PDF - This Chapter (1.88 MB)

INDEX
access ports
Numerics
and Layer 2 protocol tunneling
10-Gigabit Ethernet interfaces
configuration guidelines
defined
defined
11-18
11-3
in switch clusters
11-6
17-11
access template
6-10
8-1
accounting
with 802.1x
A
with IEEE 802.1x
AAA down policy with NAC Layer 2 IP validation
abbreviating commands
ABRs
10-32
1-9
with RADIUS
9-11, 9-17
ACEs
35-25
AC (command switch)
and QoS
6-11
defined
access
templates
9-28
with TACACS+
2-4
10-9
33-7
32-2
Ethernet
8-1
access-class command
IP
32-20
32-2
32-2
ACLs
access control entries
ACEs
See ACEs
access-denied response, VMPS
13-28
32-2
any keyword
32-13
applying
access groups
applying IPv4 ACLs to interfaces
32-21
on bridged packets
32-39
Layer 2
32-21
on multicast packets
Layer 3
32-21
on routed packets
clusters, switch
6-14
command switches
member switches
switch clusters
6-12
See ACLs
32-17
to an interface
32-20, 38-8
to QoS
6-14
5-23
32-38
time ranges to
to IPv6 interfaces
6-14
accessing stack members
access lists
32-40
on switched packets
accessing
32-40
38-8
33-7
classifying traffic for QoS
comments in
compiling
defined
33-44
32-19
32-22
32-1, 32-8
examples of
32-22, 33-44
extended IP, configuring for QoS classification
33-45
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-1
Index
ACLs (continued)
ACLs (continued)
extended IPv4
creating
matching
monitoring
32-11
matching criteria
32-22
names
implicit deny
33-33
applying to interfaces
33-7, 33-44
32-20
32-2, 38-2
creating
32-10
matching criteria
32-8
terminal lines, setting on
unsupported features
support for
32-19
1-8
time ranges
IPv6
IPv6
interactions with other features
38-4
configuring
active links
38-2
active router
unsupported features
Layer 4 information in
MAC extended
using router ACLs with VLAN maps
configuration guidelines
38-3
38-2
logging messages
32-7
32-37
VLAN maps
38-3
38-3
supported
38-3
unsupported features, IPv4
38-9
precedence of
32-2
unsupported features
38-8
38-4, 38-5
matching criteria
32-22
32-17
types supported
38-3
limitations
32-8
support in hardware
32-7
applying to interfaces
33-44
standard IPv4
32-8
32-15
displaying
32-15
standard IP, configuring for QoS classification
matching criteria
configuring
32-2
router ACLs and VLAN map configuration
guidelines 32-37
32-8
and stacking
33-33
32-2, 38-2
router
IPv4
named
port
resequencing entries
32-8
32-21
numbers
38-4
QoS
32-10
matching criteria
creating
32-15
precedence of
32-10, 32-14, 32-16
implicit masks
undefined
38-3
number per QoS class map
32-8
fragments and QoS guidelines
named
IPv6
named, IPv4
32-13
IP
creating
32-41, 38-9
named
32-8
hardware and software handling
host keyword
32-8, 32-21, 38-3
38-3
32-31
32-30
21-2
39-1
address aliasing
24-2
32-38
32-9
32-27, 33-46
Catalyst 3750 Switch Software Configuration Guide
IN-2
OL-8550-01
Index
addresses
aging time
displaying the MAC address table
7-27
for MSTP
dynamic
accelerated aging
for STP
18-9
changing the aging time
default aging
defined
for MSTP
for STP
29-3
13-21
area border routers
group address range
See ABRs
40-3
STP address management
ARP
18-9
configuring
static
adding and removing
defined
defined
7-24
35-10
1-5, 7-27, 35-10
encapsulation
7-19
address resolution
35-11
static cache configuration
7-27, 35-9
Address Resolution Protocol
address resolution
adjacency tables, with CEF
managing
35-75
administrative distances
ASBRs
routing protocol defaults
vendor-proprietary
36-1
advertisements
35-20
vendor-specific
audience
9-30
9-29
xliii
EIGRP
aggregatable global unicast addresses
aggregate addresses, BGP
35-58
aggregated ports
36-3
HSRP
35-40
39-9
local mode with AAA
NTP associations
See EtherChannel
9-36
7-4
RADIUS
aggregate policers
33-59
key
aggregate policing
1-10
login
aging, accelerating
17-4
authentication
13-19, 14-3
aggregator template
35-53
attributes, RADIUS
35-77
advanced IP services image
RIP
35-25
asymmetrical links, and IEEE 802.1Q tunneling
35-31
26-1
7-27
7-27
AS-path filters, BGP
35-86
CDP
35-10
table
See ARP
VTP
18-23, 18-24
allowed-VLAN list
7-27
multicast
defined
7-21
19-24
alarms, RMON
7-22
MAC, discovering
18-9, 18-23
maximum
18-9
7-20
removing
19-23
MAC address table
7-21
7-19
learning
OSPF
accelerated
9-21
9-23
5-10, 8-1
18-9
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-3
Index
authentication (continued)
autonegotiation
TACACS+
duplex mode
defined
key
interface configuration guidelines
9-11
mismatches
9-13
login
11-19
43-12
autonomous system boundary routers
9-14
See ASBRs
See also port-based authentication
autonomous systems, in BGP
authentication failed VLAN
See restricted VLAN
Auto-RP, described
authentication keys, and routing protocols
authoritative time source, described
35-46
40-5
autosensing, port speed
35-87
1-4
auxiliary VLAN
7-2
See voice VLAN
authorization
with RADIUS
availability, features
9-27
with TACACS+
autoconfiguration
10-7
B
3-3
automatic advise (auto-advise) in switch stacks
automatic copy (auto-copy) in switch stacks
5-12
BackboneFast
5-11
automatic discovery
considerations
beyond a noncandidate device
brand new switches
connectivity
6-8
6-10
20-7
disabling
20-17
enabling
20-16
1-7
backup interfaces
See Flex Links
6-7
management VLANs
backup links
6-8
21-2
banners
non-CDP-capable devices
6-6
noncluster-capable devices
configuring
6-6
login
6-9
in switch clusters
described
support for
6-5
different VLANs
routed ports
1-6
9-11, 9-16
authorized ports with IEEE 802.1x
7-19
message-of-the-day login
6-5
default configuration
See also CDP
when displayed
automatic QoS
7-17
7-17
aggregate addresses
automatic recovery, clusters
6-11
automatic upgrades (auto-upgrade) in switch stacks
auto-MDIX
CIDR
5-11
11-21
35-58
35-58
clear commands
35-62
community filtering
11-22
35-58
aggregate routes, configuring
See also HSRP
configuring
7-18
BGP
See QoS
described
1-4
configuring neighbors
default configuration
described
enabling
35-55
35-57
35-44
35-43
35-46
Catalyst 3750 Switch Software Configuration Guide
IN-4
OL-8550-01
Index
BGP (continued)
monitoring
boot loader
35-62
multipath support
35-50
neighbors, types of
path selection
route maps
error-disabled state
35-60
Version 4
filtering
35-59
routing session with multi-VRF CE
35-69
20-3
RSTP format
19-12
described
20-3
1-11
disabling
20-15
35-43
enabling
20-14
binding cluster group and HSRP group
39-11
binding database
support for
1-7
BPDU guard
address, DHCP server
See DHCP, Cisco IOS server database
DHCP snooping
See DHCP snooping binding database
bindings
described
20-2
disabling
20-14
enabling
20-13
support for
1-7
bridged packets, ACLs on
address, Cisco IOS DHCP server
DHCP snooping database
IP source guard
22-6
22-7
See DHCP snooping binding database
blocking packets
booting
boot process
3-2
See fallback bridging
See BPDU
broadcast flooding
3-2
directed
35-14
flooded
35-14
35-17
broadcast storm-control command
broadcast storms
3-13
specific image
bridge groups
broadcast packets
25-6
boot loader, function of
32-39
bridge protocol data unit
22-16
binding table, DHCP snooping
manually
20-2
BPDU filtering
35-62
35-58
support for
40-5
BPDU
routing domain confederation
supernets
3-2
See BGP
35-52
show commands
3-14
Border Gateway Protocol
35-61
route reflectors
3-15
bootstrap router (BSR), described
35-49
route dampening
3-2
trap-door mechanism
35-57
35-54
resetting sessions
described
prompt
35-50
prefix filtering
3-14
environment variables
35-46
peers, configuring
accessing
25-4
25-1, 35-14
3-14
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-5
Index
CGMP
C
as IGMP snooping learning method
cables, monitoring for unidirectional links
27-1
candidate switch
automatic discovery
defined
6-5
6-4
6-4
40-32
joining multicast group
24-3
CA trustpoint
switch support of
CIDR
9-45
40-8
1-4
35-58
CipherSuites
configuring
9-44
Cisco 7960 IP Phone
9-43
40-49
40-8
server support only
See also command switch, cluster standby group, and
member switch
15-1
Cisco Discovery Protocol
caution, described
xliv
See CDP
CDP
Cisco Express Forwarding
and trusted boundary
33-40
See CEF
automatic discovery in switch clusters
configuring
6-5
26-2
described
26-2
Cisco Intelligence Engine 2100 Series Configuration
Registrar
26-1
disabling for routing device
26-3 to 26-4
See IE2100
enabling and disabling
on an interface
on a switch
overview
Cisco intelligent power management
26-4
See DHCP, Cisco IOS DHCP server
17-8
See IFS
26-1
power negotiation extensions
Cisco Network Assistant
11-7
See Network Assistant
1-6
switch stack considerations
Cisco StackWise technology
26-2
transmission timer and holdtime, setting
updates
Cisco IOS File System
26-5
support for
11-7
Cisco IOS DHCP server
26-3
Layer 2 protocol tunneling
monitoring
Cisco Group Management Protocol
See CGMP
default configuration
1-3
See also stacks, switch
26-2
26-2
CEF
CiscoWorks 2000
1-5, 31-4
CIST regional root
See MSTP
defined
35-75
distributed
enabling
IPv6
enabling server support
overview
requirements
defined
clearing cached group entries
24-9
35-75
35-75
36-15
CIST root
See MSTP
classless interdomain routing
See CIDR
classless routing
35-8
Catalyst 3750 Switch Software Configuration Guide
IN-6
OL-8550-01
Index
class maps for QoS
configuring
described
clusters, switch (continued)
managing
33-47
through CLI
33-7
displaying
through SNMP
33-79
class of service
planning
See CoS
11-30
CLI
abbreviating commands
command modes
described
2-5
1-5
automatic recovery
6-11
6-18
6-14
IP addresses
6-14
LRE profiles
6-17
passwords
enabling and disabling
keystroke editing
wrapped lines
error messages
RADIUS
2-7
SNMP
2-7
6-15
6-17
6-15, 6-19
switch stacks
2-9
TACACS+
2-5
filtering command output
getting help
6-5
host names
editing features
6-16
6-17
See also candidate switch, command switch, cluster
standby group, member switch, and standby
command switch
2-10
2-3
history
cluster standby group
changing the buffer size
described
2-6
disabling
2-7
2-6
considerations
managing clusters
2-6
defined
6-18
39-11
14-3
2-4
6-13
6-12
6-2
requirements
no and default forms of commands
client mode, VTP
and HSRP group
automatic recovery
recalling commands
6-3
virtual IP address
6-12
See also HSRP
clock
CNS
See system clock
cluster requirements
Configuration Engine
xlv
configID, deviceID, hostname
clusters, switch
configuration service
6-14
described
automatic discovery
6-5
automatic recovery
6-11
4-2
4-3
embedded agents
described
6-4
4-5
enabling automated configuration
6-1
LRE profile considerations
4-3
4-1
event service
1-2
compatibility
described
6-4
automatic discovery
CLI
2-4
2-1
configuration logging
benefits
6-19
planning considerations
clearing interfaces
accessing
6-18
enabling configuration agent
6-17
enabling event agent
4-6
4-9
4-8
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-7
Index
Coarse Wave Division Multiplexer
compatibility, software
See CWDM SFPs
See stacks, switch
command-line interface
config.text
See CLI
configurable leave timer, IGMP
command modes
defaults
