Sei sulla pagina 1di 1336
INDEX Numerics 10-Gigabit Ethernet interfaces configuration guidelines defined 14-7 1 4 - 3 3 802.1AE

INDEX

Numerics

10-Gigabit Ethernet interfaces configuration guidelines

defined

14-7

14-33

802.1AE 11-2 802.1AE Tagging 11-9, 13-2 802.1x-REV 11-2

access ports and Layer 2 protocol tunneling 19-11 defined 14-3 in switch clusters 6-10

access ports, defined

access template

accounting with 802.1x 10-55

14-3

8-2

 

with IEEE 802.1x 10-17 with RADIUS 9-35 with TACACS+ 9-12, 9-17 ACEs and QoS 38-8 defined 37-2 Ethernet 37-2

A

AAA down policy, NAC Layer 2 IP validation

1-15

abbreviating commands

2-3

ABRs

41-26

AC (command switch) access-class command

6-11

37-21

IP

37-2

access control entries

ACLs

See ACEs

ACEs 37-2

access control entry (ACE)

43-3

any keyword

37-14

access-denied response, VMPS

15-28

 

applying

access groups

on bridged packets

37-44

applying IPv4 ACLs to interfaces

37-22

on multicast packets

37-45

Layer 2

37-22

on routed packets

37-45

Layer 3

37-23

on switched packets

37-43

access groups, applying IPv4 ACLs to interfaces accessing

clusters, switch

6-14

37-22

time ranges to to an interface

to IPv6 interfaces

37-18

37-21, 43-7

43-7

command switches

6-12

to QoS

38-8

member switches

6-14

classifying traffic for QoS

38-51

switch clusters

6-14

comments in

37-20

accessing stack members

5-27

compiling

37-26

access lists

defined

37-2, 37-8

 

See ACLs

examples of

37-26, 38-51

Catalyst 3560 Switch Software Configuration Guide

37-8   See ACLs examples of 37-26, 38-51 Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-1

OL-26641-03

IN-1

Index

extended IP, configuring for QoS classification

38-53

named, IPv6

43-3

extended IPv4

names 43-4

creating

matching criteria

37-12

37-8

hardware and software handling

host keyword 37-14

IP

37-23

creating

fragments and QoS guidelines

implicit deny

implicit masks 37-11

matching criteria 37-8

undefined 37-23

37-8

37-11, 37-16, 37-18

IPv4

38-42

applying to interfaces 37-21

creating 37-8

matching criteria 37-8

named 37-16

numbers 37-9

terminal lines, setting on 37-21

unsupported features 37-8

IPv6

and stacking 43-3

applying to interfaces 43-7

configuring 43-4, 43-5

displaying 43-8

interactions with other features 43-4

limitations 43-3

matching criteria 43-3

named 43-3

precedence of 43-2

supported 43-2

unsupported features 43-3

Layer 4 information in 37-43

logging messages 37-10

MAC extended 37-31, 38-54

matching

monitoring 37-47, 43-8

named, IPv4 37-16

37-8, 37-23, 43-3

number per QoS class map

port

precedence of

QoS

resequencing entries

router

router ACLs and VLAN map configuration guidelines 37-42

standard IP, configuring for QoS classification

standard IPv4

38-42

37-2, 43-1

38-8, 38-51

37-2, 43-1

37-3

37-16

creating

matching criteria

37-11

support for

support in hardware

time ranges

types supported

1-13

37-18

37-2

37-8

37-23

38-52

unsupported features, IPv4

37-8

unsupported features, IPv6

43-3

using router ACLs with VLAN maps

VLAN maps

configuration guidelines

configuring 37-33

37-34

active link

24-4, 24-5, 24-6

active links

24-2

active router

45-2

active traffic monitoring, IP SLAs

address aliasing

addresses

27-2

46-1

37-42

displaying the MAC address table

dynamic

accelerated aging

changing the aging time

default aging

20-10

20-10

defined

7-14

learning

7-15

removing

7-17

IPv6 42-2

7-16

7-26

7-15 removing 7-17 IPv6 42-2 7-16 7 - 2 6 Catalyst 3560 Switch Software Configuration Guide

