INDEX access ports Numerics and Layer 2 protocol tunneling 10-Gigabit Ethernet interfaces configuration guidelines defined defined 11-18 11-3 in switch clusters 11-6 17-11 access template 6-10 8-1 accounting with 802.1x A with IEEE 802.1x AAA down policy with NAC Layer 2 IP validation abbreviating commands ABRs 10-32 1-9 with RADIUS 9-11, 9-17 ACEs 35-25 AC (command switch) and QoS 6-11 defined access templates 9-28 with TACACS+ 2-4 10-9 33-7 32-2 Ethernet 8-1 access-class command IP 32-20 32-2 32-2 ACLs access control entries ACEs See ACEs access-denied response, VMPS 13-28 32-2 any keyword 32-13 applying access groups applying IPv4 ACLs to interfaces 32-21 on bridged packets 32-39 Layer 2 32-21 on multicast packets Layer 3 32-21 on routed packets clusters, switch 6-14 command switches member switches switch clusters 6-12 See ACLs 32-17 to an interface 32-20, 38-8 to QoS 6-14 5-23 32-38 time ranges to to IPv6 interfaces 6-14 accessing stack members access lists 32-40 on switched packets accessing 32-40 38-8 33-7 classifying traffic for QoS comments in compiling defined 33-44 32-19 32-22 32-1, 32-8 examples of 32-22, 33-44 extended IP, configuring for QoS classification 33-45 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-1 Index ACLs (continued) ACLs (continued) extended IPv4 creating matching monitoring 32-11 matching criteria 32-22 names implicit deny 33-33 applying to interfaces 33-7, 33-44 32-20 32-2, 38-2 creating 32-10 matching criteria 32-8 terminal lines, setting on unsupported features support for 32-19 1-8 time ranges IPv6 IPv6 interactions with other features 38-4 configuring active links 38-2 active router unsupported features Layer 4 information in MAC extended using router ACLs with VLAN maps configuration guidelines 38-3 38-2 logging messages 32-7 32-37 VLAN maps 38-3 38-3 supported 38-3 unsupported features, IPv4 38-9 precedence of 32-2 unsupported features 38-8 38-4, 38-5 matching criteria 32-22 32-17 types supported 38-3 limitations 32-8 support in hardware 32-7 applying to interfaces 33-44 standard IPv4 32-8 32-15 displaying 32-15 standard IP, configuring for QoS classification matching criteria configuring 32-2 router ACLs and VLAN map configuration guidelines 32-37 32-8 and stacking 33-33 32-2, 38-2 router IPv4 named port resequencing entries 32-8 32-21 numbers 38-4 QoS 32-10 matching criteria creating 32-15 precedence of 32-10, 32-14, 32-16 implicit masks undefined 38-3 number per QoS class map 32-8 fragments and QoS guidelines named IPv6 named, IPv4 32-13 IP creating 32-41, 38-9 named 32-8 hardware and software handling host keyword 32-8, 32-21, 38-3 38-3 32-31 32-30 21-2 39-1 address aliasing 24-2 32-38 32-9 32-27, 33-46 Catalyst 3750 Switch Software Configuration Guide IN-2 OL-8550-01 Index addresses aging time displaying the MAC address table 7-27 for MSTP dynamic accelerated aging for STP 18-9 changing the aging time default aging defined for MSTP for STP 29-3 13-21 area border routers group address range See ABRs 40-3 STP address management ARP 18-9 configuring static adding and removing defined defined 7-24 35-10 1-5, 7-27, 35-10 encapsulation 7-19 address resolution 35-11 static cache configuration 7-27, 35-9 Address Resolution Protocol address resolution adjacency tables, with CEF managing 35-75 administrative distances ASBRs routing protocol defaults vendor-proprietary 36-1 advertisements 35-20 vendor-specific audience 9-30 9-29 xliii EIGRP aggregatable global unicast addresses aggregate addresses, BGP 35-58 aggregated ports 36-3 HSRP 35-40 39-9 local mode with AAA NTP associations See EtherChannel 9-36 7-4 RADIUS aggregate policers 33-59 key aggregate policing 1-10 login aging, accelerating 17-4 authentication 13-19, 14-3 aggregator template 35-53 attributes, RADIUS 35-77 advanced IP services image RIP 35-25 asymmetrical links, and IEEE 802.1Q tunneling 35-31 26-1 7-27 7-27 AS-path filters, BGP 35-86 CDP 35-10 table See ARP VTP 18-23, 18-24 allowed-VLAN list 7-27 multicast defined 7-21 19-24 alarms, RMON 7-22 MAC, discovering 18-9, 18-23 maximum 18-9 7-20 removing 19-23 MAC address table 7-21 7-19 learning OSPF accelerated 9-21 9-23 5-10, 8-1 18-9 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-3 Index authentication (continued) autonegotiation TACACS+ duplex mode defined key interface configuration guidelines 9-11 mismatches 9-13 login 11-19 43-12 autonomous system boundary routers 9-14 See ASBRs See also port-based authentication autonomous systems, in BGP authentication failed VLAN See restricted VLAN Auto-RP, described authentication keys, and routing protocols authoritative time source, described 35-46 40-5 autosensing, port speed 35-87 1-4 auxiliary VLAN 7-2 See voice VLAN authorization with RADIUS availability, features 9-27 with TACACS+ autoconfiguration 10-7 B 3-3 automatic advise (auto-advise) in switch stacks automatic copy (auto-copy) in switch stacks 5-12 BackboneFast 5-11 automatic discovery considerations beyond a noncandidate device brand new switches connectivity 6-8 6-10 20-7 disabling 20-17 enabling 20-16 1-7 backup interfaces See Flex Links 6-7 management VLANs backup links 6-8 21-2 banners non-CDP-capable devices 6-6 noncluster-capable devices configuring 6-6 login 6-9 in switch clusters described support for 6-5 different VLANs routed ports 1-6 9-11, 9-16 authorized ports with IEEE 802.1x 7-19 message-of-the-day login 6-5 default configuration See also CDP when displayed automatic QoS 7-17 7-17 aggregate addresses automatic recovery, clusters 6-11 automatic upgrades (auto-upgrade) in switch stacks auto-MDIX CIDR 5-11 11-21 35-58 35-58 clear commands 35-62 community filtering 11-22 35-58 aggregate routes, configuring See also HSRP configuring 7-18 BGP See QoS described 1-4 configuring neighbors default configuration described enabling 35-55 35-57 35-44 35-43 35-46 Catalyst 3750 Switch Software Configuration Guide IN-4 OL-8550-01 Index BGP (continued) monitoring boot loader 35-62 multipath support 35-50 neighbors, types of path selection route maps error-disabled state 35-60 Version 4 filtering 35-59 routing session with multi-VRF CE 35-69 20-3 RSTP format 19-12 described 20-3 1-11 disabling 20-15 35-43 enabling 20-14 binding cluster group and HSRP group 39-11 binding database support for 1-7 BPDU guard address, DHCP server See DHCP, Cisco IOS server database DHCP snooping See DHCP snooping binding database bindings described 20-2 disabling 20-14 enabling 20-13 support for 1-7 bridged packets, ACLs on address, Cisco IOS DHCP server DHCP snooping database IP source guard 22-6 22-7 See DHCP snooping binding database blocking packets booting boot process 3-2 See fallback bridging See BPDU broadcast flooding 3-2 directed 35-14 flooded 35-14 35-17 broadcast storm-control command broadcast storms 3-13 specific image bridge groups broadcast packets 25-6 boot loader, function of 32-39 bridge protocol data unit 22-16 binding table, DHCP snooping manually 20-2 BPDU filtering 35-62 35-58 support for 40-5 BPDU routing domain confederation supernets 3-2 See BGP 35-52 show commands 3-14 Border Gateway Protocol 35-61 route reflectors 3-15 bootstrap router (BSR), described 35-49 route dampening 3-2 trap-door mechanism 35-57 35-54 resetting sessions described prompt 35-50 prefix filtering 3-14 environment variables 35-46 peers, configuring accessing 25-4 25-1, 35-14 3-14 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-5 Index CGMP C as IGMP snooping learning method cables, monitoring for unidirectional links 27-1 candidate switch automatic discovery defined 6-5 6-4 6-4 40-32 joining multicast group 24-3 CA trustpoint switch support of CIDR 9-45 40-8 1-4 35-58 CipherSuites configuring 9-44 Cisco 7960 IP Phone 9-43 40-49 40-8 server support only See also command switch, cluster standby group, and member switch 15-1 Cisco Discovery Protocol caution, described xliv See CDP CDP Cisco Express Forwarding and trusted boundary 33-40 See CEF automatic discovery in switch clusters configuring 6-5 26-2 described 26-2 Cisco Intelligence Engine 2100 Series Configuration Registrar 26-1 disabling for routing device 26-3 to 26-4 See IE2100 enabling and disabling on an interface on a switch overview Cisco intelligent power management 26-4 See DHCP, Cisco IOS DHCP server 17-8 See IFS 26-1 power negotiation extensions Cisco Network Assistant 11-7 See Network Assistant 1-6 switch stack considerations Cisco StackWise technology 26-2 transmission timer and holdtime, setting updates Cisco IOS File System 26-5 support for 11-7 Cisco IOS DHCP server 26-3 Layer 2 protocol tunneling monitoring Cisco Group Management Protocol See CGMP default configuration 1-3 See also stacks, switch 26-2 26-2 CEF CiscoWorks 2000 1-5, 31-4 CIST regional root See MSTP defined 35-75 distributed enabling IPv6 enabling server support overview requirements defined clearing cached group entries 24-9 35-75 35-75 36-15 CIST root See MSTP classless interdomain routing See CIDR classless routing 35-8 Catalyst 3750 Switch Software Configuration Guide IN-6 OL-8550-01 Index class maps for QoS configuring described clusters, switch (continued) managing 33-47 through CLI 33-7 displaying through SNMP 33-79 class of service planning See CoS 11-30 CLI abbreviating commands command modes described 2-5 1-5 automatic recovery 6-11 6-18 6-14 IP addresses 6-14 LRE profiles 6-17 passwords enabling and disabling keystroke editing wrapped lines error messages RADIUS 2-7 SNMP 2-7 6-15 6-17 6-15, 6-19 switch stacks 2-9 TACACS+ 2-5 filtering command output getting help 6-5 host names editing features 6-16 6-17 See also candidate switch, command switch, cluster standby group, member switch, and standby command switch 2-10 2-3 history cluster standby group changing the buffer size described 2-6 disabling 2-7 2-6 considerations managing clusters 2-6 defined 6-18 39-11 14-3 2-4 6-13 6-12 6-2 requirements no and default forms of commands client mode, VTP and HSRP group automatic recovery recalling commands 6-3 virtual IP address 6-12 See also HSRP clock CNS See system clock cluster requirements Configuration Engine xlv configID, deviceID, hostname clusters, switch configuration service 6-14 described automatic discovery 6-5 automatic recovery 6-11 4-2 4-3 embedded agents described 6-4 4-5 enabling automated configuration 6-1 LRE profile considerations 4-3 4-1 event service 1-2 compatibility described 6-4 automatic discovery CLI 2-4 2-1 configuration logging benefits 6-19 planning considerations clearing interfaces accessing 6-18 enabling configuration agent 6-17 enabling event agent 4-6 4-9 4-8 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-7 Index Coarse Wave Division Multiplexer compatibility, software See CWDM SFPs See stacks, switch command-line interface config.text See CLI configurable leave timer, IGMP command modes defaults abbreviating 2-4 commands, setting privilege levels 9-8 6-12 active (AC) clearing the startup configuration creating using a text editor passive (PC) 1-15 configuration files 43-12 6-2 6-11 default name password privilege levels priority See also getting started guide and hardware installation guide configuration examples, network 6-11 configuration conflicts defined 1-2 configuration conflicts, recovering from lost member connectivity 43-12 command switch accessing 1-13 Express