1026
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Catalyst 2960 and 2960-S Switches Software Configuration Guide Cisco IOS Release 15.0(2)SE August 2012 Text Part Number: OL-26520-02

2960 Cisco Switch

Embed Size (px)

DESCRIPTION

Catalyst 2960 and 2960-S Switches Software Configuration Guide

Citation preview

Catalyst 2960 and 2960-S Switches Software Configuration GuideCisco IOS Release 15.0(2)SE August 2012

Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

Text Part Number: OL-26520-02

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE Copyright 20042012 Cisco Systems, Inc. All rights reserved.

CONTENTSPrefacexxxvii xxxvii xxxvii xxxviii xxxix xl

Audience Purpose Conventions

Related Publications

Obtaining Documentation, Obtaining Support, and Security Guidelines1

CHAPTER

Overview

1-1

Features 1-1 Ease-of-Deployment and Ease-of-Use Features Performance Features 1-4 Management Options 1-5 Manageability Features 1-6 Availability and Redundancy Features 1-8 VLAN Features 1-9 Security Features 1-10 QoS and CoS Features 1-13 Layer 3 Features 1-15 Power over Ethernet Features 1-15 Monitoring Features 1-15 Default Settings After Initial Switch Configuration

1-2

1-16

Network Configuration Examples 1-19 Design Concepts for Using the Switch 1-19 Small to Medium-Sized Network Using Catalyst 2960, 2960-S and 2960-C Switches Long-Distance, High-Bandwidth Transport Configuration 1-24 Where to Go Next21-25

1-23

CHAPTER

Using the Command-Line Interface Understanding Command Modes Understanding the Help System

2-1 2-1 2-3 2-3 2-4

Understanding Abbreviated Commands Understanding CLI Error Messages2-4

Understanding no and default Forms of Commands

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

iii

Contents

Using Configuration Logging

2-4

Using Command History 2-5 Changing the Command History Buffer Size 2-5 Recalling Commands 2-6 Disabling the Command History Feature 2-6 Using Editing Features 2-6 Enabling and Disabling Editing Features 2-6 Editing Commands through Keystrokes 2-7 Editing Command Lines that Wrap 2-8 Searching and Filtering Output of show and more Commands2-9

Accessing the CLI 2-9 Accessing the CLI through a Console Connection or through Telnet3

2-10

CHAPTER

Assigning the Switch IP Address and Default Gateway Understanding the Boot Process3-1

3-1

Assigning Switch Information 3-2 Default Switch Information 3-3 Understanding DHCP-Based Autoconfiguration 3-3 DHCP Client Request Process 3-3 Understanding DHCP-based Autoconfiguration and Image Update 3-5 DHCP Autoconfiguration 3-5 DHCP Auto-Image Update 3-5 Limitations and Restrictions 3-5 Configuring DHCP-Based Autoconfiguration 3-6 DHCP Server Configuration Guidelines 3-6 Configuring the TFTP Server 3-7 Configuring the DNS 3-7 Configuring the Relay Device 3-7 Obtaining Configuration Files 3-8 Example Configuration 3-9 Configuring the DHCP Auto Configuration and Image Update Features 3-11 Configuring DHCP Autoconfiguration (Only Configuration File) 3-11 Configuring DHCP Auto-Image Update (Configuration File and Image) 3-12 Configuring the Client 3-13 Manually Assigning IP Information 3-14 Checking and Saving the Running Configuration Configuring the NVRAM Buffer Size 3-16 Modifying the Startup Configuration 3-17 Default Boot Configuration 3-18Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

3-15

iv

OL-26520-02

Contents

Automatically Downloading a Configuration File 3-18 Specifying the Filename to Read and Write the System Configuration Booting Manually 3-19 Booting a Specific Software Image 3-19 Controlling Environment Variables 3-20 Scheduling a Reload of the Software Image 3-21 Configuring a Scheduled Reload 3-22 Displaying Scheduled Reload Information 3-234

3-18

CHAPTER

Configuring Cisco IOS Configuration Engine

4-1

Understanding Cisco Configuration Engine Software 4-1 Configuration Service 4-2 Event Service 4-3 NameSpace Mapper 4-3 What You Should Know About the CNS IDs and Device Hostnames ConfigID 4-3 DeviceID 4-4 Hostname and DeviceID 4-4 Using Hostname, DeviceID, and ConfigID 4-4 Understanding Cisco IOS Agents 4-5 Initial Configuration 4-5 Incremental (Partial) Configuration Synchronized Configuration 4-6

4-3

4-6

Configuring Cisco IOS Agents 4-6 Enabling Automated CNS Configuration 4-6 Enabling the CNS Event Agent 4-8 Enabling the Cisco IOS CNS Agent 4-9 Enabling an Initial Configuration 4-9 Enabling a Partial Configuration 4-12 Displaying CNS Configuration54-13

CHAPTER

Administering the Switch

5-1 5-1

Identifying the Switch Image

Managing the System Time and Date 5-2 Understanding the System Clock 5-2 Understanding Network Time Protocol 5-3 NTP Version 4 5-5 Configuring Time and Date Manually 5-5 Setting the System Clock 5-6Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

v

Contents

Displaying the Time and Date Configuration 5-6 Configuring the Time Zone 5-7 Configuring Summer Time (Daylight Saving Time) 5-8 Configuring a System Name and Prompt 5-9 Default System Name and Prompt Configuration Configuring a System Name 5-10 Understanding DNS 5-10 Default DNS Configuration 5-11 Setting Up DNS 5-11 Displaying the DNS Configuration 5-12 Creating a Banner 5-12 Default Banner Configuration 5-12 Configuring a Message-of-the-Day Login Banner Configuring a Login Banner 5-145-10

5-13

Managing the MAC Address Table 5-14 Building the Address Table 5-15 MAC Addresses and VLANs 5-15 MAC Addresses and Switch Stacks 5-16 Default MAC Address Table Configuration 5-16 Changing the Address Aging Time 5-16 Removing Dynamic Address Entries 5-17 Configuring MAC Address Change Notification Traps 5-17 Configuring MAC Address Move Notification Traps 5-19 Configuring MAC Threshold Notification Traps 5-20 Adding and Removing Static Address Entries 5-21 Configuring Unicast MAC Address Filtering 5-22 Disabling MAC Address Learning on a VLAN 5-23 Displaying Address Table Entries 5-24 Managing the ARP Table65-25

CHAPTER

Clustering Switches

6-1

Understanding Switch Clusters 6-2 Cluster Command Switch Characteristics 6-3 Standby Cluster Command Switch Characteristics 6-3 Candidate Switch and Cluster Member Switch Characteristics

6-4

Planning a Switch Cluster 6-4 Automatic Discovery of Cluster Candidates and Members 6-5 Discovery Through CDP Hops 6-5 Discovery Through Non-CDP-Capable and Noncluster-Capable DevicesCatalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

6-6

vi

OL-26520-02

Contents

Discovery Through Different VLANs 6-7 Discovery Through Different Management VLANs 6-7 Discovery of Newly Installed Switches 6-8 HSRP and Standby Cluster Command Switches 6-9 Virtual IP Addresses 6-11 Other Considerations for Cluster Standby Groups 6-11 Automatic Recovery of Cluster Configuration 6-12 IP Addresses 6-13 Hostnames 6-13 Passwords 6-13 SNMP Community Strings 6-14 Switch Clusters and Switch Stacks 6-14 TACACS+ and RADIUS 6-16 LRE Profiles 6-16 Using the CLI to Manage Switch Clusters Using SNMP to Manage Switch Clusters76-16 6-17

CHAPTER

Managing Switch Stacks

7-1

Understanding Stacks 7-1 Stack Membership 7-3 Master Election 7-5 Stack MAC Address 7-6 Member Numbers 7-6 Member Priority Values 7-7 Stack Offline Configuration 7-7 Effects of Adding a Provisioned Switch to a Stack 7-8 Effects of Replacing a Provisioned Switch in a Stack 7-9 Effects of Removing a Provisioned Switch from a Stack 7-9 Stack Software Compatibility Recommendations 7-9 Stack Protocol Version Compatibility 7-10 Major Version Number Incompatibility Among Switches 7-10 Minor Version Number Incompatibility Among Switches 7-10 Understanding Auto-Upgrade and Auto-Advise 7-11 Auto-Upgrade and Auto-Advise Example Messages 7-12 Incompatible Software and Member Image Upgrades 7-13 Stack Configuration Files 7-14 Additional Considerations for System-Wide Configuration on Switch Stacks Stack Management Connectivity 7-15 Stack Through an IP Address 7-15

7-14

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

vii

Contents

Stack Through an SSH Session 7-15 Stack Through Console Ports 7-15 Specific Members 7-16 Stack Configuration Scenarios 7-16 Configuring the Switch Stack 7-17 Default Switch Stack Configuration 7-17 Enabling Persistent MAC Address 7-18 Assigning Stack Member Information 7-20 Assigning a Member Number 7-20 Setting the Member Priority Value 7-20 Provisioning a New Member for a Stack 7-21 Changing the Stack Membership 7-22 Accessing the CLI of a Specific Member Displaying Stack Information7-22 7-22

Troubleshooting Stacks 7-23 Manually Disabling a Stack Port 7-23 Re-Enabling a Stack Port While Another Member Starts 7-23 Understanding the show switch stack-ports summary Output 7-248

CHAPTER

Configuring SDM Templates

8-1

Understanding the SDM Templates 8-1 SDM Templates and Switch Stacks 8-3 Configuring the Switch SDM Template 8-4 Default SDM Template 8-4 SDM Template Configuration Guidelines Setting the SDM Template 8-5 .Displaying the SDM Templates98-5

8-4

CHAPTER

Configuring Switch-Based Authentication

9-1 9-1

Preventing Unauthorized Access to Your Switch

Protecting Access to Privileged EXEC Commands 9-2 Default Password and Privilege Level Configuration 9-2 Setting or Changing a Static Enable Password 9-3 Protecting Enable and Enable Secret Passwords with Encryption Disabling Password Recovery 9-5 Setting a Telnet Password for a Terminal Line 9-6 Configuring Username and Password Pairs 9-7 Configuring Multiple Privilege Levels 9-8