abbreviating
2-4
commands, setting privilege levels
9-8
6-12
active (AC)
clearing the startup configuration
creating using a text editor
passive (PC)
1-15
configuration files
43-12
6-2
6-11
default name
password privilege levels
priority
See also getting started guide and hardware installation
guide
configuration examples, network
6-11
configuration conflicts
defined
1-2
configuration conflicts, recovering from lost member
connectivity 43-12
command switch
accessing
1-13
Express Setup
2-4
no and default
24-6
configuration, initial
2-1
commands
6-19
described
B-19
B-10
3-12
deleting a stored configuration
6-11
recovery
B-19
B-8
downloading
from command-switch failure
from lost member connectivity
redundant
6-11, 43-8
43-12
6-11
replacing
with another switch
43-10
with cluster member
43-9
requirements
6-3
standby (SC)
6-11
35-56
in clusters
overview
31-4
using FTP
B-13
using RCP
B-17
using TFTP
B-11
limiting TFTP server access
obtaining with DHCP
B-9
B-5
31-16
3-7
types and location
9-5
3-12
system contact and location information
preparing
31-4
6-15
compatibility, feature
B-8
31-15
B-10
uploading
6-15
community VLANs
reasons for
specifying the filename
6-15, 31-8
for cluster switches
B-10, B-13, B-16
password recovery disable considerations
16-2
community strings
configuring
preparing
3-12
invalid combinations when copying
community list, BGP
community ports
automatically
guidelines for creating and using
See also candidate switch, cluster standby group,
member switch, and standby command switch
SNMP
3-12
16-2, 16-3
25-11
B-10, B-13, B-16
reasons for
B-9
using FTP
B-14
using RCP
B-18
using TFTP
B-12
Catalyst 3750 Switch Software Configuration Guide
IN-8
OL-8550-01
Index
configuration guidelines, multi-VRF CE
configuration logging
cross-stack UplinkFast, STP
35-67
2-5
described
20-5
configuration settings, saving
3-10
disabling
20-16
configure terminal command
11-12
enabling
20-16
config-vlan mode
fast-convergence events
2-2, 13-7
conflicts, configuration
connectivity problems
Fast Uplink Transition Protocol
43-12
connections, secure remote
normal-convergence events
9-38
support for
43-14, 43-16, 43-17
consistency checks in VTP Version 2
console port, connecting to
Kerberos
2-11
xliv
for examples
publication
text
9-32
SSH
9-37
SSL
9-42
customer edge devices
xliv
CWDM SFPs
xliv
corrupted software, recovery steps with Xmodem
CoS
override priority
trust priority
20-7
1-7
switch stack considerations
xliv
in Layer 2 frames
5-2, 5-16, 9-38
35-64
1-26
43-2
D
33-2
15-6
daylight saving time
15-6
7-13
dCEF in the switch stack
CoS input queue threshold map for QoS
33-16
CoS output queue threshold map for QoS
33-19
35-75
debugging
enabling all system diagnostics
CoS-to-DSCP map for QoS
33-61
enabling for a specific feature
counters, clearing interface
11-30
redirecting error message output
crashinfo file
43-24
using commands
critical authentication, IEEE 802.1x
10-36
cross-stack EtherChannel
configuration guidelines
34-13
802.1x
34-2
43-20
43-21
43-20
2-4
10-21
auto-QoS
34-13
on Layer 3 physical interfaces
described
default commands
43-21
default configuration
configuring
on Layer 2 interfaces
20-6
cryptographic software image
14-4
conventions
command
20-7
banners
34-16
BGP
34-4
CDP
support for
1-6
DHCP
7-17
35-44
booting
illustration
33-21
3-12
26-2
22-8
DHCP option 82
22-9
DHCP snooping
22-9
DHCP snooping binding database
22-9
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-9
Index
default configuration (continued)
DNS
default configuration (continued)
SPAN
7-16
dynamic ARP inspection
EIGRP
SSL
23-5
fallback bridging
HSRP
STP
34-11
Ethernet interfaces
Flex Links
18-13
TACACS+
UDLD
17-4
9-13
27-4
24-25
VLANs
13-8
13-29
IGMP snooping
24-7, 37-5, 37-6
VMPS
IGMP throttling
24-25
voice VLAN
initial switch information
3-3
IP addressing, IP routing
35-6
IP multicast routing
IP source guard
VTP
22-17
Layer 2 interfaces
MAC address table
3-10, 35-12
35-78
default routes
35-78
default routing
35-3
deleting VLANs
11-16
Layer 2 protocol tunneling
14-7
default networks
40-9
13-10
denial-of-service attack
17-11
description command
7-21
MAC address-table move update
MSDP
41-4
desktop template
MSTP
19-15
destination addresses
in IPv6 ACLs
35-66
7-4
optional spanning-tree configuration
OSPF
9-2
RADIUS
16-7
RSPAN
28-11
SDM template
SNMP
detecting indirect link failures, STP
32-12
34-8
20-8
B-19
device discovery protocol
benefits
35-20
29-3
38-6
26-1
device manager
9-20
RMON
5-10, 8-1
destination-IP address-based forwarding,
EtherChannel 34-9
device
40-9
private VLANs
1-15
destination-MAC address forwarding, EtherChannel
password and privilege level
RIP
20-12
35-26
PIM
11-25
destination addresses, in IPv4 ACLs
24-20
NTP
25-1
designing your network, examples
21-4
13-19
15-3
default gateway
36-11
MVR
7-15
VLAN, Layer 2 Ethernet interfaces
40-27
multi-VRF CE
30-4
system name and prompt
IEEE 802.1Q tunneling
IPv6
5-19
system message logging
42-4
21-4
IGMP filtering
33-31
switch stacks
11-16
39-5
IGMP
9-44
standard QoS
35-36
EtherChannel
28-11
described
1-2
1-2, 1-5
in-band management
8-5
31-7
requirements
1-6
xliv
upgrading a switch
B-19
Catalyst 3750 Switch Software Configuration Guide
IN-10
OL-8550-01
Index
DHCP
DHCP option 82(continued)
Cisco IOS server database
configuring
22-14
default configuration
described
packet format, suboption
22-9
remote ID
22-5
22-5
DHCP snooping
relay agent
server
accepting untrusted packets form edge switch
22-11
22-10
and private VLANs
client request message exchange
See DHCP snooping binding database
client side
configuration guidelines
3-4
default configuration
3-6
relay device
3-5
server-side
22-10
TFTP server
option 82 data insertion
trusted interface
3-6
lease options
for IP address information
22-2
22-2
untrusted messages
22-2
3-5
adding bindings
22-14
22-7
location
bindings
1-5
22-7
22-7
clearing agent statistics
DHCP binding database
See DHCP snooping binding database
See DHCP snooping binding database
22-15
configuration guidelines
configuring
DHCP binding table
22-10
22-14
default configuration
22-8, 22-9
deleting
DHCP option 82
circuit ID suboption
default configuration
binding file
22-5
configuration guidelines
bindings
22-9
forwarding address, specifying
22-11
22-15
22-15
database agent
22-8
described
22-15
22-3
22-3
untrusted interface
format
3-4
1-5, 1-12
helper address
22-4
binding file
3-3
relationship to BOOTP
displaying
22-15
DHCP snooping binding database
3-5
for receiving the configuration file
support for
22-8
message exchange process
3-8
relay support
22-9
displaying binding tables
3-7
server side
overview
22-14
binding database
3-4
configuring
example
22-3,
22-13
DHCP-based autoconfiguration
overview
22-5
remote ID suboption
22-6
enabling
DNS
circuit ID
22-11
22-15
22-7
displaying
22-15
binding entries
22-15
status and statistics
enabling
entry
22-15
22-14
22-7
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-11
Index
DHCP snooping binding database (continued)
renewing database
double-tagged packets
IEEE 802.1Q tunneling
22-15
resetting
Layer 2 protocol tunneling
delay value
configuration files
22-15
preparing
DHCP snooping binding table
See DHCP snooping binding database
Differentiated Services architecture, QoS
Differentiated Services Code Point
directed unicast requests
33-2
33-2
Diffusing Update Algorithm (DUAL)
35-34
B-10, B-13, B-16
reasons for
B-8
using FTP
B-13
using RCP
B-17
using TFTP
B-11
image files
1-5
deleting old image
directories
changing
preparing
B-4
B-4
reasons for
B-19
displaying the working
B-4
using CMS
1-3
using FTP
B-26
discovery, clusters
See automatic discovery
using HTTP
Distance Vector Multicast Routing Protocol
See DVMRP
using RCP
drop threshold for Layer 2 protocol packets
35-86
DSCP
and DHCP-based autoconfiguration
3-6
7-17
1-10, 33-2
DSCP input queue threshold map for QoS
DSCP-to-CoS map for QoS
overview
7-15
DSCP transparency
setting up
7-16
DTP
support for
33-16
1-7, 13-17
documentation, related
xliv
dual IPv4 and IPv6 templates
document conventions
xliv
dual protocol stacks
configuring
domain names
35-35
8-2, 36-1, 36-9
36-13
DNS
7-15
IPv4 and IPv6
VTP
14-8
SDM templates supporting
Domain Name System
33-65
33-40
DUAL finite state machine, EIGRP
1-5
33-19
33-64
DSCP-to-DSCP-mutation map for QoS
36-4
B-19
17-11
DSCP output queue threshold map for QoS
7-16
displaying the configuration
B-22
using the device manager or Network Assistant
35-3
DNS
default configuration
1-3, B-19
B-30
using TFTP
distance-vector protocols
B-23
B-21, B-25, B-29
creating and removing
distribute-list command
17-10
downloading
22-15
timeout value
in IPv6
17-2
36-9
36-9
DVMRP
See DNS
autosummarization
dot1q-tunnel switchport mode
13-18
configuring a summary address
disabling
40-46
40-48
connecting PIM domain to DVMRP router
40-39
Catalyst 3750 Switch Software Configuration Guide
IN-12
OL-8550-01
Index
dynamic ARP inspection
DVRMP (continued)
enabling unicast routing
ARP cache poisoning
40-42
interoperability
23-1
ARP requests, described
with Cisco devices
ARP spoofing attack
40-37
with Cisco IOS software
23-1
clearing
40-7
mrinfo requests, responding to
log buffer
40-41
neighbors
23-15
statistics
23-15
advertising the default route to
40-40
configuration guidelines
discovery with Probe messages
40-37
configuring
displaying information
overview
in DHCP environments
40-44
log buffer
40-43
routes
adding a metric offset
advertising all
described
40-48
40-40
caching DVMRP routes learned in report
messages 40-42
changing the threshold for syslog messages
40-7
40-45
23-15
1-11
function of
23-2
40-39
displaying neighbor information
dynamic access ports
characteristics
configuring
13-31
11-3
dynamic addresses
See addresses
13-3
displaying
40-41
23-3
23-15
configuring
configuring
23-4
log buffer
clearing
tunnels
23-14
error-disabled state for exceeding rate limit
interface trust states
40-7
23-14
23-15
trust state and rate limit
40-37
23-2
23-14
configuration and operating state
statistics
40-48
source distribution tree, building
defined
DHCP snooping binding database
log buffer
limiting unicast route advertisements
support for
23-1
ARP ACLs
40-45
40-50
limiting the number injected into MBONE
23-10
displaying
40-49
favoring one over another
23-4, 23-10
23-5
denial-of-service attacks, preventing
40-48
advertising the default route to neighbors
routing table
23-7
23-12
default configuration
displaying
23-8
rate limit for incoming ARP packets
40-7
deleting
23-6
ACLs for non-DHCP environments
40-41
prevent peering with nonpruning
rejecting nonpruning
23-1
23-12
23-15
logging of dropped packets, described
man-in-the middle attack, described
23-5
23-2
network security issues and interface trust states
23-3
priority of ARP ACLs and DHCP snooping entries
23-4
rate limiting of ARP packets
configuring
described
23-10
23-4
error-disabled state
23-4
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-13
Index
dynamic ARP inspection (continued)