Setup 2-4 no and default 24-6 configuration, initial 2-1 commands 6-19 described B-19 B-10 3-12 deleting a stored configuration 6-11 recovery B-19 B-8 downloading from command-switch failure from lost member connectivity redundant 6-11, 43-8 43-12 6-11 replacing with another switch 43-10 with cluster member 43-9 requirements 6-3 standby (SC) 6-11 35-56 in clusters overview 31-4 using FTP B-13 using RCP B-17 using TFTP B-11 limiting TFTP server access obtaining with DHCP B-9 B-5 31-16 3-7 types and location 9-5 3-12 system contact and location information preparing 31-4 6-15 compatibility, feature B-8 31-15 B-10 uploading 6-15 community VLANs reasons for specifying the filename 6-15, 31-8 for cluster switches B-10, B-13, B-16 password recovery disable considerations 16-2 community strings configuring preparing 3-12 invalid combinations when copying community list, BGP community ports automatically guidelines for creating and using See also candidate switch, cluster standby group, member switch, and standby command switch SNMP 3-12 16-2, 16-3 25-11 B-10, B-13, B-16 reasons for B-9 using FTP B-14 using RCP B-18 using TFTP B-12 Catalyst 3750 Switch Software Configuration Guide IN-8 OL-8550-01 Index configuration guidelines, multi-VRF CE configuration logging cross-stack UplinkFast, STP 35-67 2-5 described 20-5 configuration settings, saving 3-10 disabling 20-16 configure terminal command 11-12 enabling 20-16 config-vlan mode fast-convergence events 2-2, 13-7 conflicts, configuration connectivity problems Fast Uplink Transition Protocol 43-12 connections, secure remote normal-convergence events 9-38 support for 43-14, 43-16, 43-17 consistency checks in VTP Version 2 console port, connecting to Kerberos 2-11 xliv for examples publication text 9-32 SSH 9-37 SSL 9-42 customer edge devices xliv CWDM SFPs xliv corrupted software, recovery steps with Xmodem CoS override priority trust priority 20-7 1-7 switch stack considerations xliv in Layer 2 frames 5-2, 5-16, 9-38 35-64 1-26 43-2 D 33-2 15-6 daylight saving time 15-6 7-13 dCEF in the switch stack CoS input queue threshold map for QoS 33-16 CoS output queue threshold map for QoS 33-19 35-75 debugging enabling all system diagnostics CoS-to-DSCP map for QoS 33-61 enabling for a specific feature counters, clearing interface 11-30 redirecting error message output crashinfo file 43-24 using commands critical authentication, IEEE 802.1x 10-36 cross-stack EtherChannel configuration guidelines 34-13 802.1x 34-2 43-20 43-21 43-20 2-4 10-21 auto-QoS 34-13 on Layer 3 physical interfaces described default commands 43-21 default configuration configuring on Layer 2 interfaces 20-6 cryptographic software image 14-4 conventions command 20-7 banners 34-16 BGP 34-4 CDP support for 1-6 DHCP 7-17 35-44 booting illustration 33-21 3-12 26-2 22-8 DHCP option 82 22-9 DHCP snooping 22-9 DHCP snooping binding database 22-9 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-9 Index default configuration (continued) DNS default configuration (continued) SPAN 7-16 dynamic ARP inspection EIGRP SSL 23-5 fallback bridging HSRP STP 34-11 Ethernet interfaces Flex Links 18-13 TACACS+ UDLD 17-4 9-13 27-4 24-25 VLANs 13-8 13-29 IGMP snooping 24-7, 37-5, 37-6 VMPS IGMP throttling 24-25 voice VLAN initial switch information 3-3 IP addressing, IP routing 35-6 IP multicast routing IP source guard VTP 22-17 Layer 2 interfaces MAC address table 3-10, 35-12 35-78 default routes 35-78 default routing 35-3 deleting VLANs 11-16 Layer 2 protocol tunneling 14-7 default networks 40-9 13-10 denial-of-service attack 17-11 description command 7-21 MAC address-table move update MSDP 41-4 desktop template MSTP 19-15 destination addresses in IPv6 ACLs 35-66 7-4 optional spanning-tree configuration OSPF 9-2 RADIUS 16-7 RSPAN 28-11 SDM template SNMP detecting indirect link failures, STP 32-12 34-8 20-8 B-19 device discovery protocol benefits 35-20 29-3 38-6 26-1 device manager 9-20 RMON 5-10, 8-1 destination-IP address-based forwarding, EtherChannel 34-9 device 40-9 private VLANs 1-15 destination-MAC address forwarding, EtherChannel password and privilege level RIP 20-12 35-26 PIM 11-25 destination addresses, in IPv4 ACLs 24-20 NTP 25-1 designing your network, examples 21-4 13-19 15-3 default gateway 36-11 MVR 7-15 VLAN, Layer 2 Ethernet interfaces 40-27 multi-VRF CE 30-4 system name and prompt IEEE 802.1Q tunneling IPv6 5-19 system message logging 42-4 21-4 IGMP filtering 33-31 switch stacks 11-16 39-5 IGMP 9-44 standard QoS 35-36 EtherChannel 28-11 described 1-2 1-2, 1-5 in-band management 8-5 31-7 requirements 1-6 xliv upgrading a switch B-19 Catalyst 3750 Switch Software Configuration Guide IN-10 OL-8550-01 Index DHCP DHCP option 82(continued) Cisco IOS server database configuring 22-14 default configuration described packet format, suboption 22-9 remote ID 22-5 22-5 DHCP snooping relay agent server accepting untrusted packets form edge switch 22-11 22-10 and private VLANs client request message exchange See DHCP snooping binding database client side configuration guidelines 3-4 default configuration 3-6 relay device 3-5 server-side 22-10 TFTP server option 82 data insertion trusted interface 3-6 lease options for IP address information 22-2 22-2 untrusted messages 22-2 3-5 adding bindings 22-14 22-7 location bindings 1-5 22-7 22-7 clearing agent statistics DHCP binding database See DHCP snooping binding database See DHCP snooping binding database 22-15 configuration guidelines configuring DHCP binding table 22-10 22-14 default configuration 22-8, 22-9 deleting DHCP option 82 circuit ID suboption default configuration binding file 22-5 configuration guidelines bindings 22-9 forwarding address, specifying 22-11 22-15 22-15 database agent 22-8 described 22-15 22-3 22-3 untrusted interface format 3-4 1-5, 1-12 helper address 22-4 binding file 3-3 relationship to BOOTP displaying 22-15 DHCP snooping binding database 3-5 for receiving the configuration file support for 22-8 message exchange process 3-8 relay support 22-9 displaying binding tables 3-7 server side overview 22-14 binding database 3-4 configuring example 22-3, 22-13 DHCP-based autoconfiguration overview 22-5 remote ID suboption 22-6 enabling DNS circuit ID 22-11 22-15 22-7 displaying 22-15 binding entries 22-15 status and statistics enabling entry 22-15 22-14 22-7 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-11 Index DHCP snooping binding database (continued) renewing database double-tagged packets IEEE 802.1Q tunneling 22-15 resetting Layer 2 protocol tunneling delay value configuration files 22-15 preparing DHCP snooping binding table See DHCP snooping binding database Differentiated Services architecture, QoS Differentiated Services Code Point directed unicast requests 33-2 33-2 Diffusing Update Algorithm (DUAL) 35-34 B-10, B-13, B-16 reasons for B-8 using FTP B-13 using RCP B-17 using TFTP B-11 image files 1-5 deleting old image directories changing preparing B-4 B-4 reasons for B-19 displaying the working B-4 using CMS 1-3 using FTP B-26 discovery, clusters See automatic discovery using HTTP Distance Vector Multicast Routing Protocol See DVMRP using RCP drop threshold for Layer 2 protocol packets 35-86 DSCP and DHCP-based autoconfiguration 3-6 7-17 1-10, 33-2 DSCP input queue threshold map for QoS DSCP-to-CoS map for QoS overview 7-15 DSCP transparency setting up 7-16 DTP support for 33-16 1-7, 13-17 documentation, related xliv dual IPv4 and IPv6 templates document conventions xliv dual protocol stacks configuring domain names 35-35 8-2, 36-1, 36-9 36-13 DNS 7-15 IPv4 and IPv6 VTP 14-8 SDM templates supporting Domain Name System 33-65 33-40 DUAL finite state machine, EIGRP 1-5 33-19 33-64 DSCP-to-DSCP-mutation map for QoS 36-4 B-19 17-11 DSCP output queue threshold map for QoS 7-16 displaying the configuration B-22 using the device manager or Network Assistant 35-3 DNS default configuration 1-3, B-19 B-30 using TFTP distance-vector protocols B-23 B-21, B-25, B-29 creating and removing distribute-list command 17-10 downloading 22-15 timeout value in IPv6 17-2 36-9 36-9 DVMRP See DNS autosummarization dot1q-tunnel switchport mode 13-18 configuring a summary address disabling 40-46 40-48 connecting PIM domain to DVMRP router 40-39 Catalyst 3750 Switch Software Configuration Guide IN-12 OL-8550-01 Index dynamic ARP inspection DVRMP (continued) enabling unicast routing ARP cache poisoning 40-42 interoperability 23-1 ARP requests, described with Cisco devices ARP spoofing attack 40-37 with Cisco IOS software 23-1 clearing 40-7 mrinfo requests, responding to log buffer 40-41 neighbors 23-15 statistics 23-15 advertising the default route to 40-40 configuration guidelines discovery with Probe messages 40-37 configuring displaying information overview in DHCP environments 40-44 log buffer 40-43 routes adding a metric offset advertising all described 40-48 40-40 caching DVMRP routes learned in report messages 40-42 changing the threshold for syslog messages 40-7 40-45 23-15 1-11 function of 23-2 40-39 displaying neighbor information dynamic access ports characteristics configuring 13-31 11-3 dynamic addresses See addresses 13-3 displaying 40-41 23-3 23-15 configuring configuring 23-4 log buffer clearing tunnels 23-14 error-disabled state for exceeding rate limit interface trust states 40-7 23-14 23-15 trust state and rate limit 40-37 23-2 23-14 configuration and operating state statistics 40-48 source distribution tree, building defined DHCP snooping binding database log buffer limiting unicast route advertisements support for 23-1 ARP ACLs 40-45 40-50 limiting the number injected into MBONE 23-10 displaying 40-49 favoring one over another 23-4, 23-10 23-5 denial-of-service attacks, preventing 40-48 advertising the default route to neighbors routing table 23-7 23-12 default configuration displaying 23-8 rate limit for incoming ARP packets 40-7 deleting 23-6 ACLs for non-DHCP environments 40-41 prevent peering with nonpruning rejecting nonpruning 23-1 23-12 23-15 logging of dropped packets, described man-in-the middle attack, described 23-5 23-2 network security issues and interface trust states 23-3 priority of ARP ACLs and DHCP snooping entries 23-4 rate limiting of ARP packets configuring described 23-10 23-4 error-disabled state 23-4 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-13 Index dynamic ARP inspection (continued) encryption, CipherSuite statistics 9-44 encryption for passwords clearing Enhanced IGRP 23-15 displaying See EIGRP 23-15 validation checks, performing dynamic auto trunking mode 23-11 13-18 Dynamic Host Configuration Protocol See DHCP-based autoconfiguration error messages during command entry EtherChannel 34-5, 34-7 binding physical and logical interfaces numbering of 13-31, 13-32 troubleshooting Layer 2 interfaces Dynamic Trunking Protocol 34-13 Layer 3 physical interfaces See DTP 34-16 Layer 3 port-channel logical interfaces default configuration described E 34-11 34-23 forwarding methods 35-42 34-8, 34-18 IEEE 802.3ad, described editing features keystrokes used wrapped lines 34-15 34-2 displaying status 34-7 interaction 2-7 with STP 2-7 34-12 with VLANs 2-9 34-12 LACP EIGRP authentication described 35-40 34-7 components 35-35 displaying status configuring 35-38 hot-standby ports default configuration definition