9-3

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

viii

OL-26520-02

Contents

Setting the Privilege Level for a Command 9-8 Changing the Default Privilege Level for Lines 9-9 Logging into and Exiting a Privilege Level 9-10 Controlling Switch Access with TACACS+ 9-10 Understanding TACACS+ 9-10 TACACS+ Operation 9-12 Configuring TACACS+ 9-13 Default TACACS+ Configuration 9-13 Identifying the TACACS+ Server Host and Setting the Authentication Key 9-13 Configuring TACACS+ Login Authentication 9-14 Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services Starting TACACS+ Accounting 9-17 Establishing a Session with a Router if the AAA Server is Unreachable 9-17 Displaying the TACACS+ Configuration 9-18

9-16

Controlling Switch Access with RADIUS 9-18 Understanding RADIUS 9-18 RADIUS Operation 9-20 RADIUS Change of Authorization 9-20 Overview 9-20 Change-of-Authorization Requests 9-21 CoA Request Response Code 9-22 CoA Request Commands 9-23 Stacking Guidelines for Session Termination 9-26 Configuring RADIUS 9-27 Default RADIUS Configuration 9-27 Identifying the RADIUS Server Host 9-28 Configuring RADIUS Login Authentication 9-30 Defining AAA Server Groups 9-32 Configuring RADIUS Authorization for User Privileged Access and Network Services 9-34 Starting RADIUS Accounting 9-35 Establishing a Session with a Router if the AAA Server is Unreachable 9-36 Configuring Settings for All RADIUS Servers 9-36 Configuring the Switch to Use Vendor-Specific RADIUS Attributes 9-36 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 9-38 Configuring CoA on the Switch 9-39 Monitoring and Troubleshooting CoA Functionality 9-40 Configuring RADIUS Server Load Balancing 9-40 Displaying the RADIUS Configuration 9-40 Configuring the Switch for Local Authentication and Authorization9-40

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

ix

Contents

Configuring the Switch for Secure Shell 9-41 Understanding SSH 9-42 SSH Servers, Integrated Clients, and Supported Versions Limitations 9-42 Configuring SSH 9-43 Configuration Guidelines 9-43 Setting Up the Switch to Run SSH 9-43 Configuring the SSH Server 9-44 Displaying the SSH Configuration and Status 9-45 Configuring the Switch for Secure Socket Layer HTTP 9-46 Understanding Secure HTTP Servers and Clients 9-46 Certificate Authority Trustpoints 9-46 CipherSuites 9-48 Configuring Secure HTTP Servers and Clients 9-48 Default SSL Configuration 9-48 SSL Configuration Guidelines 9-49 Configuring a CA Trustpoint 9-49 Configuring the Secure HTTP Server 9-50 Configuring the Secure HTTP Client 9-51 Displaying Secure HTTP Server and Client Status 9-52 Configuring the Switch for Secure Copy Protocol Information About Secure Copy 9-53109-52

9-42

CHAPTER

Configuring IEEE 802.1x Port-Based Authentication

10-1

Understanding IEEE 802.1x Port-Based Authentication 10-1 Device Roles 10-3 Authentication Process 10-4 Authentication Initiation and Message Exchange 10-5 Authentication Manager 10-7 Port-Based Authentication Methods 10-7 Per-User ACLs and Filter-Ids 10-8 Authentication Manager CLI Commands 10-9 Ports in Authorized and Unauthorized States 10-10 802.1x Authentication and Switch Stacks 10-11 802.1x Host Mode 10-12 Multidomain Authentication 10-13 802.1x Multiple Authentication Mode 10-14 MAC Move 10-15 MAC Replace 10-15

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

x

OL-26520-02

Contents

802.1x Accounting 10-16 802.1x Accounting Attribute-Value Pairs 10-16 802.1x Readiness Check 10-17 802.1x Authentication with VLAN Assignment 10-18 Using 802.1x Authentication with Per-User ACLs 10-19 802.1x Authentication with Downloadable ACLs and Redirect URLs 10-20 Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL 10-22 Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs 10-22 VLAN ID-based MAC Authentication 10-22 802.1x Authentication with Guest VLAN 10-23 802.1x Authentication with Restricted VLAN 10-24 802.1x Authentication with Inaccessible Authentication Bypass 10-25 Support on Multiple-Authentication Ports 10-25 Authentication Results 10-25 Feature Interactions 10-26 802.1x Critical Voice VLAN 10-27 802.1x Authentication with Voice VLAN Ports 10-27 802.1x Authentication with Port Security 10-28 802.1x Authentication with Wake-on-LAN 10-28 802.1x Authentication with MAC Authentication Bypass 10-28 802.1x User Distribution 10-30 802.1x User Distribution Configuration Guidelines 10-30 Network Admission Control Layer 2 802.1x Validation 10-31 Flexible Authentication Ordering 10-31 Open1x Authentication 10-31 Using Voice Aware 802.1x Security 10-32 802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) Guidelines 10-34 Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute 10-34 Common Session ID 10-34 Configuring 802.1x Authentication 10-35 Default 802.1x Authentication Configuration 10-36 802.1x Authentication Configuration Guidelines 10-37 802.1x Authentication 10-37 VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass 10-38 MAC Authentication Bypass 10-39 Maximum Number of Allowed Devices Per Port 10-39 Configuring 802.1x Readiness Check 10-39 Configuring Voice Aware 802.1x Security 10-40Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

10-32

xi

Contents

Configuring 802.1x Violation Modes 10-42 Configuring 802.1x Authentication 10-43 Configuring the Switch-to-RADIUS-Server Communication 10-44 Configuring the Host Mode 10-45 Configuring Periodic Re-Authentication 10-47 Manually Re-Authenticating a Client Connected to a Port 10-48 Changing the Quiet Period 10-48 Changing the Switch-to-Client Retransmission Time 10-48 Setting the Switch-to-Client Frame-Retransmission Number 10-49 Setting the Re-Authentication Number 10-50 Enabling MAC Move 10-50 Enabling MAC Replace 10-51 Configuring 802.1x Accounting 10-52 Configuring a Guest VLAN 10-53 Configuring a Restricted VLAN 10-53 Configuring Inaccessible Authentication Bypass and Critical Voice VLAN 10-55 Configuring 802.1x Authentication with Wake-on-LAN 10-57 Configuring MAC Authentication Bypass 10-58 Configuring a MAC Authentication Bypass (MAB) Username and Password 10-58 Configuring 802.1x User Distribution 10-59 Configuring NAC Layer 2 802.1x Validation 10-60 Configuring an Authenticator and a Supplicant Switch with NEAT 10-61 Configuring NEAT with Auto Smartports Macros 10-62 Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs 10-63 Configuring Downloadable ACLs 10-63 Configuring a Downloadable Policy 10-63 Configuring VLAN ID-based MAC Authentication 10-65 Configuring Flexible Authentication Ordering 10-65 Configuring Open1x 10-66 Disabling 802.1x Authentication on the Port 10-67 Resetting the 802.1x Authentication Configuration to the Default Values 10-67 Displaying 802.1x Statistics and Status1110-68

CHAPTER

Configuring Web-Based Authentication Understanding Web-Based Authentication Device Roles 11-2 Host Detection 11-2 Session Creation 11-3 Authentication Process 11-3

11-1 11-1

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xii

OL-26520-02

Contents

Local Web Authentication Banner 11-4 Web Authentication Customizable Web Pages 11-6 Guidelines 11-6 Web-based Authentication Interactions with Other Features Port Security 11-7 LAN Port IP 11-8 Gateway IP 11-8 ACLs 11-8 Context-Based Access Control 11-8 802.1x Authentication 11-8 EtherChannel 11-8

11-7

Configuring Web-Based Authentication 11-9 Default Web-Based Authentication Configuration 11-9 Web-Based Authentication Configuration Guidelines and Restrictions Web-Based Authentication Configuration Task List 11-10 Configuring the Authentication Rule and Interfaces 11-10 Configuring AAA Authentication 11-11 Configuring Switch-to-RADIUS-Server Communication 11-11 Configuring the HTTP Server 11-13 Customizing the Authentication Proxy Web Pages 11-13 Specifying a Redirection URL for Successful Login 11-15 Configuring the Web-Based Authentication Parameters 11-15 Configuring a Web Authentication Local Banner 11-16 Removing Web-Based Authentication Cache Entries 11-16 Displaying Web-Based Authentication Status1211-17

11-9

CHAPTER

Configuring Interface Characteristics

12-1

Understanding Interface Types 12-1 Connecting Interfaces, page 12-11Port-Based VLANs 12-2 Switch Ports 12-2 Access Ports 12-3 Trunk Ports 12-3 Switch Virtual Interfaces 12-3 EtherChannel Port Groups 12-4 Dual-Purpose Uplink Ports 12-4 Power over Ethernet Ports 12-5 Supported Protocols and Standards 12-5 Powered-Device Detection and Initial Power Allocation Power Management Modes 12-7

12-6

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xiii

Contents

Power Monitoring and Power Policing 12-8 PoE Uplinks and PoE Pass-Through Capability Connecting Interfaces 12-11 Using the Switch USB Ports 12-11 USB Mini-Type B Console Port 12-12 Console Port Change Logs 12-12 Configuring the Console Media Type 12-13 Configuring the USB Inactivity Timeout 12-13 USB Type A Port 12-14 Using Interface Configuration Mode 12-17 Procedures for Configuring Interfaces 12-18 Configuring a Range of Interfaces 12-19 Configuring and Using Interface Range Macros

12-10

12-20

Using the Ethernet Management Port (Catalyst 2960-S Only) 12-22 Understanding the Ethernet Management Port 12-22 Supported Features on the Ethernet Management Port 12-23 Configuring the Ethernet Management Port 12-24 TFTP and the Ethernet Management Port 12-24 Configuring Ethernet Interfaces 12-25 Default Ethernet Interface Configuration 12-25 Setting the Type of a Dual-Purpose Uplink Port 12-26 Configuring Interface Speed and Duplex Mode 12-28 Speed and Duplex Configuration Guidelines 12-28 Setting the Interface Speed and Duplex Parameters 12-29 Configuring IEEE 802.3x Flow Control 12-30 Configuring Auto-MDIX on an Interface 12-31 Configuring a Power Management Mode on a PoE Port 12-32 Budgeting Power for Devices Connected to a PoE Port 12-33 Configuring Power Policing 12-35 Configuring Catalyst PoE and PoE Pass-Through Ports on Compact Switches Adding a Description for an Interface 12-39 Configuring Layer 3 SVIs12-39 12-40