Catalyst 3560 Switch Software Configuration Guide

IN-2

OL-26641-03

Index

MAC, discovering 7-26

for MSTP

21-26

multicast

for STP

20-25, 20-26

group address range

49-3

alarms, RMON

33-4

STP address management

20-10

allowed-VLAN list

15-21

multicast, STP address management static

20-10

application engines, redirecting traffic to area border routers

IS-IS 41-67

48-1

adding and removing

7-22

See ABRs

defined 7-14 address resolution 7-26, 41-9

 

area routing

Address Resolution Protocol

ISO IGRP

41-67

See ARP

ARP

adjacency tables, with CEF 41-92

configuring

41-11

administrative distances defined 41-105

OSPF

41-34

routing protocol defaults administrative VLAN

REP, configuring

23-8

administrative VLAN, REP advertisements

41-94

23-8

defined

encapsulation

static cache configuration table address resolution

1-7, 7-26, 41-9

41-12

41-11

7-26

managing ASBRs 41-26 AS-path filters, BGP

7-26

41-56

CDP

29-1

asymmetrical links, and IEEE 802.1Q tunneling

19-4

LLDP 30-2

attributes, RADIUS

RIP

41-21

vendor-proprietary 9-38

VTP

15-19, 16-3, 16-5

9-36

age timer, REP 23-8 aggregatable global unicast addresses 42-3

aggregate addresses, BGP 41-62

vendor-specific attribute-value pairs authentication

10-14, 10-17, 10-22, 10-23

 

EIGRP 41-43

 

aggregated ports

aggregate policing 1-17

HSRP

45-12

See EtherChannel aggregate policers 38-69

local mode with AAA open1x 10-32 RADIUS

9-44

aggregator template 5-12, 8-3

key

login

TACACS+

9-28

aging, accelerating 20-10

9-30

aging time

accelerated

defined

9-11

 

for MSTP

21-25

key

9-13

for STP

20-10, 20-25

login

9-14

MAC address table maximum

7-16

See also port-based authentication

Catalyst 3560 Switch Software Configuration Guide

table maximum 7-16 See also port-bas ed authentication Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-3

OL-26641-03

IN-3

Index

authentication compatibility with Catalyst 6000 switches 10-9

authentication failed VLAN

See restricted VLAN

authentication keys, and routing protocols

authentication manager

CLI commands

compatibility with older 802.1x CLI

10-10

commands

10-10 to ??

overview

10-8

41-105

authoritative time source, described

7-3

authorization

 

with

RADIUS

9-34

with

TACACS+

9-12, 9-16

authorized ports with IEEE 802.1x

10-11

autoconfiguration 3-3

auto enablement

automatic advise (auto-advise) in switch stacks

automatic copy (auto-copy) in switch stacks

automatic discovery

10-34

5-14

5-13

considerations

beyond a noncandidate device

6-9

brand new switches

 

6-10

connectivity

6-6

different VLANs

6-8

management VLANs

6-8

non-CDP-capable devices

noncluster-capable devices

routed ports

6-9

in switch clusters

See also CDP

6-6

6-7

6-7

automatic extraction (auto-extract) in switch stacks

5-13

automatic QoS

 

See

QoS

automatic recovery, clusters

6-11

 

See

also HSRP

automatic upgrades (auto-upgrade) in switch stacks

5-13

auto-MDIX

configuring

14-39

described

14-39

autonegotiation

duplex mode

interface configuration guidelines

mismatches 52-13

1-4

14-36

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP

Auto-QoS video devices

Auto-RP, described

autosensing, port speed

autostate exclude

14-6

auxiliary VLAN

1-18

1-4

49-6

See voice VLAN

availability, features

1-9

41-50

B

BackboneFast

described

22-8

disabling

22-18

enabling

22-17

support for

1-10

backup interfaces

See Flex Links

backup links

24-2

backup static routing, configuring

47-12

banners

configuring

login

7-14

message-of-the-day login

7-13

default configuration

7-12

when displayed

7-12

Berkeley r-tools replacement

9-56

BGP

aggregate addresses

41-62

aggregate routes, configuring

41-62

CIDR

clear commands

community filtering

41-62

41-65

41-59

CIDR clear commands community filtering 41-62 41-65 41-59 Catalyst 3560 Switch Software Configuration Guide IN-4

