in the MAC address table. Exits configuration mode.
Note
Only port where the link is up will see the dynamic entry validated in the Ethernet switch network module.
50
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Use the show mac command to verify the mac-address-table, as illustrated below:
Router# show mac Destination Address ------------------0001.6443.6440 0004.c16d.9be1 0004.ddf0.0282 0006.0006.0006 001b.001b.ad45 Address Type -----------Static Dynamic Dynamic Dynamic Dynamic VLAN ---1 1 1 1 1 Destination Port -------------------Vlan1 FastEthernet2/13 FastEthernet2/13 FastEthernet2/13 FastEthernet2/13
Configuring aging-timer
To configure the aging-timer, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2 Step 3
Router# configure terminal Router(config)# mac-address-table aging-time <10-1000000> Router(config)# end
Purpose Enters global configuration mode. Configures the MAC address aging-timer age in seconds Exits configuration mode.
Caution
Cisco advises that you not change the aging-timer, because the Ethernet switch network module could go out of synchronization.
Use the show mac-address-table aging-time command to verify the mac-address-table, as illustrated below:
Router # show mac-address-table aging-time Mac address aging time 23
Configuring Cisco Discovery Protocol (CDP), page 52 Enabling CDP on an Interface, page 52
51
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Use the show cdp command to verify the CDP configuration, as illustrated below:
Router# show cdp Global CDP information: Sending CDP packets every 120 seconds Sending a holdtime value of 180 seconds Sending CDPv2 advertisements is enabled Router#
The following example shows how to enable CDP on Fast Ethernet interface 5/1:
Router(config)# interface fastethernet 5/1 Router(config-if)# cdp enable
Use the show cdp interface command to verify the CDP configuration for an interface, as illustrated below:
Router# show cdp interface fastethernet 5/1 FastEthernet5/1 is up, line protocol is up Encapsulation ARPA Sending CDP packets every 120 seconds Holdtime is 180 seconds Router#
52
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Use the show cdp neighbors command to verify information about the neighboring equipment, as illustrated below:
Router# show cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge S - Switch, H - Host, I - IGMP, r - Repeater Device ID Local Intrfce Holdtme Capability Platform Port ID JAB023807H1 Fas 5/3 127 T S WS-C2948 2/46 JAB023807H1 Fas 5/2 127 T S WS-C2948 2/45 JAB023807H1 Fas 5/1 127 T S WS-C2948 2/44 JAB023807H1 Gig 1/2 122 T S WS-C2948 2/50 JAB023807H1 Gig 1/1 122 T S WS-C2948 2/49 JAB03130104 Fas 5/8 167 T S WS-C4003 2/47 JAB03130104 Fas 5/9 152 T S WS-C4003 2/48
Purpose Resets the traffic counters to zero. Delete the CDP table of information about neighbors. Verifies global information such as frequency of transmissions and the holdtime for packets being transmitted. Verifies information about a specific neighbor. The display can be limited to protocol version information. Verifies information about interfaces on which CDP is enabled. Verifies information about neighbors. The display can be limited to neighbors on a specific interface and can be expanded to provide more detailed information. Verifies CDP counters, including the number of packets sent and received and checksum errors.
Router# show cdp entry entry_name [protocol | version] Router# show cdp interface [slot/port] Router# show cdp neighbors [slot/port] [detail]
Configuring Switched Port Analyzer (SPAN), page 54 Configuring SPAN Destinations, page 54 Removing Sources or Destinations from a SPAN Session, page 54
53
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Purpose Specifies the SPAN session number (1 or 2), the source interfaces or VLANs, and the traffic direction to be monitored.
Note
Multiple SPAN sessions can be configured. But only one SPAN session is supported at a time. The following example shows how to configure SPAN session 1 to monitor bidirectional traffic from source interface Fast Ethernet 5/1:
Router(config)# monitor session 1 source interface fastethernet 5/1
Purpose Specifies the SPAN session number (1 or 2) and the destination interfaces or VLANs.
54
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Purpose Enters global configuration mode. Selects a particular Fast Ethernet interface for configuration. Configures the port to supply inline power automatically to a Cisco IP phone. Use never to permanently disable inline power on the port.
Use the show power inline command to verify the power configuration on the ports, as illustrated below:
Router# show power inline PowerSupply ----------EXT-PS SlotNum. -------1 Maximum ------165.000 Allocated --------20.000 Powered ------off off off off off off off off off off off on on off off off Status -----PS1 GOOD PS2 ABSENT PowerAllocated -------------0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 0.000 Watts 6.400 Watts 6.400 Watts 0.000 Watts 0.000 Watts 0.000 Watts
Interface --------FastEthernet1/0 FastEthernet1/1 FastEthernet1/2 FastEthernet1/3 FastEthernet1/4 FastEthernet1/5 FastEthernet1/6 FastEthernet1/7 FastEthernet1/8 FastEthernet1/9 FastEthernet1/10 FastEthernet1/11 FastEthernet1/12 FastEthernet1/13 FastEthernet1/14 FastEthernet1/15
Config -----auto auto auto auto auto auto auto auto auto auto auto auto auto auto auto auto
Phone ----no no no no unknown unknown unknown unknown unknown unknown unknown yes yes no unknown unknown
Use the show power inline command to verify the power configuration on the ports, as illustrated below:
Router# show power inline [actual | interface fastethernet port/slot | configured]
55
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Enabling IP Multicast Routing Globally, page 56 Enabling IP PIM on Layer 3 Interfaces, page 56 Verifying IP Multicast Layer 3 Hardware Switching Summary, page 57 Verifying the IP Multicast Routing Table, page 58 Configuring IGMP Snooping, page 59
Cisco IOS IP Configuration Guide, Release 12.2. Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.2. Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2. Cisco IOS IP Command Reference, Volume 3 of 3: Multicast, Release 12.2.
To enable IP multicast routing globally, Use this command in global configuration mode: Command
Router(config)# ip multicast-routing
This example shows how to enable PIM on an interface using the default mode (sparse-dense-mode):
Router(config-if)# ip pim Router(config-if)#
56
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
The show interface statistics command does not verify hardware-switched packets, only packets switched by software. The show ip pim interface count command verifies the IP multicast Layer 3 switching enable state on IP PIM interfaces and the number of packets received and sent on the interface. Use the following show commands to verify IP multicast Layer 3 switching information for an IP PIM Layer 3 interface, as illustrated below:
Step 1
Router# show ip pim interface count State:* - Fast Switched, D - Distributed Fast Switched H - Hardware Switching Enabled Address Interface FS Mpackets In/Out 10.15.1.20 GigabitEthernet4/8 * H 952/4237130770 10.20.1.7 GigabitEthernet4/9 * H 1385673757/34 10.25.1.7 GigabitEthernet4/10* H 0/34 10.11.1.30 FastEthernet6/26 * H 0/0 10.37.1.1 FastEthernet6/37 * H 0/0 1.22.33.44 FastEthernet6/47 * H 514/68
Step 2
Router# show ip mroute count IP Multicast Statistics 56 routes using 28552 bytes of memory 13 groups, 3.30 average sources per group Forwarding Counts:Pkt Count/Pkts per second/Avg Pkt Size/Kilobits per second Other counts:Total/RPF failed/Other drops(OIF-null, rate-limit etc) Group:224.2.136.89, Source count:1, Group pkt count:29051 Source:132.206.72.28/32, Forwarding:29051/-278/1186/0, Other:85724/8/56665 Router#
Note
The -tive counter means that the outgoing interface list of the corresponding entry is NULL, and this indicates that this flow is still active.
Router# show ip interface vlan 10 Vlan10 is up, line protocol is up Internet address is 10.0.0.6/8 Broadcast address is 255.255.255.255 Address determined by non-volatile memory MTU is 1500 bytes Helper address is not set Directed broadcast forwarding is disabled Multicast reserved groups joined: 224.0.0.1 224.0.0.2 224.0.0.13 224.0.0.10 Outgoing access list is not set Inbound access list is not set Proxy ARP is enabled Security level is default Split horizon is enabled ICMP redirects are always sent ICMP unreachables are never sent ICMP mask replies are never sent IP fast switching is enabled
Step 3
57
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
IP fast switching on the same interface is disabled IP Flow switching is disabled IP CEF switching is enabled IP Fast switching turbo vector IP Normal CEF switching turbo vector IP multicast fast switching is enabled IP multicast distributed fast switching is disabled IP route-cache flags are Fast, CEF Router Discovery is disabled IP output packet accounting is disabled IP access violation accounting is disabled TCP/IP header compression is disabled RTP/IP header compression is disabled Probe proxy name replies are disabled Policy routing is disabled Network address translation is disabled WCCP Redirect outbound is disabled WCCP Redirect exclude is disabled BGP Policy Mapping is disabled IP multicast multilayer switching is enabled IP mls switching is enabled Router#
Step 1
Use the show ip mroute command to verify the IP multicast routing table, as illustrated below:
Router# show ip mroute 230.13.13.1 IP Multicast Routing Table Flags:D - Dense, S - Sparse, s - SSM Group, C - Connected, L - Local, P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set, J - Join SPT, M - MSDP created entry, X - Proxy Join Timer Running A - Advertised via MSDP, U - URD, I - Received Source Specific Host Report Outgoing interface flags:H - Hardware switched Timers:Uptime/Expires Interface state:Interface, Next-Hop or VCD, State/Mode (*, 230.13.13.1), 00:16:41/00:00:00, RP 10.15.1.20, flags:SJC Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20 Outgoing interface list: GigabitEthernet4/9, Forward/Sparse-Dense, 00:16:41/00:00:00, H (*, 230.13.13.2), 00:16:41/00:00:00, RP 10.15.1.20, flags:SJC Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20, RPF-MFD Outgoing interface list: GigabitEthernet4/9, Forward/Sparse-Dense, 00:16:41/00:00:00, H (10.20.1.15, 230.13.13.1), 00:14:31/00:01:40, flags:CJT Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20, RPF-MFD Outgoing interface list: GigabitEthernet4/9, Forward/Sparse-Dense, 00:14:31/00:00:00, H (132.206.72.28, 224.2.136.89), 00:14:31/00:01:40, flags:CJT Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20, RPF-MFD Outgoing interface list:Null Router#
58
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Note
The RPF-MFD flag indicates that the flow is completely hardware switched. The H flag indicates that the flow is hardware-switched on the outgoing interface.
IGMP Snooping is enabled by default on a VLAN or subnet basis. Multicast routing has to be enabled on the router first and then PIM (Multicast routing protocol) has to be enabled on the VLAN interface so that the switch acknowledges the IGMP join and leave messages which are sent from the hosts connected to the switch.
Router(config)# ip multicast-routing Router(config-if)# interface VLAN1 ip-address 192.168.10.1 255.255.255.0 ip pim sparse-mode
Configuring Storm-Control
This section describes how to configure storm-control and characteristics on your router and consists of the following configuration information and procedures:
Default Storm-Control Configuration, page 59 Enabling Storm-Control, page 59 Verifying Storm-Control, page 60
Enabling Storm-Control
Enable storm-control globally and enter the percentage of total available bandwidth that you want to be used by a all traffic (multicast, unicast,); entering 100 percent would allow all traffic. To enable a particular type of storm-control, use the following commands beginning in privileged EXEC mode:
59
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Command
Step 1 Step 2
Router# configure terminal Router(config)# [no] storm-control broadcast threshold <0-100>
Purpose Enters global configuration mode. Specifies the broadcast suppression level for an interface as a percentage of total bandwidth. A threshold value of 100 percent means that no limit is placed on broadcast traffic. Use the no keyword to restore the defaults. Specifies the multicast suppression level for an interface as a percentage of total bandwidth. Use the no keyword to restore the defaults. Specifies the unicast suppression level for an interface as a percentage of total bandwidth. Use the no keyword to restore the defaults. Returns to privileged EXEC mode.
Step 3
Step 4
Step 5
Router(config)# end
Verifying Storm-Control
Step 1
Use the show storm-control command to view switchport characteristics, including storm-control levels set on the interface, as illustrated below:
Router# show storm-control
Step 2
Use the show interface counters privileged EXEC commands display the count of discarded packets.
To verify storm-control statistics on an interface, use the following commands beginning in privileged EXEC mode: Command
show interface [interface-id] counters broadcast
Purpose Verifies the broadcast suppression discard counter for all interfaces or a specific interface. Verify the number of packets discarded. Verifies the multicast suppression discard counter for all interfaces or a specific interface. Verify the number of packets discarded. Verifies the unicast suppression discard counter for all interfaces or a specific interface. Verify the number of packets discarded.
60
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
The following is sample output from the show interface counters broadcast privileged EXEC command:
Router# show interface counters broadcast Port Fa0/1 Fa0/2 BcastSuppDiscards 0 0
Note
Refer to the Cisco AVVID QoS Design Guide for more information on how to implement end-to-end QoS as you deploy Cisco AVVID solutions. To automatically configure Cisco IP phones to send voice traffic on the voice VLAN ID (VVID) on a per-port basis (see the Voice Traffic and VVID section on page 62), use the following commands beginning in global configuration mode:
Command
Step 1 Step 2 Step 3 Step 4
Router(config)# enable
Purpose Enters the privileged EXEC mode. A preset password may be required to enter this mode. Enters global configuration mode. Enters the interface configuration mode and the port to be configured (for example, interface fa5/1). Configures the interface type as trunk mode.
Note
Step 5
Configures the voice port with a VVID that will be used exclusively for voice traffic.
61
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Network managers should ensure that existing subnets have enough available IP addresses for the new Cisco IP phones, each of which requires a unique IP address. Administering a network with a mix of IP phones and workstations on the same subnet might pose a challenge.
To automatically configure Cisco IP phones to send voice and data traffic on the same VLAN, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2 Step 3
Router# configure terminal Router(config)# interface <interface>
Purpose Enters global configuration mode. Enters the interface configuration mode and the port to be configured (e.g., interface fa5/1). Sets the native VLAN for untagged traffic. The value of vlan-id represents the ID of the VLAN that is sending and receiving untagged traffic on the port. Valid IDs are from 1 to 1001. Leading zeroes are not accepted.
Step 4
Configures the Cisco IP phone to send voice traffic with higher priority (CoS=5 on 802.1Q tag) on the access VLAN. Data traffic (from an attached PC) is sent untagged for lower priority (port default=0). Returns to the privileged EXEC mode.
Step 5
Router# end
62
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Use the show run interface command to verify the switch port configuration and the write memory command to save the current configuration in flash memory, as illustrated below:
Router# show run interface <interface> Router# write memory
Step 2
You are connecting Cisco IP phones that do not have a second Ethernet port for attaching a PC. You want to create a physical separation between the voice and data networks. You want to provide in-line power easily to the IP phones without having to upgrade the data infrastructure. You want to limit the number of switches that need Uninterruptible Power Supply (UPS) power.
IP Addressing
The recommended configuration for using multiple cables to connect IP phones to the Cisco AVVID network is to use a separate IP subnet and separate VLANs for IP telephony.
Adding Trap Managers, page 63 Configuring IP Information, page 64 Configuring Voice Ports, page 66 Enabling Switch Port Analyzer (SPAN), page 68 Managing the ARP Table, page 68 Managing the MAC Address Tables, page 69
63
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
To add a trap manager and community string, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2 Step 3
Router# config terminal Router(config)# snmp-server host 172.2.128.263 traps1 snmp vlan-membership Router(config)# end
Purpose Enters global configuration mode. Enters the trap manager IP address, community string, and the traps to generate. Returns to privileged EXEC mode.
Use the show running-config command to verify that the information was entered correctly by displaying the running configuration, as illustrated below:
Router# show running-config
Configuring IP Information
This section describes how to assign IP information on the Ethernet switch network module. The following topics are included:
Assigning IP Information to the Switch, page 64 Specifying a Domain Name and Configuring the DNS, page 65
Purpose Enters global configuration mode. Enter interface configuration mode, and enter the VLAN to which the IP information is assigned. VLAN 1 is the management VLAN, but you can configure any VLAN from IDs 1 to 1001.
64
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Command
Step 3 Step 4 Step 5 Step 6
Router(config)# ip address ip_address subnet_mask Router(config)# exit Router# ip default-gateway ip_address Router# end
Purpose Enters the IP address and subnet mask. Returns to global configuration mode. Enters the IP address of the default router. Returns to privileged EXEC mode. Use the following procedure to remove the IP information from a switch.