encryption, CipherSuite
statistics
9-44
encryption for passwords
clearing
Enhanced IGRP
23-15
displaying
See EIGRP
23-15
validation checks, performing
dynamic auto trunking mode
23-11
13-18
Dynamic Host Configuration Protocol
See DHCP-based autoconfiguration
error messages during command entry
EtherChannel
34-5, 34-7
binding physical and logical interfaces
numbering of
13-31, 13-32
troubleshooting
Layer 2 interfaces
Dynamic Trunking Protocol
34-13
Layer 3 physical interfaces
See DTP
34-16
Layer 3 port-channel logical interfaces
default configuration
described
E
34-11
34-23
forwarding methods
35-42
34-8, 34-18
IEEE 802.3ad, described
editing features
keystrokes used
wrapped lines
34-15
34-2
displaying status
34-7
interaction
2-7
with STP
2-7
34-12
with VLANs
2-9
34-12
LACP
EIGRP
authentication
described
35-40
34-7
components
35-35
displaying status
configuring
35-38
hot-standby ports
default configuration
definition
modes
35-34
monitoring
35-39
34-20
port priority
34-22
Layer 3 interface
35-40
load balancing
1-11
34-21
35-5
34-8, 34-18
logical interfaces, described
elections
34-7
34-7
system priority
35-41
stub routing
34-23
interaction with other features
35-36
interface parameters, configuring
support for
34-12
configuring
13-31
35-3
enabling and disabling
34-4
34-4
configuration guidelines
13-33
types of connections
EBGP
2-5
channel groups
13-29
dynamic routing
3-15
1-11, 35-76
automatic creation of
dynamic port VLAN membership
reconfirming
environment variables, function of
equal-cost routing
13-18
dynamic desirable trunking mode
described
9-3
34-4
See stack master
enable password
9-3
enable secret password
9-3
Catalyst 3750 Switch Software Configuration Guide
IN-14
OL-8550-01
Index
EtherChannel (continued)
extended system ID
PAgP
MSTP
aggregate-port learners
STP
34-19
compatibility with Catalyst 1900
described
See EUI
Extensible Authentication Protocol over LAN
34-23
interaction with other features
See EBGP
34-19
external neighbors, BGP
34-6
support for
described
F
34-4
numbering of
port groups
34-4
failover support
11-6
1-6
fallback bridging
stack changes, effects of
34-10
and protected ports
1-4
creating
42-4
described
20-10
described
disabling
20-17
displaying
42-11
enabling
20-17
function of
42-2
Ethernet VLANs
13-9
removing
13-8
13-9
clearing
29-3
42-11
42-11
configuration guidelines
examples
42-4
connecting interfaces with
conventions for
xliv
default configuration
network configuration
expedite queue for QoS
Express Setup
1-15
described
33-78
extended crashinfo file
42-2
forwarding packets
43-24
overview
extended-range VLANs
configuring
42-4
42-1
flooding packets
configuration guidelines
11-10
frame forwarding
1-2
See also getting started guide
13-13
42-2
42-1
protocol, unsupported
42-4
stack changes, effects of
42-3
13-12
13-14
creating with an internal VLAN ID
defined
42-5
displaying
events, RMON
42-5
bridge table
36-3
creating
42-2
number supported
defaults and ranges
EUI
42-4
bridge groups
EtherChannel guard
modifying
35-46
1-4
port-channel interfaces
adding
10-1
external BGP
34-6
learn method and priority configuration
support for
18-4, 18-16
extended universal identifier
34-19
34-5
displaying status
modes
19-17
13-15
13-1
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-15
Index
fallback bridging (continued)
file system
STP
displaying available file systems
disabling on an interface
forward-delay interval
setting the default
42-10
42-8
VLAN-bridge spanning-tree priority
VLAN-bridge STP
support for
unsupported protocols
42-4
IPv6 traffic
38-4, 38-8
non-IP traffic
2-10
B-1
configuration guidelines
25-11
27-1
files
basic crashinfo
21-4
21-5
default configuration
description
21-1
monitoring
21-8
21-4
flooded traffic, blocking
43-24
25-7
flow-based packet classification
43-24
1-10
flowcharts
B-5
QoS classification
crashinfo
description
33-6
QoS egress queueing and scheduling
43-24
QoS ingress queueing and scheduling
B-5
displaying the contents of
B-8
extended crashinfo
description
location
2-10
Flex Links
20-6
configuring
location
32-27
flash device, number of
18-11
fiber-optic, detecting unidirectional links
deleting
32-30
See ACLs, IP
35-75
copying
in a VLAN
filters, IP
Fast Uplink Transition Protocol
description
B-3
filtering show and more command output
42-2
features, incompatible
B-5
show and more command output
42-2
SVIs and routed ports
FIB
42-7
1-11
VLAN-bridge STP
B-1
filtering
18-2
maximum-idle interval
B-3
network file system names
42-9
42-7
keepalive messages
path cost
local file system names
42-10
hello BPDU interval
interface priority
displaying file information
42-11
B-2
QoS policing and marking
33-17
33-15
33-10
flowcontrol
configuring
43-24
described
43-25
tar
11-21
11-20
forward-delay time
creating
MSTP
B-6
displaying the contents of
extracting
B-7
18-23
Forwarding Information Base
B-7
image file format
STP
19-23
B-20
See FIB
forwarding nonroutable protocols
42-1
Catalyst 3750 Switch Software Configuration Guide
IN-16
OL-8550-01
Index
FTP
hierarchical policy maps
accessing MIB files
configuration guidelines
A-4
configuration files
downloading
overview
configuring
described
B-13
preparing the server
image files
deleting old image
33-11
described
2-6
disabling
2-7
recalling commands
B-28
2-6
2-6
history table, level and number of syslog messages
B-26
preparing the server
uploading
33-53
changing the buffer size
B-13
B-14
downloading
33-33
history
B-12
uploading
33-8
30-10
host names
B-25
in clusters
B-28
6-14
host ports
configuring
G
kinds of
16-12
16-2
get-bulk-request operation
31-3
hosts, limit on dynamic ports
get-next-request operation
31-3, 31-5
Hot Standby Router Protocol
get-request operation
See HSRP
31-3, 31-5
get-response operation
HP OpenView
31-3
authentication string
See SFPs
global configuration mode
39-9
automatic cluster recovery
2-2
binding to cluster group
24-13
guest VLAN and 802.1x
6-13
39-11
cluster standby group considerations
10-13
command-switch redundancy
guide
audience
configuring
xliii
purpose of
guide mode
1-3
definition
39-1
guidelines
39-5
monitoring
See device manager and Network Assistant
overview
priority
H
39-5
39-1
39-7
1-11
support for ICMP redirect messages
switch stack considerations
hello time
MSTP
11-26
timers
19-22
tracking
18-22
help, for the command line
2-3
1-1, 1-6
39-11
routing redundancy
hardware limitations and Layer 3 interfaces
6-12
39-4
default configuration
xliii
GUIs
STP
1-5
HSRP
Gigabit modules
global leave, IGMP
13-33
39-11
39-4
39-9
39-7
See also clusters, cluster standby group, and standby
command switch
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-17
Index
HTTP over SSL
IEEE 802.1Q (continued)
see HTTPS
HTTPS
tunneling
compatibility with other features
9-42
configuring
defaults
9-46
self-signed certificate
HTTP secure server
17-4
described
9-43
17-1
tunnel ports with other features
9-42
17-6
17-6
IEEE 802.1s
See MSTP
I
IEEE 802.1w
IBPG
See RSTP
35-42
IEEE 802.1x
ICMP
IPv6
See port-based authentication
36-4
redirect messages
support for
IEEE 802.3ad
35-12
See EtherChannel
1-11
time-exceeded messages
traceroute and
IEEE 802.3af
43-18
See PoE
43-18
unreachable messages
IEEE 802.3x flow control
32-20
unreachable messages and IPv6
unreachables and ACLs
38-4
ifIndex values, SNMP
IFS
32-22
1-6
configurable leave timer
executing
43-15
overview
43-14
described
24-6
ICMP Router Discovery Protocol
enabling
24-12
configuring the switch
See IRDP
as a member of a group
36-4
40-27
statically connected member
IDS appliances
and ingress RSPAN
and ingress SPAN
controlling access to groups
28-22
28-15
IEEE 802.1D
default configuration
40-27
deleting cache entries
40-50
displaying groups
See STP
IEEE 802.1p
31-6
IGMP
ICMP ping
ICMPv6
11-20
fast switching
15-1
40-31
40-28
40-50
40-32
flooded multicast traffic
IEEE 802.1Q
and trunk ports
configuration limitations
encapsulation
controlling the length of time
11-3
disabling on an interface
13-19
global leave
13-16
native VLAN for untagged traffic
13-23
24-13
24-14
24-13
query solicitation
24-13
recovering from flood mode
24-13
host-query interval, modifying
40-29
joining multicast group
24-3
Catalyst 3750 Switch Software Configuration Guide
IN-18
OL-8550-01
Index
IGMP (continued)
join messages
IGMP snooping
and address aliasing
24-3
leave processing, enabling
leaving multicast group
multicast reachability
overview
queries
and stack changes
24-11, 37-9
configuring
24-5
definition
24-7
24-7, 37-5, 37-6
24-2
enabling and disabling
24-4
report suppression
global configuration
described
24-6
Immediate Leave
disabling
24-16, 37-11
in the switch stack
supported versions
method
24-3
24-8, 37-6
24-8
24-6
24-7
24-9
monitoring
1-4
Version 1
24-16, 37-11
querier
changing to Version 2
described
configuration guidelines
40-29
configuring
40-3
Version 2
described
support for
40-29
maximum query response time value
pruning groups
IGP
24-25
24-29
support for
1-4
24-25
24-25
24-29
35-25
Immediate Leave, IGMP
24-24
monitoring
24-28
displaying action
24-25
24-8
IGMP throttling
described
default configuration
enabling
24-6
37-9
inaccessible authentication bypass
IGMP groups
10-15
initial configuration
configuring filtering
IGMP Immediate Leave
configuration guidelines
described
24-6
enabling
24-11
defaults
24-28
setting the maximum number
24-12
24-27
1-13
Express Setup
See also getting started guide and hardware installation
guide
number
11-11
range macros
11-14
interface command
24-26
configuration mode
1-2
interface
IGMP profile
configuring
40-31
default configuration
40-30
IGMP filtering
described
1-4
configuring
40-31
query timeout value
configuring
24-3
VLAN configuration
40-3
24-15
24-15
supported versions
changing to Version 1
applying
24-7
default configuration
40-27
40-2
support for
24-2
24-25
11-11 to 11-12
interface configuration mode
2-3
24-26
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-19
Index
Inter-Switch Link
interfaces
auto-MDIX, configuring
See ISL
11-21
inter-VLAN routing
configuration guidelines
10-Gigabit Ethernet
duplex and speed
Intrusion Detection System
11-18
See IDS appliances
11-18
IP ACLs
configuring
procedure
for QoS classification
11-12
configuring for IPv4 and IPv6
counters, clearing
36-13
implicit deny
named
11-16
descriptive name, adding
32-21
IP addresses
11-25
displaying information about
32-10
32-15
undefined
11-25
11-30
128-bit
36-2
flow control
11-20
candidate or member
management
1-5
classes of
monitoring
naming
range of
discovering
IPv6
11-31
speed and duplex, configuring
status
11-19
supported
types of
MAC address association
35-9
35-18
redundant clusters
11-10
6-12
standby command switch
11-1
interfaces range macro command
interface types
35-5
36-2
monitoring
11-29
35-6
7-27
for IP routing
11-31
shutting down
6-3, 6-12, 6-14
default configuration
11-10, 11-11
11-12
restarting
6-2
command switch
11-25
6-4, 6-14
35-6
cluster access
11-29
physical, identifying
33-7
32-10, 32-14
implicit masks