Catalyst 3560 Switch Software Configuration Guide

IN-4

OL-26641-03

Index

configuring neighbors

41-60

boot loader

default configuration

41-47

accessing 3-22

described 41-46

described 3-2

enabling 41-50

environment variables

3-22

monitoring 41-65

prompt 3-22

multipath support

41-54

trap-door mechanism

3-2

neighbors, types of

41-50

Boot Loader Upgrade and Image Verification for the FIPS

path selection

41-54

Mode of Operation

3-25

peers, configuring

prefix filtering

41-60

41-58

resetting sessions

41-53

route dampening

41-64

route maps

41-56

route reflectors

routing domain confederation

41-63

41-63

routing session with multi-VRF CE

41-86

show commands

41-65

supernets 41-62

support for

1-19

Version 4

41-47

binding cluster group and HSRP group

45-13

binding database

address, DHCP server

See DHCP, Cisco IOS server database

DHCP snooping

See DHCP snooping binding database

bindings

address, Cisco IOS DHCP server

DHCP snooping database

IP source guard

25-6

25-16

25-6

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets

Boolean expressions in tracked lists

booting

28-7

boot loader, function of

boot process

3-2

3-2

manually 3-20

specific image

3-21

47-4

bootstrap router (BSR), described 49-7

Border Gateway Protocol

See BGP

BPDU

error-disabled state

filtering 22-3

RSTP format

21-13

BPDU filtering

described 22-3

disabling 22-16

enabling 22-15

support for

1-10

BPDU guard

described

disabling 22-15

enabling

support for

22-2

22-14

1-10

22-2

bridged packets, ACLs on 37-44

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding 41-18

broadcast packets

directed 41-15

flooded 41-15

broadcast storm-control command 28-4

broadcast storms 28-1, 41-15

Catalyst 3560 Switch Software Configuration Guide

command 28-4 broadcast storms 28-1, 41-15 Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-5

OL-26641-03

IN-5

Index

C

as IGMP snooping learning method

clearing cached group entries

49-64

27-9

cables, monitoring for unidirectional links

31-1

enabling server support

49-45

candidate switch

joining multicast group

27-3

automatic discovery

6-6

overview

49-9

defined 6-5

server support only

49-9

requirements 6-5

switch support of

1-5

See also command switch, cluster standby group, and member switch

Catalyst 6000 switches

authentication compatibility

CA trustpoint

configuring 9-53

defined 9-51

10-9

CDP

and trusted boundary

automatic discovery in switch clusters

configuring 29-2

default configuration

defined with LLDP

described 29-1

38-48

29-2

30-1

6-6

CIDR

CipherSuites 9-52

Cisco 7960 IP Phone 17-1

Cisco Discovery Protocol

41-62

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco intelligent power management 14-8

Cisco IOS DHCP server

See DHCP, Cisco IOS DHCP server

Cisco IOS File System

See IFS

disabling for routing device

29-4

Cisco IOS IP SLAs 46-2

enabling and disabling

Cisco Redundant Power System 2300

on an interface

29-4

configuring 14-53

on a switch

29-4

managing 14-53

Layer 2 protocol tunneling

19-7

Cisco Secure ACS

monitoring 29-5

overview 29-1

power negotiation extensions

support for

switch stack considerations

transmission timer and holdtime, setting

updates 29-3

14-8

29-2

1-7

CEF

defined 41-92

distributed 41-92

enabling 41-92

IPv6

42-31

CGMP

29-3

attribute-value pairs for downloadable ACLs

attribute-value pairs for redirect URL

Cisco Secure ACS configuration guide 10-73

CiscoWorks 2000 1-7, 35-5

CISP

CIST regional root

See MSTP

CIST root

See MSTP

civic location

classless interdomain routing

10-22

10-34

30-3

See CIDR

classless routing

41-8

10-23

0 - 3 See CIDR classless routing 4 1 - 8 1 0 - 2 3

Catalyst 3560 Switch Software Configuration Guide

IN-6

OL-26641-03

Index

class maps for QoS

compatibility 6-5

configuring

38-55

described 6-1

described

38-8

LRE profile considerations

6-17

displaying

38-89

managing

class of service

through CLI

6-17

See CoS

through SNMP

6-18

clearing interfaces

14-56

planning 6-5

CLI

planning considerations

 

