Catalyst 3560 Switch Software Configuration Guide, Cisco IOS

  • Upload
    buique

  • View
    238

  • Download
    11

Embed Size (px)

Citation preview

  • OL-26641-03

    I N D E X

    Numerics

    10-Gigabit Ethernet interfaces

    configuration guidelines 14-33

    defined 14-7

    802.1AE 11-2

    802.1AE Tagging 11-9, 13-2

    802.1x-REV 11-2

    A

    AAA down policy, NAC Layer 2 IP validation 1-15

    abbreviating commands 2-3

    ABRs 41-26

    AC (command switch) 6-11

    access-class command 37-21

    access control entries

    See ACEs

    access control entry (ACE) 43-3

    access-denied response, VMPS 15-28

    access groups

    applying IPv4 ACLs to interfaces 37-22

    Layer 2 37-22

    Layer 3 37-23

    access groups, applying IPv4 ACLs to interfaces 37-22

    accessing

    clusters, switch 6-14

    command switches 6-12

    member switches 6-14

    switch clusters 6-14

    accessing stack members 5-27

    access lists

    See ACLs

    access ports

    and Layer 2 protocol tunneling 19-11

    defined 14-3

    in switch clusters 6-10

    access ports, defined 14-3

    access template 8-2

    accounting

    with 802.1x 10-55

    with IEEE 802.1x 10-17

    with RADIUS 9-35

    with TACACS+ 9-12, 9-17

    ACEs

    and QoS 38-8

    defined 37-2

    Ethernet 37-2

    IP 37-2

    ACLs

    ACEs 37-2

    any keyword 37-14

    applying

    on bridged packets 37-44

    on multicast packets 37-45

    on routed packets 37-45

    on switched packets 37-43

    time ranges to 37-18

    to an interface 37-21, 43-7

    to IPv6 interfaces 43-7

    to QoS 38-8

    classifying traffic for QoS 38-51

    comments in 37-20

    compiling 37-26

    defined 37-2, 37-8

    examples of 37-26, 38-51

    IN-1Catalyst 3560 Switch Software Configuration Guide

  • Index

    extended IP, configuring for QoS classification 38-53

    extended IPv4

    creating 37-12

    matching criteria 37-8

    hardware and software handling 37-23

    host keyword 37-14

    IP

    creating 37-8

    fragments and QoS guidelines 38-42

    implicit deny 37-11, 37-16, 37-18

    implicit masks 37-11

    matching criteria 37-8

    undefined 37-23

    IPv4

    applying to interfaces 37-21

    creating 37-8

    matching criteria 37-8

    named 37-16

    numbers 37-9

    terminal lines, setting on 37-21

    unsupported features 37-8

    IPv6

    and stacking 43-3

    applying to interfaces 43-7

    configuring 43-4, 43-5

    displaying 43-8

    interactions with other features 43-4

    limitations 43-3

    matching criteria 43-3

    named 43-3

    precedence of 43-2

    supported 43-2

    unsupported features 43-3

    Layer 4 information in 37-43

    logging messages 37-10

    MAC extended 37-31, 38-54

    matching 37-8, 37-23, 43-3

    monitoring 37-47, 43-8

    named, IPv4 37-16

    IN-2Catalyst 3560 Switch Software Configuration Guide

    named, IPv6 43-3

    names 43-4

    number per QoS class map 38-42

    port 37-2, 43-1

    precedence of 37-3

    QoS 38-8, 38-51

    resequencing entries 37-16

    router 37-2, 43-1

    router ACLs and VLAN map configuration guidelines 37-42

    standard IP, configuring for QoS classification 38-52

    standard IPv4

    creating 37-11

    matching criteria 37-8

    support for 1-13

    support in hardware 37-23

    time ranges 37-18

    types supported 37-2

    unsupported features, IPv4 37-8

    unsupported features, IPv6 43-3

    using router ACLs with VLAN maps 37-42

    VLAN maps

    configuration guidelines 37-34

    configuring 37-33

    active link 24-4, 24-5, 24-6

    active links 24-2

    active router 45-2

    active traffic monitoring, IP SLAs 46-1

    address aliasing 27-2

    addresses

    displaying the MAC address table 7-26

    dynamic

    accelerated aging 20-10

    changing the aging time 7-16

    default aging 20-10

    defined 7-14

    learning 7-15

    removing 7-17

    IPv6 42-2

    OL-26641-03

  • Index

    MAC, discovering 7-26

    multicast

    group address range 49-3

    STP address management 20-10

    multicast, STP address management 20-10

    static

    adding and removing 7-22

    defined 7-14

    address resolution 7-26, 41-9

    Address Resolution Protocol

    See ARP

    adjacency tables, with CEF 41-92

    administrative distances

    defined 41-105

    OSPF 41-34

    routing protocol defaults 41-94

    administrative VLAN

    REP, configuring 23-8

    administrative VLAN, REP 23-8

    advertisements

    CDP 29-1

    LLDP 30-2

    RIP 41-21

    VTP 15-19, 16-3, 16-5

    age timer, REP 23-8

    aggregatable global unicast addresses 42-3

    aggregate addresses, BGP 41-62

    aggregated ports

    See EtherChannel

    aggregate policers 38-69

    aggregate policing 1-17

    aggregator template 5-12, 8-3

    aging, accelerating 20-10

    aging time

    accelerated

    for MSTP 21-25

    for STP 20-10, 20-25

    MAC address table 7-16

    maximum

    OL-26641-03

    for MSTP 21-26

    for STP 20-25, 20-26

    alarms, RMON 33-4

    allowed-VLAN list 15-21

    application engines, redirecting traffic to 48-1

    area border routers

    See ABRs

    area routing

    IS-IS 41-67

    ISO IGRP 41-67

    ARP

    configuring 41-11

    defined 1-7, 7-26, 41-9

    encapsulation 41-12

    static cache configuration 41-11

    table

    address resolution 7-26

    managing 7-26

    ASBRs 41-26

    AS-path filters, BGP 41-56

    asymmetrical links, and IEEE 802.1Q tunneling 19-4

    attributes, RADIUS

    vendor-proprietary 9-38

    vendor-specific 9-36

    attribute-value pairs 10-14, 10-17, 10-22, 10-23

    authentication

    EIGRP 41-43

    HSRP 45-12

    local mode with AAA 9-44

    open1x 10-32

    RADIUS

    key 9-28

    login 9-30

    TACACS+

    defined 9-11

    key 9-13

    login 9-14

    See also port-based authentication

    IN-3Catalyst 3560 Switch Software Configuration Guide

  • Index

    authentication compatibility with Catalyst 6000 switches 10-9

    authentication failed VLAN

    See restricted VLAN

    authentication keys, and routing protocols 41-105

    authentication manager

    CLI commands 10-10

    compatibility with older 802.1x CLI commands 10-10 to ??