11-30
default configuration
described
1-11, 35-2
11-14
See also IP information
IP base image
11-11
Interior Gateway Protocol
1-1
IP broadcast address
See IGP
6-12, 6-14
35-16
ip cef distributed command
internal BGP
IP directed broadcasts
See IBGP
35-15
ip igmp profile command
internal neighbors, BGP
35-46
Internet Control Message Protocol
Internet Group Management Protocol
See IGMP
24-25
IP information
assigned
manually
See ICMP
35-75
3-10
through DHCP-based autoconfiguration
default configuration
3-3
3-3
Internet Protocol version 6
See IPv6
Catalyst 3750 Switch Software Configuration Guide
IN-20
OL-8550-01
Index
IP multicast routing
IP multicast routing (continued)
addresses
all-hosts
MBONE
deleting sdr cache entries
40-3
all-multicast-routers
described
40-3
host group address range
administratively-scoped boundaries, described
and IGMP snooping
40-35
40-51
enabling sdr listener support
40-34
limiting DVMRP routes advertised
24-2
Auto-RP
limiting sdr cache entry lifetime
adding to an existing sparse-mode cloud
benefits of
40-5
preventing candidate RP spoofing
40-17
preventing join messages to false RPs
setting up in a new internetwork
40-16
40-14
packet rate loss
40-51
peering devices
40-51
tracing a path
40-51
multicast forwarding, described
configuring candidate RPs
deleting
40-20
40-2
defining the PIM domain border
40-19
40-18
40-50
RP
assigning manually
40-12
configuring Auto-RP
40-5
using with Auto-RP
40-22
Cisco implementation
40-2
40-6
40-50
displaying
40-21
defining the IP multicast boundary
40-14
configuring PIMv2 BSR
basic multicast routing
IP multicast boundary
default configuration
40-10
40-35
40-9
40-18
monitoring mapping information
using Auto-RP and BSR
configuring
40-9
routing table
40-10
configuring candidate BSRs
40-6
PIMv1 and PIMv2 interoperability
reverse path check (RPF)
bootstrap router
overview
40-17
protocol interaction
40-22
configuration guidelines
40-23
40-22
stacking
stack master functions
stack member functions
40-8
40-8
statistics, displaying system and network
enabling
multicast forwarding
PIM mode
40-12
group-to-RP mappings
Auto-RP
40-5
40-11
40-33
monitoring
40-10
filtering incoming RP announcement messages
using with BSR
40-34
Session Directory (sdr) tool, described
40-50
configuration guidelines
overview
40-45
SAP packets for conference session
announcement 40-33
40-15
40-14
clearing the cache
BSR
40-33
displaying sdr cache
40-3
40-50
40-50
See also CGMP
See also DVMRP
See also IGMP
See also PIM
40-5
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-21
Index
IP phones
IP source guard (continued)
and QoS
filtering
15-1
automatic classification and queueing
configuring
33-20
ensuring port security with QoS
trusted boundary for QoS
33-39
33-62
adding
22-18
IP traceroute
1-11
IP routes, monitoring
35-88
IP routing
executing
43-18
overview
43-17
IP unicast routing
connecting interfaces with
11-10
address resolution
35-9
disabling
35-19
administrative distances
enabling
35-19
ARP
IP services image
and 802.1x
and DHCP snooping
and EtherChannels
and port security
22-16
35-17
35-14
storms
22-17
35-14
classless routing
22-17
22-17
35-76
default
addressing configuration
22-17
binding configuration
22-16
22-16
22-16
configuration guidelines
default configuration
22-17
22-17
gateways
35-12
networks
35-78
routes
35-78
routing
35-3
directed broadcasts
disabling
22-16
dynamic routing
disabling
22-18
enabling
displaying
35-6
35-15
35-19
described
35-3
35-19
EtherChannel Layer 3 interface
IGP
22-19
configuration
enabling
35-8
configuring static routes
22-17
and trunk interfaces
bindings
35-87
35-16
packets
22-17
and TCAM entries
address
flooding
22-17
and private VLANs
binding table
35-7
broadcast
22-17
automatic
35-10
authentication keys
and routed ports
35-77, 35-86
assigning IP addresses to Layer 3 interfaces
1-1
IP source guard
manual
22-16
22-18
deleting
32-12
and VRF
22-16
static bindings
33-2
IP protocols
routing
source IP address filtering
22-16
source IP and MAC address filtering
33-39
IP-precedence-to-DSCP map for QoS
in ACLs
22-16
source IP and MAC address
15-4
IP precedence
source IP address
22-19
35-5
35-25
inter-VLAN
35-2
22-18
Catalyst 3750 Switch Software Configuration Guide
IN-22
OL-8550-01
Index
IP unicast routing (continued)
IPv6
IP addressing
classes
ACLs
35-6
configuring
IPv6
IRDP
35-5
limitations
38-3
port
35-13
Layer 3 interfaces
passive interfaces
35-9
router
protocols
38-2
addresses
distance-vector
dynamic
proxy ARP
advantages
35-10
applications
reverse address resolution
35-9
static routing
subnet mask
36-11
autoconfiguration
36-5
36-15
default configuration
35-5
defined
35-7
36-7
features not supported
ICMP
35-5
ICMP rate limiting
See also EIGRP
monitoring
See also OSPF
neighbor discovery
See also RIP
OSPF
IPv4 ACLs
36-15
36-22
36-4
36-20
path MTU discovery
applying to interfaces
extended, creating
reasons for
32-20
RIP
32-11
standard, creating
IPv4 and IPv6
differences
8-2, 36-8, 37-1, 38-1
36-13
supported features
36-3
switch limitations
36-7
IPv6 traffic, filtering
36-2
dual protocol stacks
36-18
stack master functions
32-10
configuring on an interface
36-4
36-1
SDM templates
32-15
36-6
36-4
See also BGP
named
36-11
36-11
feature limitations
35-16
36-16
36-1
enabling
35-7
35-8
with SVIs
36-5
configuring static routes
35-3
steps to configure
36-7
assigning address
CEFv6
35-5
36-2
36-2
and switch stacks
35-79
subnet zero
36-2
35-3
redistribution
routed ports
38-2
address formats
35-3
35-3
link-state
38-2
supported
35-85
38-3
38-2
precedence
35-5
MAC address and IP address
UDP
38-9
matching criteria
36-3
supernet
displaying
36-8
38-4
36-6
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-23
Index
IRDP
Kerberos (continued)
configuring
terms
35-13
definition
TGT
35-13
support for
9-33
9-34
tickets
1-11
ISL
9-32
key distribution center
and IPv6
See KDC
36-3
and trunk ports
encapsulation
11-3
1-7, 13-16
trunking with IEEE 802.1 tunneling
isolated port
17-5
16-2
isolated VLANs
L
l2protocol-tunnel command
16-2, 16-3
17-13
LACP
Layer 2 protocol tunneling
17-9
See EtherChannel
J
Layer 2 frames, classification with CoS
join messages, IGMP
Layer 2 interfaces, default configuration
24-3
33-2
11-16
Layer 2 protocol tunneling
configuring
K
17-10
configuring for EtherChannels
default configuration
KDC
described
defined
9-32
keepalive messages
authenticating to
KDC
cryptographic software image
KDC
43-16
43-16
multicast traffic
43-17
9-32
unicast traffic
Layer 3 features
43-17
43-16
usage guidelines
9-32
43-16
43-16
multiple devices on a port
9-32
operation
43-16
MAC addresses and VLANs
9-32
9-32
described
and CDP
IP addresses and subnets
9-35
9-35
credentials
43-17
described
configuration examples
configuring
and ARP
broadcast traffic
9-34
9-34
network services
17-12
Layer 2 traceroute
18-2
Kerberos
boundary switch
17-11
17-8
guidelines
See also Kerberos
17-14
43-16
1-11
Layer 3 interfaces
9-34
realm
9-33
assigning IP addresses to
server
9-33
assigning IPv4 and IPv6 addresses to
support for
assigning IPv6 addresses to
1-9
switch as trusted third party
35-7
9-32
changing from Layer 2 mode
types of
36-13
36-12
35-7
35-5
Catalyst 3750 Switch Software Configuration Guide
IN-24
OL-8550-01
Index
Layer 3 packets, classification methods
LDAP
33-2
M
4-2
MAC addresses
LEDs, switch
aging time
See hardware installation guide
and VLAN association
lightweight directory access protocol
line configuration mode
default configuration
2-3
discovering
Link Aggregation Control Protocol
displaying
See EtherChannel
detecting unidirectional
7-21
7-27
7-27
learning
36-3
in ACLs
See Flex Links
link-state protocols
adding
35-3
39-3
logging messages, ACL
7-26
removing
7-25
configuration guidelines
configuring
9-23
with TACACS+
7-17
log messages
21-4
21-6
default configuration
9-14
description
21-2
monitoring
21-8
21-4
MAC address-to-VLAN mapping
See system message logging
Long-Reach Ethernet (LRE) technology
1-12
MAC address-table move update
32-9
login authentication
login banners
dropping
7-24
MAC address notification, support for
28-2
with RADIUS
7-26
characteristics of
34-23
local SPAN
35-9
7-25
allowing
34-25
load balancing
32-27
static
35-30
link-state tracking
described
7-22
IP address association
27-1
link state advertisements (LSAs)
configuring
7-20
removing
link redundancy
links, unidirectional
22-19
dynamic
19-8
link local unicast addresses
1-17, 1-25
described
20-11
10-24
MAC extended access lists
1-7
LRE profiles, considerations in switch clusters
10-38
10-18
guidelines
20-18
13-28
MAC authentication bypass
configuring
loop guard
support for
7-20
displaying in the IP source binding table
Link Failure
enabling
7-20
building the address table
See LDAP
described
7-21
6-17
applying to Layer 2 interfaces
configuring for QoS
creating
32-27
defined
32-27
for QoS classification
32-29
33-46
33-5
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-25
Index
macros
maximum aging time
See Smartports macros
magic packet
MSTP
STP
10-18
manageability features
maximum-paths command
in-band
CLI session
35-50, 35-76
SNMP
automatic discovery
1-6
defined
1-6
1-6
out-of-band console port connection
1-6
management options
6-2
managing
6-18
passwords
6-14
requirements
4-1
Network Assistant
to users through banners
metrics, in BGP
considerations in switch clusters
35-51
metro tags
35-82
17-2
39-3
MIBs
configuring
CoS-to-DSCP
accessing files with FTP
33-61
location of files
33-61
DSCP-to-CoS
overview
33-64
DSCP-to-DSCP-mutation
IP-precedence-to-DSCP
policed-DSCP
33-65
33-62
33-49
action with aggregate policers
33-59
31-1
SNMP interaction with
supported
31-4
A-1
mirroring traffic for analysis
28-1
mismatches, autonegotiation
43-12
module number
11-11
monitoring
33-4, 33-8
access groups
matching
BGP
38-3
matching, IPv4 ACLs
A-4
See POP
33-12
action in policy map
A-4
mini-point-of-presence
33-63
marking
IPv6 ACLs
6-8
MHSRP
mapping tables for QoS
7-17
metric translations, between routing protocols
6-8
discovery through different management VLANs
described
7-17
messages, to users through banners
1-3
management VLAN
described
6-4
messages
1-2
1-5
switch stacks
43-12
See also candidate switch, cluster standby group, and
standby command switch
1-3
overview
6-5
recovering from lost connectivity
2-1
clustering
13-3
member switch
1-6
device manager
DSCP
19-24
membership mode, VLAN port
browser session
CNS
18-23
maximum hop count, MSTP
1-5
management access
CLI
19-24
32-8
32-41
35-62
cables for unidirectional links
CDP
26-5
CEF
35-75
27-1
Catalyst 3750 Switch Software Configuration Guide
IN-26
OL-8550-01
Index
monitoring (continued)
EIGRP
monitoring (continued)
VLAN
35-41
fallback bridging
features
filters
42-11
1-12
Flex Links
HSRP
21-8
IEEE 802.1Q tunneling
13-16
13-33
14-16
benefits of
24-29
snooping
interfaces
35-18
multicast routing
41-12
originated by switch
41-9
41-14
default configuration
IPv4 ACL configuration
41-4
dense-mode regions
32-41