12-37

Configuring the System MTU

Monitoring and Maintaining the Interfaces 12-42 Monitoring Interface Status 12-42 Clearing and Resetting Interfaces and Counters 12-43 Shutting Down and Restarting the Interface 12-43

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xiv

OL-26520-02

Contents

CHAPTER

13

Configuring VLANs

13-1

Understanding VLANs 13-1 Supported VLANs 13-3 VLAN Port Membership Modes

13-4

Configuring Normal-Range VLANs 13-5 Token Ring VLANs 13-6 Normal-Range VLAN Configuration Guidelines 13-6 Configuring Normal-Range VLANs 13-7 Default Ethernet VLAN Configuration 13-8 Creating or Modifying an Ethernet VLAN 13-8 Deleting a VLAN 13-9 Assigning Static-Access Ports to a VLAN 13-10 Configuring Extended-Range VLANs 13-11 Default VLAN Configuration 13-11 Extended-Range VLAN Configuration Guidelines Creating an Extended-Range VLAN 13-12 Displaying VLANs13-13

13-11

Configuring VLAN Trunks 13-14 Trunking Overview 13-14 IEEE 802.1Q Configuration Considerations 13-15 Default Layer 2 Ethernet Interface VLAN Configuration 13-15 Configuring an Ethernet Interface as a Trunk Port 13-16 Interaction with Other Features 13-16 Configuring a Trunk Port 13-17 Defining the Allowed VLANs on a Trunk 13-18 Changing the Pruning-Eligible List 13-19 Configuring the Native VLAN for Untagged Traffic 13-20 Configuring Trunk Ports for Load Sharing 13-20 Load Sharing Using STP Port Priorities 13-21 Load Sharing Using STP Path Cost 13-23 Configuring VMPS 13-24 Understanding VMPS 13-24 Dynamic-Access Port VLAN Membership 13-25 Default VMPS Client Configuration 13-25 VMPS Configuration Guidelines 13-26 Configuring the VMPS Client 13-26 Entering the IP Address of the VMPS 13-26 Configuring Dynamic-Access Ports on VMPS Clients Reconfirming VLAN Memberships 13-28

13-27

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xv

Contents

Changing the Reconfirmation Interval 13-28 Changing the Retry Count 13-28 Monitoring the VMPS 13-29 Troubleshooting Dynamic-Access Port VLAN Membership VMPS Configuration Example 13-2914

13-29

CHAPTER

Configuring VTP

14-1

Understanding VTP 14-1 The VTP Domain 14-2 VTP Modes 14-3 VTP Advertisements 14-4 VTP Version 2 14-5 VTP Version 3 14-5 VTP Pruning 14-6 VTP and Switch Stacks 14-8 Configuring VTP 14-8 Default VTP Configuration 14-9 VTP Configuration Guidelines 14-9 Domain Names 14-10 Passwords 14-10 VTP Version 14-10 Configuration Requirements 14-11 Configuring VTP Mode 14-11 Configuring a VTP Version 3 Password 14-14 Configuring a VTP Version 3 Primary Server 14-14 Enabling the VTP Version 14-15 Enabling VTP Pruning 14-16 Configuring VTP on a Per-Port Basis 14-16 Adding a VTP Client Switch to a VTP Domain 14-17 Monitoring VTP1514-18

CHAPTER

Configuring Voice VLAN

15-1

Understanding Voice VLAN 15-1 Cisco IP Phone Voice Traffic 15-2 Cisco IP Phone Data Traffic 15-2 Configuring Voice VLAN 15-3 Default Voice VLAN Configuration 15-3 Voice VLAN Configuration Guidelines 15-3 Configuring a Port Connected to a Cisco 7960 IP PhoneCatalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

15-4

xvi

OL-26520-02

Contents

Configuring Cisco IP Phone Voice Traffic 15-5 Configuring the Priority of Incoming Data Frames Displaying Voice VLAN1615-7

15-6

CHAPTER

Configuring STP

16-1

Understanding Spanning-Tree Features 16-1 STP Overview 16-2 Spanning-Tree Topology and BPDUs 16-3 Bridge ID, Switch Priority, and Extended System ID 16-4 Spanning-Tree Interface States 16-5 Blocking State 16-6 Listening State 16-7 Learning State 16-7 Forwarding State 16-7 Disabled State 16-8 How a Switch or Port Becomes the Root Switch or Root Port 16-8 Spanning Tree and Redundant Connectivity 16-9 Spanning-Tree Address Management 16-9 Accelerated Aging to Retain Connectivity 16-9 Spanning-Tree Modes and Protocols 16-10 Supported Spanning-Tree Instances 16-10 Spanning-Tree Interoperability and Backward Compatibility 16-11 STP and IEEE 802.1Q Trunks 16-11 Spanning Tree and Switch Stacks 16-12 Configuring Spanning-Tree Features 16-12 Default Spanning-Tree Configuration 16-13 Spanning-Tree Configuration Guidelines 16-14 Changing the Spanning-Tree Mode. 16-15 Disabling Spanning Tree 16-16 Configuring the Root Switch 16-16 Configuring a Secondary Root Switch 16-18 Configuring Port Priority 16-18 Configuring Path Cost 16-20 Configuring the Switch Priority of a VLAN 16-21 Configuring Spanning-Tree Timers 16-22 Configuring the Hello Time 16-22 Configuring the Forwarding-Delay Time for a VLAN 16-23 Configuring the Maximum-Aging Time for a VLAN 16-23 Configuring the Transmit Hold-Count 16-24

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xvii

Contents

Displaying the Spanning-Tree Status17

16-24

CHAPTER

Configuring MSTP

17-1

Understanding MSTP 17-2 Multiple Spanning-Tree Regions 17-2 IST, CIST, and CST 17-3 Operations Within an MST Region 17-3 Operations Between MST Regions 17-4 IEEE 802.1s Terminology 17-5 Hop Count 17-5 Boundary Ports 17-6 IEEE 802.1s Implementation 17-6 Port Role Naming Change 17-7 Interoperation Between Legacy and Standard Switches Detecting Unidirectional Link Failure 17-8 MSTP and Switch Stacks 17-8 Interoperability with IEEE 802.1D STP 17-9 Understanding RSTP 17-9 Port Roles and the Active Topology 17-9 Rapid Convergence 17-10 Synchronization of Port Roles 17-11 Bridge Protocol Data Unit Format and Processing 17-12 Processing Superior BPDU Information 17-13 Processing Inferior BPDU Information 17-13 Topology Changes 17-13 Configuring MSTP Features 17-14 Default MSTP Configuration 17-14 MSTP Configuration Guidelines 17-15 Specifying the MST Region Configuration and Enabling MSTP Configuring the Root Switch 17-18 Configuring a Secondary Root Switch 17-19 Configuring Port Priority 17-20 Configuring Path Cost 17-22 Configuring the Switch Priority 17-23 Configuring the Hello Time 17-24 Configuring the Forwarding-Delay Time 17-24 Configuring the Maximum-Aging Time 17-25 Configuring the Maximum-Hop Count 17-25 Specifying the Link Type to Ensure Rapid Transitions 17-26

17-7

17-16

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xviii

OL-26520-02

Contents

Designating the Neighbor Type 17-26 Restarting the Protocol Migration Process Displaying the MST Configuration and Status18

17-27 17-27

CHAPTER

Configuring Optional Spanning-Tree Features

18-1

Understanding Optional Spanning-Tree Features 18-1 Understanding Port Fast 18-2 Understanding BPDU Guard 18-2 Understanding BPDU Filtering 18-3 Understanding UplinkFast 18-4 Understanding Cross-Stack UplinkFast 18-5 How CSUF Works 18-6 Events that Cause Fast Convergence 18-7 Understanding BackboneFast 18-7 Understanding EtherChannel Guard 18-10 Understanding Root Guard 18-10 Understanding Loop Guard 18-11 Configuring Optional Spanning-Tree Features 18-12 Default Optional Spanning-Tree Configuration 18-12 Optional Spanning-Tree Configuration Guidelines 18-12 Enabling Port Fast 18-13 Enabling BPDU Guard 18-14 Enabling BPDU Filtering 18-15 Enabling UplinkFast for Use with Redundant Links 18-16 Enabling Cross-Stack UplinkFast 18-17 Enabling BackboneFast 18-17 Enabling EtherChannel Guard 18-17 Enabling Root Guard 18-18 Enabling Loop Guard 18-19 Displaying the Spanning-Tree Status1918-19

CHAPTER

Configuring Flex Links and the MAC Address-Table Move Update Feature Understanding Flex Links and the MAC Address-Table Move Update Flex Links 19-2 VLAN Flex Link Load Balancing and Support 19-2 Flex Link Multicast Fast Convergence 19-3 Learning the Other Flex Link Port as the mrouter Port 19-3 Generating IGMP Reports 19-4 Leaking IGMP Reports 19-419-1

19-1

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xix

Contents

Configuration Examples 19-4 MAC Address-Table Move Update 19-6 Configuring Flex Links and the MAC Address-Table Move Update 19-7 Default Configuration 19-8 Configuration Guidelines 19-8 Configuring Flex Links 19-9 Configuring VLAN Load Balancing on Flex Links 19-11 Configuring the MAC Address-Table Move Update Feature 19-13 Monitoring Flex Links and the MAC Address-Table Move Update2019-15

CHAPTER

Configuring DHCP and IP Source Guard Features Understanding DHCP Snooping 20-1 DHCP Server 20-2 DHCP Relay Agent 20-2 DHCP Snooping 20-2 Option-82 Data Insertion 20-3 DHCP Snooping Binding Database 20-6 DHCP Snooping and Switch Stacks 20-7

20-1

Configuring DHCP Snooping 20-7 Default DHCP Snooping Configuration 20-8 DHCP Snooping Configuration Guidelines 20-8 Configuring the DHCP Relay Agent 20-9 Enabling DHCP Snooping and Option 82 20-10 Enabling the DHCP Snooping Binding Database Agent Displaying DHCP Snooping Information20-12