    overview 10-8

    authoritative time source, described 7-3

    authorization

    with RADIUS 9-34

    with TACACS+ 9-12, 9-16

    authorized ports with IEEE 802.1x 10-11

    autoconfiguration 3-3

    auto enablement 10-34

    automatic advise (auto-advise) in switch stacks 5-14

    automatic copy (auto-copy) in switch stacks 5-13

    automatic discovery

    considerations

    beyond a noncandidate device 6-9

    brand new switches 6-10

    connectivity 6-6

    different VLANs 6-8

    management VLANs 6-8

    non-CDP-capable devices 6-7

    noncluster-capable devices 6-7

    routed ports 6-9

    in switch clusters 6-6

    See also CDP

    automatic extraction (auto-extract) in switch stacks 5-13

    automatic QoS

    See QoS

    automatic recovery, clusters 6-11

    See also HSRP

    automatic upgrades (auto-upgrade) in switch stacks 5-13

    auto-MDIX

    configuring 14-39

    described 14-39

    IN-4Catalyst 3560 Switch Software Configuration Guide

    autonegotiation

    duplex mode 1-4

    interface configuration guidelines 14-36

    mismatches 52-13

    autonomous system boundary routers

    See ASBRs

    autonomous systems, in BGP 41-50

    Auto-QoS video devices 1-18

    Auto-RP, described 49-6

    autosensing, port speed 1-4

    autostate exclude 14-6

    auxiliary VLAN

    See voice VLAN

    availability, features 1-9

    B

    BackboneFast

    described 22-8

    disabling 22-18

    enabling 22-17

    support for 1-10

    backup interfaces

    See Flex Links

    backup links 24-2

    backup static routing, configuring 47-12

    banners

    configuring

    login 7-14

    message-of-the-day login 7-13

    default configuration 7-12

    when displayed 7-12

    Berkeley r-tools replacement 9-56

    BGP

    aggregate addresses 41-62

    aggregate routes, configuring 41-62

    CIDR 41-62

    clear commands 41-65

    community filtering 41-59

    OL-26641-03

  • Index

    configuring neighbors 41-60

    default configuration 41-47

    described 41-46

    enabling 41-50

    monitoring 41-65

    multipath support 41-54

    neighbors, types of 41-50

    path selection 41-54

    peers, configuring 41-60

    prefix filtering 41-58

    resetting sessions 41-53

    route dampening 41-64

    route maps 41-56

    route reflectors 41-63

    routing domain confederation 41-63

    routing session with multi-VRF CE 41-86

    show commands 41-65

    supernets 41-62

    support for 1-19

    Version 4 41-47

    binding cluster group and HSRP group 45-13

    binding database

    address, DHCP server

    See DHCP, Cisco IOS server database

    DHCP snooping

    See DHCP snooping binding database

    bindings

    address, Cisco IOS DHCP server 25-6

    DHCP snooping database 25-6

    IP source guard 25-16

    binding table, DHCP snooping

    See DHCP snooping binding database

    blocking packets 28-7

    Boolean expressions in tracked lists 47-4

    booting

    boot loader, function of 3-2

    boot process 3-2

    manually 3-20

    specific image 3-21

    OL-26641-03

    boot loader

    accessing 3-22

    described 3-2

    environment variables 3-22

    prompt 3-22

    trap-door mechanism 3-2

    Boot Loader Upgrade and Image Verification for the FIPS Mode of Operation 3-25

    bootstrap router (BSR), described 49-7

    Border Gateway Protocol

    See BGP

    BPDU

    error-disabled state 22-2

    filtering 22-3

    RSTP format 21-13

    BPDU filtering

    described 22-3

    disabling 22-16

    enabling 22-15

    support for 1-10

    BPDU guard

    described 22-2

    disabling 22-15

    enabling 22-14

    support for 1-10

    bridged packets, ACLs on 37-44

    bridge groups

    See fallback bridging

    bridge protocol data unit

    See BPDU

    broadcast flooding 41-18

    broadcast packets

    directed 41-15

    flooded 41-15

    broadcast storm-control command 28-4

    broadcast storms 28-1, 41-15

    IN-5Catalyst 3560 Switch Software Configuration Guide

  • Index

    C

    cables, monitoring for unidirectional links 31-1

    candidate switch

    automatic discovery 6-6

    defined 6-5

    requirements 6-5

    See also command switch, cluster standby group, and member switch

    Catalyst 6000 switches

    authentication compatibility 10-9

    CA trustpoint

    configuring 9-53

    defined 9-51

    CDP

    and trusted boundary 38-48

    automatic discovery in switch clusters 6-6

    configuring 29-2

    default configuration 29-2

    defined with LLDP 30-1

    described 29-1

    disabling for routing device 29-4

    enabling and disabling

    on an interface 29-4

    on a switch 29-4

    Layer 2 protocol tunneling 19-7

    monitoring 29-5

    overview 29-1

    power negotiation extensions 14-8

    support for 1-7

    switch stack considerations 29-2

    transmission timer and holdtime, setting 29-3

    updates 29-3

    CEF

    defined 41-92

    distributed 41-92

    enabling 41-92

    IPv6 42-31

    CGMP

    IN-6Catalyst 3560 Switch Software Configuration Guide

    as IGMP snooping learning method 27-9

    clearing cached group entries 49-64

    enabling server support 49-45

    joining multicast group 27-3

    overview 49-9

    server support only 49-9

    switch support of 1-5

    CIDR 41-62

    CipherSuites 9-52

    Cisco 7960 IP Phone 17-1

    Cisco Discovery Protocol

    See CDP

    Cisco Express Forwarding

    See CEF

    Cisco Group Management Protocol

    See CGMP

    Cisco intelligent power management 14-8

    Cisco IOS DHCP server

    See DHCP, Cisco IOS DHCP server

    Cisco IOS File System

    See IFS

    Cisco IOS IP SLAs 46-2

    Cisco Redundant Power System 2300

    configuring 14-53

    managing 14-53

    Cisco Secure ACS

    attribute-value pairs for downloadable ACLs 10-23

    attribute-value pairs for redirect URL 10-22

    Cisco Secure ACS configuration guide 10-73

    CiscoWorks 2000 1-7, 35-5

    CISP 10-34

    CIST regional root

    See MSTP

    CIST root

    See MSTP

    civic location 30-3

    classless interdomain routing

    See CIDR

    classless routing 41-8

    OL-26641-03

  • Index

    class maps for QoS

    configuring 38-55

    described 38-8

    displaying 38-89

    class of service

    See CoS

    clearing interfaces 14-56

    CLI

    abbreviating commands 2-3

    command modes 2-1

    configuration logging 2-5

    described 1-6

    editing features

    enabling and disabling 2-6

    keystroke editing 2-7

    wrapped lines 2-8

    error messages 2-4

    filtering command output 2-9

    getting help 2-3

    history

    changing the buffer size 2-5

    described 2-5

    disabling 2-6

    recalling commands 2-6

    managing clusters 6-17

    no and default forms of commands 2-4

    Client Information Signalling Protocol

    See CISP

    client mode, VTP 16-3

    client processes, tracking 47-1

    CLNS

    See ISO CLNS

    clock

    See system clock

    clusters, switch

    accessing 6-14

    automatic discovery 6-6

    automatic recovery 6-11

    benefits 1-2

    OL-26641-03

    compatibility 6-5

    described 6-1

    LRE profile considerations 6-17

    managing

    through CLI 6-17

    through SNMP 6-18

    planning 6-5

    planning considerations

    automatic discovery 6-6

    automatic recovery 6-11

    CLI 6-17

    host names 6-14

    IP addresses 6-14

    LRE profiles 6-17

    passwords 6-15

    RADIUS 6-17

    SNMP 6-15, 6-18

    switch stacks 6-15

    TACACS+ 6-17

    See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

    cluster standby group

    and HSRP group 45-13

    automatic recovery 6-13

    considerations 6-12

    defined 6-2

    requirements 6-3

    virtual IP address 6-12

    See also HSRP

    CNS 1-7

    Configuration Engine

    configID, deviceID, hostname 4-3

    configuration service 4-2

    described 4-1

    event service 4-3

    embedded agents

    described 4-5

    enabling automated configuration 4-6

    IN-7Catalyst 3560 Switch Software Configuration Guide

  • Index

    enabling configuration agent 4-9

    enabling event agent 4-8

    management functions 1-7

    CoA Request Commands 9-23

    Coarse Wave Division Multiplexer

    See CWDM SFPs

    command-line interface

    See CLI

    command modes 2-1

    commands

    abbreviating 2-3

    no and default 2-4

    commands, setting privilege levels 9-8

    command switch

    accessing 6-12

    active (AC) 6-11

    configuration conflicts 52-12

    defined 6-2

    passive (PC) 6-11

    password privilege levels 6-18

    priority 6-11

    recovery

    from command-switch failure 6-11, 52-9

    from lost member connectivity 52-12

    redundant 6-11

    replacing

    with another switch 52-11

    with cluster member 52-9

    requirements 6-3

    standby (SC) 6-11

    See also candidate switch, cluster standby group, member switch, and standby command switch