modes 35-34 monitoring 35-39 34-20 port priority 34-22 Layer 3 interface 35-40 load balancing 1-11 34-21 35-5 34-8, 34-18 logical interfaces, described elections 34-7 34-7 system priority 35-41 stub routing 34-23 interaction with other features 35-36 interface parameters, configuring support for 34-12 configuring 13-31 35-3 enabling and disabling 34-4 34-4 configuration guidelines 13-33 types of connections EBGP 2-5 channel groups 13-29 dynamic routing 3-15 1-11, 35-76 automatic creation of dynamic port VLAN membership reconfirming environment variables, function of equal-cost routing 13-18 dynamic desirable trunking mode described 9-3 34-4 See stack master enable password 9-3 enable secret password 9-3 Catalyst 3750 Switch Software Configuration Guide IN-14 OL-8550-01 Index EtherChannel (continued) extended system ID PAgP MSTP aggregate-port learners STP 34-19 compatibility with Catalyst 1900 described See EUI Extensible Authentication Protocol over LAN 34-23 interaction with other features See EBGP 34-19 external neighbors, BGP 34-6 support for described F 34-4 numbering of port groups 34-4 failover support 11-6 1-6 fallback bridging stack changes, effects of 34-10 and protected ports 1-4 creating 42-4 described 20-10 described disabling 20-17 displaying 42-11 enabling 20-17 function of 42-2 Ethernet VLANs 13-9 removing 13-8 13-9 clearing 29-3 42-11 42-11 configuration guidelines examples 42-4 connecting interfaces with conventions for xliv default configuration network configuration expedite queue for QoS Express Setup 1-15 described 33-78 extended crashinfo file 42-2 forwarding packets 43-24 overview extended-range VLANs configuring 42-4 42-1 flooding packets configuration guidelines 11-10 frame forwarding 1-2 See also getting started guide 13-13 42-2 42-1 protocol, unsupported 42-4 stack changes, effects of 42-3 13-12 13-14 creating with an internal VLAN ID defined 42-5 displaying events, RMON 42-5 bridge table 36-3 creating 42-2 number supported defaults and ranges EUI 42-4 bridge groups EtherChannel guard modifying 35-46 1-4 port-channel interfaces adding 10-1 external BGP 34-6 learn method and priority configuration support for 18-4, 18-16 extended universal identifier 34-19 34-5 displaying status modes 19-17 13-15 13-1 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-15 Index fallback bridging (continued) file system STP displaying available file systems disabling on an interface forward-delay interval setting the default 42-10 42-8 VLAN-bridge spanning-tree priority VLAN-bridge STP support for unsupported protocols 42-4 IPv6 traffic 38-4, 38-8 non-IP traffic 2-10 B-1 configuration guidelines 25-11 27-1 files basic crashinfo 21-4 21-5 default configuration description 21-1 monitoring 21-8 21-4 flooded traffic, blocking 43-24 25-7 flow-based packet classification 43-24 1-10 flowcharts B-5 QoS classification crashinfo description 33-6 QoS egress queueing and scheduling 43-24 QoS ingress queueing and scheduling B-5 displaying the contents of B-8 extended crashinfo description location 2-10 Flex Links 20-6 configuring location 32-27 flash device, number of 18-11 fiber-optic, detecting unidirectional links deleting 32-30 See ACLs, IP 35-75 copying in a VLAN filters, IP Fast Uplink Transition Protocol description B-3 filtering show and more command output 42-2 features, incompatible B-5 show and more command output 42-2 SVIs and routed ports FIB 42-7 1-11 VLAN-bridge STP B-1 filtering 18-2 maximum-idle interval B-3 network file system names 42-9 42-7 keepalive messages path cost local file system names 42-10 hello BPDU interval interface priority displaying file information 42-11 B-2 QoS policing and marking 33-17 33-15 33-10 flowcontrol configuring 43-24 described 43-25 tar 11-21 11-20 forward-delay time creating MSTP B-6 displaying the contents of extracting B-7 18-23 Forwarding Information Base B-7 image file format STP 19-23 B-20 See FIB forwarding nonroutable protocols 42-1 Catalyst 3750 Switch Software Configuration Guide IN-16 OL-8550-01 Index FTP hierarchical policy maps accessing MIB files configuration guidelines A-4 configuration files downloading overview configuring described B-13 preparing the server image files deleting old image 33-11 described 2-6 disabling 2-7 recalling commands B-28 2-6 2-6 history table, level and number of syslog messages B-26 preparing the server uploading 33-53 changing the buffer size B-13 B-14 downloading 33-33 history B-12 uploading 33-8 30-10 host names B-25 in clusters B-28 6-14 host ports configuring G kinds of 16-12 16-2 get-bulk-request operation 31-3 hosts, limit on dynamic ports get-next-request operation 31-3, 31-5 Hot Standby Router Protocol get-request operation See HSRP 31-3, 31-5 get-response operation HP OpenView 31-3 authentication string See SFPs global configuration mode 39-9 automatic cluster recovery 2-2 binding to cluster group 24-13 guest VLAN and 802.1x 6-13 39-11 cluster standby group considerations 10-13 command-switch redundancy guide audience configuring xliii purpose of guide mode 1-3 definition 39-1 guidelines 39-5 monitoring See device manager and Network Assistant overview priority H 39-5 39-1 39-7 1-11 support for ICMP redirect messages switch stack considerations hello time MSTP 11-26 timers 19-22 tracking 18-22 help, for the command line 2-3 1-1, 1-6 39-11 routing redundancy hardware limitations and Layer 3 interfaces 6-12 39-4 default configuration xliii GUIs STP 1-5 HSRP Gigabit modules global leave, IGMP 13-33 39-11 39-4 39-9 39-7 See also clusters, cluster standby group, and standby command switch Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-17 Index HTTP over SSL IEEE 802.1Q (continued) see HTTPS HTTPS tunneling compatibility with other features 9-42 configuring defaults 9-46 self-signed certificate HTTP secure server 17-4 described 9-43 17-1 tunnel ports with other features 9-42 17-6 17-6 IEEE 802.1s See MSTP I IEEE 802.1w IBPG See RSTP 35-42 IEEE 802.1x ICMP IPv6 See port-based authentication 36-4 redirect messages support for IEEE 802.3ad 35-12 See EtherChannel 1-11 time-exceeded messages traceroute and IEEE 802.3af 43-18 See PoE 43-18 unreachable messages IEEE 802.3x flow control 32-20 unreachable messages and IPv6 unreachables and ACLs 38-4 ifIndex values, SNMP IFS 32-22 1-6 configurable leave timer executing 43-15 overview 43-14 described 24-6 ICMP Router Discovery Protocol enabling 24-12 configuring the switch See IRDP as a member of a group 36-4 40-27 statically connected member IDS appliances and ingress RSPAN and ingress SPAN controlling access to groups 28-22 28-15 IEEE 802.1D default configuration 40-27 deleting cache entries 40-50 displaying groups See STP IEEE 802.1p 31-6 IGMP ICMP ping ICMPv6 11-20 fast switching 15-1 40-31 40-28 40-50 40-32 flooded multicast traffic IEEE 802.1Q and trunk ports configuration limitations encapsulation controlling the length of time 11-3 disabling on an interface 13-19 global leave 13-16 native VLAN for untagged traffic 13-23 24-13 24-14 24-13 query solicitation 24-13 recovering from flood mode 24-13 host-query interval, modifying 40-29 joining multicast group 24-3 Catalyst 3750 Switch Software Configuration Guide IN-18 OL-8550-01 Index IGMP (continued) join messages IGMP snooping and address aliasing 24-3 leave processing, enabling leaving multicast group multicast reachability overview queries and stack changes 24-11, 37-9 configuring 24-5 definition 24-7 24-7, 37-5, 37-6 24-2 enabling and disabling 24-4 report suppression global configuration described 24-6 Immediate Leave disabling 24-16, 37-11 in the switch stack supported versions method 24-3 24-8, 37-6 24-8 24-6 24-7 24-9 monitoring 1-4 Version 1 24-16, 37-11 querier changing to Version 2 described configuration guidelines 40-29 configuring 40-3 Version 2 described support for 40-29 maximum query response time value pruning groups IGP 24-25 24-29 support for 1-4 24-25 24-25 24-29 35-25 Immediate Leave, IGMP 24-24 monitoring 24-28 displaying action 24-25 24-8 IGMP throttling described default configuration enabling 24-6 37-9 inaccessible authentication bypass IGMP groups 10-15 initial configuration configuring filtering IGMP Immediate Leave configuration guidelines described 24-6 enabling 24-11 defaults 24-28 setting the maximum number 24-12 24-27 1-13 Express Setup See also getting started guide and hardware installation guide number 11-11 range macros 11-14 interface command 24-26 configuration mode 1-2 interface IGMP profile configuring 40-31 default configuration 40-30 IGMP filtering described 1-4 configuring 40-31 query timeout value configuring 24-3 VLAN configuration 40-3 24-15 24-15 supported versions changing to Version 1 applying 24-7 default configuration 40-27 40-2 support for 24-2 24-25 11-11 to 11-12 interface configuration mode 2-3 24-26 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-19 Index Inter-Switch Link interfaces auto-MDIX, configuring See ISL 11-21 inter-VLAN routing configuration guidelines 10-Gigabit Ethernet duplex and speed Intrusion Detection System 11-18 See IDS appliances 11-18 IP ACLs configuring procedure for QoS classification 11-12 configuring for IPv4 and IPv6 counters, clearing 36-13 implicit deny named 11-16 descriptive name, adding 32-21 IP addresses 11-25 displaying information about 32-10 32-15 undefined 11-25 11-30 128-bit 36-2 flow control 11-20 candidate or member management 1-5 classes of monitoring naming range of discovering IPv6 11-31 speed and duplex, configuring status 11-19 supported types of MAC address association 35-9 35-18 redundant clusters 11-10 6-12 standby command switch 11-1 interfaces range macro command interface types 35-5 36-2 monitoring 11-29 35-6 7-27 for IP routing 11-31 shutting down 6-3, 6-12, 6-14 default configuration 11-10, 11-11 11-12 restarting 6-2 command switch 11-25 6-4, 6-14 35-6 cluster access 11-29 physical, identifying 33-7 32-10, 32-14 implicit masks 11-30 default configuration described 1-11, 35-2 11-14 See also IP information IP base image 11-11 Interior Gateway Protocol 1-1 IP broadcast address See IGP 6-12, 6-14 35-16 ip cef distributed command internal BGP IP directed broadcasts See IBGP 35-15 ip igmp profile command internal neighbors, BGP 35-46 Internet Control Message Protocol Internet Group Management Protocol See IGMP 24-25 IP information assigned manually See ICMP 35-75 3-10 through DHCP-based autoconfiguration default configuration 3-3 3-3 Internet Protocol version 6 See IPv6 Catalyst 3750 Switch Software Configuration Guide IN-20 OL-8550-01 Index IP multicast routing IP multicast routing (continued) addresses all-hosts MBONE deleting sdr cache entries 40-3 all-multicast-routers described 40-3 host group address range administratively-scoped boundaries, described and IGMP snooping 40-35 40-51 enabling sdr listener support 40-34 limiting DVMRP routes advertised 24-2 Auto-RP limiting sdr cache entry lifetime adding to an existing sparse-mode cloud benefits of 40-5 preventing candidate RP spoofing 40-17 preventing join messages to false RPs setting up in a new internetwork 40-16 40-14 packet rate loss 40-51 peering devices 40-51 tracing a path 40-51 multicast forwarding, described configuring candidate RPs deleting 40-20 40-2 defining the PIM domain border 40-19 40-18 40-50 RP assigning manually 