abbreviating commands

2-3

automatic discovery

6-6

command modes

2-1

automatic recovery

6-11

configuration logging

2-5

CLI

6-17

described 1-6

host names

6-14

editing features

IP addresses

6-14

enabling and disabling

2-6

LRE profiles

6-17

keystroke editing

2-7

passwords

6-15

wrapped lines

2-8

error messages

filtering command output

getting help

history

2-4

2-3

2-9

changing the buffer size

described 2-5

disabling 2-6

recalling commands

2-6

2-5

managing clusters

no and default forms of commands

6-17

2-4

Client Information Signalling Protocol

See CISP

client mode, VTP

16-3

client processes, tracking

47-1

CLNS

See ISO CLNS

clock

See system clock

 

clusters, switch

accessing 6-14

automatic discovery

6-6

automatic recovery

6-11

benefits 1-2

RADIUS

SNMP

switch stacks

TACACS+

6-17

6-15, 6-18

6-15

6-17

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

and HSRP group 45-13

automatic recovery 6-13

considerations 6-12

defined 6-2

requirements 6-3

virtual IP address 6-12

See also HSRP

CNS

1-7

Configuration Engine

configID, deviceID, hostname

configuration service

described 4-1

event service

4-2

4-3

embedded agents

4-3

described 4-5

enabling automated configuration

4-6

Catalyst 3560 Switch Software Configuration Guide

described 4 - 5 enabling automated configuration 4-6 Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-7

OL-26641-03

IN-7

Index

enabling configuration agent

enabling event agent

4-8

4-9

management functions 1-7

CoA Request Commands

9-23

SNMP 6-15

community VLANs 18-2, 18-3

compatibility, feature 28-12

compatibility, software

Coarse Wave Division Multiplexer

See stacks, switch

See CWDM SFPs

config.text 3-19

command-line interface

configurable leave timer, IGMP 27-6

See CLI

configuration, initial

command modes

2-1

defaults 1-23

commands

Express Setup

1-2

abbreviating 2-3

configuration changes, logging 34-11

no and default 2-4

commands, setting privilege levels

command switch

accessing 6-12

active (AC) 6-11

9-8

configuration conflicts 52-12

defined 6-2

passive (PC) 6-11

password privilege levels 6-18

priority 6-11

recovery

from command-switch failure

from lost member connectivity

redundant 6-11

replacing

6-11, 52-9

52-12

with another switch

52-11

with cluster member

52-9

requirements 6-3

configuration conflicts, recovering from lost member connectivity 52-12

configuration examples, network 1-26

configuration files

archiving 54-21

clearing the startup configuration

creating using a text editor

default name

deleting a stored configuration

described 54-8

downloading

54-20

54-11

3-19

54-20

automatically 3-19

preparing

54-11, 54-14, 54-17

reasons for

54-8

using FTP

54-14

using RCP

54-18

using TFTP

54-12

guidelines for creating and using

54-10

standby (SC)

6-11

guidelines for replacing and rolling back

54-22

See also candidate switch, cluster standby group,

invalid combinations when copying

54-5

member switch, and standby command switch

limiting TFTP server access

35-18

community list, BGP

41-59

obtaining with DHCP

3-9

community ports

18-2

password recovery disable considerations

9-5

community strings

replacing a running configuration

54-21

configuring 6-15, 35-8

for cluster switches 35-4

rolling back a running configuration

specifying the filename

3-19

54-21, 54-22

in clusters 6-15

system contact and location information

35-17

overview 35-4

types and location

54-10

35-17 overview 35-4 types and location 54-10 Catalyst 3560 Switch Software Configuration Guide IN-8