    community list, BGP 41-59

    community ports 18-2

    community strings

    configuring 6-15, 35-8

    for cluster switches 35-4

    in clusters 6-15

    overview 35-4

    IN-8Catalyst 3560 Switch Software Configuration Guide

    SNMP 6-15

    community VLANs 18-2, 18-3

    compatibility, feature 28-12

    compatibility, software

    See stacks, switch

    config.text 3-19

    configurable leave timer, IGMP 27-6

    configuration, initial

    defaults 1-23

    Express Setup 1-2

    configuration changes, logging 34-11

    configuration conflicts, recovering from lost member connectivity 52-12

    configuration examples, network 1-26

    configuration files

    archiving 54-21

    clearing the startup configuration 54-20

    creating using a text editor 54-11

    default name 3-19

    deleting a stored configuration 54-20

    described 54-8

    downloading

    automatically 3-19

    preparing 54-11, 54-14, 54-17

    reasons for 54-8

    using FTP 54-14

    using RCP 54-18

    using TFTP 54-12

    guidelines for creating and using 54-10

    guidelines for replacing and rolling back 54-22

    invalid combinations when copying 54-5

    limiting TFTP server access 35-18

    obtaining with DHCP 3-9

    password recovery disable considerations 9-5

    replacing a running configuration 54-21

    rolling back a running configuration 54-21, 54-22

    specifying the filename 3-19

    system contact and location information 35-17

    types and location 54-10

    OL-26641-03

  • Index

    uploading

    preparing 54-11, 54-14, 54-17

    reasons for 54-9

    using FTP 54-16

    using RCP 54-19

    using TFTP 54-13

    configuration guidelines

    REP 23-7

    configuration guidelines, multi-VRF CE 41-79

    configuration logger 34-11

    configuration logging 2-5

    configuration replacement 54-21

    configuration rollback 54-21

    configuration settings, saving 3-16

    configure terminal command 14-24

    configuring 802.1x user distribution 10-68

    Configuring First Hop Security in IPv6 41-45, 42-19

    Configuring IPv6 Source Guard 42-22

    configuring port-based authentication violation modes 10-45

    configuring small-frame arrival rate 28-5

    Configuring VACL Logging 37-41

    conflicts, configuration 52-12

    connections, secure remote 9-46

    connectivity problems 52-15, 52-16, 52-18

    consistency checks in VTP Version 2 16-6

    console port, connecting to 2-10

    content-routing technology

    See WCCP

    control protocol, IP SLAs 46-4

    convergence

    REP 23-4

    corrupted software, recovery steps with Xmodem 52-2

    CoS

    in Layer 2 frames 38-2

    override priority 17-6

    trust priority 17-6

    CoS input queue threshold map for QoS 38-17

    CoS output queue threshold map for QoS 38-21

    OL-26641-03

    CoS-to-DSCP map for QoS 38-71

    counters, clearing interface 14-56

    CPU utilization, troubleshooting 52-29

    crashinfo file 52-25

    critical authentication, IEEE 802.1x 10-65

    critical VLAN 10-26

    critical voice VLAN

    configuring 10-65

    cross-stack EtherChannel

    configuration guidelines 39-14

    configuring

    on Layer 2 interfaces 39-14

    on Layer 3 physical interfaces 39-18

    described 39-3

    illustration 39-4

    support for 1-9

    cross-stack UplinkFast, STP

    described 22-5

    disabling 22-17

    enabling 22-17

    fast-convergence events 22-8

    Fast Uplink Transition Protocol 22-7

    normal-convergence events 22-8

    support for 1-10

    cryptographic software image

    Kerberos 9-40

    SSH 9-45

    SSL 9-50

    switch stack considerations 5-18

    customer edge devices 41-77

    customjzeable web pages, web-based authentication 12-6

    CWDM SFPs 1-39

    D

    DACL

    See downloadable ACL

    daylight saving time 7-8

    dCEF, in the switch stack 41-92

    IN-9Catalyst 3560 Switch Software Configuration Guide

  • Index

    debugging

    enabling all system diagnostics 52-21

    enabling for a specific feature 52-21

    redirecting error message output 52-22

    using commands 52-20

    default commands 2-4

    default configuration

    802.1x 10-39

    auto-QoS 38-24

    banners 7-12

    BGP 41-47

    CDP 29-2

    DHCP 25-8

    DHCP option 82 25-8

    DHCP snooping 25-8

    DHCP snooping binding database 25-9

    DNS 7-11

    dynamic ARP inspection 26-6

    EIGRP 41-38

    EtherChannel 39-12

    Ethernet interfaces 14-32

    fallback bridging 51-3

    Flex Links 24-9

    HSRP 45-6

    IEEE 802.1Q tunneling 19-4

    IGMP 49-40

    IGMP filtering 27-25

    IGMP snooping 27-7, 44-6

    IGMP throttling 27-25

    initial switch information 3-3

    IP addressing, IP routing 41-6

    IP multicast routing 49-11

    IP SLAs 46-6

    IP source guard 25-17

    IPv6 42-17

    IS-IS 41-68

    Layer 2 interfaces 14-32

    Layer 2 protocol tunneling 19-12

    LLDP 30-5

    IN-10Catalyst 3560 Switch Software Configuration Guide

    MAC address table 7-16

    MAC address-table move update 24-9

    MSDP 50-4

    MSTP 21-15

    multi-VRF CE 41-79

    MVR 27-20

    optional spanning-tree configuration 22-12

    OSPF 41-27

    password and privilege level 9-3

    PIM 49-11

    private VLANs 18-7

    RADIUS 9-27

    REP 23-7

    RIP 41-21

    RMON 33-3

    RSPAN 32-11

    SDM template 8-8

    SNMP 35-7

    SPAN 32-11

    SSL 9-52

    standard QoS 38-39

    STP 20-14

    switch stacks 5-22

    system message logging 34-4

    system name and prompt 7-10

    TACACS+ 9-13

    UDLD 31-4

    VLAN, Layer 2 Ethernet interfaces 15-19

    VLANs 15-9

    VMPS 15-29

    voice VLAN 17-3

    VTP 16-10

    WCCP 48-5

    default gateway 3-16, 41-13

    default networks 41-95

    default router preference

    See DRP

    default routes 41-95

    default routing 41-3

    OL-26641-03

  • Index

    default web-based authentication configuration

    802.1X 12-9

    deleting VLANs 15-10

    denial-of-service attack 28-1

    description command 14-47

    designing your network, examples 1-26

    desktop template 5-12, 8-3

    destination addresses

    in IPv4 ACLs 37-13

    in IPv6 ACLs 43-5

    destination-IP address-based forwarding, EtherChannel 39-10

    destination-MAC address forwarding, EtherChannel 39-10

    detecting indirect link failures, STP 22-8

    device 54-25

    device discovery protocol 29-1, 30-1

    device manager

    benefits 1-2

    described 1-2, 1-6

    in-band management 1-8

    upgrading a switch 54-25

    device sensor

    configuring 10-56

    restrictions 10-56

    DHCP

    Cisco IOS server database

    configuring 25-14

    default configuration 25-9

    described 25-6

    DHCP for IPv6

    See DHCPv6

    enabling

    relay agent 25-10

    DHCP-based autoconfiguration

    client request message exchange 3-4

    configuring

    client side 3-4

    DNS 3-8

    OL-26641-03

    relay device 3-8

    server side 3-6

    TFTP server 3-7

    example 3-10

    lease options

    for IP address information 3-6

    for receiving the configuration file 3-7

    overview 3-3

    relationship to BOOTP 3-4

    relay support 1-7, 1-19

    support for 1-7

    DHCP-based autoconfiguration and image update

    configuring 3-11 to 3-15

    understanding 3-5 to 3-6

    DHCP binding database

    See DHCP snooping binding database

    DHCP binding table

    See DHCP snooping binding database

    DHCP object tracking, configuring primary interface 47-10

    DHCP option 82

    circuit ID suboption 25-5

    configuration guidelines 25-9

    default configuration 25-8

    displaying 25-15

    forwarding address, specifying 25-10

    helper address 25-10

    overview 25-3

    packet format, suboption

    circuit ID 25-5

    remote ID 25-5

    remote ID suboption 25-5

    DHCP server port-based address allocation

    configuration guidelines 25-27

    default configuration 25-27

    described 25-26

    displaying 25-30

    enabling 25-27

    reserved addresses 25-28

    IN-11Catalyst 3560 Switch Software Configuration Guide

  • Index

    DHCP server port-based address assignment

    support for 1-7

    DHCP snooping

    accepting untrusted packets form edge switch 25-3, 25-12

    and private VLANs 25-13

    binding database

    See DHCP snooping binding database

    configuration guidelines 25-9

    default configuration 25-8

    displaying binding tables 25-15

    message exchange process 25-4

    option 82 data insertion 25-3

    trusted interface 25-2

    untrusted interface 25-2

    untrusted messages 25-2

    DHCP snooping binding database

    adding bindings 25-14

    binding entries, displaying 25-15

    binding file

    format 25-7

    location 25-6

    bindings 25-6

    clearing agent statistics 25-15

    configuration guidelines 25-9

    configuring 25-14

    default configuration 25-8, 25-9

    deleting

    binding file 25-15

    bindings 25-15

    database agent 25-15

    described 25-6

    displaying 25-15

    binding entries 25-15

    status and statistics 25-15

    displaying status and statistics 25-15

    enabling 25-14

    entry 25-6

    renewing database 25-15

    IN-12Catalyst 3560 Switch Software Configuration Guide

    resetting

    delay value 25-15

    timeout value 25-15

    DHCP snooping binding table

    See DHCP snooping binding database

    DHCPv6

    configuration guidelines 42-27

    default configuration 42-27

    described 42-10

    enabling client function 42-30

    enabling DHCPv6 server function 42-28

    support for 1-19

    Differentiated Services architecture, QoS 38-2

    Differentiated Services Code Point 38-2

    Diffusing Update Algorithm (DUAL) 41-36

    directed unicast requests 1-7

    directories

    changing 54-4

    creating and removing 54-4

    displaying the working 54-4

    discovery, clusters

    See automatic discovery

    Distance Vector Multicast Routing Protocol

    See DVMRP

    distance-vector protocols 41-3

    distribute-list command 41-104

    DNS

    and DHCP-based autoconfiguration 3-8

    default configuration 7-11

    displaying the configuration 7-12

    in IPv6 42-4

    overview 7-10

    setting up 7-11

    support for 1-7

    DNS-based SSM mapping 49-19, 49-21

    domain names

    DNS 7-10

    VTP 16-11

    Domain Name System

    OL-26641-03

  • Index

    See DNS

    domains, ISO IGRP routing 41-67

    dot1q-tunnel switchport mode 15-18

    double-tagged packets

    IEEE 802.1Q tunneling 19-2

    Layer 2 protocol tunneling 19-11

    downloadable ACL 10-21, 10-23, 10-73

    downloading

    configuration files

    preparing 54-11, 54-14, 54-17

    reasons for 54-8

    using FTP 54-14

    using RCP 54-18

    using TFTP 54-12

    image files

    deleting old image 54-29

    preparing 54-27, 54-31, 54-35

    reasons for 54-25

    using CMS 1-3

    using FTP 54-32

    using HTTP 1-3, 54-25

    using RCP 54-36

    using TFTP 54-28

    using the device manager or Network Assistant 54-25

    drop threshold for Layer 2 protocol packets 19-12

    DRP

    configuring 42-24

    described 42-9

    IPv6 42-9

    support for 1-19

    DSCP 1-17, 38-2

    DSCP input queue threshold map for QoS 38-17

    DSCP output queue threshold map for QoS 38-21

    DSCP-to-CoS map for QoS 38-74

    DSCP-to-DSCP-mutation map for QoS 38-75

    DSCP transparency 38-49

    DTP 1-11, 15-17

    dual-action detection 39-7

    OL-26641-03

    DUAL finite state machine, EIGRP 41-37

    dual IPv4 and IPv6 templates 8-5, 42-10

    dual protocol stacks

    IPv4 and IPv6 42-10

    SDM templates supporting 42-10

    dual-purpose uplinks

    defined 14-7

    LEDs 14-7