20-11

Understanding IP Source Guard 20-13 Source IP Address Filtering 20-13 Source IP and MAC Address Filtering 20-14 IP Source Guard for Static Hosts 20-14 Configuring IP Source Guard 20-15 Default IP Source Guard Configuration 20-15 IP Source Guard Configuration Guidelines 20-16 Enabling IP Source Guard 20-16 Configuring IP Source Guard for Static Hosts 20-17 Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port Displaying IP Source Guard Information20-21 20-21

20-18

Understanding DHCP Server Port-Based Address Allocation Configuring DHCP Server Port-Based Address Allocation

20-22

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xx

OL-26520-02

Contents

Default Port-Based Address Allocation Configuration 20-22 Port-Based Address Allocation Configuration Guidelines 20-22 Enabling DHCP Server Port-Based Address Allocation 20-23 Displaying DHCP Server Port-Based Address Allocation2120-25

CHAPTER

Configuring IGMP Snooping and MVR

21-1

Understanding IGMP Snooping 21-2 IGMP Versions 21-3 Joining a Multicast Group 21-3 Leaving a Multicast Group 21-5 Immediate Leave 21-5 IGMP Configurable-Leave Timer 21-6 IGMP Report Suppression 21-6 IGMP Snooping and Switch Stacks 21-6 Configuring IGMP Snooping 21-7 Default IGMP Snooping Configuration 21-7 Enabling or Disabling IGMP Snooping 21-7 Setting the Snooping Method 21-8 Configuring a Multicast Router Port 21-9 Configuring a Host Statically to Join a Group 21-10 Enabling IGMP Immediate Leave 21-10 Configuring the IGMP Leave Timer 21-11 Configuring TCN-Related Commands 21-12 Controlling the Multicast Flooding Time After a TCN Event Recovering from Flood Mode 21-13 Disabling Multicast Flooding During a TCN Event 21-13 Configuring the IGMP Snooping Querier 21-14 Disabling IGMP Report Suppression 21-15 Displaying IGMP Snooping Information21-16

21-12

Understanding Multicast VLAN Registration 21-17 Using MVR in a Multicast Television Application Configuring MVR 21-19 Default MVR Configuration 21-19 MVR Configuration Guidelines and Limitations Configuring MVR Global Parameters 21-20 Configuring MVR Interfaces 21-21 Displaying MVR Information21-23

21-18

21-20

Configuring IGMP Filtering and Throttling 21-23 Default IGMP Filtering and Throttling Configuration

21-24

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxi

Contents

Configuring IGMP Profiles 21-24 Applying IGMP Profiles 21-26 Setting the Maximum Number of IGMP Groups Configuring the IGMP Throttling Action 21-27 Displaying IGMP Filtering and Throttling Configuration22

21-26

21-28

CHAPTER

Configuring Dynamic ARP Inspection

22-1

Understanding Dynamic ARP Inspection 22-1 Interface Trust States and Network Security 22-3 Rate Limiting of ARP Packets 22-4 Relative Priority of ARP ACLs and DHCP Snooping Entries Logging of Dropped Packets 22-5 Configuring Dynamic ARP Inspection 22-5 Default Dynamic ARP Inspection Configuration 22-5 Dynamic ARP Inspection Configuration Guidelines 22-6 Configuring Dynamic ARP Inspection in DHCP Environments Configuring ARP ACLs for Non-DHCP Environments 22-9 Limiting the Rate of Incoming ARP Packets 22-11 Performing Validation Checks 22-13 Configuring the Log Buffer 22-14 Displaying Dynamic ARP Inspection Information2322-15

22-4

22-7

CHAPTER

Configuring Port-Based Traffic Control

23-1

Configuring Storm Control 23-1 Understanding Storm Control 23-1 Default Storm Control Configuration 23-3 Configuring Storm Control and Threshold Levels Configuring Small-Frame Arrival Rate 23-5 Configuring Protected Ports 23-6 Default Protected Port Configuration 23-6 Protected Port Configuration Guidelines 23-7 Configuring a Protected Port 23-7 Configuring Port Blocking 23-7 Default Port Blocking Configuration 23-8 Blocking Flooded Traffic on an Interface 23-8 Configuring Port Security 23-8 Understanding Port Security 23-9 Secure MAC Addresses 23-9 Security Violations 23-10Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

23-3

xxii

OL-26520-02

Contents

Default Port Security Configuration 23-11 Port Security Configuration Guidelines 23-11 Enabling and Configuring Port Security 23-12 Enabling and Configuring Port Security Aging 23-17 Port Security and Switch Stacks 23-19 Configuring Protocol Storm Protection 23-19 Understanding Protocol Storm Protection 23-19 Default Protocol Storm Protection Configuration 23-20 Enabling Protocol Storm Protection 23-20 Displaying Port-Based Traffic Control Settings2423-21

CHAPTER

Configuring UDLD

24-1

Understanding UDLD 24-1 Modes of Operation 24-1 Methods to Detect Unidirectional Links Configuring UDLD 24-3 Default UDLD Configuration 24-4 Configuration Guidelines 24-4 Enabling UDLD Globally 24-5 Enabling UDLD on an Interface 24-6 Resetting an Interface Disabled by UDLD Displaying UDLD Status2524-7

24-2

24-6

CHAPTER

Configuring CDP

25-1

Understanding CDP 25-1 CDP and Switch Stacks

25-2

Configuring CDP 25-2 Default CDP Configuration 25-2 Configuring the CDP Characteristics 25-3 Disabling and Enabling CDP 25-3 Disabling and Enabling CDP on an Interface Monitoring and Maintaining CDP2625-5

25-4

CHAPTER

Configuring LLDP, LLDP-MED, and Wired Location Service Understanding LLDP, LLDP-MED, and Wired Location Service LLDP 26-1 LLDP-MED 26-2 Wired Location Service 26-4

26-1 26-1

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxiii

Contents

Configuring LLDP, LLDP-MED, and Wired Location Service Default LLDP Configuration 26-5 Configuration Guidelines 26-5 Enabling LLDP 26-6 Configuring LLDP Characteristics 26-6 Configuring LLDP-MED TLVs 26-7 Configuring Network-Policy TLV 26-8 Configuring Location TLV and Wired Location Service

26-5

26-9 26-11

Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service27

CHAPTER

Configuring SPAN and RSPAN

27-1

Understanding SPAN and RSPAN 27-1 Local SPAN 27-2 Remote SPAN 27-3 SPAN and RSPAN Concepts and Terminology 27-4 SPAN Sessions 27-4 Monitored Traffic 27-5 Source Ports 27-6 Source VLANs 27-7 VLAN Filtering 27-7 Destination Port 27-7 RSPAN VLAN 27-8 SPAN and RSPAN Interaction with Other Features 27-9 SPAN and RSPAN and Switch Stacks 27-10 Configuring SPAN and RSPAN 27-10 Default SPAN and RSPAN Configuration 27-10 Configuring Local SPAN 27-11 SPAN Configuration Guidelines 27-11 Creating a Local SPAN Session 27-11 Creating a Local SPAN Session and Configuring Incoming Traffic 27-14 Specifying VLANs to Filter 27-16 Configuring RSPAN 27-17 RSPAN Configuration Guidelines 27-17 Configuring a VLAN as an RSPAN VLAN 27-18 Creating an RSPAN Source Session 27-18 Creating an RSPAN Destination Session 27-20 Creating an RSPAN Destination Session and Configuring Incoming Traffic Specifying VLANs to Filter 27-22 Displaying SPAN and RSPAN Status27-23

27-21

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxiv

OL-26520-02

Contents

CHAPTER

28

Configuring RMON

28-1 28-2

Understanding RMON

Configuring RMON 28-3 Default RMON Configuration 28-3 Configuring RMON Alarms and Events 28-3 Collecting Group History Statistics on an Interface 28-5 Collecting Group Ethernet Statistics on an Interface 28-6 Displaying RMON Status2928-6

CHAPTER

Configuring System Message Logging

29-1 29-1

Understanding System Message Logging

Configuring System Message Logging 29-2 System Log Message Format 29-2 Default System Message Logging Configuration 29-4 Disabling Message Logging 29-4 Setting the Message Display Destination Device 29-5 Synchronizing Log Messages 29-6 Enabling and Disabling Time Stamps on Log Messages 29-8 Enabling and Disabling Sequence Numbers in Log Messages 29-8 Defining the Message Severity Level 29-9 Limiting Syslog Messages Sent to the History Table and to SNMP 29-10 Enabling the Configuration-Change Logger 29-11 Configuring UNIX Syslog Servers 29-13 Logging Messages to a UNIX Syslog Daemon 29-13 Configuring the UNIX System Logging Facility 29-13 Displaying the Logging Configuration3029-14

CHAPTER

Configuring SNMP

30-1

Understanding SNMP 30-1 SNMP Versions 30-2 SNMP Manager Functions 30-3 SNMP Agent Functions 30-4 SNMP Community Strings 30-4 Using SNMP to Access MIB Variables 30-5 SNMP Notifications 30-5 SNMP ifIndex MIB Object Values 30-6 Configuring SNMP 30-6 Default SNMP Configuration30-7

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxv

Contents

SNMP Configuration Guidelines 30-7 Disabling the SNMP Agent 30-8 Configuring Community Strings 30-8 Configuring SNMP Groups and Users 30-10 Configuring SNMP Notifications 30-13 Setting the CPU Threshold Notification Types and Values 30-16 Setting the Agent Contact and Location Information 30-17 Limiting TFTP Servers Used Through SNMP 30-17 SNMP Examples 30-18 Displaying SNMP Status3130-19

CHAPTER

Configuring Network Security with ACLs

31-1

Understanding ACLs 31-2 Supported ACLs 31-2 Port ACLs 31-3 Router ACLs 31-4 Handling Fragmented and Unfragmented Traffic ACLs and Switch Stacks 31-6