Catalyst 3560 Switch Software Configuration Guide

IN-8

OL-26641-03

Index

uploading

CoS-to-DSCP map for QoS

38-71

preparing

54-11, 54-14, 54-17

counters, clearing interface

14-56

reasons for

54-9

CPU utilization, troubleshooting

52-29

using FTP

54-16

crashinfo file

52-25

using RCP

54-19

critical authentication, IEEE 802.1x

10-65

using TFTP

54-13

critical VLAN

10-26

configuration guidelines

REP

23-7

configuration guidelines, multi-VRF CE 41-79

configuration logger 34-11

configuration logging 2-5

configuration replacement 54-21

configuration rollback 54-21

critical voice VLAN

configuring

cross-stack EtherChannel

10-65

configuration guidelines

configuring

39-14

on Layer 2 interfaces

on Layer 3 physical interfaces

39-14

39-18

configuration settings, saving 3-16

described 39-3

configure terminal command 14-24

illustration 39-4

configuring 802.1x user distribution 10-68

support for

1-9

Configuring First Hop Security in IPv6 41-45, 42-19

Configuring IPv6 Source Guard 42-22

configuring port-based authentication violation modes 10-45

configuring small-frame arrival rate 28-5

Configuring VACL Logging 37-41

conflicts, configuration 52-12

connections, secure remote 9-46

connectivity problems 52-15, 52-16, 52-18

consistency checks in VTP Version 2 16-6

console port, connecting to 2-10

content-routing technology

See WCCP

control protocol, IP SLAs 46-4

convergence

REP

23-4

corrupted software, recovery steps with Xmodem

CoS

in Layer 2 frames

38-2

override priority

17-6

trust priority

17-6

CoS input queue threshold map for QoS

CoS output queue threshold map for QoS

38-17

38-21

52-2

cross-stack UplinkFast, STP

described 22-5

disabling 22-17

enabling 22-17

fast-convergence events

22-8

Fast Uplink Transition Protocol

22-7

normal-convergence events

22-8

support for

1-10

cryptographic software image

 

Kerberos 9-40

SSH

9-45

SSL

9-50

switch stack considerations

5-18

customer edge devices

customjzeable web pages, web-based authentication

CWDM SFPs

41-77

1-39

12-6

D

DACL

See downloadable ACL

daylight saving time

dCEF, in the switch stack

7-8

41-92

Catalyst 3560 Switch Software Configuration Guide

saving time dCEF, in the switch stack 7 - 8 41-92 Catalyst 3560 Switch Software Configuration

OL-26641-03

IN-9

Index

debugging enabling all system diagnostics enabling for a specific feature

52-21

52-21

MAC address table

MAC address-table move update MSDP 50-4

7-16

24-9

redirecting error message output

52-22

MSTP

21-15

using commands

2-4

52-20

multi-VRF CE

41-79

default commands

MVR

27-20

default configuration

optional spanning-tree configuration

22-12

802.1x 10-39

OSPF

41-27

auto-QoS 38-24

password and privilege level

9-3

 

banners 7-12

PIM

49-11

BGP

41-47

private VLANs

18-7

CDP

29-2

RADIUS

9-27

DHCP 25-8

 

REP

23-7

DHCP option 82

25-8

RIP

41-21

DHCP snooping

25-8

RMON

33-3

DHCP snooping binding database

25-9

RSPAN

32-11

 

DNS

7-11

SDM template

8-8

dynamic ARP inspection

26-6

SNMP

35-7

EIGRP 41-38

SPAN

32-11

EtherChannel 39-12

SSL

9-52

Ethernet interfaces

14-32

standard QoS

38-39

fallback bridging

51-3

STP

20-14

Flex Links

24-9

switch stacks

5-22

HSRP 45-6

 

system message logging

34-4

IEEE 802.1Q tunneling

19-4

system name and prompt

7-10

IGMP

49-40

TACACS+ 9-13

IGMP filtering 27-25 IGMP snooping 27-7, 44-6 IGMP throttling 27-25 initial switch information 3-3 IP addressing, IP routing 41-6 IP multicast routing 49-11

IP SLAs 46-6

IP source guard 25-17

IPv6

IS-IS 41-68 Layer 2 interfaces

Layer 2 protocol tunneling LLDP 30-5

42-17

14-32

19-12

UDLD 31-4 VLAN, Layer 2 Ethernet interfaces VLANs 15-9

VMPS

voice VLAN

VTP

15-29

16-10

17-3

15-19

WCCP 48-5 default gateway 3-16, 41-13 default networks 41-95 default router preference See DRP default routes 41-95

default routing 41-3

See DRP default routes 4 1 - 9 5 default routing 41-3 Catalyst 3560 Switch Software