    link selection 14-7, 14-34

    setting the type 14-34

    DVMRP

    autosummarization

    configuring a summary address 49-59

    disabling 49-61

    connecting PIM domain to DVMRP router 49-52

    enabling unicast routing 49-55

    interoperability

    with Cisco devices 49-50

    with Cisco IOS software 49-9

    mrinfo requests, responding to 49-54

    neighbors

    advertising the default route to 49-54

    discovery with Probe messages 49-50

    displaying information 49-54

    prevent peering with nonpruning 49-57

    rejecting nonpruning 49-56

    overview 49-9

    routes

    adding a metric offset 49-62

    advertising all 49-61

    advertising the default route to neighbors 49-54

    caching DVMRP routes learned in report messages 49-55

    changing the threshold for syslog messages 49-58

    deleting 49-64

    displaying 49-64

    favoring one over another 49-62

    limiting the number injected into MBONE 49-58

    limiting unicast route advertisements 49-50

    IN-13Catalyst 3560 Switch Software Configuration Guide

  • Index

    routing table 49-9

    source distribution tree, building 49-9

    support for 1-19

    tunnels

    configuring 49-52

    displaying neighbor information 49-54

    dynamic access ports

    characteristics 15-4

    configuring 15-30

    defined 14-3

    dynamic addresses

    See addresses

    dynamic ARP inspection

    ARP cache poisoning 26-1

    ARP requests, described 26-1

    ARP spoofing attack 26-1

    clearing

    log buffer 26-17

    statistics 26-17

    configuration guidelines 26-7

    configuring

    ACLs for non-DHCP environments 26-10

    in DHCP environments 26-8

    log buffer 26-15

    rate limit for incoming ARP packets 26-4, 26-12

    default configuration 26-6

    denial-of-service attacks, preventing 26-12

    described 26-1

    DHCP snooping binding database 26-2

    displaying

    ARP ACLs 26-16

    configuration and operating state 26-16

    log buffer 26-17

    statistics 26-17

    trust state and rate limit 26-16

    error-disabled state for exceeding rate limit 26-4

    function of 26-2

    interface trust states 26-3

    log buffer

    IN-14Catalyst 3560 Switch Software Configuration Guide

    clearing 26-17

    configuring 26-15

    displaying 26-17

    logging of dropped packets, described 26-5

    man-in-the middle attack, described 26-2

    network security issues and interface trust states 26-3

    priority of ARP ACLs and DHCP snooping entries 26-4

    rate limiting of ARP packets

    configuring 26-12

    described 26-4

    error-disabled state 26-4

    statistics

    clearing 26-17

    displaying 26-17

    validation checks, performing 26-14

    dynamic auto trunking mode 15-18

    dynamic desirable trunking mode 15-18

    Dynamic Host Configuration Protocol

    See DHCP-based autoconfiguration

    dynamic port VLAN membership

    described 15-28

    reconfirming 15-31

    troubleshooting 15-33

    types of connections 15-30

    dynamic routing 41-3

    ISO CLNS 41-66

    Dynamic Trunking Protocol

    See DTP

    E

    EAC 13-2

    EBGP 41-45

    editing features

    enabling and disabling 2-6

    keystrokes used 2-7

    wrapped lines 2-8

    EEM 3.2 36-5

    OL-26641-03

  • Index

    EIGRP

    authentication 41-43

    components 41-37

    configuring 41-40

    default configuration 41-38

    definition 41-36

    interface parameters, configuring 41-41

    monitoring 41-45

    stub routing 41-44

    elections

    See stack master

    ELIN location 30-3

    embedded event manager

    3.2 36-5

    actions 36-4

    configuring 36-1, 36-6

    displaying information 36-8

    environmental variables 36-5

    event detectors 36-3

    policies 36-4

    registering and defining an applet 36-6

    registering and defining a TCL script 36-7

    understanding 36-1

    enable password 9-4

    enable secret password 9-4

    Enable the FIPS mode 3-25

    encryption, CipherSuite 9-52

    encryption for passwords 9-4

    encryption keying 11-2

    encryption keys, MKA 11-2

    Endpoint Admission Control (EAC) 13-2

    Enhanced IGRP

    See EIGRP

    enhanced object tracking

    backup static routing 47-12

    commands 47-1

    defined 47-1

    DHCP primary interface 47-10

    HSRP 47-7

    OL-26641-03

    IP routing state 47-2

    IP SLAs 47-9

    line-protocol state 47-2

    network monitoring with IP SLAs 47-11

    routing policy, configuring 47-12

    static route primary interface 47-10

    tracked lists 47-3

    enhanced object tracking static routing 47-10

    environmental variables, embedded event manager 36-5

    environment variables, function of 3-23

    equal-cost routing 1-19, 41-93

    error-disabled state, BPDU 22-2

    error messages during command entry 2-4

    EtherChannel

    automatic creation of 39-6, 39-8

    channel groups

    binding physical and logical interfaces 39-5, 39-6

    numbering of 39-6

    configuration guidelines 39-13

    configuring

    Layer 2 interfaces 39-14

    Layer 3 physical interfaces 39-18

    Layer 3 port-channel logical interfaces 39-17

    configuring Layer 2 interfaces 39-14

    default configuration 39-12

    described 39-2

    displaying status 39-25

    forwarding methods 39-10, 39-20

    IEEE 802.3ad, described 39-8

    interaction

    with STP 39-13

    with VLANs 39-14

    LACP

    described 39-8

    displaying status 39-25

    hot-standby ports 39-22

    interaction with other features 39-9

    modes 39-9

    port priority 39-24

    IN-15Catalyst 3560 Switch Software Configuration Guide

  • Index

    system priority 39-23

    Layer 3 interface 41-5

    load balancing 39-10, 39-20

    logical interfaces, described 39-5

    PAgP

    aggregate-port learners 39-21

    compatibility with Catalyst 1900 39-21

    described 39-6

    displaying status 39-25

    interaction with other features 39-8

    interaction with virtual switches 39-7

    learn method and priority configuration 39-21

    modes 39-7

    support for 1-5

    with dual-action detection 39-7

    port-channel interfaces

    described 39-5

    numbering of 39-6

    port groups 14-6

    stack changes, effects of 39-11

    support for 1-5

    EtherChannel guard

    described 22-10

    disabling 22-18

    enabling 22-18

    Ethernet management port

    active link 14-29

    and routing 14-29

    and TFTP 14-31

    configuring 14-31

    default setting 14-29

    described 14-29

    for network management 14-29

    specifying 14-31

    supported features 14-30

    unsupported features 14-30

    Ethernet management port, internal

    and routing 14-29

    unsupported features 14-30

    IN-16Catalyst 3560 Switch Software Configuration Guide

    Ethernet VLANs

    adding 15-9

    defaults and ranges 15-9

    modifying 15-9

    EUI 42-4

    event detectors, embedded event manager 36-3

    events, RMON 33-4

    examples

    network configuration 1-26

    expedite queue for QoS 38-88

    Express Setup 1-2

    See also getting started guide

    extended crashinfo file 52-25

    extended-range VLANs

    configuration guidelines 15-12

    configuring 15-12

    creating 15-13

    creating with an internal VLAN ID 15-15

    defined 15-1

    extended system ID

    MSTP 21-19

    STP 20-5, 20-18

    extended universal identifier

    See EUI

    Extensible Authentication Protocol over LAN 10-2

    external BGP

    See EBGP

    external neighbors, BGP 41-50

    F

    fa0 interface 1-8

    Fa0 port

    See Ethernet management port

    failover support 1-9

    fallback bridging

    and protected ports 51-4

    bridge groups

    creating 51-4

    OL-26641-03

  • Index

    described 51-2

    displaying 51-10

    function of 51-2

    number supported 51-4

    removing 51-5

    bridge table

    clearing 51-10

    displaying 51-10

    configuration guidelines 51-4

    connecting interfaces with 14-17

    default configuration 51-3

    described 51-1

    frame forwarding

    flooding packets 51-2

    forwarding packets 51-2

    overview 51-1

    protocol, unsupported 51-4

    stack changes, effects of 51-3

    STP

    disabling on an interface 51-9

    forward-delay interval 51-8

    hello BPDU interval 51-8

    interface priority 51-6

    maximum-idle interval 51-9

    path cost 51-7

    VLAN-bridge spanning-tree priority 51-6

    VLAN-bridge STP 51-2

    support for 1-19

    SVIs and routed ports 51-1

    unsupported protocols 51-4

    VLAN-bridge STP 20-13

    Fast Convergence 24-3

    fastethernet0 port

    See Ethernet management port

    Fast Uplink Transition Protocol 22-7

    features, incompatible 28-12

    FIB 41-92

    fiber-optic, detecting unidirectional links 31-1

    files

    OL-26641-03

    basic crashinfo

    description 52-25

    location 52-25

    copying 54-5

    crashinfo, description 52-25

    deleting 54-5

    displaying the contents of 54-8

    extended crashinfo

    description 52-25

    location 52-25

    tar

    creating 54-6

    displaying the contents of 54-7

    extracting 54-7

    image file format 54-26

    file system

    displaying available file systems 54-2

    displaying file information 54-3

    local file system names 54-1

    network file system names 54-5

    setting the default 54-3

    filtering

    in a VLAN 37-33

    IPv6 traffic 43-4, 43-7

    non-IP traffic 37-31

    show and more command output 2-9

    filtering show and more command output 2-9

    filters, IP

    See ACLs, IP

    fips authorization-key authorization-key 3-25

    flash device, number of 54-1

    flexible authentication ordering

    configuring 10-76

    overview 10-32

    Flex Link Multicast Fast Convergence 24-3

    Flex Links

    configuration guidelines 24-9

    configuring 24-10

    configuring preferred VLAN 24-13

    IN-17Catalyst 3560 Switch Software Configuration Guide

  • Index

    configuring VLAN load balancing 24-12

    default configuration 24-9

    description 24-2

    link load balancing 24-2

    monitoring 24-16

    VLANs 24-2

    flooded traffic, blocking 28-8

    flow-based packet classification 1-17

    flowcharts

    QoS classification 38-7

    QoS egress queueing and scheduling 38-19

    QoS ingress queueing and scheduling 38-16

    QoS policing and marking 38-11

    flowcontrol

    configuring 14-38

    described 14-38

    forward-delay time

    MSTP 21-25

    STP 20-25

    Forwarding Information Base

    See FIB

    forwarding nonroutable protocols 51-1

    FTP

    configuration files

    downloading 54-14

    overview 54-13

    preparing the server 54-14

    uploading 54-16

    image files

    deleting old image 54-33

    downloading 54-32

    preparing the server 54-31

    uploading 54-33

    G

    general query 24-5

    Generating IGMP Reports 24-4

    get-bulk-request operation 35-4

    IN-18Catalyst 3560 Switch Software Configuration Guide

    get-next-request operation 35-3, 35-5

    get-request operation 35-3, 35-4, 35-5

    get-response operation 35-4

    Gigabit modules

    See SFPs

    global configuration mode 2-2

    global leave, IGMP 27-13

    guest VLAN and 802.1x 10-24

    guide mode 1-2

    GUIs

    See device manager and Network Assistant

    H

    hardware limitations and Layer 3 interfaces 14-49

    hello time

    MSTP 21-25

    STP 20-24

    help, for the command line 2-3

    HFTM space 52-28

    hierarchical policy maps 38-9

    configuration guidelines 38-42

    configuring 38-62

    described 38-12

    history

    changing the buffer size 2-5

    described 2-5

    disabling 2-6

    recalling commands 2-6

    history table, level and number of syslog messages 34-10