31-5

Configuring IPv4 ACLs 31-6 Creating Standard and Extended IPv4 ACLs 31-7 Access List Numbers 31-8 Creating a Numbered Standard ACL 31-9 Creating a Numbered Extended ACL 31-10 Resequencing ACEs in an ACL 31-14 Creating Named Standard and Extended ACLs 31-14 Using Time Ranges with ACLs 31-16 Including Comments in ACLs 31-18 Applying an IPv4 ACL to a Terminal Line 31-19 Applying an IPv4 ACL to an Interface 31-19 Hardware and Software Treatment of IP ACLs 31-21 Troubleshooting ACLs 31-21 IPv4 ACL Configuration Examples 31-22 Numbered ACLs 31-22 Extended ACLs 31-23 Named ACLs 31-23 Time Range Applied to an IP ACL 31-23 Commented IP ACL Entries 31-24 Creating Named MAC Extended ACLs 31-24 Applying a MAC ACL to a Layer 2 Interface31-25

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxvi

OL-26520-02

Contents

Displaying IPv4 ACL Configuration32

31-27

CHAPTER

Configuring Cisco IOS IP SLAs Operations

32-1

Understanding Cisco IOS IP SLAs 32-1 Using Cisco IOS IP SLAs to Measure Network Performance IP SLAs Responder and IP SLAs Control Protocol 32-4 Response Time Computation for IP SLAs 32-4 Configuring IP SLAs Operations 32-5 Default Configuration 32-5 Configuration Guidelines 32-5 Configuring the IP SLAs Responder Monitoring IP SLAs Operations3332-6

32-3

32-6

CHAPTER

Configuring QoS

33-1

Understanding QoS 33-2 Basic QoS Model 33-3 Classification 33-5 Classification Based on QoS ACLs 33-8 Classification Based on Class Maps and Policy Maps Policing and Marking 33-9 Policing on Physical Ports 33-10 Mapping Tables 33-11 Queueing and Scheduling Overview 33-12 Weighted Tail Drop 33-13 SRR Shaping and Sharing 33-13 Queueing and Scheduling on Ingress Queues 33-14 Queueing and Scheduling on Egress Queues 33-16 Packet Modification 33-19

33-8

Configuring Auto-QoS 33-20 Generated Auto-QoS Configuration 33-20 VOIP Device Specifics 33-21 Enhanced Auto-QoS for Video, Trust, and Classification 33-22 Auto-QoS Configuration Migration 33-22 Global Auto-QoS Configuration 33-23 Auto-QoS Generated Configuration For VoIP Devices 33-27 Auto-QoS Generated Configuration For Enhanced Video, Trust, and Classify Devices Effects of Auto-QoS on the Configuration 33-32 Auto-QoS Configuration Guidelines 33-33 Auto-QoS Enhanced Considerations 33-33Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

33-30

xxvii

Contents

Enabling Auto-QoS 33-34 Troubleshooting Auto QoS Commands Displaying Auto-QoS Information33-35

33-35

Configuring Standard QoS 33-35 Default Standard QoS Configuration 33-36 Default Ingress Queue Configuration 33-36 Default Egress Queue Configuration 33-37 Default Mapping Table Configuration 33-38 Standard QoS Configuration Guidelines 33-38 QoS ACL Guidelines 33-38 Policing Guidelines 33-39 General QoS Guidelines 33-39 Enabling QoS Globally 33-40 Configuring Classification Using Port Trust States 33-40 Configuring the Trust State on Ports Within the QoS Domain 33-40 Configuring the CoS Value for an Interface 33-42 Configuring a Trusted Boundary to Ensure Port Security 33-43 Enabling DSCP Transparency Mode 33-44 Configuring the DSCP Trust State on a Port Bordering Another QoS Domain 33-45 Configuring a QoS Policy 33-47 Classifying Traffic by Using ACLs 33-47 Classifying Traffic by Using Class Maps 33-51 Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps 33-53 Classifying, Policing, and Marking Traffic by Using Aggregate Policers 33-58 Configuring DSCP Maps 33-61 Configuring the CoS-to-DSCP Map 33-61 Configuring the IP-Precedence-to-DSCP Map 33-62 Configuring the Policed-DSCP Map 33-63 Configuring the DSCP-to-CoS Map 33-64 Configuring the DSCP-to-DSCP-Mutation Map 33-65 Configuring Ingress Queue Characteristics 33-67 Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds 33-67 Allocating Buffer Space Between the Ingress Queues 33-69 Allocating Bandwidth Between the Ingress Queues 33-69 Configuring the Ingress Priority Queue 33-70 Configuring Egress Queue Characteristics 33-71 Configuration Guidelines 33-72 Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set 33-72 Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID 33-74 Configuring SRR Shaped Weights on Egress Queues 33-76Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxviii

OL-26520-02

Contents

Configuring SRR Shared Weights on Egress Queues 33-77 Configuring the Egress Expedite Queue 33-78 Limiting the Bandwidth on an Egress Interface 33-78 Displaying Standard QoS Information3433-79

CHAPTER

Configuring Static IP Unicast Routing Understanding IP Routing 34-1 Types of Routing 34-2 IP Routing and Switch Stacks Steps for Configuring Routing Enabling IP Unicast Routing Assigning IP Addresses to SVIs Configuring Static Unicast Routes34-3 34-3 34-4

34-1

34-2

34-5 34-5

Monitoring and Maintaining the IP Network35

CHAPTER

Configuring IPv6 Host Functions

35-1

Understanding IPv6 35-1 IPv6 Addresses 35-2 Supported IPv6 Host Features 35-2 128-Bit Wide Unicast Addresses 35-3 DNS for IPv6 35-3 ICMPv6 35-3 Neighbor Discovery 35-4 First Hop Security in IPv6 35-4 IPv6 Stateless Autoconfiguration and Duplicate Address Detection IPv6 Applications 35-9 Dual IPv4 and IPv6 Protocol Stacks 35-9 onfiguring IPSec on OSPFv3SNMP and Syslog Over IPv6 35-10 HTTP(S) Over IPv6 35-11 IPv6 and Switch Stacks 35-11 Configuring IPv6 35-11 Default IPv6 Configuration 35-12 Configuring IPv6 Addressing and Enabling IPv6 Host 35-12 Configuring First Hop Security in IPv6 35-14 Configuring an IPv6 Snooping Policy 35-14 Configuring IPv6 DHCP Guard 35-16 Configuring IPv6 Source Guard 35-17 Configuration Examples for Implementing First Hop Security in IPv6

35-9

35-17

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxix

Contents

Configuring IPv6 ICMP Rate Limiting 35-20 Configuring Static Routes for IPv6 35-21 Displaying IPv63635-22

CHAPTER

Configuring IPv6 MLD Snooping

36-1

Understanding MLD Snooping 36-2 MLD Messages 36-3 MLD Queries 36-3 Multicast Client Aging Robustness 36-3 Multicast Router Discovery 36-4 MLD Reports 36-4 MLD Done Messages and Immediate-Leave 36-4 Topology Change Notification Processing 36-5 MLD Snooping in Switch Stacks 36-5 Configuring IPv6 MLD Snooping 36-5 Default MLD Snooping Configuration 36-6 MLD Snooping Configuration Guidelines 36-6 Enabling or Disabling MLD Snooping 36-7 Configuring a Static Multicast Group 36-8 Configuring a Multicast Router Port 36-8 Enabling MLD Immediate Leave 36-9 Configuring MLD Snooping Queries 36-10 Disabling MLD Listener Message Suppression 36-11 Displaying MLD Snooping Information3736-12

CHAPTER

Configuring IPv6 ACLs

37-1

Understanding IPv6 ACLs 37-1 Supported ACL Features 37-2 IPv6 ACL Limitations 37-2 Configuring IPv6 ACLs 37-3 Default IPv6 ACL Configuration 37-4 Interaction with Other Features 37-4 Creating IPv6 ACLs 37-4 Applying an IPv6 ACL to an Interface 37-7 Displaying IPv6 ACLs3837-8

CHAPTER

Configuring EtherChannels and Link-State Tracking Understanding EtherChannels38-1

38-1

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxx

OL-26520-02

Contents

EtherChannel Overview 38-2 Port-Channel Interfaces 38-4 Port Aggregation Protocol 38-5 PAgP Modes 38-6 PAgP Interaction with Virtual Switches and Dual-Active Detection PAgP Interaction with Other Features 38-7 Link Aggregation Control Protocol 38-7 LACP Modes 38-7 LACP Interaction with Other Features 38-8 EtherChannel On Mode 38-8 Load Balancing and Forwarding Methods 38-8 EtherChannel and Switch Stacks 38-10 Configuring EtherChannels 38-11 Default EtherChannel Configuration 38-11 EtherChannel Configuration Guidelines 38-11 Configuring Layer 2 EtherChannels 38-13 Configuring EtherChannel Load Balancing 38-15 Configuring the PAgP Learn Method and Priority 38-16 Configuring LACP Hot-Standby Ports 38-18 Configuring the LACP System Priority 38-18 Configuring the LACP Port Priority 38-19 Displaying EtherChannel, PAgP, and LACP Status Understanding Link-State Tracking38-21 38-21

38-6

Configuring Link-State Tracking 38-23 Default Link-State Tracking Configuration 38-23 Link-State Tracking Configuration Guidelines 38-24 Configuring Link-State Tracking 38-24 Displaying Link-State Tracking Status 38-2539

CHAPTER

Troubleshooting

39-1 39-2

Recovering from a Software Failure

Recovering from a Lost or Forgotten Password 39-3 Procedure with Password Recovery Enabled 39-4 Procedure with Password Recovery Disabled 39-6 Preventing Switch Stack Problems39-8

Recovering from a Command Switch Failure 39-8 Replacing a Failed Command Switch with a Cluster Member 39-9 Replacing a Failed Command Switch with Another Switch 39-11 Recovering from Lost Cluster Member Connectivity39-12

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxxi

Contents

Preventing Autonegotiation Mismatches

39-12 39-13

Troubleshooting Power over Ethernet Switch Ports Disabled Port Caused by Power Loss 39-13 Disabled Port Caused by False Link Up 39-13 SFP Module Security and Identification Monitoring SFP Module Status Using Ping 39-14 Understanding Ping 39-14 Executing Ping 39-15 Using Layer 2 Traceroute 39-15 Understanding Layer 2 Traceroute 39-16 Usage Guidelines 39-16 Displaying the Physical Path 39-17 Using IP Traceroute 39-17 Understanding IP Traceroute 39-17 Executing IP Traceroute 39-18 Using TDR 39-19 Understanding TDR 39-19 Running TDR and Displaying the Results39-14 39-13