40-12 configuring Auto-RP 40-5 using with Auto-RP 40-22 Cisco implementation 40-2 40-6 40-50 displaying 40-21 defining the IP multicast boundary 40-14 configuring PIMv2 BSR basic multicast routing IP multicast boundary default configuration 40-10 40-35 40-9 40-18 monitoring mapping information using Auto-RP and BSR configuring 40-9 routing table 40-10 configuring candidate BSRs 40-6 PIMv1 and PIMv2 interoperability reverse path check (RPF) bootstrap router overview 40-17 protocol interaction 40-22 configuration guidelines 40-23 40-22 stacking stack master functions stack member functions 40-8 40-8 statistics, displaying system and network enabling multicast forwarding PIM mode 40-12 group-to-RP mappings Auto-RP 40-5 40-11 40-33 monitoring 40-10 filtering incoming RP announcement messages using with BSR 40-34 Session Directory (sdr) tool, described 40-50 configuration guidelines overview 40-45 SAP packets for conference session announcement 40-33 40-15 40-14 clearing the cache BSR 40-33 displaying sdr cache 40-3 40-50 40-50 See also CGMP See also DVMRP See also IGMP See also PIM 40-5 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-21 Index IP phones IP source guard (continued) and QoS filtering 15-1 automatic classification and queueing configuring 33-20 ensuring port security with QoS trusted boundary for QoS 33-39 33-62 adding 22-18 IP traceroute 1-11 IP routes, monitoring 35-88 IP routing executing 43-18 overview 43-17 IP unicast routing connecting interfaces with 11-10 address resolution 35-9 disabling 35-19 administrative distances enabling 35-19 ARP IP services image and 802.1x and DHCP snooping and EtherChannels and port security 22-16 35-17 35-14 storms 22-17 35-14 classless routing 22-17 22-17 35-76 default addressing configuration 22-17 binding configuration 22-16 22-16 22-16 configuration guidelines default configuration 22-17 22-17 gateways 35-12 networks 35-78 routes 35-78 routing 35-3 directed broadcasts disabling 22-16 dynamic routing disabling 22-18 enabling displaying 35-6 35-15 35-19 described 35-3 35-19 EtherChannel Layer 3 interface IGP 22-19 configuration enabling 35-8 configuring static routes 22-17 and trunk interfaces bindings 35-87 35-16 packets 22-17 and TCAM entries address flooding 22-17 and private VLANs binding table 35-7 broadcast 22-17 automatic 35-10 authentication keys and routed ports 35-77, 35-86 assigning IP addresses to Layer 3 interfaces 1-1 IP source guard manual 22-16 22-18 deleting 32-12 and VRF 22-16 static bindings 33-2 IP protocols routing source IP address filtering 22-16 source IP and MAC address filtering 33-39 IP-precedence-to-DSCP map for QoS in ACLs 22-16 source IP and MAC address 15-4 IP precedence source IP address 22-19 35-5 35-25 inter-VLAN 35-2 22-18 Catalyst 3750 Switch Software Configuration Guide IN-22 OL-8550-01 Index IP unicast routing (continued) IPv6 IP addressing classes ACLs 35-6 configuring IPv6 IRDP 35-5 limitations 38-3 port 35-13 Layer 3 interfaces passive interfaces 35-9 router protocols 38-2 addresses distance-vector dynamic proxy ARP advantages 35-10 applications reverse address resolution 35-9 static routing subnet mask 36-11 autoconfiguration 36-5 36-15 default configuration 35-5 defined 35-7 36-7 features not supported ICMP 35-5 ICMP rate limiting See also EIGRP monitoring See also OSPF neighbor discovery See also RIP OSPF IPv4 ACLs 36-15 36-22 36-4 36-20 path MTU discovery applying to interfaces extended, creating reasons for 32-20 RIP 32-11 standard, creating IPv4 and IPv6 differences 8-2, 36-8, 37-1, 38-1 36-13 supported features 36-3 switch limitations 36-7 IPv6 traffic, filtering 36-2 dual protocol stacks 36-18 stack master functions 32-10 configuring on an interface 36-4 36-1 SDM templates 32-15 36-6 36-4 See also BGP named 36-11 36-11 feature limitations 35-16 36-16 36-1 enabling 35-7 35-8 with SVIs 36-5 configuring static routes 35-3 steps to configure 36-7 assigning address CEFv6 35-5 36-2 36-2 and switch stacks 35-79 subnet zero 36-2 35-3 redistribution routed ports 38-2 address formats 35-3 35-3 link-state 38-2 supported 35-85 38-3 38-2 precedence 35-5 MAC address and IP address UDP 38-9 matching criteria 36-3 supernet displaying 36-8 38-4 36-6 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-23 Index IRDP Kerberos (continued) configuring terms 35-13 definition TGT 35-13 support for 9-33 9-34 tickets 1-11 ISL 9-32 key distribution center and IPv6 See KDC 36-3 and trunk ports encapsulation 11-3 1-7, 13-16 trunking with IEEE 802.1 tunneling isolated port 17-5 16-2 isolated VLANs L l2protocol-tunnel command 16-2, 16-3 17-13 LACP Layer 2 protocol tunneling 17-9 See EtherChannel J Layer 2 frames, classification with CoS join messages, IGMP Layer 2 interfaces, default configuration 24-3 33-2 11-16 Layer 2 protocol tunneling configuring K 17-10 configuring for EtherChannels default configuration KDC described defined 9-32 keepalive messages authenticating to KDC cryptographic software image KDC 43-16 43-16 multicast traffic 43-17 9-32 unicast traffic Layer 3 features 43-17 43-16 usage guidelines 9-32 43-16 43-16 multiple devices on a port 9-32 operation 43-16 MAC addresses and VLANs 9-32 9-32 described and CDP IP addresses and subnets 9-35 9-35 credentials 43-17 described configuration examples configuring and ARP broadcast traffic 9-34 9-34 network services 17-12 Layer 2 traceroute 18-2 Kerberos boundary switch 17-11 17-8 guidelines See also Kerberos 17-14 43-16 1-11 Layer 3 interfaces 9-34 realm 9-33 assigning IP addresses to server 9-33 assigning IPv4 and IPv6 addresses to support for assigning IPv6 addresses to 1-9 switch as trusted third party 35-7 9-32 changing from Layer 2 mode types of 36-13 36-12 35-7 35-5 Catalyst 3750 Switch Software Configuration Guide IN-24 OL-8550-01 Index Layer 3 packets, classification methods LDAP 33-2 M 4-2 MAC addresses LEDs, switch aging time See hardware installation guide and VLAN association lightweight directory access protocol line configuration mode default configuration 2-3 discovering Link Aggregation Control Protocol displaying See EtherChannel detecting unidirectional 7-21 7-27 7-27 learning 36-3 in ACLs See Flex Links link-state protocols adding 35-3 39-3 logging messages, ACL 7-26 removing 7-25 configuration guidelines configuring 9-23 with TACACS+ 7-17 log messages 21-4 21-6 default configuration 9-14 description 21-2 monitoring 21-8 21-4 MAC address-to-VLAN mapping See system message logging Long-Reach Ethernet (LRE) technology 1-12 MAC address-table move update 32-9 login authentication login banners dropping 7-24 MAC address notification, support for 28-2 with RADIUS 7-26 characteristics of 34-23 local SPAN 35-9 7-25 allowing 34-25 load balancing 32-27 static 35-30 link-state tracking described 7-22 IP address association 27-1 link state advertisements (LSAs) configuring 7-20 removing link redundancy links, unidirectional 22-19 dynamic 19-8 link local unicast addresses 1-17, 1-25 described 20-11 10-24 MAC extended access lists 1-7 LRE profiles, considerations in switch clusters 10-38 10-18 guidelines 20-18 13-28 MAC authentication bypass configuring loop guard support for 7-20 displaying in the IP source binding table Link Failure enabling 7-20 building the address table See LDAP described 7-21 6-17 applying to Layer 2 interfaces configuring for QoS creating 32-27 defined 32-27 for QoS classification 32-29 33-46 33-5 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-25 Index macros maximum aging time See Smartports macros magic packet MSTP STP 10-18 manageability features maximum-paths command in-band CLI session 35-50, 35-76 SNMP automatic discovery 1-6 defined 1-6 1-6 out-of-band console port connection 1-6 management options 6-2 managing 6-18 passwords 6-14 requirements 4-1 Network Assistant to users through banners metrics, in BGP considerations in switch clusters 35-51 metro tags 35-82 17-2 39-3 MIBs configuring CoS-to-DSCP accessing files with FTP 33-61 location of files 33-61 DSCP-to-CoS overview 33-64 DSCP-to-DSCP-mutation IP-precedence-to-DSCP policed-DSCP 33-65 33-62 33-49 action with aggregate policers 33-59 31-1 SNMP interaction with supported 31-4 A-1 mirroring traffic for analysis 28-1 mismatches, autonegotiation 43-12 module number 11-11 monitoring 33-4, 33-8 access groups matching BGP 38-3 matching, IPv4 ACLs A-4 See POP 33-12 action in policy map A-4 mini-point-of-presence 33-63 marking IPv6 ACLs 6-8 MHSRP mapping tables for QoS 7-17 metric translations, between routing protocols 6-8 discovery through different management VLANs described 7-17 messages, to users through banners 1-3 management VLAN described 6-4 messages 1-2 1-5 switch stacks 43-12 See also candidate switch, cluster standby group, and standby command switch 1-3 overview 6-5 recovering from lost connectivity 2-1 clustering 13-3 member switch 1-6 device manager DSCP 19-24 membership mode, VLAN port browser session CNS 18-23 maximum hop count, MSTP 1-5 management access CLI 19-24 32-8 32-41 35-62 cables for unidirectional links CDP 26-5 CEF 35-75 27-1 Catalyst 3750 Switch Software Configuration Guide IN-26 OL-8550-01 Index monitoring (continued) EIGRP monitoring (continued) VLAN 35-41 fallback bridging features filters 42-11 1-12 Flex Links HSRP 21-8 IEEE 802.1Q tunneling 13-16 13-33 14-16 benefits of 24-29 snooping interfaces 35-18 multicast routing 41-12 originated by switch 41-9 41-14 default configuration IPv4 ACL configuration 41-4 dense-mode regions 32-41 sending SA messages to 36-22 IPv6 ACL configuration incoming SA messages 21-8 multi-VRF CE 41-14 SA messages to a peer 41-19 multicast router interfaces 41-12 SA requests from a peer 24-17, 37-12 join latency, defined 35-74 41-11 41-6 meshed groups 24-24 network traffic for analysis with probe 28-2 configuring defined 35-34 port 41-16 41-16 originating address, changing blocking overview 25-17 protection 41-2 peers 16-15 RP mapping information 41-18 41-1 peer-RPF flooding 25-17 private VLANs configuring a default 40-23 monitoring 11-30, 43-14 41-4 41-19 source-active messages 41-19 peering relationship, overview speed and duplex mode 11-20 requesting source information from traffic flowing among switches traffic suppression tunneling 41-18 filtering 17-18 MAC address-table move update 41-17 specifying the originating address 38-9 Layer 2 protocol tunneling SFP status forwarded by switch received by switch 40-49 35-88 MSDP peers 41-19 controlling source information 11-29 address tables routes 41-3 clearing MSDP connections and statistics 24-16, 37-11 IP OSPF VLANs MSDP filters MVR 32-42 VTP 17-18 IGMP IPv6 maps VMPS 39-11 32-42 29-1 shutting down 41-1 41-8 41-16 25-17 17-18 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-27 Index MDSP (continued) MSTP (continued) source-active messages caching CST defined 41-6 clearing cache entries defined operations between regions 41-19 default configuration 41-2 filtering from a peer filtering incoming displaying status described 41-19 support for 41-9 19-16 20-10 enabling 20-17 extended system ID 1-11 effects on root switch MSTP boundary ports unexpected behavior 19-16 implementation described 20-3 enabling 20-14 terminology enabling 20-13 CIST, described described 19-3 19-15, 20-12 master 19-23 19-3 19-3 operations within a region 19-22 link type for rapid convergence