Note
Using the no ip address command in configuration mode disables the IP protocol stack and removes the IP information. Cluster members without IP addresses rely on the IP protocol stack being enabled. To remove an IP address, use the following commands beginning in global configuration mode:
Command
Step 1
Router(config)# interface vlan 1
Purpose Enters interface configuration mode, and enters the VLAN to which the IP information is assigned. VLAN 1 is the management VLAN, but you can configure any VLAN from IDs 1 to 1001. Removes the IP address and subnet mask. Returns to privileged EXEC mode.
Step 2 Step 3
Caution
If you are removing the IP address through a telnet session, your connection to the switch will be lost.
65
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
You can specify a default domain name that the software uses to complete domain name requests. You can specify either a single domain name or a list of domain names. When you specify a domain name, any IP host name without a domain name has that domain name appended to it before being added to the host table.
Specifying a Name Server
You can specify up to six hosts that can function as a name server to supply name information for the DNS.
Enabling the DNS
If your network devices require connectivity with devices in networks for which you do not control name assignment, you can assign device names that uniquely identify your devices within the entire internetwork. The Internets global naming scheme, the DNS, accomplishes this task. This service is enabled by default.
Configuring a Port to Connect to a Cisco 7960 IP phone, page 66 Disabling Inline Power on a Ethernet switch network module, page 67
The Ethernet switch network module can connect to a Cisco 7960 IP phone and carry IP voice traffic. If necessary, the Ethernet switch network module can supply electrical power to the circuit connecting it to the Cisco 7960 IP phone. Because the sound quality of an IP telephone call can deteriorate if the data is unevenly transmitted, the current release of the IOS software supports QoS based on IEEE 802.1p CoS. QoS uses classification and scheduling to transmit network traffic from the switch in a predictable manner. The Cisco 7960 IP phone contains an integrated three-port 10/100 switch. The ports are dedicated to connect to the following devices:
Port 1 connects to the Ethernet switch network module switch or other voice-over-IP device Port 2 is an internal 10/100 interface that carries the phone traffic Port 3 connects to a PC or other device
All traffic is transmitted according to the default COS priority (0) of the port. This is the default. Voice traffic is given a higher priority by the phone, and all traffic is in the same VLAN. Voice and data traffic are carried on separate VLANs, and voice traffic always has a CoS priority of 5.
66
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
To instruct the phone to give voice traffic a higher priority and to forward all traffic through the 802.1Q native VLAN, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2 Step 3 Step 4
Router# configure terminal Router(config)# interface interface_id
Purpose Enters global configuration mode. Enters interface configuration mode, and enter the port to be configured. Instruct the switch to use 802.1p priority tagging for voice traffic and to use VLAN 0 (default native VLAN) to carry all traffic. Returns to privileged EXEC mode.
Use the show interface interface switchport command to verify the voice traffic configuration on the 802.1Q native VLAN, as illustrated below:
Router# show interface interface switchport
Purpose Enters global configuration mode. Enters interface configuration mode, and enter the port to be configured. Permanently disables inline power on the port. Returns to privileged EXEC mode.
67
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Use the show power inline interface configured command to verifies the change by displaying the setting as configured, as illustrated below:
Router# show power inline interface configured
Purpose Enters global configuration mode. Enables port monitoring for a specific session (number). Optionally, supply a SPAN destination interface, and a source interface. Returns to privileged EXEC mode.
Step 3
To disable SPAN, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2 Step 3
Router# configure terminal Router(config)# no monitor session session_id Router(config)# end
Purpose Enters global configuration mode. Disables port monitoring for a specific session. Returns to privileged EXEC mode.
68
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
MAC Addresses and VLANs, page 69 Changing the Address Aging Time, page 70 Configuring the Aging Time, page 70
The switch uses the MAC address tables to forward traffic between ports. All MAC addresses in the address tables are associated with one or more ports. These MAC tables include the following types of addresses:
Dynamic addressa source MAC address that the switch learns and then drops when it is not in use. Secure addressa manually entered unicast address that is usually associated with a secured port. Secure addresses do not age. Static addressa manually entered unicast or multicast address that does not age and that is not lost when the switch resets.
The address tables list the destination MAC address and the associated VLAN ID, module, and port number associated with the address. The following shows an example of a list of addresses as they would appear in the dynamic, secure, or static address table.
Router# show mac 4d01h:%SYS-5-CONFIG_I:Configured from console by consolec Slot # :0 -------------Destination Address Address Type VLAN Destination Port ------------------- ------------ ---- -------------------0004.272f.49de Dynamic 1 FastEthernet0/8 0004.2762.3235 Dynamic 1 FastEthernet0/3 0004.4d07.6960 Dynamic 1 FastEthernet0/0 0004.ddbb.6700 Self 1 Vlan1 0020.18d7.4304 Dynamic 1 FastEthernet0/2 beef.beef.beef Static 1 FastEthernet0/11 0004.2762.3235 Dynamic 2 FastEthernet0/3 0004.ddbb.6700 Self 2 Vlan2 0002.7e48.cc38 Dynamic 3 FastEthernet0/4 0002.7e48.cc39 Dynamic 3 FastEthernet0/5
69
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Purpose Enters global configuration mode. Enters the number of seconds that dynamic addresses are to be retained in the address table. Valid entries are from 10 to 1000000. Returns to privileged EXEC mode.
Use the show mac-address-table aging-time command to verify configuration, as illustrated below:
Router# show mac-address-table aging-time
Purpose Enters global configuration mode. Enters the MAC address to be removed from dynamic MAC address table. Returns to privileged EXEC mode.
You can remove all dynamic entries by using the clear mac-address-table dynamic command in privileged EXEC mode.
Step 1
Use the show mac-address-table dynamic command to verify configuration, as illustrated below:
Router# show mac-address-table dynamic
70
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Purpose Enters global configuration mode. Enters the MAC address, its associated port, and the VLAN ID. Returns to privileged EXEC mode.
Step 3
To remove a secure address, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2 Step 3
Router# configure terminal Router(config)# no mac-address-table secure hw-addr vlan vlan-id Router(config)# end
Purpose Enters global configuration mode. Enters the secure MAC address, its associated port, and the VLAN ID to be removed. Returns to privileged EXEC mode.
You can remove all secure addresses by using the clear mac-address-table secure command in privileged EXEC mode.
Use the show mac-address-table secure command to verify configuration, as illustrated below:
Router# show mac-address-table secure
It is manually entered in the address table and must be manually removed. It can be a unicast or multicast address. It does not age and is retained when the switch restarts.
71
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Tasks
Because all ports are associated with at least one VLAN, the switch acquires the VLAN ID for the address from the ports that you select on the forwarding map. A static address in one VLAN must be a static address in other VLANs. A packet with a static address that arrives on a VLAN where it has not been statically entered is flooded to all ports and not learned. To add a static address, use the following commands beginning in privileged EXEC mode: Command
Step 1 Step 2
Router# configure terminal Router(config)# mac-address-table static hw-addr [interface] interface-id [vlan] vlan-id Router(config)# end
Purpose Enters global configuration mode. Enters the static MAC address, the interface, and the VLAN ID of those ports. Returns to privileged EXEC mode.
Step 3
To remove a static address, use the following commands beginning in privileged EXEC mode
:
Command
Step 1 Step 2
Router# configure terminal Router(config)# no mac-address-table static hw-addr [interface] interface-id [vlan] vlan-id Router(config)# end
Purpose Enters global configuration mode. Enters the static MAC address, the interface, and the VLAN ID of the port to be removed. Returns to privileged EXEC mode.
Step 3
You can remove all secure addresses by using the clear mac-address-table static command in privileged EXEC mode.
Use the show mac-address-table static command to verify configuration, as illustrated below:
Router # show mac-address-table static 4d01h:%SYS-5-CONFIG_I:Configured from console by consolec Slot # :0 -------------Destination Address Address Type VLAN Destination Port ------------------- ------------ ---- -------------------0004.272f.49de Dynamic 1 FastEthernet0/8 0004.2762.3235 Dynamic 1 FastEthernet0/3 0004.4d07.6960 Dynamic 1 FastEthernet0/0 0004.ddbb.6700 Self 1 Vlan1 0020.18d7.4304 Dynamic 1 FastEthernet0/2 beef.beef.beef Static 1 FastEthernet0/11 0004.2762.3235 Dynamic 2 FastEthernet0/3 0004.ddbb.6700 Self 2 Vlan2 0002.7e48.cc38 Dynamic 3 FastEthernet0/4 0002.7e48.cc39 Dynamic 3 FastEthernet0/5
72
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks
Purpose Enters to clear all MAC address tables. Returns to privileged EXEC mode.
Purpose Enters the current Gigabit Ethernet interface being used for intrachassis stacking. Creates the intrachassis stacking between the current GE interface and the stacking link partner GE interface. To restore the defaults, use the no form of this command . Exits configuration mode.
Step 2
Router(config)# end
Purpose Sets the flow control parameters on a Gigabit Ethernet port. Verifies the flow control configuration.
73
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
Configuration Examples
This section provides the following configuration examples:
Range of Interface Examples, page 74 Optional Interface Feature Examples, page 75 VLAN Configuration Example, page 76 VTP Examples, page 76 EtherChannel Load Balancing Example, page 78 Spanning Tree Examples, page 78 Mac Table Manipulation Examples, page 81 Cisco Discovery Protocol (CDP) Example, page 81 Switched Port Analyzer (SPAN) Source Examples, page 81 IGMP Snooping Example, page 82 Storm-Control Example, page 83 Ethernet Switching Examples, page 84 Intrachassis Stacking Example, page 86 Flow Control on Gigabit Ethernet Ports Example, page 87
Single Range Configuration Example, page 74 Multiple Range Configuration Example, page 75 Range Macro Definition Example, page 75
74
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
The following example shows how to change to the interface-range configuration mode using the interface-range macro enet_list:
Router(config)# interface range macro enet_list Router(config-if)#
Interface Speed Example, page 75 Setting the Interface Duplex Mode Example, page 76 Adding a Description for an Interface Example, page 76 Configuring an Ethernet Interface as a Layer 2 Trunk Example, page 76
75
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
VTP Examples
VTP Server Example, page 77 VTP Client Example, page 77 Disabling VTP (VTP Transparent Mode) Example, page 77 VTP version 2 Example, page 77
76
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
77
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
Layer 2 EtherChannels Example, page 78 EtherChannel Load Balancing Example, page 78 Removing an EtherChannel Example, page 78
Note
Removing the port-channel also removes the channel-group command from the interfaces belonging to it.
Spanning-Tree Interface and Spanning-Tree Port Priority Example, page 79 Spanning-Tree Port Cost Example, page 79 Bridge Priority of a VLAN, page 80 Hello Time Example, page 80 Forward-Delay Time for a VLAN Example, page 80 Maximum Aging Time for a VLAN Example, page 80 Spanning Tree Examples, page 80
78
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
The following example shows how to verify the configuration of VLAN 200 on the interface when it is configured as a trunk port:
Router# show spanning-tree vlan 200 ! ! ! Port 264 (FastEthernet5/8) of VLAN200 is forwarding Port path cost 19, Port priority 64, Port Identifier 129.8. Designated root has priority 32768, address 0010.0d40.34c7 Designated bridge has priority 32768, address 0010.0d40.34c7 Designated port id is 128.1, designated path cost 0 Timers: message age 2, forward delay 0, hold 0 Number of transitions to forwarding state: 1 BPDU: sent 0, received 13513 Router# ! ! !
The following example shows how to verify the configuration of the interface when it is configured as an access port:
Router# show spanning-tree interface fastethernet 5/8 Port 264 (FastEthernet5/8) of VLAN200 is forwarding Port path cost 18, Port priority 100, Port Identifier 129.8. Designated root has priority 32768, address 0010.0d40.34c7 Designated bridge has priority 32768, address 0010.0d40.34c7 Designated port id is 128.1, designated path cost 0 Timers: message age 2, forward delay 0, hold 0 Number of transitions to forwarding state: 1 BPDU: sent 0, received 13513 Router#
The following example shows how to configure the spanning-tree VLAN port cost of a Fast Ethernet interface:
Router# configure terminal Router(config)# interface fastethernet 5/8 Router(config-if)# spanning-tree vlan 200 cost 17 Router(config-if)# exit Router(config)# exit Router#
79
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
Note
Because spanning tree is enabled by default, issuing a show running command to view the resulting configuration will not display the command you entered to enable spanning tree. The following example shows spanning tree being disabled on VLAN 200:
Router# configure terminal Router(config)# no spanning-tree vlan 200 Router(config)# end Router#
80
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
The following example shows a static entry being configured in the MAC address table:
Router(config)# mac-address-table static beef.beef.beef int fa0/11 vlan 1 Router(config)# end
SPAN Source Configuration Example, page 81 SPAN Destinations Example, page 81 Removing Sources or Destinations from a SPAN Session Example, page 82
81
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
VLANID 1 1 1 1 1 1 1 2 2 2 2 2 2 2
INTERFACES
Fa3/10 Fa3/11
The following is an example of output from the show run int privileged EXEC command for VLAN 1:
Router#show run int vlan 1 Building configuration... Current configuration :82 bytes ! interface Vlan1 ip address 192.168.4.90 255.255.255.0 ip pim sparse-mode end Router# show run int vlan 2 Building configuration... Current configuration :82 bytes ! interface Vlan2 ip address 192.168.5.90 255.255.255.0 ip pim sparse-mode end Router# Router# sh ip igmp group IGMP Connected Group Membership Group Address Interface
Uptime
Expires
Last Reporter
82
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
Router# show ip mroute IP Multicast Routing Table Flags:D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C Connected, L - Local, P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set, J - Join SPT, M - MSDP created entry, X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement, U - URD, I - Received Source Specific Host Report Outgoing interface flags:H - Hardware switched Timers:Uptime/Expires Interface state:Interface, Next-Hop or VCD, State/Mode (*, 239.255.255.255), 01:06:43/00:02:17, RP 0.0.0.0, flags:DC Incoming interface:Null, RPF nbr 0.0.0.0 Outgoing interface list: Vlan1, Forward/Sparse, 01:06:43/00:02:17 (*, 224.0.1.40), 01:12:42/00:00:00, RP 0.0.0.0, flags:DCL Incoming interface:Null, RPF nbr 0.0.0.0 Outgoing interface list: Vlan2, Forward/Sparse, 01:07:53/00:02:14 (*, 224.5.5.5), 01:07:43/00:02:22, RP 0.0.0.0, flags:DC Incoming interface:Null, RPF nbr 0.0.0.0 Outgoing interface list: Vlan1, Forward/Sparse, 01:06:40/00:02:22 Vlan2, Forward/Sparse, 01:07:44/00:02:17 (*, 224.6.6.6), 01:06:43/00:02:18, RP 0.0.0.0, flags:DC Incoming interface:Null, RPF nbr 0.0.0.0 Outgoing interface list: Vlan1, Forward/Sparse, 01:06:40/00:02:18 Vlan2, Forward/Sparse, 01:06:43/00:02:16 Router#
Storm-Control Example
The following example shows bandwidth-based multicast suppression being enabled at 70 percent on Gigabit Ethernet interface 1 and the configuration being verified:
Router# configure terminal Router(config)# interface gigabitethernet0/2 Router(config-if)# storm-control threshold 70 Router(config-if)# end Router# show storm-control Name: Gi0/2 Switchport: Enabled Administrative Mode: dynamic desirable Operational Mode: down Administrative Trunking Encapsulation: dot1q Negotiation of Trunking: On
83
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Trunking VLANs Enabled: ALL Pruning VLANs Enabled: 2-1001 Port Protected: Off Unknown Unicast Traffic: Allowed Unknown Multicast Traffic: Not Allowed Broadcast Suppression Level: 100 Multicast Suppression Level: 70 Unicast Suppression Level: 100
Subnets for Voice and Data Example, page 84 Inter-VLAN Routing Example, page 85 Single Subnet Configuration Example, page 85 Ethernet Ports on IP Phones with Multiple Ports Example, page 85
This configuration instructs the IP phone to generate a packet with an 802.1Q VLAN ID of 150 with an 802.1p value of 5 (default for voice bearer traffic).
Note
In a centralized CallManager deployment model, the DHCP server might be located across the WAN link. If so, an ip helper-address command pointing to the DHCP server should be included on the voice VLAN interface for the IP phone. This is done to obtain its IP address as well as the address of the TFTP server required for its configuration. Be aware that IOS supports a DHCP server function. If this function is used, the Ethernet switch network module serves as a local DHCP server and a helper address would not be required.