39-19

Using Debug Commands 39-20 Enabling Debugging on a Specific Feature 39-20 Enabling All-System Diagnostics 39-21 Redirecting Debug and Error Message Output 39-21 Using the show platform forward Command Using the crashinfo Files 39-23 Basic crashinfo Files 39-23 Extended crashinfo Files 39-25 Using On-Board Failure Logging 39-25 Understanding OBFL 39-25 Configuring OBFL 39-26 Displaying OBFL Information 39-26 Memory Consistency Check Routines39-27 39-22

Troubleshooting Tables 39-28 Troubleshooting CPU Utilization 39-28 Possible Symptoms of High CPU Utilization 39-28 Verifying the Problem and Cause 39-29 Troubleshooting Power over Ethernet (PoE) 39-30 Troubleshooting Switch Stacks 39-33Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxxii

OL-26520-02

Contents

CHAPTER

40

Configuring Online Diagnostics Scheduling Online Diagnostics

40-1 40-1

Understanding How Online Diagnostics Work40-2

Configuring Health-Monitoring Diagnostics Running Online Diagnostic Tests 40-3 Starting Online Diagnostic Tests 40-3

40-2

Displaying Online Diagnostic Tests and Test ResultsA

40-4

APPENDIX

Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System A-1 Displaying Available File Systems A-2 Setting the Default File System A-3 Displaying Information about Files on a File System A-3 Changing Directories and Displaying the Working Directory Creating and Removing Directories A-4 Copying Files A-5 Deleting Files A-5 Creating, Displaying, and Extracting tar Files A-6 Creating a tar File A-6 Displaying the Contents of a tar File A-7 Extracting a tar File A-7 Displaying the Contents of a File A-8

A-1

A-4

Working with Configuration Files A-8 Guidelines for Creating and Using Configuration Files A-9 Configuration File Types and Location n A-10 Creating a Configuration File By Using a Text Editor A-10 Copying Configuration Files By Using TFTP A-10 Preparing to Download or Upload a Configuration File B y Using TFTP A-10 Downloading the Configuration File By Using TFTP A-11 Uploading the Configuration File By Using TFTP A-12 Copying Configuration Files By Using FTP A-12 Preparing to Download or Upload a Configuration File By Using FTP A-13 Downloading a Configuration File By Using FTP A-13 Uploading a Configuration File By Using FTP A-15 Copying Configuration Files By Using RCP A-16 Preparing to Download or Upload a Configuration File By Using RCP A-16 Downloading a Configuration File By Using RCP A-17 Uploading a Configuration File By Using RCP A-18 Clearing Configuration Information A-19Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxxiii

Contents

Clearing the Startup Configuration File A-19 Deleting a Stored Configuration File A-19 Replacing and Rolling Back Configurations A-19 Understanding Configuration Replacement and Rollback A-20 Configuration Guidelines A-21 Configuring the Configuration Archive A-22 Performing a Configuration Replacement or Rollback Operation

A-23

Working with Software Images A-24 Image Location on the Switch A-25 tar File Format of Images on a Server or Cisco.com A-25 Copying Image Files By Using TFTP A-26 Preparing to Download or Upload an Image File By Using TFTP A-26 Downloading an Image File By Using TFTP A-27 Uploading an Image File By Using TFTP A-29 Copying Image Files By Using FTP A-29 Preparing to Download or Upload an Image File By Using FTP A-30 Downloading an Image File By Using FTP A-31 Uploading an Image File By Using FTP A-32 Copying Image Files By Using RCP A-33 Preparing to Download or Upload an Image File By Using RCP A-34 Downloading an Image File By Using RCP A-35 Uploading an Image File By Using RCP A-37 Copying an Image File from One Stack Member to Another A-38B

APPENDIX

Unsupported Commands in Cisco IOS Release 15.0(2)SE

B-1

Access Control Lists B-1 Unsupported Privileged EXEC Commands B-1 Unsupported Global Configuration Commands B-2 Unsupported Route-Map Configuration Commands B-2 Boot Loader Commands B-2 Unsupported Global Configuration CommandsB-2

Embedded Syslog Manager B-2 Unsupported Global Configuration Commands B-2 Unsupported Privileged EXEC Commands B-2 IGMP Snooping Commands B-2 Unsupported Global Configuration CommandsB-2

Interface Commands B-3 Unsupported Privileged EXEC Commands B-3 Unsupported Global Configuration Commands B-3Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxxiv

OL-26520-02

Contents

Unsupported Interface Configuration Commands

B-3

MAC Address Commands B-3 Unsupported Privileged EXEC Commands B-3 Unsupported Global Configuration Commands B-4 Miscellaneous B-4 Unsupported User EXEC Commands B-4 Unsupported Privileged EXEC Commands B-4 Unsupported Global Configuration Commands B-4 Network Address Translation (NAT) Commands B-4 Unsupported Privileged EXEC Commands B-4 QoSB-5

Unsupported Global Configuration Command B-5 Unsupported Interface Configuration Commands B-5 Unsupported Policy-Map Configuration Command B-5 RADIUS B-5 Unsupported Global Configuration Commands SNMP B-5 Unsupported Global Configuration Commands SNMPv3 B-6 Unsupported 3DES Encryption CommandsB-6 B-5

B-5

Spanning Tree B-6 Unsupported Global Configuration Command B-6 Unsupported Interface Configuration Command B-6 VLAN B-6 Unsupported Global Configuration Command B-6 Unsupported vlan-config Command B-6 Unsupported User EXEC Commands B-6 Unsupported vlan-config Command B-7 Unsupported VLAN Database Commands B-7 VTPB-7

Unsupported Privileged EXEC CommandsC

B-7

APPENDIX

Recommendations for Upgrading a Catalyst 2950 Switch to a Catalyst 2960 Switch Configuration Compatibility Issues Feature Behavior IncompatibilitiesC-1 C-5

C-1

INDEX

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxxv

Contents

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxxvi

OL-26520-02

PrefaceAudienceThis guide is for the networking professional managing the Catalyst 2960, 2960-S, and 2960-C switch, hereafter referred to as the switch. Before using this guide, you should have experience working with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local area networking.

PurposeThis guide provides the information that you need to configure Cisco IOS software features on your switch. Catalyst 2960, 2960-S, and 2960-C switches run one of these images:

The LAN base software image provides enterprise-class intelligent services such as access control lists (ACLs) and quality of service (QoS) features. On a Catalyst 2960-S switch, stacking is also supported. The LAN Lite image provides reduced functionality.

The Catalyst 2960-S ships with a universal image that includes cryptographic functionality. The software image on the switch is either the LAN base or LAN Lite image, depending on the switch model. To determine which image your switch is running:

Switches running the LAN Lite image do not support the FlexStack module. They do not have a FlexStack module slot on the rear of the switch. On the front of the switch, the label in the top right corner ends in -S if the switch model runs the LAN Lite image. Enter the show version privileged EXEC command. The line that shows the product ID also ends in either -L (if running the LAN base image) or -S (if running the LAN Lite image). For example, WS-C2960S-48PD-L is running LAN base; WS-C2960S-24TS-S is running LAN Lite image. Enter the show license privileged EXEC command, and see which is the active image:Switch# show license Index 1 Feature: lanlite Period left: 0 minute

0

second

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxxvii

Preface

Index 2 Feature: lanbase Period left: Life time License Type: Permanent License State: Active, In Use License Priority: Medium License Count: Non-Counted

This guide provides procedures for using the commands that have been created or changed for use with the switch. It does not provide detailed information about these commands. For detailed information about these commands, see the Catalyst 2960, 2960-S, and 2960-C Switch Command Reference for this release. For information about the standard Cisco IOS Release 15.0 commands, see the Cisco IOS documentation set available on Cisco.com. This guide does not provide detailed information on the graphical user interfaces (GUIs) for the embedded device manager or for Cisco Network Assistant (hereafter referred to as Network Assistant) that you can use to manage the switch. However, the concepts in this guide are applicable to the GUI user. For information about the device manager, see the switch online help. For information about Network Assistant, see Getting Started with Cisco Network Assistant, available on Cisco.com. This guide does not describe system messages you might encounter or how to install your switch. For more information, see the appropriate system message guide and hardware installation guide. For documentation updates, see the release notes for this release.

ConventionsThis publication uses these conventions to convey instructions and information: Command descriptions use these conventions:

Commands and keywords are in boldface text. Arguments for which you supply values are in italic. Square brackets ([ ]) mean optional elements. Braces ({ }) group required choices, and vertical bars ( | ) separate the alternative elements. Braces and vertical bars within square brackets ([{ | }]) mean a required choice within an optional element. Terminal sessions and system displays are in screen font. Information you enter is in boldface screen font. Nonprinting characters, such as passwords or tabs, are in angle brackets (< >).

Interactive examples use these conventions:

Notes, cautions, and timesavers use these conventions and symbols:

Note

Means reader take note. Notes contain helpful suggestions or references to materials not contained in this manual.

Caution

Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xxxviii

OL-26520-02

Preface

Related PublicationsThese documents provide complete information about the switch and are available from this Cisco.com site: http://www.cisco.com/en/US/products/ps6406/tsd_products_support_series_home.html

Note

Before installing, configuring, or upgrading the switch, see these documents:

For initial configuration information, see the Using Express Setup section in the getting started guide or the Configuring the Switch with the CLI-Based Setup Program appendix in the hardware installation guide. For device manager requirements, see the System Requirements section in the release notes (not orderable but available on Cisco.com). For Network Assistant requirements, see the Getting Started with Cisco Network Assistant (not orderable but available on Cisco.com). For cluster requirements, see the Release Notes for Cisco Network Assistant (not orderable but available on Cisco.com). For upgrading information, see the Downloading Software section in the release notes.