    host modes, MACsec 11-3

    host names, in clusters 6-14

    host ports

    configuring 18-12

    kinds of 18-2

    hosts, limit on dynamic ports 15-33

    Hot Standby Router Protocol

    See HSRP

    HP OpenView 1-7

    OL-26641-03

  • Index

    HQATM space 52-28

    HSRP

    authentication string 45-12

    automatic cluster recovery 6-13

    binding to cluster group 45-13

    cluster standby group considerations 6-12

    command-switch redundancy 1-1, 1-9

    configuring 45-6

    default configuration 45-6

    definition 45-1

    guidelines 45-7

    monitoring 45-14

    object tracking 47-7

    overview 45-1

    priority 45-9

    routing redundancy 1-18

    support for ICMP redirect messages 45-13

    switch stack considerations 45-5

    timers 45-12

    tracking 45-9

    See also clusters, cluster standby group, and standby command switch

    HSRP for IPv6

    configuring 42-38

    guidelines 42-37

    HTTP over SSL

    see HTTPS

    HTTPS 9-50

    configuring 9-54

    self-signed certificate 9-51

    HTTP secure server 9-50

    Hulc Forwarding TCAM Manager

    See HFTM space

    Hulc QoS/ACL TCAM Manager

    See HQATM space

    I

    IBPG 41-45

    OL-26641-03

    ICMP

    IPv6 42-4

    redirect messages 41-13

    support for 1-19

    time-exceeded messages 52-18

    traceroute and 52-18

    unreachable messages 37-22

    unreachable messages and IPv6 43-4

    unreachables and ACLs 37-23

    ICMP Echo operation

    configuring 46-12

    IP SLAs 46-12

    ICMP ping

    executing 52-15

    overview 52-15

    ICMP Router Discovery Protocol

    See IRDP

    ICMPv6 42-4

    IDS appliances

    and ingress RSPAN 32-22

    and ingress SPAN 32-15

    IEEE 802.1D

    See STP

    IEEE 802.1p 17-1

    IEEE 802.1Q

    and trunk ports 14-4

    configuration limitations 15-19

    encapsulation 15-16

    native VLAN for untagged traffic 15-23

    tunneling

    compatibility with other features 19-5

    defaults 19-4

    described 19-1

    tunnel ports with other features 19-6

    IEEE 802.1s

    See MSTP

    IEEE 802.1w

    See RSTP

    IEEE 802.1x

    IN-19Catalyst 3560 Switch Software Configuration Guide

  • Index

    See port-based authentication

    IEEE 802.3ad

    See EtherChannel

    IEEE 802.3ad, PoE+ 1-20, 14-9

    IEEE 802.3af

    See PoE

    IEEE 802.3x flow control 14-38

    ifIndex values, SNMP 35-6

    IFS 1-7

    IGMP

    configurable leave timer

    described 27-6

    enabling 27-11

    configuring the switch

    as a member of a group 49-40

    statically connected member 49-44

    controlling access to groups 49-41

    default configuration 49-40

    deleting cache entries 49-64

    displaying groups 49-64

    fast switching 49-45

    flooded multicast traffic

    controlling the length of time 27-12

    disabling on an interface 27-13

    global leave 27-13

    query solicitation 27-13

    recovering from flood mode 27-13

    host-query interval, modifying 49-42

    joining multicast group 27-3

    join messages 27-3

    leave processing, enabling 27-11, 44-9

    leaving multicast group 27-5

    multicast reachability 49-40

    overview 49-3

    queries 27-4

    report suppression

    described 27-6

    disabling 27-16, 44-11

    supported versions 27-3

    IN-20Catalyst 3560 Switch Software Configuration Guide

    support for 1-5

    Version 1

    changing to Version 2 49-42

    described 49-3

    Version 2

    changing to Version 1 49-42

    described 49-3

    maximum query response time value 49-44

    pruning groups 49-44

    query timeout value 49-43

    IGMP filtering

    configuring 27-26

    default configuration 27-25

    described 27-24

    monitoring 27-29

    support for 1-6

    IGMP groups

    configuring filtering 27-28

    setting the maximum number 27-27

    IGMP helper 1-5, 49-6

    IGMP Immediate Leave

    configuration guidelines 27-11

    described 27-5

    enabling 27-11

    IGMP profile

    applying 27-27

    configuration mode 27-26

    configuring 27-26

    IGMP snooping

    and address aliasing 27-2

    and stack changes 27-6

    configuring 27-7

    default configuration 27-7, 44-6

    definition 27-2

    enabling and disabling 27-7, 44-7

    global configuration 27-7

    Immediate Leave 27-5

    in the switch stack 27-6

    method 27-8

    OL-26641-03

  • Index

    monitoring 27-17, 44-12

    querier

    configuration guidelines 27-14

    configuring 27-14

    supported versions 27-3

    support for 1-5

    VLAN configuration 27-8

    IGMP throttling

    configuring 27-28

    default configuration 27-25

    described 27-25

    displaying action 27-29

    IGP 41-26

    Immediate Leave, IGMP 27-5

    enabling 44-9

    inaccessible authentication bypass 10-26

    support for multiauth ports 10-26

    initial configuration

    defaults 1-23

    Express Setup 1-2

    interface

    number 14-23

    range macros 14-27

    interface command 14-23 to ??, 14-23 to ??, 14-23 to 14-24

    interface configuration

    REP 23-9

    interface configuration mode 2-2

    interfaces

    auto-MDIX, configuring 14-39

    configuration guidelines

    10-Gigabit Ethernet 14-33

    duplex and speed 14-35

    configuring

    procedure 14-24

    counters, clearing 14-56

    default configuration 14-32

    described 14-47

    descriptive name, adding 14-47

    displaying information about 14-55

    OL-26641-03

    flow control 14-38

    management 1-6

    monitoring 14-55

    naming 14-47

    physical, identifying 14-23

    range of 14-25

    restarting 14-56, 14-57

    shutting down 14-56

    speed and duplex, configuring 14-36

    status 14-55

    supported 14-23

    types of 14-1

    interfaces range macro command 14-27

    interface types 14-23

    Interior Gateway Protocol

    See IGP

    internal BGP

    See IBGP

    internal neighbors, BGP 41-50

    Internet Control Message Protocol

    See ICMP

    Internet Group Management Protocol

    See IGMP

    Internet Protocol version 6

    See IPv6

    Inter-Switch Link

    See ISL

    inter-VLAN routing 1-19, 41-2

    Intrusion Detection System

    See IDS appliances

    inventory management TLV 30-3, 30-7

    IP ACLs

    for QoS classification 38-8

    implicit deny 37-11, 37-16

    implicit masks 37-11

    named 37-16

    undefined 37-23

    IP addresses

    128-bit 42-2

    IN-21Catalyst 3560 Switch Software Configuration Guide

  • Index

    candidate or member 6-5, 6-14

    classes of 41-7

    cluster access 6-2

    command switch 6-3, 6-12, 6-14

    default configuration 41-6

    discovering 7-26

    for IP routing 41-5

    IPv6 42-2

    MAC address association 41-9

    monitoring 41-19

    redundant clusters 6-12

    standby command switch 6-12, 6-14

    See also IP information

    IP base image 1-1

    IP broadcast address 41-17

    ip cef distributed command 41-92

    IP directed broadcasts 41-15

    ip igmp profile command 27-26

    IP information

    assigned

    manually 3-15

    through DHCP-based autoconfiguration 3-3

    default configuration 3-3

    IP multicast routing

    addresses

    all-hosts 49-3

    all-multicast-routers 49-3

    host group address range 49-3

    administratively-scoped boundaries, described 49-48

    and IGMP snooping 27-2

    Auto-RP

    adding to an existing sparse-mode cloud 49-27

    benefits of 49-27

    clearing the cache 49-64

    configuration guidelines 49-12

    filtering incoming RP announcement messages 49-30

    overview 49-6

    preventing candidate RP spoofing 49-30

    IN-22Catalyst 3560 Switch Software Configuration Guide

    preventing join messages to false RPs 49-29

    setting up in a new internetwork 49-27

    using with BSR 49-35

    bootstrap router

    configuration guidelines 49-12

    configuring candidate BSRs 49-33

    configuring candidate RPs 49-34

    defining the IP multicast boundary 49-32

    defining the PIM domain border 49-31

    overview 49-7

    using with Auto-RP 49-35

    Cisco implementation 49-2

    configuring

    basic multicast routing 49-13

    IP multicast boundary 49-48

    default configuration 49-11

    enabling

    multicast forwarding 49-13

    PIM mode 49-14

    group-to-RP mappings

    Auto-RP 49-6

    BSR 49-7

    MBONE

    deleting sdr cache entries 49-64

    described 49-46

    displaying sdr cache 49-65

    enabling sdr listener support 49-47

    limiting DVMRP routes advertised 49-58

    limiting sdr cache entry lifetime 49-47

    SAP packets for conference session announcement 49-47

    Session Directory (sdr) tool, described 49-46

    monitoring

    packet rate loss 49-65

    peering devices 49-65

    tracing a path 49-65

    multicast forwarding, described 49-8

    PIMv1 and PIMv2 interoperability 49-12

    protocol interaction 49-2

    OL-26641-03

  • Index

    reverse path check (RPF) 49-8

    routing table

    deleting 49-64

    displaying 49-64

    RP

    assigning manually 49-25

    configuring Auto-RP 49-27

    configuring PIMv2 BSR 49-31

    monitoring mapping information 49-35

    using Auto-RP and BSR 49-35

    stacking

    stack master functions 49-10

    stack member functions 49-10

    statistics, displaying system and network 49-64

    See also CGMP

    See also DVMRP

    See also IGMP

    See also PIM

    IP phones

    and QoS 17-1

    automatic classification and queueing 38-23

    configuring 17-4

    ensuring port security with QoS 38-47

    trusted boundary for QoS 38-47

    IP Port Security for Static Hosts

    on a Layer 2 access port 25-20

    on a PVLAN host port 25-24

    IP precedence 38-2

    IP-precedence-to-DSCP map for QoS 38-72

    IP protocols

    in ACLs 37-13

    routing 1-18

    IP protocols in ACLs 37-13

    IP routes, monitoring 41-107

    IP routing

    connecting interfaces with 14-17

    disabling 41-20

    enabling 41-20

    IP Service Level Agreements

    OL-26641-03

    See IP SLAs

    IP service levels, analyzing 46-1

    IP services image 1-1

    IP SLAs

    benefits 46-2

    configuration guidelines 46-7

    configuring object tracking 47-9

    Control Protocol 46-4

    default configuration 46-6

    definition 46-1

    ICMP echo operation 46-12

    measuring network performance 46-3

    monitoring 46-14

    multioperations scheduling 46-5

    object tracking 47-9

    operation 46-3

    reachability tracking 47-9

    responder

    described 46-4

    enabling 46-8

    response time 46-4

    scheduling 46-5

    SNMP support 46-2

    supported metrics 46-2

    threshold monitoring 46-6

    track object monitoring agent, configuring 47-11

    track state 47-9

    UDP jitter operation 46-9

    IP source guard

    and 802.1x 25-18

    and DHCP snooping 25-15

    and port security 25-18

    and private VLANs 25-18

    and routed ports 25-18

    and TCAM entries 25-18

    and trunk interfaces 25-18

    and VRF 25-18

    binding configuration

    automatic 25-16

    IN-23Catalyst 3560 Switch Software Configuration Guide

  • Index

    manual 25-16

    binding table 25-16

    configuration guidelines 25-18

    default configuration 25-17

    described 25-15

    disabling 25-19

    displaying

    active IP or MAC bindings 25-26

    bindings 25-26

    configuration 25-26

    enabling 25-19, 25-20

    filtering

    source IP address 25-16

    source IP and MAC address 25-16

    on provisioned switches 25-18

    source IP address filtering 25-16

    source IP and MAC address filtering 25-16

    static bindings

    adding 25-19, 25-20

    deleting 25-19

    static hosts 25-20

    IP traceroute