maximum aging time maximum hop count 19-24 19-24 19-24 19-26 IST defined configuring forward-delay time 18-11 19-9 restarting migration process 19-3 loop guard described enabling 20-11 20-18 mapping VLANs to MST instance 19-16 neighbor type 20-2 interoperability with IEEE 802.1D 19-3 configuration guidelines path cost 18-10 interoperability and compatibility among modes 19-5 MST region 19-7 interface state, blocking to forwarding CIST regional root hello time 19-6 19-5 instances supported 20-2 19-18 port role naming change BPDU guard described 19-19 IEEE 802.1s 19-6 BPDU filtering CIST root 19-17 effects on secondary root switch configuration guidelines described 20-12 EtherChannel guard 41-14 restricting advertised sources 19-15 19-26 enabling the mode 41-12 limiting data with TTL 19-4 default optional feature configuration 41-11 41-14 filtering to a peer monitoring 19-3 19-16 19-25 19-21 port priority root switch 19-20 19-17 secondary root switch switch priority 19-19 19-22 Catalyst 3750 Switch Software Configuration Guide IN-28 OL-8550-01 Index MSTP (continued) multicast storm-control command MST region CIST multicast television application multicast VLAN 19-3 configuring described 24-18 See MVR 19-2 Multiple HSRP 19-5 See MHSRP 19-3 supported spanning-tree instances optional features supported overview 24-19 Multicast VLAN Registration 19-16 hop-count mechanism IST 25-4 19-2 1-7 multiple VPN routing/forwarding in customer edge devices See multi-VRF CE 19-2 multi-VRF CE Port Fast described 20-2 enabling 20-12 configuration example configuration guidelines preventing root switch selection 20-10 configuring enabling defined 20-10 35-74 monitoring root switch configuring effects of extended system ID 19-17 status, displaying and address aliasing 19-8 and IGMPv3 19-26 leaving 24-5 24-21 24-21 configuring interfaces 24-6 default configuration 24-3 static joins 1-11 configuration guidelines Immediate Leave described in the switch stack multicast packets 32-40 blocking 25-7 modes multicast router ports, adding 24-17, 37-12 24-10, 37-8 Multicast Source Discovery Protocol 24-22 24-20 24-19 24-20 24-22 monitoring multicast router interfaces, monitoring 24-21 24-18 example application 24-11, 37-8 ACLs on 35-65 MVR 20-2 multicast groups joining 35-66 packet-forwarding process support for 19-18 shutdown Port Fast-enabled port stack changes, effects of 35-74 network components 19-18 unexpected behavior 35-66 35-63 displaying 20-17 35-67 35-66 default configuration root guard described 35-70 24-24 multicast television application setting global parameters support for 24-19 24-21 1-4 See MSDP multicast storm 25-1 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-29 Index network configuration examples N cost-effective wiring closet NAC high-performance wiring closet AAA down policy 1-9 critical authentication 10-15, 10-36 large network IEEE 802.1x validation using a RADIUS server inaccessible authentication bypass Layer 2 IEEE 802.1x validation Layer 2 IEEE802.1x validation Layer 2 IP validation named IPv4 ACLs 1-23 multidwelling network 10-39 1-9, 10-36 1-9, 10-39 10-20 1-9 1-26 1-25 providing network services 1-17 redundant Gigabit backbone 1-19 server aggregation and Linux server cluster small to medium-sized network 1-19 1-21 network design 32-15 performance services See NSM 1-16 1-17 network management native VLAN CDP and IEEE 802.1Q tunneling configuring 17-4 26-1 RMON 13-23 SNMP 13-23 29-1 31-1 Network Time Protocol neighbor discovery, IPv6 36-4 neighbor discovery/recovery, EIGRP neighbors, BGP See NTP 35-35 35-57 no commands 2-4 nonhierarchical policy maps Network Admission Control configuration guidelines see NAC configuring Network Assistant described 1-2 described guide mode 1-3 management options 13-18 normal-range VLANs configuration modes 5-2, 5-16 xliv upgrading a switch 32-27 13-4 configuration guidelines 1-2 managing switch stacks requirements 33-9 nontrunking mode 1-3 33-33 33-49 non-IP traffic filtering 1-5 downloading image files wizards 1-16 long-distance, high-bandwidth transport NameSpace Mapper benefits 1-18 increasing network performance IEEE 802.1x authentication using a RADIUS server 10-39 default 1-17 configuring defined B-19 1-3 13-6 13-7 13-4 13-1 no switchport command note, described 11-4 xliv not-so-stubby areas See NSSA NSM 4-3 NSSA, OSPF 35-30 Catalyst 3750 Switch Software Configuration Guide IN-30 OL-8550-01 Index NTP OSFP (continued) associations default configuration authenticating defined metrics 7-4 route 7-2 enabling broadcast messages peer 7-6 7-5 server default configuration 35-26 described 35-25 36-20 LSA group pacing 7-11 monitoring 7-2 restricting access disabling NTP services per interface source IP address, configuring 35-33 35-33 route summarization 7-8 support for 7-10 35-31 out-of-profile markdown 7-2 support for 35-31 1-11 virtual links 7-10 1-10 1-6 synchronizing devices 7-5 P time 7-2 packet modification, with QoS synchronizing 7-2 17-9 See EtherChannel O parallel paths, in routing tables offline configuration for switch stacks understanding 35-85 35-31 passwords 44-3 44-1 Open Shortest Path First See OSPF default configuration 9-2 disabling recovery of 9-5 encrypting optimizing system resources options, management 35-76 passive interfaces OSPF 44-1 running tests 5-7 configuring online diagnostics 8-1 for security in clusters 1-5 OSPF overview area parameters, configuring configuring 33-20 PAgP Layer 2 protocol tunneling overview 35-28 35-34 router IDs creating an access group services settings interface parameters, configuring 7-4 displaying the configuration stratum 35-31 for IPv6 7-5 overview 35-31 35-30 recovery of 9-3 1-8 6-15 9-1 43-3 35-28 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-31 Index passwords (continued) PIM (continued) setting sparse mode enable join messages and shared tree 9-3 enable secret Telnet overview 9-3 with usernames VTP domain RPF lookups 9-6 support for 14-8 path cost MSTP STP 40-4 prune messages 9-6 40-4 40-5 40-7 1-11 versions interoperability 19-21 troubleshooting interoperability problems 18-20 path MTU discovery v2 improvements 36-4 PBR defined enabling character output description 35-83 local policy-based routing 35-84 35-84 PC (passive command switch) executing 43-15 overview 43-14 auto mode performance, network design performance features 11-8 CDP with power consumption, described 1-16 CDP with power negotiation, described 1-4 persistent self-signed certificate Cisco intelligent power management 9-43 per-VLAN spanning-tree plus configuring See PVST+ power budgeting 11-7 11-23 powered-device detection and initial power allocation 11-7 40-4 rendezvous point (RP), described power management modes 40-4 11-8 power negotiation extensions to CDP 40-7 displaying neighbors enabling a mode 11-7 11-23 power consumption 40-9 dense mode RPF lookups 11-7 11-6 IEEE power classification levels PIM overview 11-7 high-power devices operating in low-power mode 35-69 11-2 default configuration 11-7 11-22 devices supported PE to CE routing, configuring 43-15 PoE 6-11 35-57 physical ports 24-9 ping 35-82 peers, BGP 40-23 40-4 PIM-DVMRP, as snooping method fast-switched policy-based routing overview 40-9 standards supported 40-50 static mode 40-12 11-7 11-9 supported watts per port 40-3 router-query message interval, modifying 40-26 shared tree and source tree, overview 40-23 shortest path tree, delaying the use of 40-25 11-7 troubleshooting 11-6 43-12 policed-DSCP map for QoS 33-63 Catalyst 3750 Switch Software Configuration Guide IN-32 OL-8550-01 Index port-based authentication policers accounting configuring for each matched traffic class 33-49 for more than one traffic class 33-59 described 10-9 authentication server defined 10-2 RADIUS server 33-4 10-2 displaying 33-79 client, defined number of 33-34 configuration guidelines types of 10-2 configuring 33-9 802.1x authentication policing described guest VLAN 33-4 hierarchical host mode See hierarchical policy maps token-bucket algorithm 33-9 policy-based routing 10-33 10-28 inaccessible authentication bypass policy maps for QoS described 10-34 switch-to-client retransmission time 33-8 default configuration 33-33 described 10-2 displaying statistics 10-41 nonhierarchical on physical ports EAPOL-start frame 10-5 configuring described POP 33-49 33-9 10-30 10-21 33-11 33-33 10-31 10-1 device roles 33-53 configuration guidelines 10-26 switch-to-client frame-retransmission number hierarchical on SVIs configuring 10-27 restricted VLAN configuration guidelines 10-28 RADIUS server parameters on the switch 33-49 33-80 hierarchical 10-29 10-29 RADIUS server 33-7 displaying 10-36 manual re-authentication of a client quiet period characteristics of 10-25 periodic re-authentication See PBR described 10-22 EAP-request/identity frame EAP-response/identity frame encapsulation 10-5 10-5 10-3 guest VLAN 1-25 configuration guidelines port ACLs defined 32-2 types of 32-3 Port Aggregation Protocol See EtherChannel described host mode 10-13, 10-14 10-13 10-8 inaccessible authentication bypass configuring described guidelines 10-36 10-15 10-24 initiation and message exchange 10-5 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-33 Index port-based authentication (continued) port-based authentication (continued) MAC authentication bypass configuring described voice VLAN described 10-38 10-18 guidelines 10-24 magic packet method lists 10-16 VVID 10-16 port blocking multiple-hosts mode, described 10-8 AAA authorization 10-25 configuration tasks 10-12 1-4, 25-6 port-channel Port Fast 10-11 RADIUS server attributes described 20-2 enabling 20-12 mode, spanning tree 10-12 ports support for authorization state and dot1x port-control command 10-7 authorized and unauthorized 10-7 10-15 10-16 1-7 port priority MSTP 19-20 18-18 10-Gigabit Ethernet module and voice VLAN described 10-18 access 10-17 interactions 25-6 dynamic access multiple-hosts mode 10-9 resetting to default values stack changes, effects of protected 10-8 10-41 switch 10-3 upgrading from a previous release 10-24, 33-26 VLAN assignment routed 11-4 secure 25-7 13-3, 13-11 switch 11-2 trunks 13-3, 13-16 VLAN assignments 13-11 port security AAA authorization characteristics 13-4 25-5 static-access 10-3 RADIUS client 13-3 IEEE 802.1Q tunnel 10-40 11-6 11-3 blocking 10-17 statistics, displaying 13-3 ports port security 10-25 10-11 configuration tasks described 13-29 port membership modes, VLAN STP voice VLAN as proxy 10-18 See EtherChannel per-user ACLs critical PVID wake-on-LAN, described 10-18 10-25 described 10-16 aging 25-15 and QoS trusted boundary 10-11 10-10 and stacking configuring 25-16 25-12 default configuration described displaying 33-39 25-10 25-7 25-17 Catalyst 3750 Switch Software Configuration Guide IN-34 OL-8550-01 Index port security (continued) on trunk ports 25-13 sticky learning 25-8 violations private VLANs (continued) isolated VLANs mapping with other features 16-15 ports 25-10 port-shutdown response, VMPS 13-28 Power over Ethernet community 16-2 configuration guidelines See PoE configuring host ports preemption 16-8 16-12 configuring promiscuous ports default configuration described 21-4 preemption delay preferential treatment of traffic 35-54 preventing unauthorized access primary links 9-1 16-1, 16-3 promiscuous ports 