See these documents for other information about the switch:

Release Notes for the Catalyst 3750, 3560, 3560-C, 2960, 2960-S, and 2960- C Switches Catalyst 3750, 3560, 3550, 2975, 2975, 2970, and 2960 and 2960-S Switch System Message Guide Catalyst 3560-C and 2960-C Switch Hardware Installation Guide Catalyst 3560-C and 2960-C Switch Getting Started Guide Release Notes for the Catalyst 2960-S switches Catalyst 2960 Switch Getting Started Guide Catalyst 2960-S Switch Getting Started Guide Catalyst 3560-C and 2960-C Switch Hardware Installation Guide Catalyst 2960, 2960-S, and 2960-C Switch Software Configuration Guide Catalyst 2960, 2960-S, and 2960-C Switch Command Reference Catalyst 2960 Switch Hardware Installation Guide Catalyst 2960-S Switch Hardware Installation Guide Catalyst 3560-C and 2960-C Switch Hardware Installation Guide Regulatory Compliance and Safety Information for the Catalyst 2960 and 2960-S Switch Regulatory Compliance and Safety Information for the Catalyst 3560-C and 2960-C Switch Catalyst 3750, 3560, 2960, and 2960-S Switch System Message Guide Auto Smartports Configuration Guide Call Home Configuration Guide Cisco EnergyWise Configuration Guide Smart Install Configuration Guide Release Notes for Cisco Network Assistant

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

xxxix

Preface

Getting Started with Cisco Network Assistant Cisco CWDM GBIC and CWDM SFP Installation Note Cisco RPS 300 Redundant Power System Hardware Installation Guide Cisco RPS 675 Redundant Power System Hardware Installation Guide Cisco Redundant Power System 2300 Hardware Installation Guide For information about the Network Admission Control (NAC) features, see the Network Admission Control Software Configuration Guide Information about Cisco SFP, SFP+, and GBIC modules is available from this Cisco.com site: http://www.cisco.com/en/US/products/hw/modules/ps5455/prod_installation_guides_list.html SFP compatibility matrix documents are available from this Cisco.com site: http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.ht ml

Obtaining Documentation, Obtaining Support, and Security GuidelinesFor information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly Whats New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html Subscribe to the Whats New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

xl

OL-26520-02

CH A P T E R

1

OverviewThis chapter provides these topics about the Catalyst 2960, 2960-S and 2960-C switch software:

Features, page 1-1 Default Settings After Initial Switch Configuration, page 1-16 Network Configuration Examples, page 1-19 Where to Go Next, page 1-25

Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. In this document, IP refers to IP Version 4 (IPv4) unless there is a specific reference to IP Version 6 (IPv6).

FeaturesThe switch supports a LAN base image or a LAN lite image with a reduced feature set, depending on switch hardware.

Ease-of-Deployment and Ease-of-Use Features, page 1-2 Performance Features, page 1-4 Management Options, page 1-5 Manageability Features, page 1-6 Availability and Redundancy Features, page 1-8 VLAN Features, page 1-9 Security Features, page 1-10 QoS and CoS Features, page 1-13 Power over Ethernet Features, page 1-15 Monitoring Features, page 1-15

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

1-1

Chapter 1 Features

Overview

Ease-of-Deployment and Ease-of-Use Features

Express Setup for quickly configuring a switch for the first time with basic IP information, contact information, switch and Telnet passwords, and Simple Network Management Protocol (SNMP) information through a browser-based program. For more information about Express Setup, see the getting started guide. User-defined and Cisco-default Smartports macros for creating custom switch configurations for simplified deployment across the network. An embedded device manager GUI for configuring and monitoring a single switch through a web browser. For information about launching the device manager, see the getting started guide. For more information about the device manager, see the switch online help. Cisco Network Assistant (hereafter referred to as Network Assistant) for Managing communities, which are device groups like clusters, except that they can contain

routers and access points and can be made more secure. Simplifying and minimizing switch, switch stack, and switch cluster management from

anywhere in your intranet. Accomplishing multiple configuration tasks from a single graphical interface without needing

to remember command-line interface (CLI) commands to accomplish specific tasks. Interactive guide mode that guides you in configuring complex features such as VLANs, ACLs,

and quality of service (QoS).

Note

If the switch is running the LAN Lite image, you can configure ACLs, but you cannot attach them to interfaces or VLANs.

Configuration wizards that prompt you to provide only the minimum required information to

configure complex features such as QoS priorities for traffic, priority levels for data applications, and security. Downloading an image to a switch. Applying actions to multiple ports and multiple switches at the same time, such as VLAN and

QoS settings, inventory and statistic reports, link- and switch-level monitoring and troubleshooting, and multiple switch software upgrades. Viewing a topology of interconnected devices to identify existing switch clusters and eligible

switches that can join a cluster and to identify link information between switches. Monitoring real-time status of a switch or multiple switches from the LEDs on the front-panel

images. The system, redundant power system (RPS), and port LED colors on the images are similar to those used on the physical LEDs.

Note

To use the RPS, the switch must be running the LAN Base image.

The Network Assistant must be downloaded from cisco.com/go/cna.

Cisco FlexStack technology on Catalyst 2960-S switches running the LAN base image for Connecting up to four switches through their FlexStack ports to operate as a single switch in the

network. Creating a bidirectional 32-Gb/s switching fabric across the switch stack, where all stack

members have full access to the system bandwidth.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

1-2

OL-26520-02

Chapter 1

Overview Features

Creating a bidirectional 20-Gb/s switching fabric across the switch stack, with all stack

members having full access to the system bandwidth. Using a single IP address and configuration file to manage the entire switch stack. Automatic Cisco IOS version-check of new stack members with the option to automatically load

images from the stack master or from a TFTP server. Adding, removing, and replacing switches in the stack without disrupting the operation of the

stack. Provisioning a new member for a switch stack with the offline configuration feature. You can

configure in advance the interface configuration for a specific stack member number and for a specific switch type of a new switch that is not part of the stack. The switch stack retains this information across stack reloads whether or not the provisioned switch is part of the stack. Displaying stack-ring activity statistics (the number of frames sent by each stack member to the

ring).

Switch clustering technology for Unified configuration, monitoring, authentication, and software upgrade of multiple,

cluster-capable switches, regardless of their geographic proximity and interconnection media, including Ethernet, Fast Ethernet, Fast EtherChannel, small form-factor pluggable (SFP) modules, Gigabit Ethernet, and Gigabit EtherChannel connections. For a list of cluster-capable switches, see the release notes. Automatic discovery of candidate switches and creation of clusters of up to 16 switches that can

be managed through a single IP address. Extended discovery of cluster candidates that are not directly connected to the command switch.

Stack troubleshooting enhancements Auto Smartports Cisco-default and user-defined macros for dynamic port configuration based on the device type

detected on the port. Enhancements to add support for global macros, last-resort macros, event trigger control, access

points, EtherChannels, auto-QoS with Cisco Medianet, and IP phones. Enhancements to add support for macro persistency, LLDP-based triggers, MAC address and

OUI-based triggers, remote macros as well as for automatic configuration based on these two new device types: Cisco Digital Media Player (Cisco DMP) and Cisco IP Video Surveillance Camera (Cisco IPVSC). Auto Smartports enhancement to enable auto-QoS on a CDP-capable Cisco digital media

player. Improved device classification capabilities and accuracy, increased device visibility, and

enhanced macro management. The device classifier is enabled by default, and can classify devices based on DHCP options. For information, see the Auto Smartports Configuration Guide.

Smart Install to allow a single point of management (director) in a network. You can use Smart Install to provide zero touch image and configuration upgrade of newly deployed switches and image and configuration downloads for any client switches. For more information, see the Cisco Smart Install Configuration Guide.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

1-3

Chapter 1 Features

Overview

Smart Install enhancements supporting client backup files, zero-touch replacement for clients

with the same product-ID, automatic generation of the image list file, configurable file repository, hostname changes, transparent connection of the director to client, and USB storage for image and seed configuration. Smart Install enhancements in Cisco IOS Release 12.2(58)SE including the ability to manually

change a client switch health state from denied to allowed or hold for on-demand upgrades, to remove selected clients from the director database, to allow simultaneous on-demand upgrade of multiple clients, and to provide more information about client devices, including device status, health status, and upgrade status.

Call Home to provide e-mail-based and web-based notification of critical system events. Users with a service contract directly with Cisco Systems can register Call Home devices for the Cisco Smart Call Home service that generates automatic service requests with the Cisco TAC.

Performance Features

Cisco EnergyWise manages the energy usage of endpoints connected to domain members. For more information, see the Cisco EnergyWise documentation on Cisco.com. EnergyWise Phase 2.5 enhancements that add support for a query to analyze and display domain information and for Wake on LAN (WoL) to remotely power on a WoL-capable PC. Autosensing of port speed and autonegotiation of duplex mode on all switch ports for optimizing bandwidth. Automatic-medium-dependent interface crossover (auto-MDIX) capability on 10/100 and 10/100/1000 Mb/s interfaces and on 10/100/1000 BASE-TX SFP module interfaces that enables the interface to automatically detect the required cable connection type (straight-through or crossover) and to configure the connection appropriately. SFP+ support for 10Gigabit speeds (Catalyst 2960-S only) Support for up to 9000 bytes for frames that are bridged in hardware and up to 2000 bytes for frames that are bridged by software IEEE 802.3x flow control on all ports (the switch does not send pause frames). Up to 20 Gb/s of forwarding rates in a Catalyst 2960-S switch stack. EtherChannel for enhanced fault tolerance and for providing up to 8 Gb/s (Gigabit EtherChannel) or 800 Mb/s (Fast EtherChannel) full-duplex bandwidth among switches, routers, and servers. Port Aggregation Protocol (PAgP) and Link Aggregation Control Protocol (LACP) for automatic creation of EtherChannel links. Forwarding of Layer 2 packets at Gigabit line rate across the switches in the stack. Per-port storm control for preventing broadcast, multicast, and unicast storms. Port blocking on forwarding unknown Layer 2 unknown unicast, multicast, and bridged broadcast traffic. Internet Group Management Protocol (IGMP) snooping for IGMP Versions 1, 2, and 3 for efficiently forwarding multimedia and multicast traffic IGMP report suppression for sending only one IGMP report per multicast router query to the multicast devices (supported only for IGMPv1 or IGMPv2 queries). IGMP snooping querier support to configure switch to generate periodic IGMP general query messages.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

1-4

OL-26520-02

Chapter 1

Overview Features

IPv6 host support for basic IPv6 management Multicast Listener Discovery (MLD) snooping to enable efficient distribution of IP version 6 (IPv6) multicast data to clients and routers in a switched network

Note

To use IPv6 features, the switch must be running the LAN Base image. Multicast VLAN registration (MVR) to continuously send multicast streams in a multicast VLAN while isolating the streams from subscriber VLANs for bandwidth and security reasons.