84
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
Note
Standard IGP routing protocols such as RIP, IGRP, EIGRP, and OSPF are supported on the Ethernet switch network module. Multicast routing is also supported for PIM dense mode, sparse mode and sparse-dense mode.
The Ethernet switch network module instructs the IP phone to generate an 802.1Q frame with a null VLAN ID value but with an 802.1p value (default is COS of 5 for bearer traffic). The voice and data vlans are both 40 in this example.
85
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Configuration Examples
Note
Using a separate subnet, and possibly a separate IP address space, may not be an option for some small branch offices due to the IP routing configuration. If the IP routing can handle an additional subnet at the remote branch, you can use Cisco Network Registrar and secondary addressing.
The following example shows interchassis stacking being verified between GE port 2/0 and GE port 3/0:
Router# show interface gigabit 2/0 GigabitEthernet2/0 is up, line protocol is down Internal Stacking Link Active : Gi2/0 is stacked with Gi3/0 Hardware is Gigabit Ethernet, address is 001b.3f2b.2c24 (bia 001b.3f2b.2c24) MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex mode, link type is force-up, media type is unknown 0 output flow-control is off, input flow-control is off Full-duplex, 1000Mb/s ARP type: ARPA, ARP Timeout 04:00:00 Last input 1d22h, output never, output hang never Last clearing of "show interface" counters 1d22h Queueing strategy: fifo Output queue 0/40, 0 drops; input queue 0/75, 0 drops 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 250707 packets input, 19562597 bytes, 0 no buffer Received 7 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 0 multicast, 0 pause input 0 input packets with dribble condition detected 7469804 packets output, 582910831 bytes, 0 underruns(0/0/0) 0 output errors, 0 collisions, 0 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 pause output 0 output buffer failures, 0 output buffers swapped out
86
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Examples
Port 2/1 flow control receive administration status set to on (port will require far end to send flowcontrol):
Router> set port flowcontrol receive 2/1 on
87
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Command Reference
Command Reference
This section documents new or modified commands. All other commands used with this feature are documented in the Cisco IOS Release 12.2 command reference publications, except existing commands that are newly ported to the 16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. These modified commands are documented in the following pages.
New Commands
Modified Commands
channel-group (EtherChannel) clear mac-address-table mac-address-table aging-time mac-address-table aging-time mac-address-table dynamic mac-address-table secure mac-address-table static monitor session port-channel load-balance power inline set port flowcontrol show etherchannel show mac-address-table aging-time show mac-address-table dynamic show mac-address-table static show port flowcontrol show power inline show spantree show vtp spanning-tree cost spanning-tree port-priority spanning-tree vlan switchport mode switchport trunk switchport voice vlan
88
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Command Reference
vlan database vlan (VLAN configuration mode) vtp client vtp domain vtp password vtp server vtp transparent vtp v2-mode
89
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 channel-group (EtherChannel)
channel-group (EtherChannel)
To assign and configure a FastEthernet interface to an EtherChannel group, use the channel-group command in interface configuration mode. To remove the channel-group configuration from the interface, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Syntax Description
Specifies the port-channel group number; see the Usage Guidelines section for valid values. Specifies the EtherChannel mode of the interface. Forces the port to channel without Port Aggregation Protocol (PAgP). Places a port into a passive negotiating state, in which the port responds to PAgP packets it receives but does not initiate PAgP packet negotiation. Used with the auto or desirable mode when traffic is expected from the other device. Places a port into an active negotiating state, in which the port initiates negotiations with other ports by sending PAgP packets.
Defaults
Command Modes
Interface configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. The number of valid values for the port-channel-number argument was changed; see the Usage Guidelines section for valid values. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on the Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
90
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series channel-group (EtherChannel)
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
You do not have to create a port-channel interface before assigning a physical interface to a channel-group. A port-channel interface is created automatically when the channel-group gets its first physical interface, if it is not already created. You do not have to disable the IP address that is assigned to a physical interface that is part of a channel-group, but Cisco highly recommends doing so. You can create Layer 2 port-channels by entering the interface port-channel command or, when the channel-group gets its first physical interface assignment. The port-channels are not created at run time or dynamically. Any configuration or attribute changes you make to the port-channel interface are propagated to all interfaces within the same channel-group as the port-channel. When you use the on keyword, a usable EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode.
Catalyst Switches
The number of valid values for port-channel-number depends on the software release. For software releases prior to Cisco IOS release 12.1(3a)E3, valid values are from 1 to 256; for Cisco IOS release 12.1(3a)E3, 12.1(3a)E4, and 12.1(4)E1, valid values are from 1 to 64. Cisco IOS release 12.1 E and later releases support a maximum of 64 values ranging from 1 to 256. You do not have to create a port-channel interface before assigning a physical interface to a channel-group. A port-channel interface is created automatically when the channel-group gets its first physical interface, if it is not already created. You do not have to disable the IP address that is assigned to a physical interface that is part of a channel-group, but Cisco highly recommends doing so. You can create both Layer 2 and Layer 3 port-channels by entering the interface port-channel command or, when the channel-group gets its first physical interface assignment. The port-channels are not created at run time or dynamically. Any configuration or attribute changes you make to the port-channel interface are propagated to all interfaces within the same channel-group as the port-channel. (for example, configuration changes are also propagated to the physical interfaces that are not part of the port-channel, but are part of the channel-group.) When you use the on keyword, a usable EtherChannel exists only when a port group in on mode is connected to another port group in the on mode.
Caution
Do not enable Layer 3 addresses on the physical EtherChannel interfaces. Do not assign bridge groups on the physical EtherChannel interfaces because loops will result.
Examples
This example shows EtherChannel interface 1/0 being added to the EtherChannel group specified by port-channel 1:
Router(config-if)# channel-group 1 mode on Router(config-if)#
91
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 channel-group (EtherChannel)
Related Commands
Description Accesses or creates the IDB port-channel. Displays statistics for all interfaces configured.
92
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series clear mac-address-table
clear mac-address-table
To remove a specified address (or set of addresses) from the MAC address table, use the clear mac-address-table command in privileged EXEC mode.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
clear mac-address-table [dynamic | secure | static] [address mac-address] [interface type slot/port]
Catalyst Switches
clear mac-address-table [dynamic | restricted static | permanent] [address mac-address] [interface type module/port]
Syntax Description
dynamic secure static restricted static permanent address mac-address interface type slot module
Clears only dynamic addresses. Clears only secure addresses. Clears only static addresses. Clears only restricted static addresses. Clears only permanent addresses. Clears only a specified address. Target MAC address. Clears all addresses for an interface. Interface type: ethernet, fastethernet, fddi, atm, or port channel. The module interface number. Valid entries equal the number of ports on the chassis. The module interface number: 0 for fixed 1 or A for module A 2 or B for module B Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers Port interface number ranges based on type of Cisco EtherSwitch network module used: 0 to 15 for NM-16ESW 0 to 35 for NM-36ESW 0 to 1 for GigabitEthernet
Catalyst Switches
port
Port interface number ranging from 1 to 28: 1 to 25 Ethernet (fixed) 26, 27 Fast Ethernet (fixed) Port channel
93
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 clear mac-address-table
Defaults
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
If the clear mac-address-table command is invoked with no options, all MAC addresses are removed. If you specify an address but do not specify an interface, the address is deleted from all interfaces. If you specify an interface but do not specify an address, all addresses on the specified interface are removed.
Catalyst Switches
If the clear mac-address-table command is invoked with no options, all dynamic addresses are removed. If you specify an address but do not specify an interface, the address is deleted from all interfaces. If you specify an interface but do not specify an address, all addresses on the specified interface are removed. If a targeted address is not present in the MAC forwarding table, the following error message appears: MAC address not found
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows all dynamic addresses in the MAC forwarding table being cleared:
Router# clear mac-address-table dynamic
The following example shows the static address 0040.C80A.2F07 being cleared on Ethernet port 1:
Router# clear mac-address-table static address 0040.C80A.2F07 interface ether 0/1
Catalyst Switches
The following example shows all dynamic addresses in the MAC forwarding table being cleared:
Router# clear mac-address-table
94
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series clear mac-address-table
The following example shows the permanent address 0040.C80A.2F07 being cleared on Ethernet port 1:
Router# clear mac-address-table permanent address 0040.C80A.2F07 interface ether 0/1
Related Commands
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Command mac-address-table (aging-time) mac-address-table (static) mac-address-table (secure) show (mac-address-table) show (mac-address-table secure)
Catalyst Switches
Description Configures the length of time the switch keeps dynamic MAC addresses in memory before discarding. Associates a static unicast or multicast MAC address with a particular switched port interface. Associates a secure static address with a particular switched port interface. Displays addresses in the MAC address table for a switched port or module. Displays the addressing security configuration.
Command mac-address-table (aging-time) mac-address-table (permanent) mac-address-table (restricted static) show (mac-address-table) show (mac-address-table security)
Description Configures the length of time the switch keeps dynamic MAC addresses in memory before discarding. Associates a permanent unicast or multicast MAC address with a particular switched port interface. Associates a restricted static address with a particular switched port interface. Displays addresses in the MAC address table for a switched port or module. Displays the addressing security configuration.
95
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 mac-address-table aging-time
mac-address-table aging-time
To configure the aging time for entries in the Layer 2 table, use the mac-address-table aging-time command in global configuration mode. To reset the seconds value to the default setting, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table aging-time seconds [vlan vlan_id] no mac-address-table aging-time seconds [vlan vlan_id]
Syntax Description
Aging time; valid values are 0, and from 10 to 1,000,000 seconds. (Optional) Specifies the VLAN to apply the changed aging time; valid values are from 2 to 1001.
Defaults
300 seconds
Command Modes
Global configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Catalyst 6000 family switches. This command was introduced on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The aging time entry will take the specified value. Valid entries are from 10 to 1,000,000 seconds. This command cannot be disabled.
Catalyst Switches
If you do not enter a VLAN, the change is applied to all routed-port VLANs. Enter 0 seconds to disable aging.
96
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series mac-address-table aging-time
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Catalyst Switches
Related Commands
97
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 mac-address-table dynamic
mac-address-table dynamic
To add dynamic addresses to the MAC address table, use the mac-address-table dynamic command in global configuration mode. Dynamic addresses are automatically added to the address table and dropped from it when they are not in use. To remove dynamic entries from the MAC address table, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table dynamic hw-addr interface [{fa | gi}slot/port] vlan vlan-id no mac-address-table dynamic hw-addr vlan vlan-id
Catalyst Switches
mac-address-table dynamic hw-addr interface [atm slot/port] [vlan vlan-id] no mac-address-table dynamic hw-addr [vlan vlan-id]
Syntax Description
MAC address added to or removed from the table. Port to which packets destined for hw-addr are forwarded. Specifies FastEthernet. Specifies GigabitEthernet. (Optional) The slot (slot 1 or slot 2) to which to add dynamic addresses. (Optional) Port interface number. The ranges are based on type of Cisco EtherSwitch network module used: 0 to 15 for NM-16ESW 0 to 35 for NM-36ESW 0 to 1 for GigabitEthernet
98
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series mac-address-table dynamic
(Optional) Add dynamic addresses to the ATM module in slot 1 or 2. The port is always 0 for an ATM interface. Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers The interface and vlan parameters together specify a destination to which packets destined for hw-addr are forwarded. The vlan keyword is optional if the port is a static-access or dynamic-access VLAN port. In this case, the VLAN assigned to the port is assumed to be that of the port associated with the MAC address. The vlan keyword is required for multi-VLAN and trunk ports. This keyword is required on trunk ports to specify to which VLAN the dynamic address is assigned. The value of vlan-id is the ID of the VLAN to which packets destined for hw-addr are forwarded. Valid IDs are 1 to 1005; do not enter leading zeroes.
Catalyst Switches
(Optional) The interface and vlan parameters together specify a destination to which packets destined for hw-addr are forwarded. The vlan keyword is optional if the port is a static-access or dynamic-access VLAN port. In this case, the VLAN assigned to the port is assumed to be that of the port associated with the MAC address.
Note
When this command is executed on a dynamic-access port, queries to the VLAN Membership Policy Server (VMPS) do not occur. The VMPS cannot verify that the address is allowed or determine to which VLAN the port should be assigned. This command should be used only for testing purposes.
The vlan keyword is required for multi-VLAN and trunk ports. This keyword is required on trunk ports to specify to which VLAN the dynamic address is assigned. The value of vlan-id is the ID of the VLAN to which packets destined for hw-addr are forwarded. Valid IDs are 1 to 1005; do not enter leading zeroes.
Defaults
Command Modes
Global configuration
Command History
Modification This command was first introduced. The vlan keyword was added. The atm keyword was added. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers.
99
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 mac-address-table dynamic
Modification This command was integrated into Cisco IOS Release 12.2(8)T, on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
If the vlan-id argument is omitted and the no form of the command is used, the MAC address is removed from all VLANs.
Examples
The following example shows a MAC address on port fa1/1 being added to VLAN 4:
Switch(config)# mac-address-table dynamic 00c0.00a0.03fa fa1/1 vlan 4
Related Commands
Description Deletes entries from the MAC address table. Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. Adds static addresses to the MAC address table. Displays the MAC address table.
100
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series mac-address-table secure
mac-address-table secure
To add secure addresses to the MAC address table, use the mac-address-table secure command in global configuration mode. To remove secure entries from the MAC address table, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table secure hw-addr interface {fa | gi}slot/port vlan vlan-id no mac-address-table secure hw-addr vlan vlan-id
Catalyst Switches
mac-address-table secure hw-addr interface [atm slot/port] [vlan vlan-id] no mac-address-table secure hw-addr [vlan vlan-id]
Syntax Description
MAC address that is added to the table. Port to which packets destined for hw-addr are forwarded. Specifies FastEthernet. Specifies Gigabit Ethernet. (Optional) The slot (slot 1 or slot 2) to which to add dynamic addresses. (Optional) Port interface number. The ranges are based on type of Cisco EtherSwitch network module used: 0 to 15 for NM-16ESW 0 to 35 for NM-36ESW 0 to 1 for GigabitEthernet
101
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 mac-address-table secure
(Optional) Add secure address to the ATM module in slot 1 or 2. The port is always 0 for an ATM interface. Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers The interface and vlan parameters together specify a destination to which packets destined for hw-addr are forwarded. The vlan keyword is optional if the port is a static-access VLAN port. In this case, the VLAN assigned to the port is assumed to be that of the port associated with the MAC address. This keyword is required for multi-VLAN and trunk ports. The value of vlan-id is the ID of the VLAN to which secure entries are added. Valid IDs are 1 to 1005; do not enter leading zeroes.
Catalyst Switches
(Optional) The interface and vlan parameters together specify a destination to which packets destined for hw-addr are forwarded. The vlan keyword is optional if the port is a static-access VLAN port. In this case, the VLAN assigned to the port is assumed to be that of the port associated with the MAC address. This keyword is required for multi-VLAN and trunk ports. The value of vlan-id is the ID of the VLAN to which secure entries are added. Valid IDs are 1 to 1005; do not enter leading zeroes.
Defaults
Command Modes
Global configuration
Command History
Modification This command was first introduced. The vlan keyword was added. The atm keyword was added. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T, on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Secure addresses can be assigned to only one port at a time. Therefore, if a secure address table entry for the specified MAC address and VLAN already exists on another port, it is removed from that port and assigned to the specified one.
102
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series mac-address-table secure
Catalyst Switches
Secure addresses can be assigned only to one port at a time. Therefore, if a secure address table entry for the specified MAC address and VLAN already exists on another port, it is removed from that port and assigned to the specified one. Dynamic-access ports cannot be configured with secure addresses.
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows a secure MAC address being added to VLAN 6 of port fa1/1:
Router(config)# mac-address-table secure 00c0.00a0.03fa fa1/1 vlan 6
Catalyst Switches
The following example shows a secure MAC address being added to VLAN 6 of port fa1/1:
Switch(config)# mac-address-table secure 00c0.00a0.03fa fa1/1 vlan 6
The following example shows a secure MAC address being added to ATM port 2/1:
Switch(config)# mac-address-table secure 00c0.00a0.03fa atm 2/1
Related Commands
Command clear mac-address-table mac-address-table aging-time mac-address-table dynamic mac-address-table static show mac-address-table
Description Deletes entries from the MAC address table. Sets the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. Adds dynamic addresses to the MAC address table. Adds static addresses to the MAC address table. Displays the MAC address table.