16-2 secondary VLANs 16-2 subdomains traffic in 21-2 primary VLANs 16-2 primary VLANs See QoS prefix lists, BGP 16-2 promiscuous 21-4 16-1 16-5 privileged EXEC mode 16-1, 16-3 priority 16-13 13-4 isolated default configuration HSRP 16-14 monitoring 25-9 16-2, 16-3 2-2 privilege levels changing the default for lines 39-7 overriding CoS trusting CoS command switch 15-6 exiting 15-6 private VLAN edge ports overview across multiple switches and SDM template 16-4 community ports 16-2, 16-3 configuration guidelines 16-7, 16-8 16-6 16-7 end station access to 16-3 16-3 16-2 1-8, 25-5 35-35 Protocol-Independent Multicast Protocol See PIM provider edge devices 35-64 provisioning new members for a switch stack 16-10 default configuration isolated port 16-2 protocol-dependent modules, EIGRP 16-2 configuration tasks 9-8 16-13 protected ports community VLANs IP addressing setting a command with defined 16-6 16-1 configuring 9-2, 9-7 configuring and switch stacks 6-19 promiscuous ports 16-4 16-5 benefits of 9-9 mapping on member switches private VLANs and SVIs 6-19 9-9 logging into See protected ports 9-9 5-7 proxy ARP configuring definition 35-12 35-10 with IP routing disabled 35-12 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-35 Index pruning, VTP QoS (continued) disabling classification in VTP domain on a port class maps, described 14-14 defined 13-23 enabling 33-4 DSCP transparency, described in VTP domain on a port flowchart 14-14 13-23 forwarding treatment 33-3 33-3 14-5 in frames and packets overview 14-4 IP ACLs, described pruning-eligible list changing for VTP pruning options for IP traffic 33-5 policy maps, described PVST+ 18-10 IEEE 802.1Q trunking interoperability instances supported 33-5, 33-7 options for non-IP traffic 14-5 14-14 described 33-5, 33-7 MAC ACLs, described 13-23 18-11 33-40 33-6 examples VLANs 33-7 33-5 33-7 trust DSCP, described 33-5 trusted CoS, described 33-5 trust IP precedence, described 33-5 class maps 18-10 configuring 33-47 displaying Q 33-79 configuration guidelines auto-QoS QoS and MQC commands 33-25 standard QoS 33-1 33-33 configuring auto-QoS categorizing traffic aggregate policers 33-21 configuration and defaults display configuration guidelines 33-30 auto-QoS 33-59 33-20 default port CoS value 33-25 described 33-20 DSCP maps disabling 33-27 DSCP transparency displaying generated commands 33-27 displaying the initial configuration effects on running configuration egress queue defaults enabling for VoIP 33-30 33-25 33-21 33-26 33-38 33-61 33-40 DSCP trust states bordering another domain egress queue characteristics 33-45 IP standard ACLs 33-44 example configuration 33-28 MAC ACLs ingress queue defaults 33-21 policy maps, hierarchical list of generated commands basic model 33-22 33-4 33-71 ingress queue characteristics IP extended ACLs 33-41 33-67 33-46 33-53 policy maps on physical ports 33-49 port trust states within the domain trusted boundary 33-37 33-39 default auto configuration 33-21 Catalyst 3750 Switch Software Configuration Guide IN-36 OL-8550-01 Index QoS (continued) QoS (continued) default standard configuration IP phones 33-31 displaying statistics 33-79 automatic classification and queueing DSCP transparency 33-40 detection and trusted settings egress queues CoS-to-DSCP 33-18 configuring shaped weights for SRR 33-76 displaying configuring shared weights for SRR 33-77 DSCP-to-CoS flowchart 33-64 policed-DSCP 33-17 scheduling, described WTD, described enabling globally types of 33-74 overview 33-19 flowcharts 33-51, 33-56 33-4, 33-8 33-2 packet modification 33-35 33-62 33-12 marking, described 33-72 33-65 33-63 marked-down actions 33-4 setting WTD thresholds 33-20 policers classification configuring 33-6 egress queueing and scheduling ingress queueing and scheduling policing and marking implicit deny described 33-17 33-15 33-10 33-8 33-79 number of 33-34 33-9 policies, attaching to an interface allocating bandwidth described 33-69 buffer and bandwidth allocation, described configuring shared weights for SRR configuring the priority queue 33-70 33-69 33-16 33-68 33-4, 33-8 token bucket algorithm characteristics of hierarchical 33-49 33-80 33-8 hierarchical on SVIs 33-15 mapping DSCP or CoS values priority queue, described scheduling, described setting WTD thresholds 33-16 33-68 33-9 policy maps displaying 33-4 displaying the threshold map 33-8 policing 33-69 allocating buffer space WTD, described 33-51, 33-56, 33-59 displaying types of 33-7 ingress queues flowchart 33-79 IP-precedence-to-DSCP 33-75 mapping DSCP or CoS values described 33-61 DSCP-to-DSCP-mutation 33-4 displaying the threshold map 33-78 mapping tables 33-72 buffer allocation scheme, described described 33-20, 33-39 limiting bandwidth on egress interface allocating buffer space 33-20 33-53 nonhierarchical on physical ports QoS label, defined 33-49 33-4 33-4 33-68 33-16 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-37 Index QoS (continued) RADIUS (continued) queues method list, defined configuring egress characteristics 33-71 configuring ingress characteristics high priority (expedite) location of 33-19, 33-78 9-19 9-18 suggested network environments macro 11-14 of interfaces 1-9 trust states 11-13 rapid convergence bordering another domain 33-41 19-10 rapid per-VLAN spanning-tree plus See rapid PVST+ 33-5 trusted device rapid PVST+ 33-39 within the domain described 33-37 quality of service 18-10 IEEE 802.1Q trunking interoperability See QoS instances supported queries, IGMP 9-28 range 33-13 33-20 described 9-18 1-9 tracking services accessed by user 33-14 WTD, described support for overview support for 33-13 SRR, described rewrites 33-67 operation of 9-20 18-11 18-10 Rapid Spanning Tree Protocol 24-4 query solicitation, IGMP See RSTP 24-13 RARP 35-10 rcommand command R 6-18 RCP configuration files RADIUS downloading attributes vendor-proprietary vendor-specific overview 9-30 uploading authorization B-16 B-18 image files 9-28 authentication B-15 preparing the server 9-29 configuring accounting B-17 deleting old image 9-23 downloading 9-27 communication, global 9-21, 9-29 communication, per-server 9-20, 9-21 B-32 B-30 preparing the server uploading B-29 B-32 multiple UDP ports 9-21 reconfirmation interval, VMPS, changing default configuration 9-20 reconfirming dynamic VLAN membership defining AAA server groups 9-25 displaying the configuration 9-31 identifying the server in clusters recovery procedures 13-32 13-31 43-1 9-20 6-17 limiting the services to the user 9-27 Catalyst 3750 Switch Software Configuration Guide IN-38 OL-8550-01 Index redundancy restricting access EtherChannel HSRP NTP services 34-3 overview 39-1 STP 7-8 9-1 passwords and privilege levels backbone RADIUS 18-9 multidrop backbone path cost reverse address resolution 13-24 redundant links and UplinkFast 35-35 See RADIUS See RARP 1058, RIP 35-20 1112, IP multicast and IGMP Remote Copy Protocol 1157, SNMPv1 See RCP 1163, BGP Remote Network Monitoring 35-42 1166, IP addresses 1253, OSPF Remote SPAN 1267, BGP 35-42 See RSPAN 1305, NTP 7-2 28-3 report suppression, IGMP 1587, NSSAs 35-25 1757, RMON 29-2 24-6 1771, BGP disabling 24-16, 37-11 1901, SNMPv2C 31-2 31-2 2236, IP multicast and IGMP device manager advertisements 32-15 31-2 35-20 authentication 35-49 resetting a UDLD-shutdown interface restricted VLAN 27-6 configuring 35-23 35-21 default configuration described 10-34 for IPv6 10-14 using with IEEE 802.1x 24-2 RIP xliv resequencing ACL entries resets, in BGP 2273-2275, SNMPv3 xliv Network Assistant described 35-42 1902 to 1907, SNMPv2 xlv configuring 35-6 35-25 described requirements 24-2 31-2 See RMON cluster 35-9 RFC 3-16 Remote Authentication Dial-In User Service remote SPAN 13-32 Reverse Address Resolution Protocol 20-15 reliable transport protocol, EIGRP reloading software 9-10 retry count, VMPS, changing 13-26 port priority 9-17 TACACS+ 20-5 9-2 10-14 35-20 35-20 36-18 hop counts split horizon 35-20 35-23 summary addresses support for 35-23 1-11 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-39 Index RMON routing default configuration displaying status default 29-3 dynamic 29-6 enabling alarms and events groups supported overview 35-3 29-3 redistribution of information static 29-2 35-3 35-3 routing domain confederation, BGP 29-1 statistics collecting group history support for 29-5 29-5 See RIP routing protocol administrative distances RSPAN 1-12 root guard characteristics 20-10 enabling support for 28-10 28-9 configuration guidelines 20-17 default configuration 1-7 destination ports 28-8 MSTP displaying status 28-25 in a switch stack 28-2 18-16 route calculation timers, OSPF route dampening, BGP 35-31 routed packets, ACLs on 32-40 routed ports in switch clusters IP addresses on 28-5 session limits 11-4 28-11 sessions 6-9 11-26, 35-5 route-map command 28-8 1-12, 28-1 received traffic 35-5 28-9 28-6 monitoring ports overview configuring 35-84 route maps BGP interaction with other features monitored ports 35-61 28-17 28-11 root switch 19-17 35-77 28-3 and stack changes described defined 35-59 Routing Information Protocol collecting group Ethernet STP 35-79 creating 28-18 defined 28-4 limiting source traffic to specific VLANs 35-52 policy-based routing 35-82 router ACLs specifying monitored ports 28-18 with ingress traffic enabled 28-22 source ports 28-6 defined 32-2 transmitted traffic types of 32-4 VLAN-based route reflectors, BGP router ID, OSPF route targets, VPN 28-7 active topology 19-10 BPDU 35-50 route summarization, OSPF 28-6 RSTP 35-60 35-33 route selection, BGP 28-24 35-31 35-66 format 19-12 processing 19-13 designated port, defined designated switch, defined 19-9 19-9 Catalyst 3750 Switch Software Configuration Guide IN-40 OL-8550-01 Index RSTP (continued) secure HTTP client interoperability with IEEE 802.1D described displaying 19-9 restarting migration process topology changes overview configuring 9-47 9-48 secure HTTP server 19-26 configuring 19-13 displaying 19-9 port roles 9-46 9-48 secure MAC addresses described and switch stacks 19-9 synchronized deleting 19-11 proposal-agreement handshake process rapid convergence edge ports and Port Fast point-to-point links 19-10 19-10, 19-24 secure ports configuring 25-16 25-7 secure remote connections 9-38 Secure Shell 19-10 root port, defined 25-9 25-8 and switch stacks 19-10 root ports 19-11 25-14 maximum number of types of cross-stack rapid convergence described 19-10 25-17 See SSH 19-9 Secure Socket Layer See also MSTP running configuration, saving 3-10 See SSL security, port 25-7 security features S 1-8 sequence numbers in log messages SC (standby command switch) scheduled reloads 6-11 19-1 service-provider networks described and customer VLANs 8-1 switch stack consideration 5-10 17-2 and IEEE 802.1Q tunneling Layer 2 protocols across templates configuring number of set-request operation 8-1 5-10, 8-4 setup program 43-10 43-9 severity levels, defining in system messages 30-9 SFPs 8-5 monitoring status of 8-1 dual IPv4 and IPv6 8-2 numbering of 11-30, 43-14 11-11 security and identification 8-1 secondary VLANs 8-5 17-9 31-5 replacing failed command switch 8-1 configuration guidelines configuring 17-8 failed command switch replacement SDM template aggregator 17-1 Layer 2 protocol tunneling for EtherChannels 8-6 SDM mismatch mode types of 14-3 