sending SA messages to
36-22
IPv6 ACL configuration
incoming SA messages
21-8
multi-VRF CE
41-14
SA messages to a peer
41-19
multicast router interfaces
41-12
SA requests from a peer
24-17, 37-12
join latency, defined
35-74
41-11
41-6
meshed groups
24-24
network traffic for analysis with probe
28-2
configuring
defined
35-34
port
41-16
41-16
originating address, changing
blocking
overview
25-17
protection
41-2
peers
16-15
RP mapping information
41-18
41-1
peer-RPF flooding
25-17
private VLANs
configuring a default
40-23
monitoring
11-30, 43-14
41-4
41-19
source-active messages
41-19
peering relationship, overview
speed and duplex mode
11-20
requesting source information from
traffic flowing among switches
traffic suppression
tunneling
41-18
filtering
17-18
MAC address-table move update
41-17
specifying the originating address
38-9
Layer 2 protocol tunneling
SFP status
forwarded by switch
received by switch
40-49
35-88
MSDP peers
41-19
controlling source information
11-29
address tables
routes
41-3
clearing MSDP connections and statistics
24-16, 37-11
IP
OSPF
VLANs
MSDP
filters
MVR
32-42
VTP
17-18
IGMP
IPv6
maps
VMPS
39-11
32-42
29-1
shutting down
41-1
41-8
41-16
25-17
17-18
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-27
Index
MDSP (continued)
MSTP (continued)
source-active messages
caching
CST
defined
41-6
clearing cache entries
defined
operations between regions
41-19
default configuration
41-2
filtering from a peer
filtering incoming
displaying status
described
41-19
support for
41-9
19-16
20-10
enabling
20-17
extended system ID
1-11
effects on root switch
MSTP
boundary ports
unexpected behavior
19-16
implementation
described
20-3
enabling
20-14
terminology
enabling
20-13
CIST, described
described
19-3
19-15, 20-12
master
19-23
19-3
19-3
operations within a region
19-22
link type for rapid convergence
maximum aging time
maximum hop count
19-24
19-24
19-24
19-26
IST
defined
configuring
forward-delay time
18-11
19-9
restarting migration process
19-3
loop guard
described
enabling
20-11
20-18
mapping VLANs to MST instance
19-16
neighbor type
20-2
interoperability with IEEE 802.1D
19-3
configuration guidelines
path cost
18-10
interoperability and compatibility among modes
19-5
MST region
19-7
interface state, blocking to forwarding
CIST regional root
hello time
19-6
19-5
instances supported
20-2
19-18
port role naming change
BPDU guard
described
19-19
IEEE 802.1s
19-6
BPDU filtering
CIST root
19-17
effects on secondary root switch
configuration guidelines
described
20-12
EtherChannel guard
41-14
restricting advertised sources
19-15
19-26
enabling the mode
41-12
limiting data with TTL
19-4
default optional feature configuration
41-11
41-14
filtering to a peer
monitoring
19-3
19-16
19-25
19-21
port priority
root switch
19-20
19-17
secondary root switch
switch priority
19-19
19-22
Catalyst 3750 Switch Software Configuration Guide
IN-28
OL-8550-01
Index
MSTP (continued)
multicast storm-control command
MST region
CIST
multicast television application
multicast VLAN
19-3
configuring
described
24-18
See MVR
19-2
Multiple HSRP
19-5
See MHSRP
19-3
supported spanning-tree instances
optional features supported
overview
24-19
Multicast VLAN Registration
19-16
hop-count mechanism
IST
25-4
19-2
1-7
multiple VPN routing/forwarding in customer edge
devices
See multi-VRF CE
19-2
multi-VRF CE
Port Fast
described
20-2
enabling
20-12
configuration example
configuration guidelines
preventing root switch selection
20-10
configuring
enabling
defined
20-10
35-74
monitoring
root switch
configuring
effects of extended system ID
19-17
status, displaying
and address aliasing
19-8
and IGMPv3
19-26
leaving
24-5
24-21
24-21
configuring interfaces
24-6
default configuration
24-3
static joins
1-11
configuration guidelines
Immediate Leave
described
in the switch stack
multicast packets
32-40
blocking
25-7
modes
multicast router ports, adding
24-17, 37-12
24-10, 37-8
Multicast Source Discovery Protocol
24-22
24-20
24-19
24-20
24-22
monitoring
multicast router interfaces, monitoring
24-21
24-18
example application
24-11, 37-8
ACLs on
35-65
MVR
20-2
multicast groups
joining
35-66
packet-forwarding process
support for
19-18
shutdown Port Fast-enabled port
stack changes, effects of
35-74
network components
19-18
unexpected behavior
35-66
35-63
displaying
20-17
35-67
35-66
default configuration
root guard
described
35-70
24-24
multicast television application
setting global parameters
support for
24-19
24-21
1-4
See MSDP
multicast storm
25-1
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-29
Index
network configuration examples
N
cost-effective wiring closet
NAC
high-performance wiring closet
AAA down policy
1-9
critical authentication
10-15, 10-36
large network
IEEE 802.1x validation using a RADIUS server
inaccessible authentication bypass
Layer 2 IEEE 802.1x validation
Layer 2 IEEE802.1x validation
Layer 2 IP validation
named IPv4 ACLs
1-23
multidwelling network
10-39
1-9, 10-36
1-9, 10-39
10-20
1-9
1-26
1-25
providing network services
1-17
redundant Gigabit backbone
1-19
server aggregation and Linux server cluster
small to medium-sized network
1-19
1-21
network design
32-15
performance
services
See NSM
1-16
1-17
network management
native VLAN
CDP
and IEEE 802.1Q tunneling
configuring
17-4
26-1
RMON
13-23
SNMP
13-23
29-1
31-1
Network Time Protocol
neighbor discovery, IPv6
36-4
neighbor discovery/recovery, EIGRP
neighbors, BGP
See NTP
35-35
35-57
no commands
2-4
nonhierarchical policy maps
Network Admission Control
configuration guidelines
see NAC
configuring
Network Assistant
described
1-2
described
guide mode
1-3
management options
13-18
normal-range VLANs
configuration modes
5-2, 5-16
xliv
upgrading a switch
32-27
13-4
configuration guidelines
1-2
managing switch stacks
requirements
33-9
nontrunking mode
1-3
33-33
33-49
non-IP traffic filtering
1-5
downloading image files
wizards
1-16
long-distance, high-bandwidth transport
NameSpace Mapper
benefits
1-18
increasing network performance
IEEE 802.1x authentication using a RADIUS
server 10-39
default
1-17
configuring
defined
B-19
1-3
13-6
13-7
13-4
13-1
no switchport command
note, described
11-4
xliv
not-so-stubby areas
See NSSA
NSM
4-3
NSSA, OSPF
35-30
Catalyst 3750 Switch Software Configuration Guide
IN-30
OL-8550-01
Index
NTP
OSFP (continued)
associations
default configuration
authenticating
defined
metrics
7-4
route
7-2
enabling broadcast messages
peer
7-6
7-5
server
default configuration
35-26
described
35-25
36-20
LSA group pacing
7-11
monitoring
7-2
restricting access
disabling NTP services per interface
source IP address, configuring
35-33
35-33
route summarization
7-8
support for
7-10
35-31
out-of-profile markdown
7-2
support for
35-31
1-11
virtual links
7-10
1-10
1-6
synchronizing devices
7-5
P
time
7-2
packet modification, with QoS
synchronizing
7-2
17-9
See EtherChannel
O
parallel paths, in routing tables
offline configuration for switch stacks
understanding
35-85
35-31
passwords
44-3
44-1
Open Shortest Path First
See OSPF
default configuration
9-2
disabling recovery of
9-5
encrypting
optimizing system resources
options, management
35-76
passive interfaces
OSPF
44-1
running tests
5-7
configuring
online diagnostics
8-1
for security
in clusters
1-5
OSPF
overview
area parameters, configuring
configuring
33-20
PAgP
Layer 2 protocol tunneling
overview
35-28
35-34
router IDs
creating an access group
services
settings
interface parameters, configuring
7-4
displaying the configuration
stratum
35-31
for IPv6
7-5
overview
35-31
35-30
recovery of
9-3
1-8
6-15
9-1
43-3
35-28
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-31
Index
passwords (continued)
PIM (continued)
setting
sparse mode
enable
join messages and shared tree
9-3
enable secret
Telnet
overview
9-3
with usernames
VTP domain
RPF lookups
9-6
support for
14-8
path cost
MSTP
STP
40-4
prune messages
9-6
40-4
40-5
40-7
1-11
versions
interoperability
19-21
troubleshooting interoperability problems
18-20
path MTU discovery
v2 improvements
36-4
PBR
defined
enabling
character output description
35-83
local policy-based routing
35-84
35-84
PC (passive command switch)
executing
43-15
overview
43-14
auto mode
performance, network design
performance features
11-8
CDP with power consumption, described
1-16
CDP with power negotiation, described
1-4
persistent self-signed certificate
Cisco intelligent power management
9-43
per-VLAN spanning-tree plus
configuring
See PVST+
power budgeting
11-7
11-23
powered-device detection and initial power
allocation 11-7
40-4
rendezvous point (RP), described
power management modes
40-4
11-8
power negotiation extensions to CDP
40-7
displaying neighbors
enabling a mode
11-7
11-23
power consumption
40-9
dense mode
RPF lookups
11-7
11-6
IEEE power classification levels
PIM
overview
11-7
high-power devices operating in low-power mode
35-69
11-2
default configuration
11-7
11-22
devices supported
PE to CE routing, configuring
43-15
PoE
6-11
35-57
physical ports
24-9
ping
35-82
peers, BGP
40-23
40-4
PIM-DVMRP, as snooping method
fast-switched policy-based routing
overview
40-9
standards supported
40-50
static mode
40-12
11-7
11-9
supported watts per port
40-3
router-query message interval, modifying
40-26
shared tree and source tree, overview
40-23
shortest path tree, delaying the use of
40-25
11-7
troubleshooting
11-6
43-12
policed-DSCP map for QoS
33-63
Catalyst 3750 Switch Software Configuration Guide
IN-32
OL-8550-01
Index
port-based authentication
policers
accounting
configuring
for each matched traffic class
33-49
for more than one traffic class
33-59
described
10-9
authentication server
defined
10-2
RADIUS server
33-4
10-2
displaying
33-79
client, defined
number of
33-34
configuration guidelines
types of
10-2
configuring
33-9
802.1x authentication
policing
described
guest VLAN
33-4
hierarchical
host mode
See hierarchical policy maps
token-bucket algorithm
33-9
policy-based routing
10-33
10-28
inaccessible authentication bypass
policy maps for QoS
described
10-34
switch-to-client retransmission time
33-8
default configuration
33-33
described
10-2
displaying statistics
10-41
nonhierarchical on physical ports
EAPOL-start frame
10-5
configuring
described
POP
33-49
33-9
10-30
10-21
33-11
33-33
10-31
10-1
device roles
33-53
configuration guidelines
10-26
switch-to-client frame-retransmission number
hierarchical on SVIs
configuring
10-27
restricted VLAN
configuration guidelines
10-28
RADIUS server parameters on the switch
33-49
33-80
hierarchical
10-29
10-29
RADIUS server
33-7
displaying
10-36
manual re-authentication of a client
quiet period
characteristics of
10-25
periodic re-authentication
See PBR
described
10-22
EAP-request/identity frame
EAP-response/identity frame
encapsulation
10-5
10-5
10-3
guest VLAN
1-25
configuration guidelines
port ACLs
defined
32-2
types of
32-3
Port Aggregation Protocol
See EtherChannel
described
host mode
10-13, 10-14
10-13