Note

To use MVR, the switch must be running the LAN Base image. IGMP filtering for controlling the set of multicast groups to which hosts on a switch port can belong. IGMP throttling for configuring the action when the maximum number of entries is in the IGMP forwarding table. IGMP leave timer for configuring the leave latency for the network. Switch Database Management (SDM) templates for allocating system resources to maximize support for user-selected features. Configurable small-frame arrival threshold to prevent storm control when small frames (64 bytes or less) arrive on an interface at a specified rate (the threshold). Flex Link Multicast Fast Convergence to reduce the multicast traffic convergence time after a Flex Link failure.

Note

To use Flex Link Multicast Fast Convergence, the switch must be running the LAN Base image. RADIUS server load balancing to allow access and authentication requests to be distributed evenly across a server group. Support for QoS marking of CPU-generated traffic and queue CPU-generated traffic on the egress network ports. Memory consistency check routines to detect and correct invalid ternary content addressable memory (TCAM) table entries.

Management Options

An embedded device managerThe device manager is a GUI that is integrated in the software image. You use it to configure and to monitor a single switch. For information about launching the device manager, see the getting started guide. For more information about the device manager, see the switch online help. Network AssistantNetwork Assistant is a network management application that can be downloaded from Cisco.com. You use it to manage a single switch, a cluster of switches, or a community of devices. For more information about Network Assistant, see Getting Started with Cisco Network Assistant, available on Cisco.com. CLIThe Cisco IOS software supports desktop- and multilayer-switching features. You can access the CLI by connecting your management station directly to the switch console port, by connecting your PC directly to the Ethernet management port, or by using Telnet from a remote management

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

1-5

Chapter 1 Features

Overview

station or PC. You can manage the switch stack by connecting to the console port or Ethernet management port of any stack member. For more information about the CLI, see Chapter 2, Using the Command-Line Interface.

SNMPSNMP management applications such as CiscoWorks2000 LAN Management Suite (LMS) and HP OpenView. You can manage from an SNMP-compatible management station that is running platforms such as HP OpenView or SunNet Manager. The switch supports a comprehensive set of MIB extensions and four remote monitoring (RMON) groups. For more information about using SNMP, see Chapter 30, Configuring SNMP. Cisco IOS Configuration Engine (previously known to as the Cisco IOS CNS agent)-Configuration service automates the deployment and management of network devices and services. You can automate initial configurations and configuration updates by generating switch-specific configuration changes, sending them to the switch, executing the configuration change, and logging the results. For more information about CNS, see Chapter 4, Configuring Cisco IOS Configuration Engine.

Manageability Features

CNS embedded agents for automating switch management, configuration storage, and delivery DHCP for automating configuration of switch information (such as IP address, default gateway, hostname, and Domain Name System [DNS] and TFTP server names) DHCP relay for forwarding User Datagram Protocol (UDP) broadcasts, including IP address requests, from DHCP clients DHCP server for automatic assignment of IP addresses and other DHCP options to IP hosts DHCP-based autoconfiguration and image update to download a specified configuration a new image to a large number of switches DHCP server port-based address allocation for the preassignment of an IP address to a switch port Directed unicast requests to a DNS server for identifying a switch through its IP address and its corresponding hostname and to a TFTP server for administering software upgrades from a TFTP server Address Resolution Protocol (ARP) for identifying a switch through its IP address and its corresponding MAC address Unicast MAC address filtering to drop packets with specific source or destination MAC addresses Configurable MAC address scaling that allows disabling MAC address learning on a VLAN to limit the size of the MAC address table Cisco Discovery Protocol (CDP) Versions 1 and 2 for network topology discovery and mapping between the switch and other Cisco devices on the network Link Layer Discovery Protocol (LLDP) and LLDP Media Endpoint Discovery (LLDP-MED) for interoperability with third-party IP phones LLDP media extensions (LLDP-MED) location TLV that provides location information from the switch to the endpoint device

Note

To use LLDP-MED, the switch must be running the LAN Base image.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

1-6

OL-26520-02

Chapter 1

Overview Features

Support for CDP and LLDP enhancements for exchanging location information with video end points for dynamic location-based content distribution from servers Network Time Protocol (NTP) version 4 for NTP time synchronization for both IPv4 and IPv6 Cisco IOS File System (IFS) for providing a single interface to all file systems that the switch uses Configuration logging to log and to view changes to the switch configuration Unique device identifier to provide product identification information through a show inventory user EXEC command display In-band management access through the device manager over a Netscape Navigator or Microsoft Internet Explorer browser session In-band management access for up to 16 simultaneous Telnet connections for multiple CLI-based sessions over the network In-band management access for up to five simultaneous, encrypted Secure Shell (SSH) connections for multiple CLI-based sessions over the network Support for SSH for IPv6. Support for IPv6 Host on the LAN Base and LAN Lite image (Catalyst 2960 and 2960-S). In-band management access through SNMP Versions 1, 2c, and 3 get and set requests Out-of-band management access through the switch console port to a directly attached terminal or to a remote terminal through a serial connection or a modem Out-of-band management access through the Ethernet management port to a PC (Catalyst 2960-only) Secure Copy Protocol (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) for both IPv4 and IPv6 Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file The HTTP client in Cisco IOS supports can send requests to both IPv4 and IPv6 HTTP server, and the HTTP server in Cisco IOS can service HTTP requests from both IPv4 and IPv6 HTTP clients Simple Network and Management Protocol (SNMP) can be configured over IPv6 transport so that an IPv6 host can send SNMP queries and receive SNMP notifications from a device running IPv6 IPv6 stateless autoconfiguration to manage link, subnet, and site addressing changes, such as management of host and mobile IP addresses Disabling MAC address learning on a VLAN DHCP server port-based address allocation for the preassignment of an IP address to a switch port. Wired location service sends location and attachment tracking information for connected devices to a Cisco Mobility Services Engine (MSE)

Note

To use wired location, the switch must be running the LAN Base image. CPU utilization threshold trap monitors CPU utilization

Note

To use CPU utilization, the switch must be running the LAN Base image.

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE OL-26520-02

1-7

Chapter 1 Features

Overview

LLDP-MED network-policy profile time, length, value (TLV) for creating a profile for voice and voice-signalling by specifying the values for VLAN, class of service (CoS), differentiated services code point (DSCP), and tagging mode

Note

Supported on all images in Cisco IOS Release 12.2(55)SE and later. Support for including a hostname in the option 12 field of DHCPDISCOVER packets. This provides identical configuration files to be sent by using the DHCP protocol DHCP Snooping enhancement to support the selection of a fixed string-based format for the circuit-id sub-option of the Option 82 DHCP field Increased support for LLPD-MED by allowing the switch to grant power to the power device (PD), based on the power policy TLV request USB mini-Type B console port in addition to the standard RJ-45 console port. Console input is active on only one port at a time. (Catalyst 2960-S only) USB Type A port for external Cisco USB flash memory devices (thumb drives or USB keys). You can use standard Cisco CLI commands to read, write, erase, copy, or boot from the flash memory. (Catalyst 2960-S only)

Availability and Redundancy Features

Automatic stack master re-election for replacing stack masters that become unavailable (failover support) The newly elected stack master begins accepting Layer 2 traffic in less than 1 second and Layer 3 traffic between 3 to 5 seconds.

Cross-stack EtherChannel for providing redundant links across the switch stack UniDirectional Link Detection (UDLD) and aggressive UDLD for detecting and disabling unidirectional links on fiber-optic interfaces caused by incorrect fiber-optic wiring or port faults IEEE 802.1D Spanning Tree Protocol (STP) for redundant backbone connections and loop-free networks. STP has these features: Up to 128 spanning-tree instances supported

Note

Up to 64 spanning-tree instances are supported when the switch is running the LAN Lite image.

Per-VLAN spanning-tree plus (PVST+) for load balancing across VLANs Rapid PVST+ for load balancing across VLANs and providing rapid convergence of

spanning-tree instances UplinkFast, cross-stack UplinkFast, and BackboneFast for fast convergence after a

spanning-tree topology change and for achieving load balancing between redundant uplinks, including Gigabit uplinks and cross-stack Gigabit uplinks

IEEE 802.1s Multiple Spanning Tree Protocol (MSTP) for grouping VLANs into a spanning-tree instance and for providing multiple forwarding paths for data traffic and load balancing and rapid per-VLAN Spanning-Tree plus (rapid-PVST+) based on the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) for rapid convergence of the spanning tree by immediately changing root and designated ports to the forwarding state

Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE

1-8

OL-26520-02

Chapter 1

Overview Features

Optional spanning-tree features available in PVST+, rapid-PVST+, and MSTP mode: Port Fast for eliminating the forwarding delay by enabling a port to immediately change from

the blocking state to the forwarding state BPDU guard for shutting down Port Fast-enabled ports that receive bridge protocol data units

(BPDUs) BPDU filtering for preventing a Port Fast-enabled port from sending or receiving BPDUs Root guard for preventing switches outside the network core from becoming the spanning-tree

root Loop guard for preventing alternate or root ports from becoming designated ports because of a

failure that leads to a unidirectional link

Flex Link Layer 2 interfaces to back up one another as an alternative to STP for basic link redundancy

Note

To use Flex Links, the switch must be running the LAN Base image. Link-state tracking to mirror the state of the ports that carry upstream traffic from connected hosts and servers, and to allow the failover of the server traffic to an operational link on another Cisco Ethernet switch.

Note

To use Link-state Tracking, the switch must be running the LAN Base image.

VLAN Features

Support for up to 255 VLANs for assigning users to VLANs associated with appropriate network resources, traffic patterns, and bandwidth

Note

Up to 64 VLANs are supported when the switch is running the LAN Lite image. Support for VLAN IDs in the 1 to 4094 range as allowed by the IEEE 802.1Q standard VLAN Query Protocol (VQP) for dynamic VLAN membership IEEE 802.1Q trunking encapsulation on all ports for network moves, adds, and changes; management and control of broadcast and multicast traffic; and network security by establishing VLAN groups for high-security users and network r