103
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 mac-address-table static
mac-address-table static
To add static entries to the MAC address table, use the mac-address-table static command in global configuration mode. To remove entries profiled by the combination of specified entry information, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
mac-address-table static mac-addr {vlan vlan-id} {interface int} no mac-address-table static mac-addr {vlan vlan-id} {interface int}
Catalyst Switches
mac-address-table static mac-addr {vlan vlan-id} {interface int} [protocol {ip | ipx | assigned}] no mac-address-table static mac-addr {vlan vlan-id} {interface int} [protocol {ip | ipx | assigned}]
Syntax Description
Address to add to the MAC address table. (Optional) Specifies the VLAN associated with the MAC address entry; valid values are from 2 to 100. Specifies the interface. (Optional) Specifies the protocol associated with the entry. Specifies the IP protocol. Specifies the IPX protocol. Specifies assigned protocol bucket accounts for such protocols as DECnet, Banyan VINES, and AppleTalk.
Defaults
Command Modes
Global configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was changed to support multicast addresses. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
104
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series mac-address-table static
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The output interface specified must be a Layer 2 IDB and not an SVI. Entering the no form of this command does not remove system MAC addresses. When removing a MAC address, entering interface int is optional. For unicast entries, the entry is removed automatically. For multicast entries, if you do not specify an interface, the entire entry is removed. You can specify the selected ports to be removed by specifying the interface.
Catalyst Switches
The output interface specified must be a Layer 2 IDB and not an switch virtual interface (SVI). You can enter up to 15 interfaces per command entered, but you can enter more interfaces by repeating the command. If you do not enter a protocol type, an entry is automatically created for each of the four protocol types. Entering the no form of this command does not remove system MAC addresses. When removing a MAC address, entering interface int is optional. For unicast entries, the entry is removed automatically. For multicast entries, if you do not specify an interface, the entire entry is removed. You can specify the selected ports to be removed by specifying the interface.
Examples
The following example shows static entries being added to the MAC address table:
Router(config)# mac-address-table static 0050.3e8d.6400 vlan 100 interface fastethernet5/7 Router(config)#
Related Commands
Description Displays MAC address table information for a specific MAC address.
105
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 monitor session
monitor session
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
To start a new Switched Port Analyzer (SPAN) session, add or delete interfaces from an existing SPAN session, or delete a SPAN session, use the monitor session command in global configuration mode. To remove one or more source interfaces or destination interfaces from the SPAN session, use the no form of this command. monitor session {session} {source {interface type/slot/port}} [, | - | rx | tx | both] no monitor session {session} {source {interface type/slot/port}} [, | - | rx | tx | both] monitor session {session} {destination {interface type/slot/port} [, | -]}} no monitor session {session} {destination {interface type/slot/port} [, | -]}} monitor session {session} no monitor session {session}
Catalyst Switches
To start a new SPAN session, add or delete interfaces or VLANs to or from an existing SPAN session, filter SPAN traffic to specific VLANs, or delete a SPAN session, use the monitor session command in global configuration mode. To remove one or more source or destination interfaces from the SPAN session or a source VLAN from the SPAN session, use the no form of this command. monitor session {session} {source {interface type num} | {vlan vlan_id}} [, | - | rx | tx | both] no monitor session {session} {source {interface type num} | {vlan vlan_id}} [, | - | rx | tx | both] monitor session {session} {destination {interface type num} [, | -]} | {vlan vlan_id}} no monitor session {session} {destination {interface type num} [, | -]} | {vlan vlan_id}} monitor session {session} {filter {vlan vlan_id} [, | -]} no monitor session {session} {filter {vlan vlan_id} [, | -]}
Syntax Description
Number of the SPAN session; valid values are 1 and 2. Specifies the SPAN source. Specifies the SPAN destination interface. (Optional) Specifies the interface type; valid values are, FastEthernet, and GigabitEthernet. (Optional) Specifies interface number; valid entries are 1 or 2. (Optional) Port interface number ranges based on type of Cisco EtherSwitch network module used: 0 to 15 for NM-16ESW 0 to 35 for NM-36ESW 0 to 1 for GigabitEthernet
106
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series monitor session
Specifies the interface type and number; valid values are Ethernet (1 to 9), FastEthernet (1 to 9), GigabitEthernet (1 to 9), and Port-channel (see Usage Guidelines section). Limits SPAN source traffic to specific VLANs.
Note
filter
filter keyword is not supported on the Cisco 2600 series or the Cisco 3600 series Routers.
Specifies the VLAN; valid values are from 1 to 1005. (Optional) Specifies another range of SPAN VLANs; valid values are from 1 to 1005. (Optional) Specifies a range of SPAN VLANs. (Optional) Specifies monitor received traffic only. (Optional) Specifies monitor transmitted traffic only. (Optional) Specifies monitor received and transmitted traffic.
Defaults
A trunking interface monitors all VLANs and all received and transmitted traffic.
Command Modes
Global configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on the Catalyst 6000 family switches was extended to the E train. The number of valid values for port-channel-number was changed; see the Usage Guidelines section for valid values. These SPAN support restrictions were added:
If your switch has a Switch Fabric Module installed, SPAN is supported among supervisor engines and nonfabric-enabled modules. If your switch does not have a Switch Fabric Module installed, SPAN is supported on all modules, including fabric-enabled modules. SPAN on DFC-equipped modules is not supported.
This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
107
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 monitor session
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The port-channel-number supports six EtherChannels, and eight ports in each channel. Only one SPAN destination for a SPAN session is supported. If you attempt to add another destination interface to a session that already has a destination interface configured, you will get an error. You must first remove a SPAN destination interface before changing the SPAN destination to a different interface.
Catalyst Switches
The number of valid values for port-channel-number depends on the software release. For Cisco IOS releases prior to software release 12.1(3a)E3, valid values are from 1 to 256; for Cisco IOS release 12.1(3a)E3, 12.1(3a)E4, and 12.1(4)E1, valid values are from 1 to 64. Cisco IOS release 12.1(5c)EX and later support a maximum of 64 values ranging from 1 to 256. Only one destination per SPAN session is supported. If you attempt to add another destination interface to a session that already has a destination interface configured, you get an error. You must first remove a SPAN destination interface before changing the SPAN destination to a different interface. You can configure up to 64 SPAN destination interfaces, but you can have one egress SPAN source interface, and up to 64 ingress source interfaces only. A particular SPAN session can either monitor VLANs or monitor individual interfacesyou cannot have a SPAN session that monitors both specific interfaces and specific VLANs. If you first configure a SPAN session with a source interface, and then try to add a source VLAN to the same SPAN session, you get an error. You also get an error if you configure a SPAN session with a source VLAN and then try to add a source interface to that session. You must first clear any sources for a SPAN session before switching to another type of source. If you enter the filter keyword on a monitored trunk interface, only traffic on the set of specified VLANs is monitored. Port channel interfaces display in the list of interface options if you have them configured. VLAN interfaces are not supported. However, you can span a particular VLAN by entering the monitor session session source vlan vlan-id command.
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows a destination VLAN being added to an existing SPAN session:
Router(config)# monitor session 1 destination interface fastEthernet 2/0 Router(config)#
Catalyst Switches
The following example shows a destination VLAN being added to an existing SPAN session:
Router(config)# monitor session 1 destination vlan 100 Router(config)#
The following example shows a destination VLAN being deleted from an existing SPAN session:
Router(config)# no monitor session 1 destination vlan 100 Router(config)#
The following example shows SPAN traffic being limited to specific VLANs:
Router(config)# monitor session 1 filter vlan 100 - 304 Router(config)#
108
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series monitor session
Related Commands
109
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 port-channel load-balance
port-channel load-balance
To set the load distribution method among the ports in the bundle, use the port-channel load-balance command in global configuration mode. To reset the load distribution to the default, use the no form of this command. port-channel load-balance method no port-channel load-balance
Syntax Description
method
Load distribution method; see the Usage Guidelines section for a list of valid values.
Defaults
src-dst-ip
Command Modes
Global configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was updated to correct the valid values for method. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
dst-ipLoad distribution on the destination IP address dst-macLoad distribution on the destination MAC address src-dst-ipLoad distribution on the source XOR destination IP address src-dst-macLoad distribution on the source XOR destination MAC address src-ipLoad distribution on the source IP address src-macLoad distribution on the source MAC address
Catalyst Switches
110
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series port-channel load-balance
dst-macLoad distribution on the destination MAC address dst-portLoad distribution on the destination port src-dst-ipLoad distribution on the source XOR destination IP address src-dst-macLoad distribution on the source XOR destination MAC address src-dst-portLoad distribution on the source XOR destination port src-ipLoad distribution on the source IP address src-macLoad distribution on the source MAC address src-portLoad distribution on the source port
Examples
The following example shows the load distribution method being set to dst-ip:
Router(config)# port-channel load-balance dst-ip Router(config)#
Related Commands
Description Access or create the IDB port channel. Displays EtherChannel information for a channel.
111
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 power inline
power inline
To determine how inline power is applied to the device on the specified FastEthernet port, use the power inline command in interface configuration mode. To return the setting to its default, use the no form of this command. power inline {auto | never} no power inline
Syntax Description
auto never
Automatically detect and power inline devices. Never apply inline power.
Defaults
Command Modes
Interface configuration
Command History
Modification This command was first introduced. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Examples
The following example shows how to always apply power to the port:
Switch(config-if)# power inline auto
Related Commands
Command show power inline switchport priority extend switchport voice vlan
Description Displays the power status for the specified port or for all ports. Determines how the telephone connected to the specified port handles priority traffic received on its incoming port. Configures the voice VLAN on the port.
112
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series set port flowcontrol
Syntax Description
Indicates whether the port can receive administrative status from a remote device. Indicates whether the local port can send administrative status to a remote device. (Optional) Number of the module. (Optional) Number of the port on the module. When used with receiveTurns off an attached device's ability to send flow-control packets to a local port. When used with sendTurns off the local port's ability to send administrative status to a remote device.
on
When used with receive, it requires that a local port receive administrative status from a remote device. When used with send, the local port sends administrative status to a remote device.
desired
When used with receive, it allows a local port to operate with an attached device that is required to send flow-control packets, or with an attached device that is not required to but may send flow-control packets. When used with send, the local port sends administrative status to a remote device if the remote device supports it.
Defaults
receiveoff senddesired Default on multiplexed ports is on. The exception to these defaults applies to the 18-port Gigabit module. The defaults are shown below: Ports 1-2 = send is off and receive is desired Ports 3-18 = send is on and receive is desired
Command Modes
Privileged EXEC
Command History
Release 12.2(11)T
Modification This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers
113
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 set port flowcontrol
Usage Guidelines
Examples
The following examples show how to use the set port flowcontrol command set: Port 5/1 flow control receive administration status set to on (port will require far end to send flowcontrol).
router> (enable) set port flowcontrol receive 5/1 on
Port 5/1 flow control receive administration status set to desired (port will allow far end to send flowcontrol if far end supports it).
Console> (enable) Console> (enable) set port flowcontrol receive 5/1 desired
Port 5/1 flow control receive administration status set to off (port will not allow far end to send flowcontrol).
Console> (enable) Console> (enable) set port flowcontrol receive 5/1 off
Port 5/1 flow control send administration status set to on (port will send flowcontrol to far end).
Console> (enable) Console> (enable) set port flowcontrol send 5/1 on
Port 5/1 flow control send administration status set to desired (port will send flowcontrol to far end if far end supports it).
Console> (enable) Console> (enable) set port flowcontrol send 5/1 desired
Port 5/1 flow control send administration status set to off (port will not send flowcontrol to far end).
Console> (enable) Console> (enable) set port flowcontrol send 5/1 off
Related Commands
Description Displays per-port status information and statistics related to flow control.
114
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show etherchannel
show etherchannel
To display EtherChannel information for a channel, use the show etherchannel command in privileged EXEC mode.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
show etherchannel [channel-group] {port-channel | brief | detail | summary | port | load-balance} [{begin | exclude | include} expression]
Syntax Description
channel-group port-channel brief detail summary port load-balance begin exclude include expression
(Optional) Number of the channel group; see the Usage Guidelines section for valid values. Displays port channel information. Displays a summary of EtherChannel information. Displays detailed EtherChannel information. Displays a one-line summary per channel group. Displays EtherChannel port information. Displays load-balance information. (Optional) Specifies that the output display begin with the line that matches the expression value. (Optional) Specifies that the output display exclude lines that match the expression value. (Optional) Specifies that the output display include lines that match the specified expression value. Expression in the output to use as a reference point.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. The number of valid values for channel-group changed; see the Usage Guidelines section for valid values. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers.
115
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show etherchannel
Modification This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The channel-group argument supports six Etherchannels, and eight ports in each channel. If you do not specify a value for channel-group, all channel groups are displayed.
Catalyst Switches
The number of valid values for channel-group depends on the software release. For software releases prior to Cisco IOS release 12.1(3a)E3, valid values are from 1 to 256; for Cisco IOS release 12.1(3a)E3, 12.1(3a)E4, and 12.1(4)E1, valid values are from 1 to 64. Software release 12.1(5c)EX and later support a maximum of 64 values ranging from 1 to 256. If you do not specify a value for channel-group, all channel groups are displayed. In the output, the Passive port list field is displayed for Layer 3 port channels only. This field means that the physical interface, which is still not up, is configured to be in the channel group (and indirectly is in the only port channel in the channel group). Expressions, are case sensitive. For example, if you enter exclude output, the lines that contain output are not displayed, but the lines that contain Output are displayed.
Examples
The following example shows port channel information being displayed for a specific group:
Router# show etherchannel 1 port-channel Port-channels in the group: ---------------------Port-channel: Po1 -----------Age of the Port-channel = 02h:35m:26s Logical slot/port = 10/1 Number of ports in agport = 0 GC = 0x00000000 HotStandBy port = null Passive port list = Fa5/4 Fa5/5 Port state = Port-channel L3-Ag Ag-Not-Inuse Ports in the Port-channel: Index Load Port ------------------Router#
The following example shows how to display a summary of information for a specific group:
Router# show etherchannel 1 brief Group state = L3 Ports: 2 Maxports = 8 port-channels: 1 Max port-channels = 1
116
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show etherchannel
Router#
The following example shows how to display detailed information for a specific group:
Router# show etherchannel 1 detail Group state = L3 Ports: 2 Maxports = 8 Port-channels: 1 Max Port-channels = 1 Ports in the group: ------------------Port: Fa5/4 -----------Port state = EC-Enbld Down Not-in-Bndl Usr-Config Channel group = 1 Mode = Desirable Gcchange = 0 Port-channel = null GC = 0x00000000 Psudo-agport = Po1 Port indx = 0 Load = 0x00 Flags: S - Device is sending Slow hello. C - Device is in Consistent state. A - Device is in Auto mode. P - Device learns on physical port. Timers: H - Hello timer is running. Q - Quit timer is running. S - Switching timer is running. I - Interface timer is running. Local information: Port Fa5/4 Flags State d U1/S1 Timers Hello Partner PAgP Interval Count Priority 1s 0 128 Learning Group Method Ifindex Any 0
Age of the port in the current state: 02h:33m:14s Port: Fa5/5 -----------Port state Channel group Port-channel Port indx Flags: S A Timers: H S = = = = EC-Enbld Down Not-in-Bndl Usr-Config 1 Mode = Desirable Gcchange = 0 null GC = 0x00000000 Psudo-agport = Po1 0 Load = 0x00 C P Q I Device is in Consistent state. Device learns on physical port. Quit timer is running. Interface timer is running.
Device is sending Slow hello. Device is in Auto mode. Hello timer is running. Switching timer is running.