10-8
inaccessible authentication bypass
configuring
described
guidelines
10-36
10-15
10-24
initiation and message exchange
10-5
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-33
Index
port-based authentication (continued)
port-based authentication (continued)
MAC authentication bypass
configuring
described
voice VLAN
described
10-38
10-18
guidelines
10-24
magic packet
method lists
10-16
VVID
10-16
port blocking
multiple-hosts mode, described
10-8
AAA authorization
10-25
configuration tasks
10-12
1-4, 25-6
port-channel
Port Fast
10-11
RADIUS server attributes
described
20-2
enabling
20-12
mode, spanning tree
10-12
ports
support for
authorization state and dot1x port-control
command 10-7
authorized and unauthorized
10-7
10-15
10-16
1-7
port priority
MSTP
19-20
18-18
10-Gigabit Ethernet module
and voice VLAN
described
10-18
access
10-17
interactions
25-6
dynamic access
multiple-hosts mode
10-9
resetting to default values
stack changes, effects of
protected
10-8
10-41
switch
10-3
upgrading from a previous release
10-24, 33-26
VLAN assignment
routed
11-4
secure
25-7
13-3, 13-11
switch
11-2
trunks
13-3, 13-16
VLAN assignments
13-11
port security
AAA authorization
characteristics
13-4
25-5
static-access
10-3
RADIUS client
13-3
IEEE 802.1Q tunnel
10-40
11-6
11-3
blocking
10-17
statistics, displaying
13-3
ports
port security
10-25
10-11
configuration tasks
described
13-29
port membership modes, VLAN
STP
voice VLAN
as proxy
10-18
See EtherChannel
per-user ACLs
critical
PVID
wake-on-LAN, described
10-18
10-25
described
10-16
aging
25-15
and QoS trusted boundary
10-11
10-10
and stacking
configuring
25-16
25-12
default configuration
described
displaying
33-39
25-10
25-7
25-17
Catalyst 3750 Switch Software Configuration Guide
IN-34
OL-8550-01
Index
port security (continued)
on trunk ports
25-13
sticky learning
25-8
violations
private VLANs (continued)
isolated VLANs
mapping
with other features
16-15
ports
25-10
port-shutdown response, VMPS
13-28
Power over Ethernet
community
16-2
configuration guidelines
See PoE
configuring host ports
preemption
16-8
16-12
configuring promiscuous ports
default configuration
described
21-4
preemption delay
preferential treatment of traffic
35-54
preventing unauthorized access
primary links
9-1
16-1, 16-3
promiscuous ports
16-2
secondary VLANs
16-2
subdomains
traffic in
21-2
primary VLANs
16-2
primary VLANs
See QoS
prefix lists, BGP
16-2
promiscuous
21-4
16-1
16-5
privileged EXEC mode
16-1, 16-3
priority
16-13
13-4
isolated
default configuration
HSRP
16-14
monitoring
25-9
16-2, 16-3
2-2
privilege levels
changing the default for lines
39-7
overriding CoS
trusting CoS
command switch
15-6
exiting
15-6
private VLAN edge ports
overview
across multiple switches
and SDM template
16-4
community ports
16-2, 16-3
configuration guidelines
16-7, 16-8
16-6
16-7
end station access to
16-3
16-3
16-2
1-8, 25-5
35-35
Protocol-Independent Multicast Protocol
See PIM
provider edge devices
35-64
provisioning new members for a switch stack
16-10
default configuration
isolated port
16-2
protocol-dependent modules, EIGRP
16-2
configuration tasks
9-8
16-13
protected ports
community VLANs
IP addressing
setting a command with
defined
16-6
16-1
configuring
9-2, 9-7
configuring
and switch stacks
6-19
promiscuous ports
16-4
16-5
benefits of
9-9
mapping on member switches
private VLANs
and SVIs
6-19
9-9
logging into
See protected ports
9-9
5-7
proxy ARP
configuring
definition
35-12
35-10
with IP routing disabled
35-12
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-35
Index
pruning, VTP
QoS (continued)
disabling
classification
in VTP domain
on a port
class maps, described
14-14
defined
13-23
enabling
33-4
DSCP transparency, described
in VTP domain
on a port
flowchart
14-14
13-23
forwarding treatment
33-3
33-3
14-5
in frames and packets
overview
14-4
IP ACLs, described
pruning-eligible list
changing
for VTP pruning
options for IP traffic
33-5
policy maps, described
PVST+
18-10
IEEE 802.1Q trunking interoperability
instances supported
33-5, 33-7
options for non-IP traffic
14-5
14-14
described
33-5, 33-7
MAC ACLs, described
13-23
18-11
33-40
33-6
examples
VLANs
33-7
33-5
33-7
trust DSCP, described
33-5
trusted CoS, described
33-5
trust IP precedence, described
33-5
class maps
18-10
configuring
33-47
displaying
Q
33-79
configuration guidelines
auto-QoS
QoS
and MQC commands
33-25
standard QoS
33-1
33-33
configuring
auto-QoS
categorizing traffic
aggregate policers
33-21
configuration and defaults display
configuration guidelines
33-30
auto-QoS
33-59
33-20
default port CoS value
33-25
described
33-20
DSCP maps
disabling
33-27
DSCP transparency
displaying generated commands
33-27
displaying the initial configuration
effects on running configuration
egress queue defaults
enabling for VoIP
33-30
33-25
33-21
33-26
33-38
33-61
33-40
DSCP trust states bordering another domain
egress queue characteristics
33-45
IP standard ACLs
33-44
example configuration
33-28
MAC ACLs
ingress queue defaults
33-21
policy maps, hierarchical
list of generated commands
basic model
33-22
33-4
33-71
ingress queue characteristics
IP extended ACLs
33-41
33-67
33-46
33-53
policy maps on physical ports
33-49
port trust states within the domain
trusted boundary
33-37
33-39
default auto configuration
33-21
Catalyst 3750 Switch Software Configuration Guide
IN-36
OL-8550-01
Index
QoS (continued)
QoS (continued)
default standard configuration
IP phones
33-31
displaying statistics
33-79
automatic classification and queueing
DSCP transparency
33-40
detection and trusted settings
egress queues
CoS-to-DSCP
33-18
configuring shaped weights for SRR
33-76
displaying
configuring shared weights for SRR
33-77
DSCP-to-CoS
flowchart
33-64
policed-DSCP
33-17
scheduling, described
WTD, described
enabling globally
types of
33-74
overview
33-19
flowcharts
33-51, 33-56
33-4, 33-8
33-2
packet modification
33-35
33-62
33-12
marking, described
33-72
33-65
33-63
marked-down actions
33-4
setting WTD thresholds
33-20
policers
classification
configuring
33-6
egress queueing and scheduling
ingress queueing and scheduling
policing and marking
implicit deny
described
33-17
33-15
33-10
33-8
33-79
number of
33-34
33-9
policies, attaching to an interface
allocating bandwidth
described
33-69
buffer and bandwidth allocation, described
configuring shared weights for SRR
configuring the priority queue
33-70
33-69
33-16
33-68
33-4, 33-8
token bucket algorithm
characteristics of
hierarchical
33-49
33-80
33-8
hierarchical on SVIs
33-15
mapping DSCP or CoS values
priority queue, described
scheduling, described
setting WTD thresholds
33-16
33-68
33-9
policy maps
displaying
33-4
displaying the threshold map
33-8
policing
33-69
allocating buffer space
WTD, described
33-51, 33-56, 33-59
displaying
types of
33-7
ingress queues
flowchart
33-79
IP-precedence-to-DSCP
33-75
mapping DSCP or CoS values
described
33-61
DSCP-to-DSCP-mutation
33-4
displaying the threshold map
33-78
mapping tables
33-72
buffer allocation scheme, described
described
33-20, 33-39
limiting bandwidth on egress interface
allocating buffer space
33-20
33-53
nonhierarchical on physical ports
QoS label, defined
33-49
33-4
33-4
33-68
33-16
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-37
Index
QoS (continued)
RADIUS (continued)
queues
method list, defined
configuring egress characteristics
33-71
configuring ingress characteristics
high priority (expedite)
location of
33-19, 33-78
9-19
9-18
suggested network environments
macro
11-14
of interfaces
1-9
trust states
11-13
rapid convergence
bordering another domain
33-41
19-10
rapid per-VLAN spanning-tree plus
See rapid PVST+
33-5
trusted device
rapid PVST+
33-39
within the domain
described
33-37
quality of service
18-10
IEEE 802.1Q trunking interoperability
See QoS
instances supported
queries, IGMP
9-28
range
33-13
33-20
described
9-18
1-9
tracking services accessed by user
33-14
WTD, described
support for
overview
support for
33-13
SRR, described
rewrites
33-67
operation of
9-20
18-11
18-10
Rapid Spanning Tree Protocol
24-4
query solicitation, IGMP
See RSTP
24-13
RARP
35-10
rcommand command
R
6-18
RCP
configuration files
RADIUS
downloading
attributes
vendor-proprietary
vendor-specific
overview
9-30
uploading
authorization
B-16
B-18
image files
9-28
authentication
B-15
preparing the server
9-29
configuring
accounting
B-17
deleting old image
9-23
downloading
9-27
communication, global
9-21, 9-29
communication, per-server
9-20, 9-21
B-32
B-30
preparing the server
uploading
B-29
B-32
multiple UDP ports
9-21
reconfirmation interval, VMPS, changing
default configuration
9-20
reconfirming dynamic VLAN membership
defining AAA server groups
9-25
displaying the configuration
9-31
identifying the server
in clusters
recovery procedures
13-32
13-31
43-1
9-20
6-17
limiting the services to the user
9-27
Catalyst 3750 Switch Software Configuration Guide
IN-38
OL-8550-01
Index
redundancy
restricting access
EtherChannel
HSRP
NTP services
34-3
overview
39-1
STP
7-8
9-1
passwords and privilege levels
backbone
RADIUS
18-9
multidrop backbone
path cost
reverse address resolution
13-24
redundant links and UplinkFast
35-35
See RADIUS
See RARP
1058, RIP
35-20
1112, IP multicast and IGMP
Remote Copy Protocol
1157, SNMPv1
See RCP
1163, BGP
Remote Network Monitoring
35-42
1166, IP addresses
1253, OSPF
Remote SPAN
1267, BGP
35-42
See RSPAN
1305, NTP
7-2
28-3
report suppression, IGMP
1587, NSSAs
35-25
1757, RMON
29-2
24-6
1771, BGP
disabling
24-16, 37-11
1901, SNMPv2C
31-2
31-2
2236, IP multicast and IGMP
device manager
advertisements
32-15
31-2
35-20
authentication
35-49
resetting a UDLD-shutdown interface
restricted VLAN
27-6
configuring
35-23
35-21
default configuration
described
10-34
for IPv6
10-14
using with IEEE 802.1x
24-2
RIP
xliv
resequencing ACL entries
resets, in BGP
2273-2275, SNMPv3
xliv
Network Assistant
described
35-42
1902 to 1907, SNMPv2
xlv
configuring
35-6
35-25
described
requirements
24-2
31-2
See RMON
cluster
35-9
RFC
3-16
Remote Authentication Dial-In User Service
remote SPAN
13-32
Reverse Address Resolution Protocol
20-15
reliable transport protocol, EIGRP
reloading software
9-10
retry count, VMPS, changing
13-26
port priority
9-17
TACACS+
20-5
9-2
10-14
35-20
35-20
36-18
hop counts
split horizon
35-20
35-23
summary addresses
support for
35-23
1-11
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-39
Index
RMON
routing
default configuration
displaying status
default
29-3
dynamic
29-6
enabling alarms and events
groups supported
overview
35-3
29-3
redistribution of information
static
29-2
35-3
35-3
routing domain confederation, BGP
29-1
statistics
collecting group history
support for
29-5
29-5
See RIP
routing protocol administrative distances
RSPAN
1-12
root guard
characteristics
20-10
enabling
support for
28-10
28-9
configuration guidelines
20-17
default configuration
1-7
destination ports
28-8
MSTP
displaying status