Catalyst 3560 Switch Software Configuration Guide

IN-10

OL-26641-03

Index

default web-based authentication configuration

relay device

3-8

802.1X 12-9

server side

3-6

deleting VLANs 15-10

TFTP server

3-7

denial-of-service attack 28-1

example 3-10

description command 14-47

lease options

designing your network, examples 1-26

desktop template 5-12, 8-3

destination addresses

for IP address information

for receiving the configuration file

3-6

overview 3-3

3-7

in IPv4 ACLs

37-13

relationship to BOOTP 3-4

in IPv6 ACLs

43-5

relay support 1-7, 1-19

destination-IP address-based forwarding, EtherChannel 39-10

destination-MAC address forwarding, EtherChannel 39-10

detecting indirect link failures, STP 22-8

device 54-25

device discovery protocol 29-1, 30-1

device manager

benefits 1-2

described 1-2, 1-6

in-band management 1-8

upgrading a switch 54-25

device sensor

configuring 10-56

restrictions 10-56

DHCP

Cisco IOS server database

configuring 25-14

default configuration

25-9

described 25-6

DHCP for IPv6

See DHCPv6

enabling

relay agent

25-10

DHCP-based autoconfiguration

client request message exchange 3-4

configuring

client side

DNS

3-8

3-4

support for 1-7

DHCP-based autoconfiguration and image update

configuring 3-11 to 3-15

understanding 3-5 to 3-6

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP object tracking, configuring primary interface 47-10

DHCP option 82

circuit ID suboption 25-5

configuration guidelines 25-9

default configuration 25-8

displaying 25-15

forwarding address, specifying 25-10

helper address 25-10

overview 25-3

packet format, suboption

circuit ID

25-5

remote ID

25-5

remote ID suboption 25-5

DHCP server port-based address allocation

configuration guidelines 25-27

default configuration 25-27

described 25-26

displaying 25-30

enabling 25-27

reserved addresses 25-28

Catalyst 3560 Switch Software Configuration Guide

25-30 enabling 25-27 reserved addresses 25-28 Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-11

OL-26641-03

IN-11

Index

DHCP server port-based address assignment

resetting

support for

1-7

delay value

25-15

DHCP snooping accepting untrusted packets form edge switch

25-12

25-3,

and private VLANs 25-13 binding database See DHCP snooping binding database configuration guidelines 25-9 default configuration 25-8 displaying binding tables 25-15 message exchange process 25-4 option 82 data insertion 25-3 trusted interface 25-2 untrusted interface 25-2 untrusted messages 25-2 DHCP snooping binding database adding bindings 25-14 binding entries, displaying 25-15 binding file format 25-7 location 25-6 bindings 25-6 clearing agent statistics 25-15 configuration guidelines 25-9 configuring 25-14 default configuration 25-8, 25-9 deleting

binding file

25-15

bindings 25-15 database agent described 25-6 displaying 25-15 binding entries

bindings 25-15 database agent described 25-6 displaying 25-15 binding entries

25-15

25-15

status and statistics

25-15

displaying status and statistics 25-15 enabling 25-14 entry 25-6 renewing database 25-15

timeout value

25-15

DHCP snooping binding table

See DHCP snooping binding database

DHCPv6

configuration guidelines default configuration described 42-10 enabling client function

enabling DHCPv6 server function

support for

42-27

42-27

42-30

1-19

42-28

Differentiated Services architecture, QoS

Differentiated Services Code Point Diffusing Update Algorithm (DUAL)

38-2

38-2

41-36

directed unicast requests directories changing 54-4 creating and removing displaying the working discovery, clusters

unicast requests directories changing 5 4 - 4 creating and removing displaying the working discovery, clusters
unicast requests directories changing 5 4 - 4 creating and removing displaying the working discovery, clusters

1-7

54-4

54-4

See automatic discovery

Distance Vector Multicast Routing Protocol See DVMRP

distance-vector protocols

41-3

distribute-list command

41-104

DNS and DHCP-based autoconfiguration

default configuration

displaying the configuration

in IPv6

overview 7-10

7-11

42-4

7-12

setting up

7-11

support for

1-7

DNS-based SSM mapping

domain names

49-19, 49-21

DNS

VTP

7-10

16-11

Domain Name System

3-8

49-19, 49-21 DNS VTP 7-10 16-11 Domain Name System 3 - 8 Catalyst 3560 Switch Software