    executing 52-19

    overview 52-18

    IP unicast routing

    address resolution 41-9

    administrative distances 41-94, 41-105

    ARP 41-9

    assigning IP addresses to Layer 3 interfaces 41-7

    authentication keys 41-105

    broadcast

    address 41-17

    flooding 41-18

    packets 41-15

    storms 41-15

    classless routing 41-8

    configuring static routes 41-94

    default

    addressing configuration 41-6

    IN-24Catalyst 3560 Switch Software Configuration Guide

    gateways 41-13

    networks 41-95

    routes 41-95

    routing 41-3

    directed broadcasts 41-15

    disabling 41-20

    dynamic routing 41-3

    enabling 41-20

    EtherChannel Layer 3 interface 41-5

    IGP 41-26

    inter-VLAN 41-2

    IP addressing

    classes 41-7

    configuring 41-5

    IPv6 42-3

    IRDP 41-14

    Layer 3 interfaces 41-5

    MAC address and IP address 41-9

    passive interfaces 41-103

    protocols

    distance-vector 41-3

    dynamic 41-3

    link-state 41-3

    proxy ARP 41-9

    redistribution 41-96

    reverse address resolution 41-9

    routed ports 41-5

    static routing 41-3

    steps to configure 41-5

    subnet mask 41-7

    subnet zero 41-7

    supernet 41-8

    UDP 41-17

    with SVIs 41-5

    See also BGP

    See also EIGRP

    See also OSPF

    See also RIP

    IPv4 ACLs

    OL-26641-03

  • Index

    applying to interfaces 37-21

    extended, creating 37-12

    named 37-16

    standard, creating 37-11

    IPv4 and IPv6

    dual protocol stacks 42-10

    IPv6

    ACLs

    displaying 43-8

    limitations 43-3

    matching criteria 43-3

    port 43-1

    precedence 43-2

    router 43-1

    supported 43-2

    addresses 42-2

    address formats 42-2

    and switch stacks 42-15, 42-16

    applications 42-9

    assigning address 42-17

    autoconfiguration 42-9

    CEFv6 42-31

    configuring static routes 42-32

    default configuration 42-17

    default router preference (DRP) 42-9

    defined 42-1

    Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 42-12

    EIGRP IPv6 Commands 42-13

    Router ID 42-12

    feature limitations 42-14

    features not supported 42-14

    forwarding 42-17

    ICMP 42-4

    monitoring 42-40

    neighbor discovery 42-4

    OSPF 42-11

    path MTU discovery 42-4

    SDM templates 8-5, 43-1, 44-1

    OL-26641-03

    stack master functions 42-15, 42-16

    Stateless Autoconfiguration 42-9

    supported features 42-3

    switch limitations 42-14

    understanding static routes 42-11

    IPv6 traffic, filtering 43-4

    IRDP

    configuring 41-14

    definition 41-14

    support for 1-19

    IS-IS

    addresses 41-67

    area routing 41-67

    default configuration 41-68

    monitoring 41-76

    show commands 41-76

    system routing 41-67

    ISL

    and IPv6 42-3

    and trunk ports 14-4

    encapsulation 1-11, 15-16

    trunking with IEEE 802.1 tunneling 19-4

    ISO CLNS

    clear commands 41-76

    dynamic routing protocols 41-66

    monitoring 41-76

    NETs 41-66

    NSAPs 41-66

    OSI standard 41-66

    ISO IGRP

    area routing 41-67

    system routing 41-67

    isolated port 18-2

    isolated VLANs 18-2, 18-3

    J

    join messages, IGMP 27-3

    IN-25Catalyst 3560 Switch Software Configuration Guide

  • Index

    K

    KDC

    described 9-41

    See also Kerberos

    Kerberos

    authenticating to

    boundary switch 9-43

    KDC 9-43

    network services 9-43

    configuration examples 9-40

    configuring 9-44

    credentials 9-41

    cryptographic software image 9-40

    described 9-41

    KDC 9-41

    operation 9-43

    realm 9-42

    server 9-42

    support for 1-15

    switch as trusted third party 9-41

    terms 9-41

    TGT 9-42

    tickets 9-41

    key distribution center

    See KDC

    L

    l2protocol-tunnel command 19-13

    LACP

    Layer 2 protocol tunneling 19-10

    See EtherChannel

    Layer 2 frames, classification with CoS 38-2

    Layer 2 interfaces, default configuration 14-32

    Layer 2 protocol tunneling

    configuring 19-11

    configuring for EtherChannels 19-15

    default configuration 19-12

    IN-26Catalyst 3560 Switch Software Configuration Guide

    defined 19-8

    guidelines 19-12

    Layer 2 traceroute

    and ARP 52-17

    and CDP 52-17

    broadcast traffic 52-16

    described 52-16

    IP addresses and subnets 52-17

    MAC addresses and VLANs 52-17

    multicast traffic 52-17

    multiple devices on a port 52-17

    unicast traffic 52-16

    usage guidelines 52-17

    Layer 3 features 1-18

    Layer 3 interfaces

    assigning IP addresses to 41-7

    assigning IPv4 and IPv6 addresses to 42-26

    assigning IPv6 addresses to 42-18

    changing from Layer 2 mode 41-7, 41-84

    types of 41-5

    Layer 3 packets, classification methods 38-2

    LDAP 4-2

    Leaking IGMP Reports 24-4

    LEDs, switch

    See hardware installation guide

    lightweight directory access protocol

    See LDAP

    line configuration mode 2-2

    Link Aggregation Control Protocol

    See EtherChannel

    link failure, detecting unidirectional 21-8

    link integrity, verifying with REP 23-3

    Link Layer Discovery Protocol

    See CDP

    link local unicast addresses 42-4

    link redundancy

    See Flex Links

    links, unidirectional 31-1

    link state advertisements (LSAs) 41-32

    OL-26641-03

  • Index

    link-state protocols 41-3

    link-state tracking

    configuring 39-27

    described 39-25

    LLDP

    configuring 30-5

    characteristics 30-6

    default configuration 30-5

    enabling 30-6

    monitoring and maintaining 30-11

    overview 30-1

    supported TLVs 30-2

    switch stack considerations 30-2

    transmission timer and holdtime, setting 30-6

    LLDP-MED

    configuring

    procedures 30-5

    TLVs 30-7

    monitoring and maintaining 30-11

    overview 30-1, 30-2

    supported TLVs 30-2

    LLDP Media Endpoint Discovery

    See LLDP-MED

    load balancing 45-4

    local SPAN 32-2

    location TLV 30-3, 30-7

    logging messages, ACL 37-10

    login authentication

    with RADIUS 9-30

    with TACACS+ 9-14

    login banners 7-12

    log messages

    See system message logging

    Long-Reach Ethernet (LRE) technology 1-27, 1-37

    loop guard

    described 22-12

    enabling 22-19

    support for 1-10

    LRE profiles, considerations in switch clusters 6-17

    OL-26641-03

    M

    MAB

    See MAC authentication bypass

    MAB aging timer 1-12

    MAB inactivity timer

    default setting 10-39

    range 10-42

    MAC/PHY configuration status TLV 30-2

    MAC addresses

    aging time 7-16

    and VLAN association 7-15

    building the address table 7-15

    default configuration 7-16

    disabling learning on a VLAN 7-25

    discovering 7-26

    displaying 7-26

    displaying in the IP source binding table 25-26

    dynamic

    learning 7-15

    removing 7-17

    in ACLs 37-31

    IP address association 41-9

    static

    adding 7-23

    allowing 7-24, 7-26

    characteristics of 7-22

    dropping 7-24

    removing 7-23

    MAC address learning 1-7

    MAC address learning, disabling on a VLAN 7-25

    MAC address notification, support for 1-21

    MAC address-table move update

    configuration guidelines 24-9

    configuring 24-13

    default configuration 24-9

    description 24-7

    monitoring 24-16

    MAC address-to-VLAN mapping 15-28

    IN-27Catalyst 3560 Switch Software Configuration Guide

  • Index

    MAC authentication bypass 10-41

    configuring 10-68

    overview 10-18

    See MAB

    MAC extended access lists

    applying to Layer 2 interfaces 37-32

    configuring for QoS 38-54

    creating 37-31

    defined 37-31

    for QoS classification 38-5

    MACSec 11-9, 13-2

    MACsec 11-2

    configuring on an interface 11-7

    defined 11-1, 11-2

    MACsec Key Agreement Protocol

    See MKA

    magic packet 10-29

    manageability features 1-7

    management access

    in-band

    browser session 1-8

    CLI session 1-8

    device manager 1-8

    SNMP 1-8

    out-of-band console port connection 1-8

    management address TLV 30-2

    management options

    CLI 2-1

    clustering 1-3

    CNS 4-1

    Network Assistant 1-2

    overview 1-6

    management VLAN

    considerations in switch clusters 6-8

    discovery through different management VLANs 6-8

    manual preemption, REP, configuring 23-13

    mapping tables for QoS

    configuring

    CoS-to-DSCP 38-71

    IN-28Catalyst 3560 Switch Software Configuration Guide

    DSCP 38-71

    DSCP-to-CoS 38-74

    DSCP-to-DSCP-mutation 38-75

    IP-precedence-to-DSCP 38-72

    policed-DSCP 38-73

    described 38-13

    marking

    action with aggregate policers 38-69

    described 38-4, 38-9

    matching

    IPv6 ACLs 43-3

    matching, IPv4 ACLs 37-8

    maximum aging time

    MSTP 21-26

    STP 20-25

    maximum hop count, MSTP 21-26

    maximum number of allowed devices, port-based authentication 10-42

    maximum-paths command 41-54, 41-93

    MDA

    configuration guidelines 10-14

    described 1-13, 10-13

    exceptions with authentication process 10-6

    Media Access Control Security

    See MACsec

    membership mode, VLAN port 15-4

    member switch

    automatic discovery 6-6

    defined 6-2

    managing 6-17

    passwords 6-14

    recovering from lost connectivity 52-12

    requirements 6-5

    See also candidate switch, cluster standby group, and standby command switch

    memory consistency check errors

    example 52-28

    memory consistency check routines 1-6, 52-28

    memory consistency integrity 1-6, 52-28

    OL-26641-03

  • Index

    messages, to users through banners 7-12

    metrics, in BGP 41-54

    metric translations, between routing protocols 41-99

    metro tags 19-2

    MHSRP 45-4

    MIBs

    overview 35-1

    SNMP interaction with 35-5

    mini-point-of-presence

    See POP

    mirroring traffic for analysis 32-1

    mismatches, autonegotiation 52-13

    MKA

    configuring policies 11-6

    defined 11-2

    policies 11-3

    replay protection 11-3

    statistics 11-4

    virtual ports 11-3

    module number 14-23

    monitoring

    access groups 37-47

    BGP 41-65

    cables for unidirectional links 31-1

    CDP 29-5

    CEF 41-92

    EIGRP 41-45

    fallback bridging 51-10

    features 1-21

    Flex Links 24-16

    HSRP 45-14

    IEEE 802.1Q tunneling 19-18

    IGMP

    filters 27-29

    snooping 27-17, 44-12

    interfaces 14-55

    IP

    address tables 41-19

    multicast routing 49-63

    OL-26641-03

    routes 41-107

    IP SLAs operations 46-14

    IPv4 ACL configuration 37-47

    IPv6 42-40

    IPv6 ACL configuration 43-8

    IS-IS 41-76

    ISO CLNS 41-76

    Layer 2 protocol tunneling 19-18

    MAC address-table move update 24-16

    MSDP peers 50-18

    multicast router interfaces 27-17, 44-12

    multi-VRF CE 41-91

    MVR 27-24

    network traffic for analysis with probe 32-2

    object tracking 47-13

    OSPF 41-36

    port

    blocking 28-21

    protection 28-21

    private VLANs 18-15

    REP 23-14

    RP mapping information 49-35

    SFP status 14-56, 52-14

    source-active messages 50-18

    speed and duplex mode 14-37

    SSM mapping 49-23

    traffic flowing among switches 33-1

    traffic suppression 28-21

    tunneling 19-18

    VLAN

    filters 37-47

    maps 37-47

    VLANs 15-16

    VMPS 15-32

    VTP 16-19

    mrouter Port 24-3

    mrouter port 24-5

    MSDP

    benefits of 50-3

    IN-29Catalyst 3560 Switch Software Configuration Guide

  • Index

    clearing MSDP connections and statistics 50-18