28-25
in a switch stack
28-2
18-16
route calculation timers, OSPF
route dampening, BGP
35-31
routed packets, ACLs on
32-40
routed ports
in switch clusters
IP addresses on
28-5
session limits
11-4
28-11
sessions
6-9
11-26, 35-5
route-map command
28-8
1-12, 28-1
received traffic
35-5
28-9
28-6
monitoring ports
overview
configuring
35-84
route maps
BGP
interaction with other features
monitored ports
35-61
28-17
28-11
root switch
19-17
35-77
28-3
and stack changes
described
defined
35-59
Routing Information Protocol
collecting group Ethernet
STP
35-79
creating
28-18
defined
28-4
limiting source traffic to specific VLANs
35-52
policy-based routing
35-82
router ACLs
specifying monitored ports
28-18
with ingress traffic enabled
28-22
source ports
28-6
defined
32-2
transmitted traffic
types of
32-4
VLAN-based
route reflectors, BGP
router ID, OSPF
route targets, VPN
28-7
active topology
19-10
BPDU
35-50
route summarization, OSPF
28-6
RSTP
35-60
35-33
route selection, BGP
28-24
35-31
35-66
format
19-12
processing
19-13
designated port, defined
designated switch, defined
19-9
19-9
Catalyst 3750 Switch Software Configuration Guide
IN-40
OL-8550-01
Index
RSTP (continued)
secure HTTP client
interoperability with IEEE 802.1D
described
displaying
19-9
restarting migration process
topology changes
overview
configuring
9-47
9-48
secure HTTP server
19-26
configuring
19-13
displaying
19-9
port roles
9-46
9-48
secure MAC addresses
described
and switch stacks
19-9
synchronized
deleting
19-11
proposal-agreement handshake process
rapid convergence
edge ports and Port Fast
point-to-point links
19-10
19-10, 19-24
secure ports
configuring
25-16
25-7
secure remote connections
9-38
Secure Shell
19-10
root port, defined
25-9
25-8
and switch stacks
19-10
root ports
19-11
25-14
maximum number of
types of
cross-stack rapid convergence
described
19-10
25-17
See SSH
19-9
Secure Socket Layer
See also MSTP
running configuration, saving
3-10
See SSL
security, port
25-7
security features
S
1-8
sequence numbers in log messages
SC (standby command switch)
scheduled reloads
6-11
19-1
service-provider networks
described
and customer VLANs
8-1
switch stack consideration
5-10
17-2
and IEEE 802.1Q tunneling
Layer 2 protocols across
templates
configuring
number of
set-request operation
8-1
5-10, 8-4
setup program
43-10
43-9
severity levels, defining in system messages
30-9
SFPs
8-5
monitoring status of
8-1
dual IPv4 and IPv6
8-2
numbering of
11-30, 43-14
11-11
security and identification
8-1
secondary VLANs
8-5
17-9
31-5
replacing failed command switch
8-1
configuration guidelines
configuring
17-8
failed command switch replacement
SDM template
aggregator
17-1
Layer 2 protocol tunneling for EtherChannels
8-6
SDM mismatch mode
types of
14-3
service-provider network, MSTP and RSTP
3-16
SDM
desktop
server mode, VTP
30-8
16-2
status, displaying
43-13
43-14
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-41
Index
shaped round robin
SNMP
See SRR
accessing MIB variables with
show access-lists hw-summary command
32-22
show and more command output, filtering
2-10
show cdp traffic command
show configuration command
show forward command
agent
26-5
show cluster members command
described
31-4
disabling
31-8
authentication level
6-18
31-11
community strings
11-25
configuring
43-22
31-8
show interfaces command
11-20, 11-25
for cluster switches
show l2protocol command
17-13, 17-15, 17-16
overview
show platform forward command
engine ID
groups
11-25
shutdown command on interfaces
host
11-31
shutdown threshold for Layer 2 protocol packets
17-11
Simple Network Management Protocol
See SNMP
Smartports macros
applying macros
12-6
creating
12-5, 12-7
12-3
ifIndex values
31-6
in-band management
12-2
12-1
displaying
1-6
6-15
31-12
31-5
differences from traps
disabling
31-15
enabling
31-15
12-8
31-16
limiting system log messages to NMS
30-10
1-5, 31-3
managing clusters with
6-19
MIBs
location of
12-3
supported
12-2
notifications
overview
26-1
31-5
limiting access by TFTP servers
manager functions
12-4
default configuration
SNAP
12-5, 12-6
12-5
configuration guidelines
website
31-7
described
applying parameter values
tracing
31-7, 31-10
and trap keyword
applying global parameter values
31-7
informs
See SFPs
applying Cisco-default macros
31-16
31-7
in clusters
small form-factor pluggable modules
defined
31-4
default configuration
32-20, 32-21, 32-32, 32-34
interface description in
31-4
configuration examples
43-22
show running-config command
displaying ACLs
31-4
A-4
A-1
31-5
31-1, 31-4
security levels
31-3
status, displaying
31-17
system contact and location
trap manager, configuring
31-15
31-14
Catalyst 3750 Switch Software Configuration Guide
IN-42
OL-8550-01
Index
SNMP (continued)
SPAN (continued)
traps
monitored ports
described
28-6
monitoring ports
31-3, 31-5
differences from informs
overview
31-5
1-12, 28-1
disabling
31-15
ports, restrictions
enabling
31-12
received traffic
enabling MAC address notification
overview
types of
users
configuring ingress forwarding
31-12
versions supported
SNMPv2C
SNMPv3
31-2
creating
28-12
defined
28-4
28-16, 28-23
limiting source traffic to specific VLANs
31-2
removing destination (monitoring) ports
31-2
31-2
snooping, IGMP
24-2
software compatibility
specifying monitored ports
28-12
with ingress traffic enabled
28-15
source ports
See stacks, switch
VLAN-based
location in flash
recovery procedures
28-7
See STP
3-16
tar file format, described
13-19
Spanning Tree Protocol
43-2
scheduling reloads
28-14
28-6
spanning tree and native VLANs
B-20
28-16
28-6
transmitted traffic
software images
SPAN traffic
B-20
See also downloading and uploading
28-5
split horizon, RIP
source addresses
in IPv6 ACLs
28-11
sessions
31-1, 31-5
31-7, 31-10
SNMPv1
25-11
28-5
session limits
7-22
28-8
35-23
SRR
configuring
38-6
source addresses, in IPv4 ACLs
32-12
source-and-destination-IP address based forwarding,
EtherChannel 34-9
shared weights on egress queues
33-77
described
source-IP address based forwarding, EtherChannel
34-9
34-8
33-14
shared mode
33-14
default configuration
configuring
28-11
28-8
displaying status
28-25
interaction with other features
9-39
cryptographic software image
28-11
destination ports
1-10, 1-11
SSH
28-10
configuration guidelines
33-69
33-14
shaped mode
support for
SPAN
and stack changes
33-76
shared weights on ingress queues
source-and-destination MAC address forwarding,
EtherChannel 34-8
source-MAC address forwarding, EtherChannel
shaped weights on egress queues
described
1-6, 9-38
encryption methods
28-9
9-37
9-38
switch stack considerations
5-16, 9-38
user authentication methods, supported
9-39
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-43
Index
SSL
stack master
configuration guidelines
bridge ID (MAC address)
9-45
configuring a secure HTTP client
9-47
defined
5-1
configuring a secure HTTP server
9-46
election
5-4
cryptographic software image
described
9-42
stack member
MAC address of
accessing CLI of specific member
5-20
stack changes
member number
IPv6 routing
priority value
36-8
stack changes, effects on
defined
802.1x port-based authentication
ACL configuration
EtherChannel
24-7
35-4
IPv6 ACLs
5-15
stack protocol version
5-10
priority value
5-23
8-4
auto-advise
auto-copy
31-1
SPAN and RSPAN
28-10
5-21
bridge ID
6-16
30-2
13-6
5-11
5-11
1-2
5-6
CDP considerations
26-2
compatibility, software
configuration file
14-6
5-22
5-12
auto-upgrade
benefits
18-12
system message log
5-21
provisioning a new member
25-16
SDM template selection
switch clusters
11-11
member number
40-8
24-18
port security
stack member number
assigning information
multicast routing
VTP
5-22
accessing CLI of specific member
7-21
19-8
VLANs
5-7
stacks, switch
38-3
MAC address tables
SNMP
priority value
See also stacks, switch
IGMP snooping
MVR
5-23
5-6
replacing
42-3
39-4
MSTP
5-1
provisioning a new member
34-10
fallback bridging
5-21
36-8
number
34-13
5-21
displaying information of
IPv6
32-7
cross-stack EtherChannel
STP
10-8
26-2
IP routing
5-23
configuring
effects on
HSRP
5-4
See also stacks, switch
9-48
stack, switch
CDP
36-8
re-election
9-42
monitoring
IPv6
5-6
5-10
5-14
configuration scenarios
5-17
copying an image file from one member to another
default configuration
B-33
5-19
Catalyst 3750 Switch Software Configuration Guide
IN-44
OL-8550-01
Index
stacks, switch (continued)
description of
system messages
hostnames in the display
5-1
displaying information of
remotely monitoring
5-23
enabling persistent MAC address timer
in clusters
5-14, B-33
36-7
management connectivity
7-21
B-33
automatic upgrades with auto-upgrade
described
5-11
examples
5-12
manual upgrades with auto-advise
5-16
StackWise technology, Cisco
5-3
MSTP instances supported
described
40-8
configuring
considerations
offline configuration
5-7
effects of adding a provisioned switch
5-8
defined
6-2
priority
6-11
6-12
effects of removing a provisioned switch
5-9
requirements
effects of replacing a provisioned switch
5-9
virtual IP address
provisioned configuration, defined
provisioned switch, defined
5-7
provisioning a new member
5-22
5-7
6-3
6-12
See also cluster standby group and HSRP
standby group, cluster
See cluster standby group and HSRP
standby ip command
5-3, 43-8
provisioned switch
standby links
39-5
21-2
standby router
5-8
39-1
removing
5-9
standby timers, HSRP
replacing
5-9
startup configuration
replacing a failed member
software compatibility
stack protocol version
5-15
3-13
specific image
5-10
clearing
5-10
STP
39-9
booting
manually
5-10
software image version
bridge ID
1-3
standby command switch
18-10
multicast routing, stack master and member roles
adding
5-12
See also stacks, switch
5-3
partitioned
5-11
See also stack master and stack member
5-1
membership
5-15
version-mismatch (VM) mode
6-16
managing
7-14
system-wide configuration considerations
upgrading
MAC address considerations
merged
5-10
39-4
incompatible software and image upgrades
IPv6 on
30-2
system prompt consideration
5-20
hardware compatibility and SDM mismatch mode
HSRP considerations
30-1
3-14
B-19
configuration file
automatically downloading
18-3
instances supported
root port selection
18-10
18-3
stack root switch election
18-3
3-12
specifying the filename
3-12
default boot configuration
3-12
stateless autoconfiguration
36-5
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-45
Index
static access ports
STP (continued)
assigning to VLAN
BPDU filtering
13-11
described
20-3
static addresses
disabling
20-15
See addresses
enabling
20-14
defined
11-3, 13-3
static IP routing
BPDU guard
1-11
static MAC addressing
1-8
static routes
configuring
35-76
configuring for IPv6
static routing
disabling
20-14
enabling
20-13
hello time
10-41
18-23
18-22
maximum aging time
26-5
interface
path cost
11-30
IP multicast routing
18-20
port priority
40-50
root switch
35-34
18-23
18-18
18-16
QoS ingress and egress
33-79
secondary root switch
RMON group Ethernet
29-5