Catalyst 3560 Switch Software Configuration Guide

IN-12

OL-26641-03

Index

See DNS

domains, ISO IGRP routing

dot1q-tunnel switchport mode

double-tagged packets

41-67

15-18

IEEE 802.1Q tunneling

Layer 2 protocol tunneling

19-2

19-11

DUAL finite state machine, EIGRP

dual IPv4 and IPv6 templates

dual protocol stacks

41-37

8-5, 42-10

IPv4 and IPv6 42-10

SDM templates supporting 42-10

dual-purpose uplinks

downloadable ACL

10-21, 10-23, 10-73

defined 14-7

downloading

LEDs 14-7

configuration files

preparing

54-11, 54-14, 54-17

link selection 14-7, 14-34

setting the type 14-34

reasons for 54-8

DVMRP

using FTP 54-14

autosummarization

using RCP 54-18

configuring a summary address 49-59

using TFTP 54-12

disabling 49-61

image files

deleting old image 54-29

preparing

54-27, 54-31, 54-35

connecting PIM domain to DVMRP router 49-52

enabling unicast routing 49-55

interoperability

reasons for 54-25

with Cisco devices 49-50

using CMS 1-3

with Cisco IOS software 49-9

using FTP 54-32

mrinfo requests, responding to 49-54

using HTTP 1-3, 54-25

neighbors

using RCP 54-36

advertising the default route to 49-54

using TFTP 54-28

discovery with Probe messages 49-50

using the device manager or Network

displaying information 49-54

Assistant 54-25

prevent peering with nonpruning 49-57

drop threshold for Layer 2 protocol packets

DRP

configuring 42-24

described

IPv6

support for

42-9

1-19

42-9

DSCP

DSCP input queue threshold map for QoS

1-17, 38-2

19-12

38-17

rejecting nonpruning 49-56

overview 49-9

routes

adding a metric offset 49-62

advertising all 49-61

advertising the default route to neighbors 49-54

caching DVMRP routes learned in report messages 49-55

DSCP output queue threshold map for QoS

38-21

changing the threshold for syslog messages

49-58

DSCP-to-CoS map for QoS

38-74

deleting 49-64

DSCP-to-DSCP-mutation map for QoS

38-75

 

displaying 49-64

DSCP transparency

38-49

favoring one over another 49-62

DTP

1-11, 15-17

limiting the number injected into MBONE

49-58

dual-action detection

39-7

limiting unicast route advertisements 49-50

Catalyst 3560 Switch Software Configuration Guide

39-7 limiting unicast route advertisements 49-50 Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-13

OL-26641-03

IN-13

Index

routing table

49-9

clearing

26-17

source distribution tree, building

49-9

configuring

26-15

support for

1-19

displaying

26-17

tunnels

logging of dropped packets, described

26-5

configuring

displaying neighbor information

49-52

dynamic access ports

characteristics 15-4

configuring 15-30

defined 14-3

dynamic addresses

See addresses

dynamic ARP inspection

ARP cache poisoning

26-1

49-54

ARP requests, described

26-1

ARP spoofing attack

26-1

clearing

log buffer

26-17

statistics 26-17

 

configuration guidelines

26-7

configuring

ACLs for non-DHCP environments

26-10

in DHCP environments

26-8

log buffer

26-15

rate limit for incoming ARP packets

26-4, 26-12

default configuration

denial-of-service attacks, preventing

described 26-1

DHCP snooping binding database

displaying

26-6

26-12

26-2

ARP ACLs

configuration and operating state

log buffer

statistics 26-17

trust state and rate limit

26-16

26-17

26-16

26-16

error-disabled state for exceeding rate limit

function of

interface trust states

log buffer

26-2

26-3

26-4

man-in-the middle attack, described

network security issues and interface trust states

priority of ARP ACLs and DHCP snooping entries 26-4

rate limiting of ARP packets

26-2

configuring

26-12

described

26-4

error-disabled state

26-4

statistics

clearing

displaying

26-17

26-17

26-3

validation checks, performing

26-14

dynamic auto trunking mode

15-18

dynamic desirable trunking mode

15-18

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described 15-28

reconfirming 15-31

troubleshooting 15-33

types of connections

15-30

dynamic routing

41-3

ISO CLNS

41-66

Dynamic Trunking Protocol

See DTP

E

EAC

13-2

EBGP

41-45

editing features

enabling and disabling

2-6

keystrokes used

2-7

wrapped lines

2-8

EEM 3.2

36-5

keystrokes used 2-7 wrapped lines 2-8 EEM 3.2 36-5 Catalyst 3560 Switch Software Configuration Guide IN-14

Catalyst 3560 Switch Software Configuration Guide

IN-14

OL-26641-03

Index

EIGRP authentication 41-43 components 41-37 configuring 41-40

41-38

IP routing state 47-2 IP SLAs 47-9 line-protocol state 47-2 network monitoring with IP SLAs 47-11 routing policy, configuring 47-12