Local information: Port Fa5/5 Flags State d U1/S1 Timers Hello Partner PAgP Interval Count Priority 1s 0 128 Learning Group Method Ifindex Any 0
Age of the port in the current state: 02h:33m:17s Port-channels in the group: ---------------------Port-channel: Po1 -----------Age of the Port-channel = 02h:33m:52s Logical slot/port = 10/1 Number of ports in agport = 0 GC = 0x00000000 HotStandBy port = null Passive port list = Fa5/4 Fa5/5 Port state = Port-channel L3-Ag Ag-Not-Inuse Ports in the Port-channel: Index Load Port ------------------Router#
117
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show etherchannel
The following example shows how to display a one-line summary per channel group:
Router# show etherchannel summary U-in use I-in port-channel S-suspended D-down i-stand-alone d-default Group Port-channel Ports ----- ------------ ---------------------------------------------------------1 Po1(U) Fa5/4(I) Fa5/5(I) 2 Po2(U) Fa5/6(I) Fa5/7(I) 255 Fa5/9(i) 256 Fa5/8(i) Router#
The following example shows how to display EtherChannel port information for all ports and all groups:
Router# show etherchannel port Channel-group listing: ----------------------Group: 1 ---------Ports in the group: ------------------Port: Fa5/4 -----------Port state Channel group Port-channel Port indx Flags: S A Timers: H S -
= = = =
EC-Enbld Down Not-in-Bndl Usr-Config 1 Mode = Desirable Gcchange = 0 null GC = 0x00000000 Psudo-agport = Po1 0 Load = 0x00 C P Q I Device is in Consistent state. Device learns on physical port. Quit timer is running. Interface timer is running.
Device is sending Slow hello. Device is in Auto mode. Hello timer is running. Switching timer is running.
Local information: Port Fa5/4 Flags State d U1/S1 Timers Hello Partner PAgP Interval Count Priority 1s 0 128 Learning Group Method Ifindex Any 0
Age of the port Port: Fa5/5 -----------Port state = Channel group = Port-channel = Port indx = Flags: S A Timers: H S . . . Router# -
EC-Enbld Down Not-in-Bndl Usr-Config 1 Mode = Desirable Gcchange = 0 null GC = 0x00000000 Psudo-agport = Po1 0 Load = 0x00 C P Q I Device is in Consistent state. Device learns on physical port. Quit timer is running. Interface timer is running.
Device is sending Slow hello. Device is in Auto mode. Hello timer is running. Switching timer is running.
Related Commands
Description Assigns and configures an EtherChannel interface to an EtherChannel group. Accesses or creates the IDB port channel.
118
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show mac-address-table
show mac-address-table
To display the MAC address table, use the show mac-address-table command in privileged EXEC mode.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
show mac-address-table [static | dynamic | secure | self | aging-time | count] [address hw-addr] [interface type] [fa | gi slot/port] [vlan vlan-id]
Catalyst Switches
show mac-address-table [static | dynamic | secure | self | aging-time | count] [address hw-addr] [interface interface] [atm slot/port] [vlan vlan-id]
Syntax Description
static dynamic secure self aging-time count address hw-addr interface type interface interface fa gi slot/port atm slot/port vlan vlan-id
(Optional) Displays only the static addresses. (Optional) Displays only the dynamic addresses. (Optional) Displays only the secure addresses. (Optional) Displays only addresses added by the switch itself. (Optional) Displays aging-time for dynamic addresses for all VLANs. (Optional) Displays a count for different kinds of MAC addresses. (Optional) Displays information for a specific address. (Optional) Displays addresses for a specific port. (Optional) Displays addresses for a specific port. (Optional) Specifies FastEthernet. (Optional) Specifies GigabitEthernet. (Optional) Adds dynamic addresses to module in slot 1 or 2. (Optional) Adds dynamic addresses to ATM module slot/port. Use 1 or 2 for the slot number. Use 0 as the port number. (Optional) Displays addresses for a specific VLAN. Valid IDs are from 1 to 1005; do not enter leading zeroes.
Command Modes
Privileged EXEC
Command History
Modification This command was first introduced. The self, aging-time, count, and vlan vlan-id keywords were added. The atm slot/port keywords were added. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
119
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show mac-address-table
Usage Guidelines
This command displays the MAC address table for the switch. Specific views can be defined by using the optional keywords and values. If more than one optional keyword is used, then all of the conditions must be true in order for that entry to be displayed.
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following is sample output from the show mac-address-table command: Router# show mac-address-table Dynamic Addresses Count: 9 Secure Addresses (User-defined) Count: 0 Static Addresses (User-defined) Count: 0 System Self Addresses Count: 41 Total MAC addresses: 50 Non-static Address Table: Destination Address Address Type VLAN Destination Port ------------------- ------------ ---- -------------------0010.0de0.e289 Dynamic 1 FastEthernet0/1 0010.7b00.1540 Dynamic 2 FastEthernet0/5 0010.7b00.1545 Dynamic 2 FastEthernet0/5 0060.5cf4.0076 Dynamic 1 FastEthernet0/1 0060.5cf4.0077 Dynamic 1 FastEthernet0/1 0060.5cf4.1315 Dynamic 1 FastEthernet0/1 0060.70cb.f301 Dynamic 1 FastEthernet0/1 00e0.1e42.9978 Dynamic 1 FastEthernet0/1 00e0.1e9f.3900 Dynamic 1 FastEthernet0/1
Catalyst Switches
Dynamic Addresses Count: 9 Secure Addresses (User-defined) Count: 0 Static Addresses (User-defined) Count: 0 System Self Addresses Count: 41 Total MAC addresses: 50 Non-static Address Table: Destination Address Address Type VLAN Destination Port ------------------- ------------ ---- -------------------0010.0de0.e289 Dynamic 1 FastEthernet0/1 0010.7b00.1540 Dynamic 2 FastEthernet0/5 0010.7b00.1545 Dynamic 2 FastEthernet0/5 0060.5cf4.0076 Dynamic 1 FastEthernet0/1 0060.5cf4.0077 Dynamic 1 FastEthernet0/1 0060.5cf4.1315 Dynamic 1 FastEthernet0/1 0060.70cb.f301 Dynamic 1 FastEthernet0/1 00e0.1e42.9978 Dynamic 1 FastEthernet0/1 00e0.1e9f.3900 Dynamic 1 FastEthernet0/1
Related Commands
120
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show mac-address-table aging-time
Syntax Description
(Optional) Specifies a VLAN; valid values are from 1 to 1005. (Optional) Specifies that the output display begin with the line that matches the expression. (Optional) Specifies that the output display excludes lines that match the expression. (Optional) Specifies that the output display includes lines that match the specified expression. Expression in the output to use as a reference point.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Examples
The following example shows how to display the current configured aging time for all VLANs:
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Router# show mac-address-table aging-time Mac address aging time 300
121
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show mac-address-table aging-time
Catalyst Switches
Router# show mac-address-table aging-time Vlan ---100 200 Router# Aging Time ---------300 1000
The following example show how to display the current configured aging time for a specific VLAN:
Router# show mac-address-table aging-time vlan 100 Vlan Aging Time ------------100 300 Router#
Related Commands
Command show mac-address-table address show mac-address-table count show mac-address-table dynamic show mac-address-table interface show mac-address-table multicast show mac-address-table protocol show mac-address-table static show mac-address-table vlan
Description Displays MAC address table information for a specific MAC address. Displays the number of entries currently in the MAC address table. Displays dynamic MAC address table entries only. Displays the MAC address table information for a specific interface. Displays multicast MAC address table information. Displays MAC address table information based on protocol. Displays static MAC address table entries only. Displays the MAC address table information for a specific VLAN.
122
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show mac-address-table dynamic
show mac-address-table dynamic [address mac_addr | interface type slot/port | Vlan vlan]
Catalyst Switches
show mac-address-table dynamic [address mac_addr | detail | interface type number | protocol protocol | Vlan vlan] [{begin |exclude | include} expression]
Syntax Description
address mac_addr detail interface type number interface type slot port
(Optional) Specifies a 48-bit MAC address; valid format is H.H.H. (Optional) Specifies a detailed display of MAC address table information. (Optional) Specifies an interface to match; valid type values are FastEthernet and GigabitEthernet, valid number values are from 1 to 9. (Optional) Specifies an interface to match; valid type values are FastEthernet and GigabitEthernet. (Optional) Adds dynamic addresses to module in slot 1 or 2. (Optional) Port interface number ranges based on type of Cisco EtherSwitch network module used: 0 to 15 for NM-16ESW 0 to 35 for NM-36ESW 0 to 1 for GigabitEthernet
(Optional) Specifies a protocol. See the Usage Guidelines section for keyword definitions. (Optional) Displays entries for a specific VLAN; valid values are from 1 to 1005. (Optional) Specifies that the output display begin with the line that matches the expression. (Optional) Specifies that the output display exclude lines that match the expression. (Optional) Specifies that the output display include lines that match the specified expression. Expression in the output to use as a reference point.
Command Modes
Privileged EXEC
123
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show mac-address-table dynamic
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The show mac-address-table dynamic command output for an EtherChannel interface changes the port-number designation (for example, 5/7) to a port-group number.
Catalyst Switches
ipSpecifies IP protocol ipxSpecifies IPX protocols assignedSpecifies assigned protocol entries otherSpecifies other protocol entries
The show mac-address-table dynamic command output for an EtherChannel interface changes the port-number designation (for example, 5/7) to a port-group number.
Examples
The following examples shows how to display all dynamic MAC address entries:
Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series Routers
Router# show mac-address-table dynamic Non-static Address Table: Destination Address Address Type ------------------- -----------000a.000a.000a Dynamic 002a.2021.4567 Dynamic
VLAN ---1 2
Catalyst Switches
Router# show mac-address-table dynamic vlan mac address type protocol qos ports -----+---------------+--------+---------+---+-------------------------------200 0010.0d40.37ff dynamic ip -- 5/8 1 0060.704c.73ff dynamic ip -- 5/9 4095 0000.0000.0000 dynamic ip -- 15/1 1 0060.704c.73fb dynamic other -- 5/9 1 0080.1c93.8040 dynamic ip -- 5/9 4092 0050.f0ac.3058 dynamic ip -- 15/1 1 00e0.4fac.b3ff dynamic other -- 5/9 Router#
124
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show mac-address-table dynamic
The following example show how to display dynamic MAC address entries with a specific protocol type (in this case, assigned):
Router# show mac-address-table dynamic protocol assigned vlan mac address type protocol qos ports -----+---------------+--------+---------+---+-------------------------------4092 0000.0000.0000 dynamic assigned -- Router 4092 0050.f0ac.3059 dynamic assigned -- Router 1 0010.7b3b.0978 dynamic assigned -- Fa5/9 Router#
The following example shows the detailed output for the previous example:
Router# show mac-address-table dynamic protocol assigned detail MAC Table shown in details ======================================== Type Always Learn Trap Modified Notify Capture Protocol Flood -------+------------+----+--------+------+-------+--------+-----+ QoS bit L3 Spare Mac Address Age Byte Pvlan Xtag SWbits Index -----------------+--------+--------------+--------+-----+----+------+----DYNAMIC NO NO YES NO NO assigned NO Bit Not On 0 0000.0000.0000 255 4092 0 0 0x3 DYNAMIC NO Bit Not On DYNAMIC NO Bit Not On Router# NO 0 NO 0 YES NO 0050.f0ac.3059 YES NO 0010.7b3b.0978 NO 254 NO 254 assigned NO 4092 0 assigned NO 1 0
0x3
0x108
Related Commands
Command show mac-address-table address show mac-address-table aging-time show mac-address-table count show mac-address-table detail show mac-address-table interface
Description Displays MAC address table information for a specific MAC address. Displays the MAC address aging time. Displays the number of entries currently in the MAC address table. Displays detailed MAC address table information. Displays the MAC address table information for a specific interface. Displays MAC address table information based on protocol. Displays static MAC address table entries only. Displays the MAC address table information for a specific VLAN.
show mac-address-table multicast Displays multicast MAC address table information. show mac-address-table protocol show mac-address-table static show mac-address-table vlan
125
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show mac-address-table static
show mac-address-table static [address mac_addr | interface type slot/port | Vlan vlan]
Catalyst Switches
show mac-address-table static [address mac_addr | detail | interface type number | protocol protocol | Vlan vlan] [{begin |exclude | include} expression]
Syntax Description
address mac_addr detail interface type number interface type slot port
(Optional) Specifies a 48-bit MAC address to match; valid format is H.H.H. (Optional) Specifies a detailed display of MAC address table information. (Optional) Specifies an interface to match; valid type values are Ethernet, FastEthernet, and Gigabit Ethernet and valid number values are from 1 to 9. (Optional) Specifies an interface to match; valid type values are FastEthernet and Gigabit Ethernet. (Optional) Adds dynamic addresses to module in slot 1 or 2. (Optional) Port interface number ranges based on type of Cisco EtherSwitch network module used: 0 to 15 for NM-16ESW 0 to 35 for NM-36ESW 0 to 1 for Gigabit Ethernet
(Optional) Specifies a protocol. See the Usage Guidelines section for keyword definitions. (Optional) Displays entries for a specific VLAN; valid values are from 1 to 1005. (Optional) Specifies that the output display begin with the line that matches the expression. (Optional) Specifies that the output display exclude lines that match the expression. (Optional) Specifies that the output display include lines that match the specified expression. Expression in the output to use as a reference point.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers.
126
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show mac-address-table static
Modification This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Catalyst Switches
ipSpecifies IP protocol. ipxSpecifies IPX protocols. assignedSpecifies assigned protocol entries. otherSpecifies other protocol entries.
Examples
The following example shows how to display all static MAC address entries:
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Router# show mac-address-table static Static Address Table: Destination Address Address Type ------------------- -----------2323.3214.5432 Static 2323.3214.5431 Static 2323.3214.5432 Static 2323.3214.5434 Static 2323.3214.5435 Static
VLAN ---4 5 6 7 8
Catalyst Switches
Router# show mac-address-table static *Oct 22 12:15:35: %SYS-5-CONFIG_I: Configured from console by console vlan mac address type protocol qos ports -----+---------------+--------+---------+---+-------------------------------200 0050.3e8d.6400 static assigned -- Router 100 0050.3e8d.6400 static assigned -- Router 4092 0050.f0ac.3058 static other -- Router 917 0100.0cdd.dddd static other -- Fa5/9,Router,Switch 5 0050.3e8d.6400 static assigned -- Router 303 0100.0cdd.dddd static other -- Fa5/9,Router,Switch 850 0100.0cdd.dddd static other -- Fa5/9,Router,Switch 1002 0100.0cdd.dddd static other -- Fa5/9,Router,Switch 802 0100.0cdd.dddd static other -- Fa5/9,Router,Switch 2 0100.0cdd.dddd static other -- Fa5/9,Router,Switch 304 0100.5e00.0001 static ip -- Fa5/9,Switch . . .
The following example shows how to display static MAC address entries with a specific protocol type (in this case, assigned):
Router# show mac-address-table static protocol assigned vlan mac address type protocol qos ports -----+---------------+--------+---------+---+--------------------------------
127
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show mac-address-table static
----
The following example shows the detailed output for the previous example:
Router# show mac-address-table static protocol assigned detail MAC Table shown in details ======================================== Type Always Learn Trap Modified Notify Capture Protocol Flood -------+------------+----+--------+------+-------+--------+-----+ QoS bit L3 Spare Mac Address Age Byte Pvlan Xtag SWbits Index -----------------+--------+--------------+--------+-----+----+------+----STATIC NO NO NO NO NO assigned NO Bit Not On 0 0050.3e8d.6400 254 200 1 0 0x3 STATIC NO Bit Not On STATIC NO Bit Not On S . . . Bit Not On NO 0 NO 0 0 NO NO 0050.3e8d.6400 NO NO 0050.3e8d.6400 0050.f0ac.3058 NO 254 NO 254 254 assigned NO 100 1 assigned NO 5 1 4092 1
0x3
0 0
0x3 0x3
Related Commands
Description Displays MAC address table information for a specific MAC address. Displays the number of entries currently in the MAC address table. Displays detailed MAC address table information. Displays dynamic MAC address table entries only. Displays the MAC address table information for a specific interface. Displays multicast MAC address table information. Displays MAC address table information based on protocol. Displays the MAC address table information for a specific VLAN.
show mac-address-table aging-time Displays the MAC address aging time. show mac-address-table count show mac-address-table detail show mac-address-table dynamic show mac-address-table interface show mac-address-table multicast show mac-address-table protocol show mac-address-table vlan
128
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show port flowcontrol
Syntax Description
mod_num port_num
(Optional) Number of the module. (Optional) Number of the port on the module. If you do not specify a number, filters configured on all the ports on the module are shown.
Command Modes
User EXEC
Command History
Release 12.2(11)T
Modification This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers
Usage Guidelines
The Catalyst 2948G is a fixed configuration switch. All ports are located on module 2; for this reason, if you enter mod_num/port_num 1/N, an error message is displayed.