service-provider network, MSTP and RSTP 3-16 SDM desktop server mode, VTP 30-8 16-2 status, displaying 43-13 43-14 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-41 Index shaped round robin SNMP See SRR accessing MIB variables with show access-lists hw-summary command 32-22 show and more command output, filtering 2-10 show cdp traffic command show configuration command show forward command agent 26-5 show cluster members command described 31-4 disabling 31-8 authentication level 6-18 31-11 community strings 11-25 configuring 43-22 31-8 show interfaces command 11-20, 11-25 for cluster switches show l2protocol command 17-13, 17-15, 17-16 overview show platform forward command engine ID groups 11-25 shutdown command on interfaces host 11-31 shutdown threshold for Layer 2 protocol packets 17-11 Simple Network Management Protocol See SNMP Smartports macros applying macros 12-6 creating 12-5, 12-7 12-3 ifIndex values 31-6 in-band management 12-2 12-1 displaying 1-6 6-15 31-12 31-5 differences from traps disabling 31-15 enabling 31-15 12-8 31-16 limiting system log messages to NMS 30-10 1-5, 31-3 managing clusters with 6-19 MIBs location of 12-3 supported 12-2 notifications overview 26-1 31-5 limiting access by TFTP servers manager functions 12-4 default configuration SNAP 12-5, 12-6 12-5 configuration guidelines website 31-7 described applying parameter values tracing 31-7, 31-10 and trap keyword applying global parameter values 31-7 informs See SFPs applying Cisco-default macros 31-16 31-7 in clusters small form-factor pluggable modules defined 31-4 default configuration 32-20, 32-21, 32-32, 32-34 interface description in 31-4 configuration examples 43-22 show running-config command displaying ACLs 31-4 A-4 A-1 31-5 31-1, 31-4 security levels 31-3 status, displaying 31-17 system contact and location trap manager, configuring 31-15 31-14 Catalyst 3750 Switch Software Configuration Guide IN-42 OL-8550-01 Index SNMP (continued) SPAN (continued) traps monitored ports described 28-6 monitoring ports 31-3, 31-5 differences from informs overview 31-5 1-12, 28-1 disabling 31-15 ports, restrictions enabling 31-12 received traffic enabling MAC address notification overview types of users configuring ingress forwarding 31-12 versions supported SNMPv2C SNMPv3 31-2 creating 28-12 defined 28-4 28-16, 28-23 limiting source traffic to specific VLANs 31-2 removing destination (monitoring) ports 31-2 31-2 snooping, IGMP 24-2 software compatibility specifying monitored ports 28-12 with ingress traffic enabled 28-15 source ports See stacks, switch VLAN-based location in flash recovery procedures 28-7 See STP 3-16 tar file format, described 13-19 Spanning Tree Protocol 43-2 scheduling reloads 28-14 28-6 spanning tree and native VLANs B-20 28-16 28-6 transmitted traffic software images SPAN traffic B-20 See also downloading and uploading 28-5 split horizon, RIP source addresses in IPv6 ACLs 28-11 sessions 31-1, 31-5 31-7, 31-10 SNMPv1 25-11 28-5 session limits 7-22 28-8 35-23 SRR configuring 38-6 source addresses, in IPv4 ACLs 32-12 source-and-destination-IP address based forwarding, EtherChannel 34-9 shared weights on egress queues 33-77 described source-IP address based forwarding, EtherChannel 34-9 34-8 33-14 shared mode 33-14 default configuration configuring 28-11 28-8 displaying status 28-25 interaction with other features 9-39 cryptographic software image 28-11 destination ports 1-10, 1-11 SSH 28-10 configuration guidelines 33-69 33-14 shaped mode support for SPAN and stack changes 33-76 shared weights on ingress queues source-and-destination MAC address forwarding, EtherChannel 34-8 source-MAC address forwarding, EtherChannel shaped weights on egress queues described 1-6, 9-38 encryption methods 28-9 9-37 9-38 switch stack considerations 5-16, 9-38 user authentication methods, supported 9-39 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-43 Index SSL stack master configuration guidelines bridge ID (MAC address) 9-45 configuring a secure HTTP client 9-47 defined 5-1 configuring a secure HTTP server 9-46 election 5-4 cryptographic software image described 9-42 stack member MAC address of accessing CLI of specific member 5-20 stack changes member number IPv6 routing priority value 36-8 stack changes, effects on defined 802.1x port-based authentication ACL configuration EtherChannel 24-7 35-4 IPv6 ACLs 5-15 stack protocol version 5-10 priority value 5-23 8-4 auto-advise auto-copy 31-1 SPAN and RSPAN 28-10 5-21 bridge ID 6-16 30-2 13-6 5-11 5-11 1-2 5-6 CDP considerations 26-2 compatibility, software configuration file 14-6 5-22 5-12 auto-upgrade benefits 18-12 system message log 5-21 provisioning a new member 25-16 SDM template selection switch clusters 11-11 member number 40-8 24-18 port security stack member number assigning information multicast routing VTP 5-22 accessing CLI of specific member 7-21 19-8 VLANs 5-7 stacks, switch 38-3 MAC address tables SNMP priority value See also stacks, switch IGMP snooping MVR 5-23 5-6 replacing 42-3 39-4 MSTP 5-1 provisioning a new member 34-10 fallback bridging 5-21 36-8 number 34-13 5-21 displaying information of IPv6 32-7 cross-stack EtherChannel STP 10-8 26-2 IP routing 5-23 configuring effects on HSRP 5-4 See also stacks, switch 9-48 stack, switch CDP 36-8 re-election 9-42 monitoring IPv6 5-6 5-10 5-14 configuration scenarios 5-17 copying an image file from one member to another default configuration B-33 5-19 Catalyst 3750 Switch Software Configuration Guide IN-44 OL-8550-01 Index stacks, switch (continued) description of system messages hostnames in the display 5-1 displaying information of remotely monitoring 5-23 enabling persistent MAC address timer in clusters 5-14, B-33 36-7 management connectivity 7-21 B-33 automatic upgrades with auto-upgrade described 5-11 examples 5-12 manual upgrades with auto-advise 5-16 StackWise technology, Cisco 5-3 MSTP instances supported described 40-8 configuring considerations offline configuration 5-7 effects of adding a provisioned switch 5-8 defined 6-2 priority 6-11 6-12 effects of removing a provisioned switch 5-9 requirements effects of replacing a provisioned switch 5-9 virtual IP address provisioned configuration, defined provisioned switch, defined 5-7 provisioning a new member 5-22 5-7 6-3 6-12 See also cluster standby group and HSRP standby group, cluster See cluster standby group and HSRP standby ip command 5-3, 43-8 provisioned switch standby links 39-5 21-2 standby router 5-8 39-1 removing 5-9 standby timers, HSRP replacing 5-9 startup configuration replacing a failed member software compatibility stack protocol version 5-15 3-13 specific image 5-10 clearing 5-10 STP 39-9 booting manually 5-10 software image version bridge ID 1-3 standby command switch 18-10 multicast routing, stack master and member roles adding 5-12 See also stacks, switch 5-3 partitioned 5-11 See also stack master and stack member 5-1 membership 5-15 version-mismatch (VM) mode 6-16 managing 7-14 system-wide configuration considerations upgrading MAC address considerations merged 5-10 39-4 incompatible software and image upgrades IPv6 on 30-2 system prompt consideration 5-20 hardware compatibility and SDM mismatch mode HSRP considerations 30-1 3-14 B-19 configuration file automatically downloading 18-3 instances supported root port selection 18-10 18-3 stack root switch election 18-3 3-12 specifying the filename 3-12 default boot configuration 3-12 stateless autoconfiguration 36-5 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-45 Index static access ports STP (continued) assigning to VLAN BPDU filtering 13-11 described 20-3 static addresses disabling 20-15 See addresses enabling 20-14 defined 11-3, 13-3 static IP routing BPDU guard 1-11 static MAC addressing 1-8 static routes configuring 35-76 configuring for IPv6 static routing disabling 20-14 enabling 20-13 hello time 10-41 18-23 18-22 maximum aging time 26-5 interface path cost 11-30 IP multicast routing 18-20 port priority 40-50 root switch 35-34 18-23 18-18 18-16 QoS ingress and egress 33-79 secondary root switch RMON group Ethernet 29-5 spanning-tree mode RMON group history SNMP input and output VTP 18-13, 20-12 configuring 13-2 forward-delay time 802.1x switch priority 29-5 18-21 counters, clearing 18-24 18-24 cross-stack UplinkFast 25-8 storm control configuring 18-18 18-15 transmit hold-count 31-17 14-16 sticky learning 18-3 configuration guidelines 35-3 statistics OSPF 20-2 BPDU message exchange 36-16 static VLAN membership CDP described 25-3 described 20-5 enabling 20-16 described 25-1 default configuration disabling 25-5 default optional feature configuration displaying 25-17 support for 1-4 thresholds 25-1 designated port, defined designated switch, defined disabling 20-4 BackboneFast 20-12 18-4 18-4 detecting indirect link failures STP accelerating root port selection 18-13 20-8 18-16 displaying status 18-24 EtherChannel guard described 20-7 described 20-10 disabling 20-17 disabling 20-17 enabling 20-16 enabling 20-17 Catalyst 3750 Switch Software Configuration Guide IN-46 OL-8550-01 Index STP (continued) STP (continued) extended system ID port priorities effects on root switch preventing root switch selection 18-16 effects on the secondary root switch overview protocols supported 18-18 unexpected behavior features supported described 1-6 IEEE 802.1t and VLAN identifier 20-17 root port, defined 18-9 configuring 18-10 election disabled 18-8 18-16 effects of extended system ID 20-2 interface states 18-7 stack changes, effects of learning 18-7 status, displaying listening 18-7 superior BPDU overview 18-5 timers, described interoperability and compatibility among modes 18-2 Layer 2 protocol tunneling 17-8 limitations with IEEE 802.1Q trunks load sharing overview 20-3 enabling 20-15 VLAN-bridge 7-2 13-26, 13-27 20-2 enabling 20-12 35-40 18-9 1-7 13-28 7-13 SunNet Manager supernet 16-1 35-7 1-5 35-8 SVIs and IP unicast routing and router ACLs described 35-30 35-7 summer time 18-10 18-2 Port Fast 18-11 success response, VMPS 20-18 optional features supported path costs described subnet zero 20-11 multicast addresses, effect of overview UplinkFast subnet mask modes supported 18-22 subdomains, private VLAN 13-24 loop guard enabling 18-12 18-24 stub routing, EIGRP 13-26 20-2 18-3 stub areas, OSPF 13-24 using port priorities described 18-11 18-11 stratum, NTP using path costs 18-16 shutdown Port Fast-enabled port 18-6, 18-7 18-4, 18-16 18-3 unexpected behavior keepalive messages 18-3 root switch 18-3 blocking 18-3 root port selection on a switch stack 18-5 interface state, blocking to forwarding forwarding 20-10 enabling 18-4 IEEE 802.1D and multicast addresses instances supported 18-9 root guard 18-16 IEEE 802.1D and bridge ID 20-10 18-10 redundant connectivity 18-4 inferior BPDU 13-25 35-5 32-4 connecting VLANs 11-9 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-47 Index system message logging SVIs (continued) defined default configuration 11-5 routing between VLANs defining error message severity levels 13-2 switch clustering technology disabling 6-1 See also clusters, switch switch console port enabling 1-6 limiting messages 32-38 Switched Port Analyzer message format See SPAN overview switched ports switchport block unicast command switchport command 30-10 30-10 30-2 