    controlling source information

    forwarded by switch 50-11

    originated by switch 50-9

    received by switch 50-13

    default configuration 50-4

    dense-mode regions

    sending SA messages to 50-16

    specifying the originating address 50-17

    filtering

    incoming SA messages 50-14

    SA messages to a peer 50-12

    SA requests from a peer 50-10

    join latency, defined 50-6

    meshed groups

    configuring 50-15

    defined 50-15

    originating address, changing 50-17

    overview 50-1

    peer-RPF flooding 50-2

    peers

    configuring a default 50-4

    monitoring 50-18

    peering relationship, overview 50-1

    requesting source information from 50-8

    shutting down 50-16

    source-active messages

    caching 50-6

    clearing cache entries 50-18

    defined 50-2

    filtering from a peer 50-10

    filtering incoming 50-14

    filtering to a peer 50-12

    limiting data with TTL 50-13

    monitoring 50-18

    restricting advertised sources 50-9

    support for 1-19

    MSTP

    boundary ports

    IN-30Catalyst 3560 Switch Software Configuration Guide

    configuration guidelines 21-16

    described 21-7

    BPDU filtering

    described 22-3

    enabling 22-15

    BPDU guard

    described 22-2

    enabling 22-14

    CIST, described 21-3

    CIST regional root 21-3

    CIST root 21-6

    configuration guidelines 21-16, 22-13

    configuring

    forward-delay time 21-25

    hello time 21-25

    link type for rapid convergence 21-27

    maximum aging time 21-26

    maximum hop count 21-26

    MST region 21-17

    neighbor type 21-27

    path cost 21-23

    port priority 21-21

    root switch 21-19

    secondary root switch 21-20

    switch priority 21-24

    CST

    defined 21-3

    operations between regions 21-5

    default configuration 21-15

    default optional feature configuration 22-12

    displaying status 21-28

    enabling the mode 21-17

    EtherChannel guard

    described 22-10

    enabling 22-18

    extended system ID

    effects on root switch 21-19

    effects on secondary root switch 21-20

    unexpected behavior 21-19

    OL-26641-03

  • Index

    IEEE 802.1s

    implementation 21-7

    port role naming change 21-7

    terminology 21-6

    instances supported 20-11

    interface state, blocking to forwarding 22-2

    interoperability and compatibility among modes 20-12

    interoperability with IEEE 802.1D

    described 21-9

    restarting migration process 21-28

    IST

    defined 21-3

    master 21-3

    operations within a region 21-3

    loop guard

    described 22-12

    enabling 22-19

    mapping VLANs to MST instance 21-17

    MST region

    CIST 21-3

    configuring 21-17

    described 21-2

    hop-count mechanism 21-6

    IST 21-3

    supported spanning-tree instances 21-2

    optional features supported 1-10

    overview 21-2

    Port Fast

    described 22-2

    enabling 22-13

    preventing root switch selection 22-11

    root guard

    described 22-11

    enabling 22-18

    root switch

    configuring 21-19

    effects of extended system ID 21-19

    unexpected behavior 21-19

    OL-26641-03

    shutdown Port Fast-enabled port 22-2

    stack changes, effects of 21-9

    status, displaying 21-28

    multiauth

    support for inaccessible authentication bypass 10-26

    multiauth mode

    See multiple-authentication mode

    multicast groups

    Immediate Leave 27-5

    joining 27-3

    leaving 27-5

    static joins 27-10, 44-8

    multicast packets

    ACLs on 37-45

    blocking 28-8

    multicast router interfaces, monitoring 27-17, 44-12

    multicast router ports, adding 27-9, 44-8

    Multicast Source Discovery Protocol

    See MSDP

    multicast storm 28-1

    multicast storm-control command 28-4

    multicast television application 27-19

    multicast VLAN 27-18

    Multicast VLAN Registration

    See MVR

    multidomain authentication

    See MDA

    multioperations scheduling, IP SLAs 46-5

    multiple authentication 10-15

    multiple authentication mode

    configuring 10-48

    Multiple HSRP

    See MHSRP

    multiple VPN routing/forwarding in customer edge devices

    See multi-VRF CE

    multi-VRF CE

    configuration example 41-87

    configuration guidelines 41-79

    IN-31Catalyst 3560 Switch Software Configuration Guide

  • Index

    configuring 41-79

    default configuration 41-79

    defined 41-77

    displaying 41-91

    monitoring 41-91

    network components 41-79

    packet-forwarding process 41-79

    support for 1-19

    MVR

    and address aliasing 27-21

    and IGMPv3 27-21

    configuration guidelines 27-21

    configuring interfaces 27-22

    default configuration 27-20

    described 27-18

    example application 27-19

    in the switch stack 27-20

    modes 27-22

    monitoring 27-24

    multicast television application 27-19

    setting global parameters 27-21

    support for 1-6

    N

    NAC

    AAA down policy 1-15

    critical authentication 10-26, 10-65

    IEEE 802.1x authentication using a RADIUS server 10-70

    IEEE 802.1x validation using RADIUS server 10-70

    inaccessible authentication bypass 1-15, 10-65

    Layer 2 IEEE 802.1x validation 1-14, 1-15, 10-32, 10-70

    Layer 2 IP validation 1-15

    named IPv4 ACLs 37-16

    NameSpace Mapper

    See NSM

    native VLAN

    and IEEE 802.1Q tunneling 19-4

    IN-32Catalyst 3560 Switch Software Configuration Guide

    configuring 15-23

    default 15-23

    NDAC 11-9, 13-2

    NEAT

    configuring 10-71

    overview 10-33

    neighbor discovery, IPv6 42-4

    neighbor discovery/recovery, EIGRP 41-37

    neighbor offset numbers, REP 23-4

    neighbors, BGP 41-60

    Network Admission Control

    NAC

    See NAC

    Network Assistant

    benefits 1-2

    described 1-6

    downloading image files 1-3

    guide mode 1-2

    management options 1-2

    managing switch stacks 5-2, 5-18

    upgrading a switch 54-25

    wizards 1-3

    network configuration examples

    cost-effective wiring closet 1-28

    high-performance wiring closet 1-29

    increasing network performance 1-26

    large network 1-35

    long-distance, high-bandwidth transport 1-39

    multidwelling network 1-37

    providing network services 1-26

    redundant Gigabit backbone 1-30

    server aggregation and Linux server cluster 1-31

    small to medium-sized network 1-33

    network design

    performance 1-26

    services 1-26

    Network Device Admission Control (NDAC) 11-9, 13-2

    Network Edge Access Topology

    See NEAT

    OL-26641-03

  • Index

    network management

    CDP 29-1

    RMON 33-1

    SNMP 35-1

    network performance, measuring with IP SLAs 46-3

    network policy TLV 30-2, 30-7

    Network Time Protocol

    See NTP

    no commands 2-4

    nonhierarchical policy maps

    configuration guidelines 38-42

    described 38-10

    non-IP traffic filtering 37-31

    nontrunking mode 15-18

    normal-range VLANs 15-5

    configuration guidelines 15-7

    configuring 15-5

    defined 15-1

    no switchport command 14-5

    not-so-stubby areas

    See NSSA

    NSAPs, as ISO IGRP addresses 41-67

    NSF Awareness

    IS-IS 41-69

    NSM 4-3

    NSSA, OSPF 41-32

    NTP

    associations

    defined 7-3

    overview 7-3

    stratum 7-3

    support for 1-7

    time

    services 7-3

    synchronizing 7-3

    O

    OBFL

    OL-26641-03

    configuring 52-27

    described 52-26

    displaying 52-27

    object tracking

    HSRP 47-7

    IP SLAs 47-9

    IP SLAs, configuring 47-9

    monitoring 47-13

    offline configuration for switch stacks 5-8

    off mode, VTP 16-4

    on-board failure logging

    See OBFL

    online diagnostics

    overview 53-1

    running tests 53-3

    understanding 53-1

    open1x

    configuring 10-76

    open1x authentication

    overview 10-32

    Open Shortest Path First

    See OSPF

    optimizing system resources 8-1

    options, management 1-6

    OSPF

    area parameters, configuring 41-32

    configuring 41-30

    default configuration

    metrics 41-33

    route 41-33

    settings 41-27

    described 41-26

    for IPv6 42-11

    interface parameters, configuring 41-31

    LSA group pacing 41-35

    monitoring 41-36

    router IDs 41-35

    route summarization 41-33

    support for 1-18

    IN-33Catalyst 3560 Switch Software Configuration Guide

  • Index

    virtual links 41-33

    out-of-profile markdown 1-17

    P

    packet modification, with QoS 38-22

    PAgP

    Layer 2 protocol tunneling 19-10

    See EtherChannel

    parallel paths, in routing tables 41-93

    passive interfaces

    configuring 41-103

    OSPF 41-34

    passwords

    default configuration 9-3

    disabling recovery of 9-5

    encrypting 9-4

    for security 1-12

    in clusters 6-15

    overview 9-1

    recovery of 52-4

    setting

    enable 9-3

    enable secret 9-4

    Telnet 9-6

    with usernames 9-7

    VTP domain 16-11

    path cost

    MSTP 21-23

    STP 20-22

    path MTU discovery 42-4

    PBR

    defined 41-99

    enabling 41-101

    fast-switched policy-based routing 41-102

    local policy-based routing 41-102

    PC (passive command switch) 6-11

    peers, BGP 41-60

    percentage thresholds in tracked lists 47-6

    IN-34Catalyst 3560 Switch Software Configuration Guide

    performance, network design 1-26

    performance features 1-4

    persistent self-signed certificate 9-51

    per-user ACLs and Filter-Ids 10-9

    per-VLAN spanning-tree plus

    See PVST+

    PE to CE routing, configuring 41-86

    physical ports 14-2

    PIM

    default configuration 49-11

    dense mode

    overview 49-4

    rendezvous point (RP), described 49-5

    RPF lookups 49-8

    displaying neighbors 49-65

    enabling a mode 49-14

    overview 49-4

    router-query message interval, modifying 49-39

    shared tree and source tree, overview 49-36

    shortest path tree, delaying the use of 49-37

    sparse mode

    join messages and shared tree 49-5

    overview 49-5

    prune messages 49-5

    RPF lookups 49-9

    stub routing

    configuration guidelines 49-23

    displaying 49-64

    enabling 49-24

    overview 49-5

    support for 1-19

    versions

    interoperability 49-12

    troubleshooting interoperability problems 49-36

    v2 improvements 49-4

    PIM-DVMRP, as snooping method 27-8

    ping

    character output description 52-16

    executing 52-15

    OL-26641-03

  • Index

    overview 52-15

    PoE

    auto mode 14-10

    CDP with power consumption, described 14-8

    CDP with power negotiation, described 14-8

    Cisco intelligent power management 14-8

    configuring 14-40

    cutoff power

    determining 14-12

    cutoff-power

    support for 14-11

    devices supported 14-8

    high-power devices operating in low-power mode 14-8

    IEEE power classification levels 14-9

    monitoring 14-11

    monitoring power 14-43

    policing power consumption 14-43

    policing power usage 14-11

    power budgeting 14-41

    power consumption 14-12, 14-41

    powered-device detection and initial power allocation 14-9

    power management modes 14-10

    power monitoring 14-11

    power negotiation extensions to CDP 14-8

    power sensing 14-11

    standards supported 14-8

    static mode 14-10

    total available power 14-13

    troubleshooting 52-13

    PoE+ 1-20, 14-8, 14-9, 14-40

    policed-DSCP map for QoS 38-73

    policers

    configuring

    for each matched traffic class 38-57

    for more than one traffic class 38-69

    described 38-4

    displaying 38-89

    OL-26641-03