 

default configuration definition 41-36

interface parameters, configuring monitoring 41-45

41-41

static route primary interface 47-10 tracked lists 47-3

stub routing

41-44

enhanced object tracking static routing 47-10 environmental variables, embedded event manager 36-5

elections

environment variables, function of 3-23

See stack master

 

equal-cost routing 1-19, 41-93

ELIN location

30-3

error-disabled state, BPDU 22-2

embedded event manager

 

error messages during command entry 2-4

3.2

36-5

EtherChannel

 

actions 36-4 configuring 36-1, 36-6

automatic creation of 39-6, 39-8 channel groups

displaying information 36-8

binding physical and logical interfaces

39-5, 39-6

environmental variables 36-5

numbering of

39-6

event detectors 36-3 policies 36-4

configuration guidelines 39-13 configuring

 

registering and defining an applet 36-6

Layer 2 interfaces

39-14

registering and defining a TCL script 36-7

Layer 3 physical interfaces

39-18

understanding 36-1

Layer 3 port-channel logical interfaces

39-17

enable password

9-4

 

configuring Layer 2 interfaces 39-14

enable secret password

9-4

default configuration 39-12

Enable the FIPS mode

3-25

described 39-2

encryption, CipherSuite

9-52

displaying status 39-25

encryption for passwords

9-4

forwarding methods 39-10, 39-20

encryption keying

11-2

IEEE 802.3ad, described 39-8

encryption keys, MKA

11-2

interaction

Endpoint Admission Control (EAC) Enhanced IGRP See EIGRP enhanced object tracking backup static routing 47-12

commands 47-1 defined 47-1 DHCP primary interface 47-10 HSRP 47-7

13-2

with STP

39-13

with VLANs

LACP described 39-8 displaying status hot-standby ports

39-14

39-25

39-22

interaction with other features modes 39-9

port priority

39-24

39-9

Catalyst 3560 Switch Software Configuration Guide

other features modes 39-9 port priority 39-24 39-9 Catalyst 3560 Switch Software Configuration Guide OL-26641-03 IN-15

OL-26641-03

IN-15

Index

system priority

39-23

Layer 3 interface 41-5 load balancing 39-10, 39-20

logical interfaces, described 39-5 PAgP

aggregate-port learners

compatibility with Catalyst 1900 described 39-6

displaying status

interaction with other features interaction with virtual switches

learn method and priority configuration modes 39-7

39-21

39-21

39-25

39-8

39-7

39-21

Ethernet VLANs adding 15-9 defaults and ranges modifying 15-9

EUI

event detectors, embedded event manager

events, RMON

examples network configuration

expedite queue for QoS

Express Setup

15-9

42-4

33-4

1-26

38-88

1-2

36-3

See also getting started guide

extended crashinfo file

52-25

support for

1-5

extended-range VLANs

with dual-action detection

39-7

configuration guidelines

15-12

port-channel interfaces

configuring 15-12

described 39-5

creating 15-13

numbering of

39-6

port groups 14-6 stack changes, effects of 39-11 support for 1-5 EtherChannel guard described 22-10 disabling 22-18 enabling 22-18 Ethernet management port active link 14-29 and routing 14-29 and TFTP 14-31 configuring 14-31 default setting 14-29 described 14-29 for network management 14-29 specifying 14-31 supported features 14-30 unsupported features 14-30 Ethernet management port, internal and routing 14-29 unsupported features 14-30

creating with an internal VLAN ID defined 15-1 extended system ID

MSTP

21-19

STP

20-5, 20-18

15-15

extended universal identifier See EUI Extensible Authentication Protocol over LAN

external BGP See EBGP external neighbors, BGP

41-50

10-2

F

fa0 interface

1-8

Fa0 port

See Ethernet management port

failover support

fallback bridging and protected ports bridge groups

1-9

creating

51-4

51-4

ports bridge groups 1 - 9 creating 5 1 - 4 5 1 - 4 Catalyst

Catalyst 3560 Switch Software Configuration Guide

IN-16

OL-26641-03

Index

described

51-2

basic crashinfo

displaying 51-10

description

52-25

function of

51-2

location

52-25

number supported

51-4

copying 54-5

removing

51-5

crashinfo, description 52-25

bridge table

deleting 54-5

clearing

displaying 51-10