Examples
The following example shows how to display the flow-control port status and statistics:
Router> show port flowcontrol Port Send-Flowcontrol Receive-Flowcntl Admin Oper Admin Oper ----- ------------------------------3/1 on disagree on disagree 3/2 off off off off 3/3 desired on desired off RxPause ------0 0 10 TxPause -----0 0 10
Table 4 Describes the fields in the show port flowcontrol command output.
Table 4 show port flowcontrol Command Output Fields
On indicates the local port sends flow control to the far end. Off indicates the local port does not send flow control to the far end. Desired indicates the local end sends flow control to the far end if the far end supports it.
129
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show port flowcontrol
Table 4
Disagree indicates the two ports could not agree on a link protocol. On indicates the local port requires the far end to send flow control. Off indicates the local port does not allow the far end to send flow control. Desired indicates the local end allows the far end to send flow control.
Receive-Flowcntl Admin
Flow-control operation. Possible setting: Disagree indicates the two ports could not agree on a link protocol. Number of pause frames received. Number of pause frames transmitted.
Related Commands
Description Sets the receive flow-control value for a particular Gigabit Ethernet switching module port.
130
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show power inline
Syntax Description
(Optional) ID of the module and port number. (Optional) Displays the current power status, which might not be the same as the configured power. (Optional) Displays the configured power status.
Command Modes
Privileged EXEC
Command History
Modification This command was first introduced. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Examples
The following is sample output from the show power inline fa0/4 actual command:
Router# show power inline fa0/4 actual Interface Power -------------------- ----FastEthernet0/4 no
Related Commands
Description Determines how inline power is applied to devices on the specified Fast Ethernet port.
131
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show spantree
show spantree
To display spanning-tree information for a VLAN or port, use the show spantree command in normal mode. show spantree [vlan] [active] show spantree mod/port
Syntax Description
(Optional) Number of the VLAN; valid values are from 1 to 1001 and from 1025 to 4094. (Optional) Displays only the active ports. Number of the module and the port on the module.
Command Modes
Privileged Exec
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on the Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
If you do not specify the VLAN number, VLAN 1 is displayed. If you are in Multiple Instances of Spanning Tree (MISTP) mode, instance information is not displayed. The maximum length of the channel port list can be 47. The space in the Port(s) column may not be enough to display the entire list in one line. If this is the case, the port list is split into multiple lines. For example, in the following display, ports 6/5-8, 6/13, 6/15, 6/17, 6/19 are channeling:
... Port(s) Vlan Port-State Cost Prio Portfast Channel_id ------------------------ ---- ------------- --------- ---- -------- ---------6/5-8,6/13,6/15,6/17,6/1 1 not-connected 2684354 32 disabled 0 9 ...
The Link Aggregation Control Protocol (LACP) channel protocol does not support half-duplex links. If a port is in active/passive mode and becomes half duplex, the port is suspended (and a syslog message is generated). The port is shown as "connected" using the show port command and as "not connected" using the show spantree command. This discrepancy is because the port is physically connected but never joined between spanning tree. To get the port to join spanning tree, either set the duplex to full or set the channel mode to off for that port.
132
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show spantree
Examples
The following example while in Per VLAN Spanning Tree (PVST+ mode) shows how to display the active spanning tree port configuration for VLAN 1:
Router# show spantree 1 active VLAN 1 Spanning tree mode PVST+ Spanning tree type ieee Spanning tree enabled Designated Root 00-60-70-4c-70-00 Designated Root Priority 16384 Designated Root Cost 19 Designated Root Port 2/3 Root Max Age 14 sec Hello Time 2 sec Forward Delay 10 sec Bridge ID MAC ADDR Bridge ID Priority Bridge Max Age 20 sec Port -----------------------2/3 2/12 Router# 00-d0-00-4c-18-00 32768 Hello Time 2 sec Forward Delay 15 sec Vlan ---1 1 Port-State Cost Prio Portfast Channel_id ------------- --------- ---- -------- ---------forwarding 19 32 disabled 0 forwarding 19 32 disabled 0
The following example (while in MISTP mode) shows how to display the active spanning-tree port configuration for VLAN 1:
Router# show spantree 1 active VLAN 1 Spanning tree mode MISTP Spanning tree type ieee Spanning tree enabled VLAN mapped to MISTP Instance: 1 Port Vlan Port-State Cost Prio Portfast Channel_id ------------------------ ---- ------------- --------- ---- -------- ---------2/3 1 forwarding 200000 32 disabled 0 2/12 1 forwarding 200000 32 disabled 0 Router#
Field VLAN Spanning tree Designated Root Designated Root Priority Designated Root Cost Designated Root Port Root Max Age
Description VLAN for which the spanning-tree information is shown. Status of whether Spanning Tree Protocol is enabled or disabled. MAC address of the designated spanning-tree root bridge. Priority of the designated root bridge. Total path cost to reach the root. Port through which the root bridge can be reached (shown only on nonroot bridges). Amount of time a bridge packet data unit (BPDU) packet should be considered valid.
133
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show spantree
Table 5
Description Number of times the root bridge sends BPDUs. Amount of time the port spends in listening or learning mode. Port number. VLAN to which the port belongs. Spanning tree port state (disabled, inactive, not-connected, blocking, listening, learning, forwarding, bridging, or type-pvid-inconsistent). Cost associated with the port. Priority associated with the port. Status of whether the port is configured to use the PortFast feature. Channel ID number.
Related Commands
Command show spantree backbonefast show spantree blockedports show spantree portvlancost show spantree statistics show spantree summary show spantree uplinkfast
Description Displays whether the spanning-tree BackboneFast Convergence feature is enabled. Displays only the blocked ports on a per-VLAN or per-instance basis. Shows the path cost for the VLANs or extended-range VLANs. Shows spanning tree statistical information Displays a summary of spanning-tree information. Shows the UplinkFast feature settings.
134
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show storm-control
show storm-control
To view switchport characteristics, including storm-control levels set on the interface, use the show storm-control command in privileged EXEC mode. show storm-control
Syntax Description
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on the Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Use the show storm-control command to verify the forwarding of unnecessary flooded traffic levels on the interface.
Examples
The following example shows the storm-control levels set on the interface being verified:
Router# show storm-control Storm control:broadcast multicast unicast threshold 25 with default packet-size 64
Related Commands
135
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show vlan-switch
show vlan-switch
To display VLAN information, use the show vlan-switch command in privileged EXEC mode. show vlan-switch [brief | id vlan | name name]
Syntax Description
(Optional) Displays only a single line for each VLAN, naming the VLAN, status, and ports. (Optional) Displays information about a single VLAN identified by VLAN ID number; valid values are from 1 to 1005. (Optional) Displays information about a single VLAN identified by VLAN name; valid values are an ASCII string from 1 to 32 characters.
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Each Ethernet switch port and Ethernet repeater group belongs to only one VLAN. Trunk ports can be on multiple VLANs.
Examples
This example shows how to display the VLAN parameters for all VLANs within the administrative domain:
Router# show vlan-switch VLAN Name Status Ports ---- -------------------------------- --------- ------------------------------1 default active Fa4/0, Fa4/1, Fa4/2, Fa4/3 Fa4/4, Fa4/5, Fa4/6, Fa4/7 Fa4/8, Fa4/9, Fa4/10, Fa4/11 Fa4/12, Fa4/13, Fa4/14, Fa4/15 Fa4/16, Fa4/17, Fa4/18, Fa4/19 Fa4/20, Fa4/21, Fa4/22, Fa4/23 Fa4/24, Fa4/25, Fa4/26, Fa4/27 Fa4/28, Fa4/29, Fa4/30, Fa4/31 Fa4/32, Fa4/33, Fa4/34, Fa4/35 Gi4/0, Gi4/1, Po1 2 VLAN0002 active 3 VLAN0003 active 5 VLAN0005 active 1002 fddi-default active 1003 token-ring-default active
136
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show vlan-switch
1004 fddinet-default 1005 trnet-default VLAN ---1 2 3 5 1002 1003 1004 1005 Type ----enet enet enet enet fddi tr fdnet trnet SAID ---------100001 100002 100003 100005 101002 101003 101004 101005 MTU ----1500 1500 1500 1500 1500 1500 1500 1500 Parent -----1005 -
active active RingNo -----0 0 BridgeNo -------1 1 Stp ---ibm ibm BrdgMode -------srb Trans1 -----1002 0 0 0 1 1 0 0 Trans2 -----1003 0 0 0 1003 1002 0 0
Field VLAN Name Status Ports Type SAID MTU Parent RingNo BrdgNo Stp BrdgMode
Description VLAN number Name, if configured, of the VLAN Status of the VLAN (active or suspend) Ports that belong to the VLAN Media type of the VLAN Security association ID value for the VLAN Maximum transmission unit size for the VLAN Parent VLAN, if one exists Ring number for the VLAN, if applicable Bridge number for the VLAN, if applicable Spanning-Tree Protocol type used on the VLAN Bridging mode for this VLANpossible values are source-route bridging (SRB) and source-route transparent bridging (SRT); the default is SRB.
Related Commands
None
137
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show vtp
show vtp
To display general information about the VLAN Trunk Protocol (VTP) management domain, status, and counters, use the show vtp command in privileged EXEC mode. show vtp {counters | status}
Syntax Description
counters status
Displays the VTP counters for the switch. Displays the general information about the VTP management domain.
Command Modes
Privileged EXEC
Command History
Modification This command was first introduced. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Examples
The following is sample output from the show vtp counters command. Table 7 describes each field in the display:
Router# show vtp counters VTP statistics: Summary advertisements received Subset advertisements received Request advertisements received Summary advertisements transmitted Subset advertisements transmitted Request advertisements transmitted Number of config revision errors Number of config digest errors Number of V1 summary errors VTP pruning statistics: Trunk Summary advts received from non-pruning-capable device ---------------- ---------------- ---------------- --------------------------Fa0/9 827 824 0 Fa0/10 827 823 0 Fa0/11 827 823 0 Join Transmitted Join Received
: : : : : : : : :
38 0 0 13 3 0 0 0 0
138
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show vtp
Table 7
Description Number of summary advertisements received by this switch on its trunk ports. Summary advertisements contain the management domain name, the configuration revision number, the update time stamp and identity, the authentication checksum, and the number of subset advertisements to follow. Number of subset advertisements received by this switch on its trunk ports. Subset advertisements contain all the information for one or more VLANs. Number of advertisement requests received by this switch on its trunk ports. Advertisement requests normally request information on all VLANs. They can also request information on a subset of VLANs. Number of summary advertisements sent by this switch on its trunk ports. Summary advertisements contain the management domain name, the configuration revision number, the update timestamp and identity, the authentication checksum, and the number of subset advertisements to follow. Number of subset advertisements sent by this switch on its trunk ports. Subset advertisements contain all the information for one or more VLANs. Number of advertisement requests sent by this switch on its trunk ports. Advertisement requests normally request information on all VLANs. They can also request information on a subset of VLANs. Number of revision errors. Whenever you define a new VLAN, delete an existing VLAN, suspend or resume an existing VLAN, or modify the parameters on an existing VLAN, the configuration revision number of the switch increments. Revision errors increment whenever the switch receives an advertisement whose revision number matches the revision number of the switch, but the MD5 digest values do not match. This error indicates that the VTP password in the two switches is different, or the switches have different configurations. These errors indicate that the switch is filtering incoming advertisements, which causes the VTP database to become unsynchronized across the network.
139
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show vtp
Table 7
Description Number of MD5 digest errors. Digest errors increment whenever the MD5 digest in the summary packet and the MD5 digest of the received advertisement calculated by the switch do not match. This error usually indicates that the VTP password in the two switches is different. To solve this problem, make sure the VTP password on all switches is the same. These errors indicate that the switch is filtering incoming advertisements, which causes the VTP database to become unsynchronized across the network.
Number of version 1 errors. Version 1 summary errors increment whenever a switch in VTP V2 mode receives a VTP version 1 frame. These errors indicate that at least one neighboring switch is either running VTP version 1 or VTP version 2 with V2-mode disabled. To solve this problem, change the configuration of the switches in VTP V2-mode to disabled.
Join Transmitted Join Received Summary Advts Received from non-pruning-capable device
Number of VTP pruning messages transmitted on the trunk. Number of VTP pruning messages received on the trunk. Number of VTP summary messages received on the trunk from devices that do not support pruning.
The following is sample output from the show vtp status command. Table 8 describes each field in the display:
Router# show vtp status VTP Version : 2 Configuration Revision : 1 Maximum VLANs supported locally : 68 Number of existing VLANs : 7 VTP Operating Mode : Server VTP Domain Name : test1 VTP Pruning Mode : Disabled VTP V2 Mode : Disabled VTP Traps Generation : Disabled MD5 digest : 0x3D 0x02 0xD4 0x3A 0xC4 0x46 0xA1 0x03 Configuration last modified by 172.20.130.52 at 3-4-93 22:25:
140
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series show vtp
Table 8
Description Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers Displays the VTP version operating on the switch. By default, switches implement version 1.
Catalyst Switches
Displays the VTP version operating on the switch. By default, Catalyst 2900 and 3500 XL switches implement version 1 but can be set to version 2. Configuration Revision Maximum VLANs Supported Locally Number of Existing VLANs VTP Operating Mode Current configuration revision number on this switch. Maximum number of VLANs supported locally. Number of existing VLANs. Displays the VTP operating mode, which can be server, client, or transparent. ServerA switch in VTP server mode is enabled for VTP and sends advertisements. You can configure VLANs on it. The switch guarantees that it can recover all VLAN information in the current VTP database from nonvolatile storage after reboot. By default, every switch is a VTP server. Client: a switch in VTP client mode is enabled for VTP, can send advertisements, but does not have enough nonvolatile storage to store VLAN configurations. You cannot configure VLANs on it. When a VTP client starts up, it does not transmit VTP advertisements until it receives advertisements to initialize its VLAN database. Transparent: a switch in VTP transparent mode is disabled for VTP, does not transmit advertisements or learn from advertisements sent by other devices, and cannot affect VLAN configurations on other devices in the network. The switch receives VTP advertisements and forwards them on all trunk ports except the one on which the advertisement was received. The configuration of multi-VLAN ports causes the switch to automatically enter transparent mode.
Note
Catalyst 2912MF, 2924M, and 3500 XL switches support up to 250 VLANs. All other Catalyst 2900 XL switches support up to 64 VLANs. If you define more than 250 or 64 or if the switch receives an advertisement that contains more than 250 or 64 VLANs, the switch automatically enters VTP transparent mode and operates with the VLAN configuration preceding the one that sent it into transparent mode.
141
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 show vtp
Table 8
Description Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers VTP pruning mode is not supported on the Cisco 2600 series and Cisco 3600 series routers.
Catalyst Switches
Displays whether pruning is enabled or disabled. Enabling pruning on a VTP server enables pruning for the entire management domain. Pruning restricts flooded traffic to those trunk links that the traffic must use to access the appropriate network devices. VTP V2 Mode Displays if VTP version 2 mode is enabled. All VTP version 2 switches operate in version 1 mode by default. Each VTP switch automatically detects the capabilities of all other VTP devices. A network of VTP devices should be configured to version 2 only if all VTP switches in the network can operate in version 2 mode. Displays whether VTP traps are transmitted to a network management station. A 16-byte checksum of the VTP configuration. Displays the date and time of the last configuration modification. Displays the IP address of the switch that caused the configuration change to the database.
Related Commands
Description Clears the VTP and pruning counters. Configures the VTP mode.
142
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series spanning-tree cost
spanning-tree cost
To set the path cost of the interface for Spanning Tree Protocol (STP) calculations, use the spanning-tree cost command in interface configuration mode. To revert to the default value, use the no form of this command. spanning-tree cost cost no spanning-tree cost
Syntax Description
cost
Path cost; valid values are from 1 to 200,000,000 for Cisco IOS Releases 12.1(3a)E and later releases and from 1 to 65535 for Cisco IOS releases prior to Cisco IOS Release 12.1(3a)E.
Defaults
The default path cost is computed from the interface's bandwidth setting; default path costs are: Ethernet100 16-Mb Token Ring62 FDDI10 FastEthernet10 ATM 1556 Gigabit Ethernet1 HSSI647
Command Modes
Interface configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was modified to support 32-bit path cost. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
When you specify a value for the cost argument, higher values indicate higher costs. This range applies regardless of the protocol type specified.