    number of 38-43

    types of 38-10

    policing

    described 38-4

    hierarchical

    See hierarchical policy maps

    token-bucket algorithm 38-10

    policy-based routing

    See PBR

    policy maps for QoS

    characteristics of 38-57

    described 38-8

    displaying 38-90

    hierarchical 38-9

    hierarchical on SVIs

    configuration guidelines 38-42

    configuring 38-62

    described 38-12

    nonhierarchical on physical ports

    configuration guidelines 38-42

    described 38-10

    POP 1-37

    port ACLs

    defined 37-2

    types of 37-4

    Port Aggregation Protocol

    See EtherChannel

    port-based authentication

    accounting 10-17

    authentication server

    defined 10-3, 12-2

    RADIUS server 10-3

    client, defined 10-3, 12-2

    configuration guidelines 10-40, 12-9

    configuring

    802.1x authentication 10-46

    guest VLAN 10-62

    host mode 10-48

    inaccessible authentication bypass 10-65

    IN-35Catalyst 3560 Switch Software Configuration Guide

  • Index

    manual re-authentication of a client 10-51

    periodic re-authentication 10-50

    quiet period 10-51

    RADIUS server 10-48, 12-13

    RADIUS server parameters on the switch 10-47, 12-11

    restricted VLAN 10-63

    switch-to-client frame-retransmission number 10-52, 10-53

    switch-to-client retransmission time 10-51

    violation modes 10-45

    default configuration 10-39, 12-9

    described 10-1

    device roles 10-3, 12-2

    displaying statistics 10-78, 12-17

    downloadable ACLs and redirect URLs

    configuring 10-73 to 10-75, ?? to 10-75

    overview 10-21 to 10-23

    EAPOL-start frame 10-6

    EAP-request/identity frame 10-6

    EAP-response/identity frame 10-6

    enabling

    802.1X authentication 12-11

    encapsulation 10-4

    flexible authentication ordering

    configuring 10-76

    overview 10-32

    guest VLAN

    configuration guidelines 10-25, 10-26

    described 10-24

    host mode 10-13

    inaccessible authentication bypass

    configuring 10-65

    described 10-26

    guidelines 10-41

    initiation and message exchange 10-6

    magic packet 10-29

    maximum number of allowed devices per port 10-42

    method lists 10-46

    multiple authentication 10-15

    IN-36Catalyst 3560 Switch Software Configuration Guide

    per-user ACLs

    AAA authorization 10-46

    configuration tasks 10-21

    described 10-20

    RADIUS server attributes 10-20

    ports

    authorization state and dot1x port-control command 10-11

    authorized and unauthorized 10-11

    voice VLAN 10-28

    port security

    described 10-29

    readiness check

    configuring 10-42

    described 10-18, 10-42

    resetting to default values 10-78

    stack changes, effects of 10-12

    statistics, displaying 10-78

    switch

    as proxy 10-3, 12-2

    RADIUS client 10-4

    switch supplicant

    configuring 10-71

    overview 10-33

    upgrading from a previous release 38-36

    user distribution

    guidelines 10-31

    overview 10-31

    VLAN assignment

    AAA authorization 10-46

    characteristics 10-19

    configuration tasks 10-19

    described 10-18

    voice aware 802.1x security

    configuring 10-43

    described 10-33, 10-43

    voice VLAN

    described 10-28

    PVID 10-28

    OL-26641-03

  • Index

    VVID 10-28

    wake-on-LAN, described 10-29

    with ACLs and RADIUS Filter-Id attribute 10-35

    port-based authentication methods, supported 10-8

    port blocking 1-5, 28-7

    port-channel

    See EtherChannel

    port description TLV 30-2

    Port Fast

    described 22-2

    enabling 22-13

    mode, spanning tree 15-29

    support for 1-10

    port membership modes, VLAN 15-4

    port priority

    MSTP 21-21

    STP 20-20

    ports

    10-Gigabit Ethernet module 14-7

    access 14-3

    blocking 28-7

    dual-purpose uplink 14-7

    dynamic access 15-4

    IEEE 802.1Q tunnel 15-5

    protected 28-6

    REP 23-6

    routed 14-4

    secure 28-9

    static-access 15-4, 15-11

    switch 14-2

    trunks 15-4, 15-16

    VLAN assignments 15-11

    port security

    aging 28-17

    and private VLANs 28-18

    and QoS trusted boundary 38-47

    and stacking 28-18

    configuring 28-13

    default configuration 28-11

    OL-26641-03

    described 28-8

    displaying 28-21

    enabling 28-18

    on trunk ports 28-14

    sticky learning 28-9

    violations 28-10

    with other features 28-11

    port-shutdown response, VMPS 15-28

    port VLAN ID TLV 30-2

    power inline consumption command 14-15

    power management TLV 30-3, 30-7

    Power over Ethernet

    See PoE

    preempt delay time, REP 23-5

    preemption, default configuration 24-9

    preemption delay, default configuration 24-9

    preferential treatment of traffic

    See QoS

    prefix lists, BGP 41-58

    preventing unauthorized access 9-1

    primary edge port, REP 23-4

    primary interface for object tracking, DHCP, configuring 47-10

    primary interface for static routing, configuring 47-10

    primary links 24-2

    primary VLANs 18-1, 18-3

    priority

    HSRP 45-9

    overriding CoS 17-6

    trusting CoS 17-6

    private VLAN edge ports

    See protected ports

    private VLANs

    across multiple switches 18-4

    and SDM template 18-4

    and SVIs 18-5

    and switch stacks 18-6

    benefits of 18-1

    community ports 18-2

    IN-37Catalyst 3560 Switch Software Configuration Guide

  • Index

    community VLANs 18-2, 18-3

    configuration guidelines 18-7, 18-8, 18-9

    configuration tasks 18-7

    configuring 18-10

    default configuration 18-7

    end station access to 18-3

    IP addressing 18-3

    isolated port 18-2

    isolated VLANs 18-2, 18-3

    mapping 18-14

    monitoring 18-15

    ports

    community 18-2

    configuration guidelines 18-9

    configuring host ports 18-12

    configuring promiscuous ports 18-13

    described 15-5

    isolated 18-2

    promiscuous 18-2

    primary VLANs 18-1, 18-3

    promiscuous ports 18-2

    secondary VLANs 18-2

    subdomains 18-1

    traffic in 18-5

    privileged EXEC mode 2-2

    privilege levels

    changing the default for lines 9-9

    command switch 6-18

    exiting 9-10

    logging into 9-10

    mapping on member switches 6-18

    overview 9-2, 9-8

    setting a command with 9-8

    promiscuous ports

    configuring 18-13

    defined 18-2

    protected ports 1-12, 28-6

    protocol-dependent modules, EIGRP 41-37

    Protocol-Independent Multicast Protocol

    IN-38Catalyst 3560 Switch Software Configuration Guide

    See PIM

    protocol storm protection 28-19

    provider edge devices 41-77

    provisioned switches and IP source guard 25-18

    provisioning new members for a switch stack 5-8

    proxy ARP

    configuring 41-12

    definition 41-9

    with IP routing disabled 41-13

    proxy reports 24-4

    pruning, VTP

    disabling

    in VTP domain 16-17

    on a port 15-23

    enabling

    in VTP domain 16-17

    on a port 15-22

    examples 16-7

    overview 16-7

    pruning-eligible list

    changing 15-22

    for VTP pruning 16-7

    VLANs 16-18

    PVST+

    described 20-11

    IEEE 802.1Q trunking interoperability 20-12

    instances supported 20-11

    Q

    QoS

    and MQC commands 38-1

    auto-QoS

    categorizing traffic 38-24

    configuration and defaults display 38-38

    configuration guidelines 38-35

    described 38-23

    disabling 38-38

    displaying generated commands 38-38

    OL-26641-03

  • Index

    displaying the initial configuration 38-38

    effects on running configuration 38-35

    list of generated commands 38-26, 38-30

    basic model 38-4

    classification

    class maps, described 38-8

    defined 38-4

    DSCP transparency, described 38-49

    flowchart 38-7

    forwarding treatment 38-3

    in frames and packets 38-3

    IP ACLs, described 38-8

    MAC ACLs, described 38-5, 38-8

    options for IP traffic 38-6

    options for non-IP traffic 38-5

    policy maps, described 38-8

    trust DSCP, described 38-5

    trusted CoS, described 38-5

    trust IP precedence, described 38-5

    class maps

    configuring 38-55

    displaying 38-89

    configuration guidelines

    auto-QoS 38-35

    standard QoS 38-42

    configuring

    aggregate policers 38-69

    auto-QoS 38-23

    default port CoS value 38-47

    DSCP maps 38-71

    DSCP transparency 38-49

    DSCP trust states bordering another domain 38-49

    egress queue characteristics 38-81

    ingress queue characteristics 38-77

    IP extended ACLs 38-53

    IP standard ACLs 38-51

    MAC ACLs 38-54

    policy maps, hierarchical 38-62

    OL-26641-03

    port trust states within the domain 38-45

    trusted boundary 38-47

    default auto configuration 38-24

    default standard configuration 38-39

    displaying statistics 38-89

    DSCP transparency 38-49

    egress queues

    allocating buffer space 38-82

    buffer allocation scheme, described 38-20

    configuring shaped weights for SRR 38-86

    configuring shared weights for SRR 38-87

    described 38-4

    displaying the threshold map 38-85

    flowchart 38-19

    mapping DSCP or CoS values 38-84

    scheduling, described 38-4

    setting WTD thresholds 38-82

    WTD, described 38-21

    enabling globally 38-44

    flowcharts

    classification 38-7

    egress queueing and scheduling 38-19

    ingress queueing and scheduling 38-16

    policing and marking 38-11

    implicit deny 38-8

    ingress queues

    allocating bandwidth 38-79

    allocating buffer space 38-79

    buffer and bandwidth allocation, described 38-18

    configuring shared weights for SRR 38-79

    configuring the priority queue 38-80

    described 38-4

    displaying the threshold map 38-78

    flowchart 38-16

    mapping DSCP or CoS values 38-77

    priority queue, described 38-18

    scheduling, described 38-4

    setting WTD thresholds 38-77

    WTD, described 38-18

    IN-39Catalyst 3560 Switch Software Configuration Guide

  • Index

    IP phones

    automatic classification and queueing 38-23

    detection and trusted settings 38-23, 38-47

    limiting bandwidth on egress interface 38-88

    mapping tables

    CoS-to-DSCP 38-71

    displaying 38-90

    DSCP-to-CoS 38-74

    DSCP-to-DSCP-mutation 38-75

    IP-precedence-to-DSCP 38-72

    policed-DSCP 38-73

    types of 38-13

    marked-down actions 38-60, 38-65

    marking, described 38-4, 38-9

    overview 38-2

    packet modification 38-22

    policers

    configuring 38-60, 38-65, 38-69

    described 38-9

    displaying 38-89

    number of 38-43

    types of 38-10

    policies, attaching to an interface 38-10

    policing

    described 38-4, 38-9

    token bucket algorithm 38-10

    policy maps

    characteristics of 38-57

    displaying 38-90

    hierarchical 38-9

    hierarchical on SVIs 38-62

    nonhierarchical on physical ports 38-57

    QoS label, defined 38-4

    queues

    configuring egress characteristics 38-81

    configuring ingress characteristics 38-77

    high priority (expedite) 38-22, 38-88

    location of 38-14

    SRR, described 38-15

    IN-40Catalyst 3560 Switch Software Configuration Guide

    WTD, described 38-14

    rewrites 38-22

    support for 1-16

    trust states

    bordering another domain 38-49

    described 38-5

    trusted device 38-47

    within the domain 38-45

    quality of service

    See QoS

    queries, IGMP 27-4

    query solicitation, IGMP 27-13

    R

    RADIUS

    attributes

    vendor-proprietary 9-38

    vendor-specific 9-36

    configuring

    accounting 9-35

    authenticati