30-1 setting the display destination device 25-7 stack changes, effects of 25-7 switchport protected command syslog facility 17-6 switch priority 30-5 30-6 1-12 time stamps, enabling and disabling 25-6 30-8 30-2 synchronizing log messages 11-17 switchport mode dot1q-tunnel command 30-8 UNIX syslog servers configuring the daemon 19-22 30-11 configuring the logging facility 18-21 switch software features facilities supported 1-1 switch virtual interface 30-12 30-13 system MTU and IEEE 802.1Q tunneling See SVI 17-5 system name synchronization, BGP default configuration 35-46 syslog default setting See system message logging 7-15 7-15 manual configuration system clock 7-15 See also DNS configuring system prompt, default setting daylight saving time manually system resources, optimizing 7-13 7-14, 7-15 8-1 7-11 summer time time zones 7-13 T 7-12 displaying the time and date overview 30-13 sequence numbers, enabling and disabling 11-2 switchport block multicast command STP 30-5 level keywords, described switched packets, ACLs on 30-13 facility keywords, described See SDM 30-9 30-4 displaying the configuration Switch Database Management MSTP 30-4 7-12 7-1 See also NTP TACACS+ accounting, defined 9-11 authentication, defined authorization, defined 9-11 9-11 Catalyst 3750 Switch Software Configuration Guide IN-48 OL-8550-01 Index TACACS+ (continued) TFTP (continued) configuring configuring for autoconfiguration accounting image files 9-17 authentication key authorization deleting 9-13 default configuration uploading 9-13 identifying the server TFTP server 9-13 See TDR 1-9 9-17 tagged packets time-range command 32-17 time ranges in ACLs 32-17 time stamps in log messages 17-3 Layer 2 protocol time zones 17-8 tar files 30-8 7-12 Token Ring VLANs support for B-6 displaying the contents of extracting ToS 1-12 Telnet accessing management interfaces setting a password templates, SDM 2-11 1-10 and ARP 43-17 and CDP 43-16 broadcast traffic described 1-6 43-16 43-16 IP addresses and subnets 9-6 multicast traffic 9-43 Terminal Access Controller Access Control System Plus See TACACS+ TFTP traceroute command configuration files 43-17 43-16 usage guidelines 9-6 43-16 43-16 multiple devices on a port unicast traffic terminal lines, setting a password downloading 43-17 MAC addresses and VLANs 8-2 temporary self-signed certificate 43-16 43-18 See also IP traceroute B-11 preparing the server uploading 14-4 traceroute, Layer 2 B-20 number of connections 13-6 VTP support B-7 B-7 image file format TDR 25-2 Time Domain Reflector tracking services accessed by user creating 1-5 See NTP and system clock 9-10 IEEE 802.1Q 31-16 time 9-16 9-12 support for B-24 threshold, traffic level limiting the services to the user B-21 limiting access by servers 9-17 6-17 overview B-22 preparing the server 9-14 displaying the configuration operation of B-23 downloading 9-16 login authentication in clusters 3-6 B-10 B-12 configuration files in base directory 3-6 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-49 Index traffic trunks blocking flooded fragmented allowed-VLAN list 25-7 configuring 32-5 fragmented IPv6 unfragmented ISL 38-2 parallel transparent mode, VTP trap-door mechanism to non-DTP device 3-2 13-23 13-17 trusted boundary for QoS configuring MAC address notification configuring managers between QoS domains 31-12 classification options support for 31-12 troubleshooting trustpoints, CA connectivity problems 27-1 defined displaying crash information 43-24 IEEE 802.1Q PIMv1 and PIMv2 interoperability problems setting packet forwarding show forward command 40-23 43-13 9-42 17-1 17-1 Layer 2 protocol defined described 43-22 17-8 13-4 11-4, 17-1 IEEE 802.1Q, configuring 31-4 17-6 incompatibilities with other features 43-20 17-6 twisted-pair Ethernet, detecting unidirectional links 43-14 with system message logging with traceroute 33-37 tunnel ports 43-22 SFP security and identification 33-39 tunneling 43-14, 43-16, 43-17 detecting unidirectional links with ping 33-5 1-10 within a QoS domain 31-1, 31-5 with debug commands 33-41 ensuring port security for IP phones 7-22, 31-12 with CiscoWorks 33-39 trusted port states 7-22 31-3 notification types 13-23 13-26 pruning-eligible list 14-3, 14-12 traps overview 13-24, 13-25 native VLAN for untagged traffic see STP enabling 13-26 using STP port priorities 25-1 transmit hold-count defined 13-16 setting STP path costs 1-10 traffic suppression 13-21, 13-25, 13-27 load sharing 32-5 traffic policing 13-21 30-1 27-1 type of service See ToS 43-17 trunk failover See link-state tracking trunking encapsulation 1-7 trunk ports UDLD configuring defined U 13-20 11-3, 13-3 encapsulation configuration guidelines default configuration 27-4 27-4 13-21, 13-25, 13-27 Catalyst 3750 Switch Software Configuration Guide IN-50 OL-8550-01 Index upgrading software images UDLD (continued) See downloading disabling globally UplinkFast 27-5 on fiber-optic interfaces per interface 27-5 27-6 echoing detection mechanism 27-3 enabling globally neighbor database enabling 20-15 27-1 27-1 status, displaying UDP, configuring B-10, B-13, B-16 reasons for B-9 using FTP B-14 using RCP B-18 using TFTP 27-6 preparing unauthorized ports with IEEE 802.1x and adding static addresses B-28 1-5 using RCP B-32 7-26 using TFTP and broadcast MAC addresses 10-7 B-24 User Datagram Protocol 7-25 See UDP 7-25 and multicast addresses user EXEC mode 7-25 and router MAC addresses configuration guidelines 2-2 username-based authentication 7-25 9-6 7-25 7-25 V 25-1 unicast storm control command unicast traffic, blocking 25-4 version-dependent transparent mode 25-7 automatic upgrades with auto-upgrade See UDLD described UNIX syslog servers displaying daemon configuration 30-11 5-11 5-11 5-11 manual upgrades with auto-advise 30-13 message logging configuration 14-4 version-mismatch (VM) mode UniDirectional Link Detection protocol 5-12 virtual IP address 30-12 unrecognized Type-Length-Value (TLV) support upgrading information B-19 using FTP unicast MAC address filtering facilities supported B-21, B-25, B-29 reasons for 35-16 and CPU packets B-12 image files 27-7 1-6 See release notes 1-7 preparing 17-10 27-2 resetting an interface unicast storm 20-16 configuration files 27-6 link-detection mechanism described disabling uploading 27-5 Layer 2 protocol tunneling support for 20-3 support for per interface overview described cluster standby group 14-4 command switch 6-12 6-12 Virtual Private Network See VPN virtual router 39-1, 39-2 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-51 Index vlan.dat file VLAN membership 13-5 VLAN 1, disabling on a trunk port VLAN 1 minimization 13-22 modes 13-22 VLAN ACLs 13-3 See VQP vlan-assignment response, VMPS VLANs 13-28 adding VLAN configuration at bootup 13-9 adding to VLAN database 13-8 VLAN configuration mode allowed on trunk 2-2, 13-7 VLAN database 13-21 configuration guidelines, normal-range VLANs VLAN configuration saved in VLANs saved in configuration options 13-7 configuring 13-4 vlan database command VLAN filtering and SPAN vlan global configuration command VLAN ID, discovering 13-7 creating in VLAN configuration mode default configuration 14-2 VLAN Management Policy Server deleting See VMPS features internal 32-31 13-1, 13-12 1-7 illustrated 32-35 13-2 13-13 in the switch stack 32-30 13-8 13-16 extended-range 32-34 13-6 creating 32-32 limiting source traffic with RSPAN defined 32-2 limiting source traffic with SPAN denying access to a server example denying and permitting packets displaying support for 32-32 normal-range parameters 1-8 32-35 28-16 24-18 13-23 13-1, 13-4 number supported 32-34 28-24 13-9 native, configuring 32-42 wiring closet configuration example modifying multicast 32-32 examples of ACLs and VLAN maps removing 32-36 17-3 11-2, 13-1 displaying 32-31 VLAN maps configuration guidelines 13-10 13-10 described VLAN map entries, order of 13-9 customer numbering in service-provider networks 7-27 VLAN management domain 13-13 11-9 creating in config-vlan mode 28-7 13-6 13-1 connecting through SVIs 17-5 13-13 13-7 configuring IDs 1006 to 4094 13-7 vlan dot1q tag native command common uses for 13-3, 13-6, 13-13 configuration guidelines, extended-range VLANs 13-8 14-1 configuring 18-10 and spanning-tree instances and startup configuration file applying 13-9 aging dynamic addresses 13-8 and VTP 13-31 VLAN Query Protocol See VLAN maps saving confirming 1-7 13-5 port membership modes static-access ports 13-3 13-11 Catalyst 3750 Switch Software Configuration Guide IN-52 OL-8550-01 Index VLANs (continued) voice VLAN (continued) STP and IEEE 802.1Q trunks supported displaying 18-11 IP phone data traffic, described 13-2 Token Ring traffic between configuring routing in 18-11, 42-2 forwarding 14-3 VLAN Trunking Protocol routes VQP 13-33 configuration example default configuration tables 13-29 35-63 adding a client to a domain advertisements 13-29 14-14 13-19, 14-3 and extended-range VLANs 13-32 troubleshooting 35-66 VTP 13-28 reconfirming 1-7, 13-28 defining 13-29 dynamic port membership and normal-range VLANs 13-33 entering server address client mode, configuring 13-30 mapping MAC addresses to VLANs 13-28 14-2 14-2 14-11 configuration global configuration mode 13-33 reconfirmation interval, changing reconfirming membership retry count, changing guidelines 13-32 requirements 13-32 saving 15-1 14-7 14-8 privileged EXEC mode 13-31 voice VLAN 14-7 14-9 14-7 VLAN configuration mode Cisco 7960 phone, port connections configuration guidelines 15-1 15-3 configuring IP phones for data traffic override CoS of incoming frame configuring ports for voice traffic in 802.1p priority tagged frames 802.1Q frames 15-5 connecting to an IP phone default configuration 15-1 15-3 15-4 15-5 14-8 configuration mode options 14-7 configuration requirements 14-9 configuration revision number guideline 15-6 trust CoS priority of incoming frame described 35-64 VRF 13-33 configuration guidelines voice-over-IP 35-63 See VRF administering monitoring 35-66 VPN routing and forwarding table 13-16 VMPS described 35-69 in service provider networks See VTP description 15-2 VPN 13-2 VLAN-bridge STP VLAN trunks 15-2 IP phone voice traffic, described 13-6 VTP modes 15-6 15-6 resetting 14-14 14-15 configuring client mode 14-11 server mode 14-9 transparent mode consistency checks default configuration 14-12 14-4 14-7 Catalyst 3750 Switch Software Configuration Guide OL-8550-01 IN-53 Index VTP (continued) W described 14-1 disabling 14-12 domain names domains weighted tail drop See WTD 14-8 wizards 14-2 Layer 2 protocol tunneling 17-8 WTD described modes client 14-3, 14-11 server 14-3, 14-9 transitions monitoring egress queue-sets ingress queues support for 14-3, 14-12 33-72 33-68 1-10, 1-11 14-16 passwords 14-8 X pruning disabling 14-14 enabling 14-14 examples 14-5 overview 14-4 support for Xmodem protocol 43-2 1-7 pruning-eligible list, changing server mode, configuring statistics 33-13 setting thresholds 14-3 transparent 13-23 14-9 14-16 support for 1-7 Token Ring support 14-4 transparent mode, configuring using 1-3 14-12 14-1 version, guidelines Version 1 14-9 14-4 Version 2 configuration guidelines disabling 14-13 enabling 14-13 overview 14-4 14-9 Catalyst 3750 Switch Software Configuration Guide IN-54 OL-8550-01
© Copyright 2026 Paperzz