143
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 spanning-tree cost
Examples
The following example shows an interface being accesses and set a path cost value of 250 being set for the spanning tree VLAN associated with that interface:
Router(config)# interface ethernet 2/0 Router(config-if)# spanning-tree cost 250
Related Commands
Description Displays spanning tree state information. Sets an interface priority when two bridges tie for position as the root bridge.
spanning-tree portfast (global Enables PortFast mode, where the interface is immediately put into configuration mode) the forwarding state upon linkup without waiting for the timer to expire. spanning-tree portfast (interface configuration mode) spanning-tree uplinkfast spanning-tree vlan Enables PortFast mode, where the interface is immediately put into the forwarding state upon linkup without waiting for the timer to expire. Enables the UplinkFast feature. Configures STP on a per-VLAN basis.
144
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series spanning-tree port-priority
spanning-tree port-priority
To set an interface priority when two bridges tie for position as the root bridge, use the spanning-tree port-priority command in interface configuration mode. The priority you set breaks the tie. To revert to the default value, use the no form of this command. spanning-tree port-priority port_priority no spanning-tree port-priority
Syntax Description
port_priority
Defaults
128
Command Modes
Interface configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on the Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Examples
The following example shows how to increase the likelihood that the spanning tree instance 20 will be chosen as the root-bridge on interface ethernet 2/0.
Router(config)# interface ethernet 2/0 Router(config-if)# spanning-tree port-priority 20 Router(config-if)#
Related Commands
Command show spanning-tree spanning-tree cost spanning-tree portfast (global configuration mode) spanning-tree portfast (interface configuration mode)
Description Displays spanning-tree state information. Sets the path cost of the interface for STP calculations. Enables PortFast mode, where the interface is immediately put into the forwarding state upon linkup, without waiting for the timer to expire. Enables PortFast mode, where the interface is immediately put into the forwarding state upon linkup, without waiting for the timer to expire.
145
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 spanning-tree port-priority
146
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series spanning-tree vlan
spanning-tree vlan
To configure Spanning Tree Protocol (STP) on a per-VLAN basis, use the spanning-tree vlan command in global configuration mode. To return to the default value, use the no form of this command. spanning-tree vlan vlan_id [forward-time seconds | hello-time seconds | max-age seconds | priority priority | protocol protocol | {root {primary | secondary} [diameter net-diameter [hello-time hello-time]]}] no spanning-tree vlan vlan_id [forward-time | hello-time | max-age | priority | protocol | root]
Syntax Description
VLAN identification number; valid values are from 1 to 1,005. (Optional) Sets the STP forward delay time; valid values are from 4 to 30 seconds. (Optional) Specifies in seconds, the duration between the generation of configuration messages by the root switch; valid values are from 1 to 10 seconds. (Optional) Sets the maximum number of seconds the information in a bridge packet data unit (BPDU) is valid; valid values are from 6 to 40 seconds. (Optional) Sets the STP bridge priority; valid values are from 0 to 65535. (Optional) Sets the STP. See the Usage Guidelines section for a list of valid values. (Optional) Forces this switch to be the root bridge. (Optional) Specifies this switch to act as the root switch should the primary root fail. (Optional) Specifies the maximum number of bridges between any two points of attachment of end stations; valid values are from 2 through 7.
max-age seconds
priority priority protocol protocol root primary root secondary diameter net-diameter
Defaults
forward-time15 seconds hello-time2 seconds max-age20 seconds priorityThe default with IEEE STP enabled is 32,768; with STP enabled, the default is 128. protocolIEEE rootNo STP root
Command Modes
Global configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on the Catalyst 6000 family switches was extended to the E train.
147
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 spanning-tree vlan
Modification This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
When setting the max-age seconds, if a bridge does not hear Bridge Protocol Data Units (BPDU) from the root bridge within the specified interval, it assumes that the network has changed and recomputes the spanning tree topology. Valid values for protocol are dec (Digital STP), ibm (IBM STP), ieee (IEEE Ethernet STP), and vlan-bridge (VLAN BridgeSTP). The spanning-tree root primary command alters this switch's bridge priority to 8,192. If you enter after spanning-tree root primary command and the switch does not become root, then the bridge priority is changed to 100 less than the bridge priority of the current bridge. If the switch does not become root, an error results. The spanning-tree root secondary command alters this switch's bridge priority to 16,384. If the root switch should fail, this switch becomes the next root switch. Use the spanning-tree root commands on backbone switches only.
Examples
The following example shows spanning tree on VLAN 200 being enabled:
Router(config)# spanning-tree vlan 200 Router(config)#
The following example shows the switch being configured as the root switch for VLAN 10 with a network diameter of 4:
Router(config)# spanning-tree vlan 10 root primary diameter 4 Router(config)#
The following example shows the switch being configured as the secondary root switch for VLAN 10 with a network diameter of 4:
Router(config)# spanning-tree vlan 10 root secondary diameter 4 Router(config)#
Related Commands
Description Displays spanning-tree state information. Sets the path cost of the interface for STP calculations. Sets an interface priority when two bridges tie for position as the root bridge.
148
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series spanning-tree vlan
Command spanning-tree portfast (global configuration mode) spanning-tree portfast (interface configuration mode) spanning-tree uplinkfast
Description Enables PortFast mode, where the interface is immediately put into the forwarding state upon linkup, without waiting for the timer to expire. Enables PortFast mode, where the interface is immediately put into the forwarding state upon linkup, without waiting for the timer to expire. Enables the UplinkFast feature.
149
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 storm-control
storm-control
To set up the storm-control threshold value, use the storm-control command in interface configuration mode. To return to the default, use the no form of this command. storm-control {broadcast threshold | multicast threshold | unicast threshold} no storm-control
Syntax Description
Specifies the broadcast suppression level for an interface as a percentage of total bandwidth. Specifies the multicast suppression level for an interface as a percentage of total bandwidth. Specifies the unicast suppression level for an interface as a percentage of total bandwidth. Specifies the limit (percentage) placed on broadcast traffic: A threshold value of 100 percent means that no limit is placed on broadcast traffic. Valid entries are from 1 to 100.
Defaults
storm-control is disabled
Command Modes
Interface configuration
Command History
Modification This command was introduced on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Use the storm-control command to block the forwarding of unnecessary flooded traffic
Examples
The following example shows the threshold of broadcast traffic being limited to 70 percent.
Router(config-if)# storm-control multicast threshold 70
150
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series storm-control
Related Commands
Description Displays the count of discarded packets. Displays switchport characteristics, including storm-control levels set on the interface.
151
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 switchport mode
switchport mode
To set the interface type, use the switchport mode command in interface configuration mode. To reset the mode to the appropriate default mode for the device.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
switchport mode {access | trunk | dynamic {auto | desirable}} switchport mode private-vlan {host | promiscuous} no switchport mode no switchport mode private-vlan
Syntax Description
access trunk dynamic auto dynamic desirable private-vlan host private-vlan promiscuous
Specifies a nontrunking, nontagged single VLAN Layer 2 interface. Specifies a trunking VLAN Layer 2 interface. Specifies that the interface convert the link to a trunk link. Specifies that the interface actively attempt to convert the link to a trunk link. Specifies that the ports with a valid PVLAN association becomes active host private VLAN ports. Specifies that the ports with a valid PVLAN mapping become active promiscuous ports.
Defaults
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Access mode
Catalyst Switches
The default mode is dependent on the platform; it should either be dynamic auto for platforms that are intended as wiring closets or dynamic desirable for platforms that are intended as backbone switches. The default for PVLAN ports is that no mode is set.
Command Modes
Interface configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. The switchport mode private-vlan {host | promiscuous} syntax was added.
152
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series switchport mode
Modification This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
If you enter a forced mode, the interface does not negotiate the link to the neighboring interface. Ensure that the interface ends match. The no form of the command is not supported on the Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
Catalyst Switches
If you enter access mode, the interface goes into permanent nontrunking mode and negotiates to convert the link into a nontrunk link even if the neighboring interface does not agree to the change. If you enter trunk mode, the interface goes into permanent trunking mode and negotiates to convert the link into a trunk link even if the neighboring interface does not agree to the change. If you enter dynamic auto mode, the interface converts the link to a trunk link if the neighboring interface is set to trunk mode or desirable mode. If you enter dynamic desirable mode, the interface becomes a trunk interface if the neighboring interface is set to trunk mode, desirable mode, or auto mode. If you configure a port as a promiscuous or host PVLAN port and one of the following applies, the port becomes inactive:
The port does not have a valid PVLAN association or mapping configured. The port is a span destination.
Similarly, if a private port PVLAN association or mapping is deleted, or if a private port is configured as a span destination, it becomes inactive.
Examples
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The following example shows the interface being set to access desirable mode:
Router(config-if)# switchport mode access desirable Router(config-if)#
The following example shows the interface being set to trunk mode:
Router(config-if)# switchport mode trunk Router(config-if)#
Catalyst Switches
The following example shows the interface being set to dynamic desirable mode:
Router(config-if)# switchport mode dynamic desirable Router(config-if)#
153
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 switchport mode
The following example shows a port being set to PVLAN host mode:
Router(config-if)# switchport mode private-vlan host Router(config-if)#
Related Commands
Command show interfaces switchport show interfaces trunk switchport switchport private-vlan host-association switchport private-vlan mapping
Description Displays administrative and operational status of a switching (nonrouting) port. Modifies the switching characteristics of the Layer 2-switched interface. Defines a PVLAN association for an isolated or community port. Defines the PVLAN mapping for a promiscuous port.
154
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series switchport stacking-link
switchport stacking-link
To create intrachassis stacking between the current Gigabit Ethernet interface and the stacking link partner Gigabit Ethernet interface, use the switchport stacking-link command in global configuration mode. To disable the intrachassis stacking, use the no form of this command. switchport stacking-link interface Gigabit slot/port no switchport stacking-link interface Gigabit slot/port
Syntax Description
slot/port
Defaults
Command Modes
Command History
Release 12.2(11)T
Modification This command was introduced on Cisco 2600 series, Cisco 3600 Series and Cisco 3700 series.
Usage Guidelines
Use the switchport stacking-link command to extend layer 2 switching in the router by connecting the Gigabit Ethernet (GE) ports of the Cisco EtherSwitch network module. This connection will sustain a line rate traffic, and form a single VLAN consisting of all ports in multiple Cisco EtherSwitch network modules. When the stacking link is disabled, both Gigabit Ethernet interfaces participating in the stacking link are made administrative down.
Note
Examples
The following example shows GE 2/0 to GE 3/0 being stacked to form a single VLAN:
Router# config terminal Router(config)# interface Gigabit 2/0 Router(config-if)# switchport stacking-link interface Gigabit 3/0
Related Commands
none
155
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 switchport trunk
switchport trunk
To set the trunk characteristics when the interface is in trunking mode, use the switchport trunk commands in interface configuration mode. To reset all of the trunking characteristics back to the original defaults, use the no form of this command.
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
switchport trunk encapsulation {dot1q} switchport trunk native vlan vlan-id switchport trunk allowed vlan vlan-list no switchport trunk {encapsulation {dot1q} | {native vlan} | {allowed vlan}}
Catalyst Switches
switchport trunk encapsulation {isl | dot1q | negotiate} switchport trunk native vlan vlan-id switchport trunk allowed vlan vlan-list switchport trunk pruning vlan vlan-list no switchport trunk {encapsulation {isl | dot1q | negotiate}} | {native vlan} | {allowed vlan} | {pruning vlan}}
Syntax Description
Sets the list of allowed VLANs that transmit this interface in tagged format when in trunking mode. See the Usage Guidelines section for vlan-list formatting guidelines. Sets the trunk encapsulation format to 802.1Q. Sets the trunk encapsulation format to Inter-Switch Link (ISL). Specifies that if Dynamic Inter-Switch Link Protocol (DISL) and Dynamic Packet Transport (DPT) negotiation do not resolve the encapsulation format, ISL is the selected format. Sets the native VLAN for the trunk in 802.1Q trunking mode. Sets the list of VLANs that are enabled for VTP pruning when in trunking mode. See the Usage Guidelines section for the vlan-list argument formatting guidelines.
encapsulation dot1q encapsulation isl encapsulation negotiate native vlan vlan-id pruning vlan vlan-list
Defaults
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The default encapsulation type is dot1q. The default access VLAN and trunk interface native VLAN is a default VLAN corresponding to the platform or interface hardware. The default for all VLAN lists is to include all VLANs.
156
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series switchport trunk
Catalyst Switches
The default encapsulation type is dependent on the platform or interface hardware itself. The default access VLAN and trunk interface native VLAN is a default VLAN corresponding to the platform or interface hardware. The default for all VLAN lists is to include all VLANs.
Command Modes
Interface configuration
Command History
Modification This command was introduced on Catalyst 6000 family switch. Support for this command on Catalyst 6000 family switch was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Routers
The switchport trunk encapsulation command is supported only for platforms and interface hardware that can support 802.1Q formats. The no form of the native vlan command resets the native mode VLAN to the appropriate default VLAN for the device. The no form of the allowed vlan command resets the list to the default list, which allows all VLANs. The vlan-list format is all | none | add | remove | except vlan-list[,vlan-list...] where:
allspecifies all VLANs from 1 to 1005. noneindicates an empty list. This keyword is not supported in the switchport trunk allowed vlan command. addadds the defined list of VLANs to those currently set, instead of replacing the list. removeremoves the defined list of VLANs from those currently set instead of replacing the list. exceptlists the VLANs that should be calculated by inverting the defined list of VLANs. vlan-listis either a single VLAN number from 1 to 1005 or a continuous range of VLANs described by two VLAN numbers, the lesser one first, separated by a hyphen that represents the VLAN IDs of the allowed VLANs when this port is in trunking mode. When you connect Cisco switches through an 802.1Q trunk, make sure that the native VLAN for an 802.1Q trunk is the same on both ends of the trunk link. If the native VLAN on one end of the trunk is different from the native VLAN on the other end, spanning-tree loops might result.
157
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 switchport trunk
Disabling spanning tree on the native VLAN of an 802.1Q trunk without disabling spanning tree on every VLAN in the network can cause spanning tree loops. Cisco recommends that you leave spanning tree enabled on the native VLAN of an 802.1Q trunk. If this is not possible, disable spanning tree on every VLAN in the network. Make sure that your network is free of physical loops before disabling spanning tree. When you connect two Cisco switches through 802.1Q trunks, the switches exchange spanning-tree BPDUs on each VLAN allowed on the trunks. The BPDUs on the native VLAN of the trunk are sent untagged to the reserved IEEE 802.1d spanning-tree multicast MAC address (01-80-C2-00-00-00). The BPDUs on all other VLANs on the trunk are sent tagged to the reserved Shared Spanning Tree Protocol (SSTP) multicast MAC address (01-00-0c-cc-cc-cd). The 802.1Q switches that are not Cisco switches maintain only a single instance of spanning tree (the Mono Spanning Tree, or MST) that defines the spanning tree topology for all VLANs. When you connect a Cisco switch to a switch other than a Cisco switch through an 802.1Q trunk, the MST of the switch that is not a Cisco switch, and the native VLAN spanning tree of the Cisco switch combine to form a single spanning tree topology known as the CST. Because Cisco switches transmit BPDUs to the SSTP multicast MAC address on VLANs other than the native VLAN of the trunk, switches that are not Cisco switches do not recognize these frames as BPDUs and flood them on all ports in the corresponding VLAN. Other Cisco switches connected to the 802.1Q cloud receive these flooded BPDUs. This allows Cisco switches to maintain a per-VLAN spanning tree topology across a cloud of 802.1Q switches that are not Cisco switches. The 802.1Q cloud of switches separating the Cisco switches is treated as a single broadcast segment between all switches connected to the 802.1Q cloud of switches that are not Cisco switches through 802.1Q trunks. Make certain that the native VLAN is the same on all the 802.1Q trunks connecting the Cisco switches to the 802.1Q cloud of switches that are not Cisco switches. If you are connecting multiple Cisco switches to a 802.1Q cloud that is not a Cisco801.1Q cloud, all the connections must be through 802.1Q trunks.
Catalyst Switches
The switchport trunk encapsulation command is supported only for platforms and interface hardware that can support both ISL and 802.1Q formats. If you enter the negotiate keywords and DISL and DTP negotiation do not resolve the encapsulation format, ISL is the selected format. The no form of the command resets the trunk encapsulation format back to the default. The no form of the native vlan command resets the native mode VLAN to the appropriate default VLAN for the device. The no form of the allowed vlan command resets the list to the default list, which allows all VLANs. The no form of the pruning vlan command resets the list to the default list, which enables all VLANs for VTP pruning. The vlan-list format is all | none | add | remove | except vlan-list[,vlan-list...] where:
allSpecifies all VLANs from 1 to 1005. This keyword is not supported in the switchport trunk pruning vlan command. noneIndicates an empty list. This keyword is not supported in the switchport trunk allowed vlan command. addAdds the defined list of VLANs to those currently set, instead of replacing the list. removeRemoves the defined list of VLANs from those currently set instead of replacing the list.
158
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series switchport trunk
exceptLists the VLANs that should be calculated by inverting the defined list of VLANs. vlan-listIs either a single VLAN number from 1 to 1005 or a continuous range of VLANs described by two VLAN numbers, the lesser one first, separated by a hyphen that represents the VLAN IDs of the allowed VLANs when this port is in trunking mode. When you connect Cisco switches through an 802.1Q trunk, make sure the native VLAN for an 802.1Q trunk is the same on both ends of the trunk link. If the native VLAN on one end of the trunk is different from the native VLAN on the other end, spanning tree loops might result. Disabling spanning tree on the native VLAN of an 802.1Q trunk without disabling spanning tree on every VLAN in the network can cause spanning tree loops. Cisco recommends that you leave spanning tree enabled on the native VLAN of an 802.1Q trunk. If this is not possible, disable spanning tree on every VLAN in the network. Make sure that your network is free of physical loops before disabling spanning tree. When you connect two Cisco switches through 802.1Q trunks, the switches exchange spanning-tree BPDUs on each VLAN allowed on the trunks. The BPDUs on the native VLAN of the trunk are sent untagged to the reserved IEEE 802.1d spanning tree multicast MAC address (01-80-C2-00-00-00). The BPDUs on all other VLANs on the trunk are sent tagged to the reserved SSTP multicast MAC address (01-00-0c-cc-cc-cd). The 802.1Q switches that are not Cisco switches maintain only a single instance of spanning-tree (the Mono Spanning Tree, or MST) that defines the spanning-tree topology for all VLANs. When you connect a Cisco switch to a switch through an 802.1Q trunk without a Cisco switch, the MST of the switch and the native VLAN spanning tree of the Cisco switch combine to form a single spanning tree topology known as the CST. Because Cisco switches transmit BPDUs to the SSTP multicast MAC address on VLANs other than the native VLAN of the trunk, switches that are not Cisco switches do not recognize these frames as BPDUs and flood them on all ports in the corresponding VLAN. Other Cisco switches connected to the 802.1Q cloud receive these flooded BPDUs. This allows Cisco switches to maintain a per-VLAN spanning tree topology across a cloud of 802.1Q switches that are not Cisco switches. The 802.1Q cloud of switches separating the Cisco switches is treated as a single broadcast segment between all switches connected to the 802.1Q cloud of switches that are not Cisco switches through 802.1Q trunks. Make certain that the native VLAN is the same on ALL of the 802.1Q trunks connecting the Cisco switches to the non-Cisco 802.1Q cloud. If you are connecting multiple Cisco switches to a non-Cisco 802.1Q cloud, all of the connections must be through 802.1Q trunks. You cannot connect Cisco switches to a non-Cisco 802.1Q cloud through ISL trunks or through access ports. Doing so will cause the switch to place the ISL trunk port or access port into the spanning tree port inconsistent state and no traffic will pass through the port.
Examples
The following example shows how to cause a port interface configured as a switched interface to encapsulate in 802.1Q trunking format, regardless of its default trunking format in trunking mode:
Router(config-if)# switchport trunk encapsulation dot1q Router(config-if)#
159
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 switchport trunk
Related Commands
160
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series switchport voice vlan
Syntax Description
vlan-id
VLAN used for voice traffic. Valid IDs are from 1 to 1005 (IDs 1006 to 4096 are not supported). Do not enter leading zeros. The switch port is an 802.1Q trunk port. The telephone uses priority tagging and uses VLAN 0. The switch port is an 802.1Q trunk port. The telephone is not instructed through the command line interface (CLI) about the voice VLAN. The telephone uses the configuration from the telephone keypad. The telephone does not tag frames; it uses VLAN 4095. The switch port can be an access port or an 802.1Q trunk port
dot1p none
untagged
Defaults
The switch default is not to automatically configure the telephone (none). The Cisco IP 7960 telephone default is to generate an 802.1Q/802.1P frame.
Command Modes
Interface configuration
Command History
Modification This command was introduced on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Ports that are not configured as trunk ports but have a configured voice VLAN are access ports with a voice VLAN ID (VVID).
Examples
The following example shows VLAN 2 being configured as the voice VLAN:
Switch(config-if)# switchport voice vlan 2
161
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 switchport voice vlan
Related Commands
None
162
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vlan database
vlan database
To enter VLAN configuration mode, use the vlan database command in privileged EXEC mode. vlan database
Syntax Description
Defaults
Command Modes
Privileged EXEC
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
Once you are in VLAN configuration mode, you can access the VLAN database editing buffer manipulation commands, including:
abortUsed to exit mode without applying the changes. applyUsed to apply current changes and bump revision number. exitUsed to apply changes, bump revision number, and exit mode. noUsed to negate a command or set its defaults; valid values are vlan and vtp. resetUsed to abandon current changes and reread current database. showUsed to display database information. vlanUsed to access subcommands to add, delete, or modify values associated with a single VLAN. For information about the vlan subcommands, see the vlan (VLAN configuration mode) command. vtpUsed to access subcommands to perform VTP administrative functions. For information about the vtp subcommands, see the vtp client command.
163
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vlan database
Examples
The following example shows how to exit VLAN configuration mode without applying changes after you are in VLAN configuration mode:
Router(vlan)# abort Aborting.... Router#
The following example shows how to delete a VLAN after you are in VLAN configuration mode:
Router(vlan)# no vlan 100 Deleting VLAN 100... Router(vlan)#
Related Commands
164
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vlan (VLAN configuration mode)
Syntax Description
Number of the VLAN; valid values are from 2 to 1001. (Optional) Specifies the maximum number of All Route Explorer hops for this VLAN; valid values are from 0 to 13. Zero is assumed if no value is specified. (Optional) Enables or disables the backup CRF mode of the VLAN; valid values are enable or disable. (Optional) Specifies the bridging characteristics of the VLAN or identification number of the bridge; valid type values are srb or srt. Valid bridge_num values are from 0 to 15. (Optional) Specifies the media type of the VLAN; valid values are ethernet, fd-net, fddi, trcrf, and trbrf. (Optional) Specifies the maximum transmission unit (packet size, in bytes) that the VLAN can use; valid values are from 576 to 18,190. (Optional) Defines a text string used as the name of the VLAN (1 to 32 characters). (Optional) Specifies the ID number of the parent VLAN of FDDI or Token Ring-type VLANs; valid values are from 2 to 1,001. (Optional) Specifies the ring number of FDDI or Token Ring-type VLANs; valid values are from 2 to 1,001. (Optional) Specifies the security association identifier; valid values are from 1 to 4,294,967,294 (Optional) Specifies whether the state of the VLAN is active or suspended. VLANs in suspended state do not pass packets. (Optional) Specifies the STP type; valid values are ieee, ibm, and auto. (Optional) Specifies the ID number of the first translational VLAN for this VLAN; valid values are from 2 to 1,001. Zero is the default value. (Optional) Specifies the ID number of the second translational VLAN for this VLAN; valid values are from 2 to 1,001. Zero is the default value.
media type mtu mtu-size name vlan-name parent parent-vlan-id ring ring-number said said-value state {suspend | active} stp type type tb-vlan1 tb-vlan1-id tb-vlan2 tb-vlan2-id
165
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vlan (VLAN configuration mode)
Defaults
The defaults are as follows: vlan-name is VLANxxxx where xxxx represents four numeric digits (including leading zeros) equal to the VLAN ID number media typeethernet stateactive said-value100000 plus the VLAN ID number mtu-sizedependent upon the VLAN type:
ethernet1500 fddi1500 trcrf1500 if V2 is not enabled, 4472 if it is enabled fd-net1500 trbrf1500 if V2 is not enabled, 4472 if it is enabled
ring-numberno ring number is specified bridge-numberno bridge number is specified parent-vlan-idno parent VLAN is specified typeno STP type is specified tb-vlan1 and tb-vlan20, which means no translational bridge VLAN is specified
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on the Catalyst 6000 family switch was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
VLAN 1 parameters are factory configured and cannot be changed. When you define vlan-name, the name must be unique within the administrative domain. The Security association ID (SAID) is documented in 802.10. When the no form is used, the VLAN's SAID is returned to the default. When you define the said-value, the name must be unique within the administrative domain. The bridge-number argument is used only for Token Ring-net and FDDI-net VLANs and is ignored in other types of VLANs. When the no form is used, the VLAN's source-routing bridge number returns to the default. The parent VLAN resets to the default if the parent VLAN is deleted or the media keyword changes the VLAN type or the VLAN type of the parent VLAN.
166
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vlan (VLAN configuration mode)
The tb-vlan1 and tb-vlan2 are used to configure translational bridge VLANs of a specified type of VLAN and are not allowed in other types of VLANs. Translational bridge VLANs must be of a differing VLAN type as the affected VLAN; if two VLANs are specified, the two must be of differing VLAN types. A translational bridge VLAN will reset to the default if the translational bridge VLAN is deleted or the media keyword changes the VLAN type or the VLAN type of the corresponding translational bridge VLAN.
Examples
The following example shows how to add a new VLAN with all default parameters to the new VLAN database:
Router(vlan)# vlan 2
Note
If the VLAN already exists, no action occurs. The following example shows how to cause the device to add a new VLAN, specify the media type and parent VLAN ID number 3, and set all other parameters to the defaults:
Router(vlan)# vlan 2 media ethernet parent 3 VLAN 2 modified: Media type ETHERNET Parent VLAN 3
The following example shows the MTU being returned to the default for its type and translational bridging VLANs being returned to the default:
Router(vlan)# no vlan 2 mtu tb-vlan1 tb-vlan2 Router(vlan)#
Related Commands
167
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vtp client
vtp client
To place the device in VLAN Trunking Protocol (VTP) client mode, use the vtp client command in VLAN configuration mode. To return to VTP server mode use the no form of this command. vtp client no vtp client
Syntax Description
Defaults
Server mode
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
If the receiving switch is in client mode, the client switch changes its configuration to duplicate the configuration of the server. If you have switches in client mode, be sure to make all VTP or VLAN configuration changes on a switch in server mode. The vtp server command is the functional equivalent of no vtp client command except that it does not return an error if the device is not in client mode.
Examples
The following example shows the device being placed in VTP client mode:
Router(vlan)# vtp client Router(vlan)#
Related Commands
Description Displays VTP statistics and domain information. Modifies the name of the VTP configuration storage file.
168
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vtp domain
vtp domain
To configure the administrative domain name for the device, use the vtp domain command in VLAN configuration mode. vtp domain domain-name
Syntax Description
domain-name
Domain name.
Defaults
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
When you define the domain-name argument, the domain name is case sensitive. Until a domain name is set, the device is in the no-management-domain state. In this state, the device does not transmit any VLAN Trunking Protocol (VTP) advertisements regardless of changes to local VLAN configuration. The device leaves the no-management-domain state upon receiving the first VTP summary packet on any port that is currently trunking or upon configuration of a domain name using the vtp domain command. If the device receives its domain from a summary packet, it resets its configuration revision number to zero. Once the device leaves the no-management-domain state, it can never be configured to reenter it, except by cleaning NVRAM and reloading.
Examples
The following example shows the device's administrative domain being set:
Router(config)# vtp domain DomainChandon Router(config)#
Related Commands
Description Displays VTP statistics and domain information. Modifies the name of the VTP configuration storage file.
169
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vtp password
vtp password
To create a VLAN Trunking Protocol (VTP) domain password, use the vtp password command in VLAN configuration mode. To delete the password, use the no form of this command. vtp password password-value no vtp password
Syntax Description
password password-value
Defaults
No password
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
The value of password-value is an ASCII string from 1 to 32 characters identifying the administrative domain for the device.
Examples
The following example shows the VTP domain password being deleted:
Router(vlan)# no vtp password Clearing device VLAN database password. Router(vlan)#
170
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vtp password
Related Commands
Description Displays VTP statistics and domain information. Modifies the name of the VTP configuration storage file.
171
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vtp server
vtp server
To place the device in VLAN Trunking Protocol (VTP) server mode, use the vtp server command in VLAN configuration mode. vtp server
Syntax Description
Defaults
Server mode
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
If you make a change to the VTP or VLAN configuration on a switch in server mode, that change is propagated to all the switches in the same VTP domain. VTP can be set to either server or client mode only when dynamic VLAN creation is disabled. If the receiving switch is in server mode, the configuration is not changed. The vtp server command is the functional equivalent of no vtp client command except that it does not return an error if the device is not in client mode.
Examples
The following example shows the device being placed in VTP server mode:
Router(vlan)# vtp server Router(vlan)#
Related Commands
Description Displays VTP statistics and domain information. Modifies the name of the VTP configuration storage file.
172
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vtp transparent
vtp transparent
To place the device in VLAN Trunking Protocol (VTP) transparent mode, use the vtp transparent command in VLAN configuration mode. To return to VTP server mode, use the no form of this command. vtp transparent no vtp transparent
Syntax Description
Defaults
Server mode
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
The vtp transparent command disables VTP from the domain but does not remove the domain from the switch. If the receiving switch is in transparent mode, the configuration is not changed. Switches in transparent mode do not participate in VTP. If you make VTP or VLAN configuration changes on a switch in transparent mode, the changes are not propagated to the other switches in the network. The vtp server command is similar to the no vtp transparent command, except that it does not return an error if the device is not in transparent mode.
Examples
The following example shows the device being placed in VTP transparent mode:
Router(vlan)# vtp transparent Router(vlan)#
173
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vtp transparent
The following example shows the device being returned to VTP server mode:
Router(vlan)# no vtp transparent Router(vlan)#
Related Commands
Description Displays VTP statistics and domain information. Modifies the name of the VTP configuration storage file.
174
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series vtp v2-mode
vtp v2-mode
To enable vtp version 2 mode, use the vtp v2-mode command in VLAN configuration mode. To disable version 2 mode, use the no form of this command. vtp v2-mode no vtp v2-mode
Syntax Description
Defaults
Command Modes
VLAN configuration
Command History
Modification This command was introduced on Catalyst 6000 family switches. Support for this command on Catalyst 6000 family switches was extended to the E train. This command was implemented on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(8)T on Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. This command was integrated into Cisco IOS Release 12.2(11)T.
Usage Guidelines
All switches in a VTP domain must run the same version of VTP. VTP version 1 and VTP version 2 do not operate on switches in the same VTP domain. If all switches in a domain are VTP version 2-capable, you need to enable VTP version 2 only on one switch; the version number is then propagated to the other version 2-capable switches in the VTP domain. If you toggle the version 2 mode, parameters of certain default VLANs are modified.
Examples
The following example shows version 2 mode being enabled in the VLAN database:
Router(vlan)# vtp v2-mode Router(vlan)#
The following example shows version 2 mode being disabled in the VLAN database:
Router(vlan)# no vtp v2-mode Router(vlan)#
175
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 vtp v2-mode
Related Commands
Description Displays VTP statistics and domain information. Modifies the name of the VTP configuration storage file.
176
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Glossary
Glossary
802.1pIEEE standard for queuing and multicast support. 802.1qIEEE standard for VLAN frame tagging. ATMAsynchronous Transfer Mode. AVVIDArchitecture for Voice, Video, and Integrated Data. BRIBasic Rate Interface. CACconnection admission control. CBWFQclass-based weighted fair queuing. CCNCisco Communications Network (Cisco IP phones and IP PBX). CoSclass of service. DSLdigital subscriber line. E&Mear and mouth. FXOForeign Exchange Office. FXSForeign Exchange Station. IPInternet Protocol. MIBManagement Information Base. PRIPrimary Rate Interface. PVCpermanent virtual circuit. PSTNpublic switched telephone network. QoSquality of service. RSVPResource Reservation Protocol. SIPsession initiation protocol. SNMPSimple Network Management Protocol. VBRvariable bit rate. VPNvirtual private network. VoIPVoice over IP. VoIPoFRVoice-over-IP over Frame-Relay. WANwide area network. WFQweighted fair queuing. WRRweighted round-robin.
177
16- and 36-Port Cisco EtherSwitch Network Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Glossary
178