spanning-tree mode
RMON group history
SNMP input and output
VTP
18-13, 20-12
configuring
13-2
forward-delay time
802.1x
switch priority
29-5
18-21
counters, clearing
18-24
18-24
cross-stack UplinkFast
25-8
storm control
configuring
18-18
18-15
transmit hold-count
31-17
14-16
sticky learning
18-3
configuration guidelines
35-3
statistics
OSPF
20-2
BPDU message exchange
36-16
static VLAN membership
CDP
described
25-3
described
20-5
enabling
20-16
described
25-1
default configuration
disabling
25-5
default optional feature configuration
displaying
25-17
support for
1-4
thresholds
25-1
designated port, defined
designated switch, defined
disabling
20-4
BackboneFast
20-12
18-4
18-4
detecting indirect link failures
STP
accelerating root port selection
18-13
20-8
18-16
displaying status
18-24
EtherChannel guard
described
20-7
described
20-10
disabling
20-17
disabling
20-17
enabling
20-16
enabling
20-17
Catalyst 3750 Switch Software Configuration Guide
IN-46
OL-8550-01
Index
STP (continued)
STP (continued)
extended system ID
port priorities
effects on root switch
preventing root switch selection
18-16
effects on the secondary root switch
overview
protocols supported
18-18
unexpected behavior
features supported
described
1-6
IEEE 802.1t and VLAN identifier
20-17
root port, defined
18-9
configuring
18-10
election
disabled
18-8
18-16
effects of extended system ID
20-2
interface states
18-7
stack changes, effects of
learning
18-7
status, displaying
listening
18-7
superior BPDU
overview
18-5
timers, described
interoperability and compatibility among modes
18-2
Layer 2 protocol tunneling
17-8
limitations with IEEE 802.1Q trunks
load sharing
overview
20-3
enabling
20-15
VLAN-bridge
7-2
13-26, 13-27
20-2
enabling
20-12
35-40
18-9
1-7
13-28
7-13
SunNet Manager
supernet
16-1
35-7
1-5
35-8
SVIs
and IP unicast routing
and router ACLs
described
35-30
35-7
summer time
18-10
18-2
Port Fast
18-11
success response, VMPS
20-18
optional features supported
path costs
described
subnet zero
20-11
multicast addresses, effect of
overview
UplinkFast
subnet mask
modes supported
18-22
subdomains, private VLAN
13-24
loop guard
enabling
18-12
18-24
stub routing, EIGRP
13-26
20-2
18-3
stub areas, OSPF
13-24
using port priorities
described
18-11
18-11
stratum, NTP
using path costs
18-16
shutdown Port Fast-enabled port
18-6, 18-7
18-4, 18-16
18-3
unexpected behavior
keepalive messages
18-3
root switch
18-3
blocking
18-3
root port selection on a switch stack
18-5
interface state, blocking to forwarding
forwarding
20-10
enabling
18-4
IEEE 802.1D and multicast addresses
instances supported
18-9
root guard
18-16
IEEE 802.1D and bridge ID
20-10
18-10
redundant connectivity
18-4
inferior BPDU
13-25
35-5
32-4
connecting VLANs
11-9
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-47
Index
system message logging
SVIs (continued)
defined
default configuration
11-5
routing between VLANs
defining error message severity levels
13-2
switch clustering technology
disabling
6-1
See also clusters, switch
switch console port
enabling
1-6
limiting messages
32-38
Switched Port Analyzer
message format
See SPAN
overview
switched ports
switchport block unicast command
switchport command
30-10
30-10
30-2
30-1
setting the display destination device
25-7
stack changes, effects of
25-7
switchport protected command
syslog facility
17-6
switch priority
30-5
30-6
1-12
time stamps, enabling and disabling
25-6
30-8
30-2
synchronizing log messages
11-17
switchport mode dot1q-tunnel command
30-8
UNIX syslog servers
configuring the daemon
19-22
30-11
configuring the logging facility
18-21
switch software features
facilities supported
1-1
switch virtual interface
30-12
30-13
system MTU and IEEE 802.1Q tunneling
See SVI
17-5
system name
synchronization, BGP
default configuration
35-46
syslog
default setting
See system message logging
7-15
7-15
manual configuration
system clock
7-15
See also DNS
configuring
system prompt, default setting
daylight saving time
manually
system resources, optimizing
7-13
7-14, 7-15
8-1
7-11
summer time
time zones
7-13
T
7-12
displaying the time and date
overview
30-13
sequence numbers, enabling and disabling
11-2
switchport block multicast command
STP
30-5
level keywords, described
switched packets, ACLs on
30-13
facility keywords, described
See SDM
30-9
30-4
displaying the configuration
Switch Database Management
MSTP
30-4
7-12
7-1
See also NTP
TACACS+
accounting, defined
9-11
authentication, defined
authorization, defined
9-11
9-11
Catalyst 3750 Switch Software Configuration Guide
IN-48
OL-8550-01
Index
TACACS+ (continued)
TFTP (continued)
configuring
configuring for autoconfiguration
accounting
image files
9-17
authentication key
authorization
deleting
9-13
default configuration
uploading
9-13
identifying the server
TFTP server
9-13
See TDR
1-9
9-17
tagged packets
time-range command
32-17
time ranges in ACLs
32-17
time stamps in log messages
17-3
Layer 2 protocol
time zones
17-8
tar files
30-8
7-12
Token Ring VLANs
support for
B-6
displaying the contents of
extracting
ToS
1-12
Telnet
accessing management interfaces
setting a password
templates, SDM
2-11
1-10
and ARP
43-17
and CDP
43-16
broadcast traffic
described
1-6
43-16
43-16
IP addresses and subnets
9-6
multicast traffic
9-43
Terminal Access Controller Access Control System Plus
See TACACS+
TFTP
traceroute command
configuration files
43-17
43-16
usage guidelines
9-6
43-16
43-16
multiple devices on a port
unicast traffic
terminal lines, setting a password
downloading
43-17
MAC addresses and VLANs
8-2
temporary self-signed certificate
43-16
43-18
See also IP traceroute
B-11
preparing the server
uploading
14-4
traceroute, Layer 2
B-20
number of connections
13-6
VTP support
B-7
B-7
image file format
TDR
25-2
Time Domain Reflector
tracking services accessed by user
creating
1-5
See NTP and system clock
9-10
IEEE 802.1Q
31-16
time
9-16
9-12
support for
B-24
threshold, traffic level
limiting the services to the user
B-21
limiting access by servers
9-17
6-17
overview
B-22
preparing the server
9-14
displaying the configuration
operation of
B-23
downloading
9-16
login authentication
in clusters
3-6
B-10
B-12
configuration files in base directory
3-6
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-49
Index
traffic
trunks
blocking flooded
fragmented
allowed-VLAN list
25-7
configuring
32-5
fragmented IPv6
unfragmented
ISL
38-2
parallel
transparent mode, VTP
trap-door mechanism
to non-DTP device
3-2
13-23
13-17
trusted boundary for QoS
configuring MAC address notification
configuring managers
between QoS domains
31-12
classification options
support for
31-12
troubleshooting
trustpoints, CA
connectivity problems
27-1
defined
displaying crash information
43-24
IEEE 802.1Q
PIMv1 and PIMv2 interoperability problems
setting packet forwarding
show forward command
40-23
43-13
9-42
17-1
17-1
Layer 2 protocol
defined
described
43-22
17-8
13-4
11-4, 17-1
IEEE 802.1Q, configuring
31-4
17-6
incompatibilities with other features
43-20
17-6
twisted-pair Ethernet, detecting unidirectional links
43-14
with system message logging
with traceroute
33-37
tunnel ports
43-22
SFP security and identification
33-39
tunneling
43-14, 43-16, 43-17
detecting unidirectional links
with ping
33-5
1-10
within a QoS domain
31-1, 31-5
with debug commands
33-41
ensuring port security for IP phones
7-22, 31-12
with CiscoWorks
33-39
trusted port states
7-22
31-3
notification types
13-23
13-26
pruning-eligible list
14-3, 14-12
traps
overview
13-24, 13-25
native VLAN for untagged traffic
see STP
enabling
13-26
using STP port priorities
25-1
transmit hold-count
defined
13-16
setting STP path costs
1-10
traffic suppression
13-21, 13-25, 13-27
load sharing
32-5
traffic policing
13-21
30-1
27-1
type of service
See ToS
43-17
trunk failover
See link-state tracking
trunking encapsulation
1-7
trunk ports
UDLD
configuring
defined
U
13-20
11-3, 13-3
encapsulation
configuration guidelines
default configuration
27-4
27-4
13-21, 13-25, 13-27
Catalyst 3750 Switch Software Configuration Guide
IN-50
OL-8550-01
Index
upgrading software images
UDLD (continued)
See downloading
disabling
globally
UplinkFast
27-5
on fiber-optic interfaces
per interface
27-5
27-6
echoing detection mechanism
27-3
enabling
globally
neighbor database
enabling
20-15
27-1
27-1
status, displaying
UDP, configuring
B-10, B-13, B-16
reasons for
B-9
using FTP
B-14
using RCP
B-18
using TFTP
27-6
preparing
unauthorized ports with IEEE 802.1x
and adding static addresses
B-28
1-5
using RCP
B-32
7-26
using TFTP
and broadcast MAC addresses
10-7
B-24
User Datagram Protocol
7-25
See UDP
7-25
and multicast addresses
user EXEC mode
7-25
and router MAC addresses
configuration guidelines
2-2
username-based authentication
7-25
9-6
7-25
7-25
V
25-1
unicast storm control command
unicast traffic, blocking
25-4
version-dependent transparent mode
25-7
automatic upgrades with auto-upgrade
See UDLD
described
UNIX syslog servers
displaying
daemon configuration
30-11
5-11
5-11
5-11
manual upgrades with auto-advise
30-13
message logging configuration
14-4
version-mismatch (VM) mode
UniDirectional Link Detection protocol
5-12
virtual IP address
30-12
unrecognized Type-Length-Value (TLV) support
upgrading information
B-19
using FTP
unicast MAC address filtering
facilities supported
B-21, B-25, B-29
reasons for
35-16
and CPU packets
B-12
image files
27-7
1-6
See release notes
1-7
preparing
17-10
27-2
resetting an interface
unicast storm
20-16
configuration files
27-6
link-detection mechanism
described
disabling
uploading
27-5
Layer 2 protocol tunneling
support for
20-3
support for
per interface
overview
described
cluster standby group
14-4
command switch
6-12
6-12
Virtual Private Network
See VPN
virtual router
39-1, 39-2
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-51
Index
vlan.dat file
VLAN membership
13-5
VLAN 1, disabling on a trunk port
VLAN 1 minimization
13-22
modes
13-22
VLAN ACLs
13-3
See VQP
vlan-assignment response, VMPS
VLANs
13-28
adding
VLAN configuration
at bootup
13-9
adding to VLAN database
13-8
VLAN configuration mode
allowed on trunk
2-2, 13-7
VLAN database
13-21
configuration guidelines, normal-range VLANs
VLAN configuration saved in
VLANs saved in
configuration options
13-7
configuring
13-4
vlan database command
VLAN filtering and SPAN
vlan global configuration command
VLAN ID, discovering
13-7
creating in VLAN configuration mode
default configuration
14-2
VLAN Management Policy Server
deleting
See VMPS
features
internal
32-31
13-1, 13-12
1-7
illustrated
32-35
13-2
13-13
in the switch stack
32-30
13-8
13-16
extended-range
32-34
13-6
creating
32-32
limiting source traffic with RSPAN
defined
32-2
limiting source traffic with SPAN
denying access to a server example
denying and permitting packets
displaying
support for
32-32
normal-range
parameters
1-8
32-35
28-16
24-18
13-23
13-1, 13-4
number supported
32-34
28-24
13-9
native, configuring
32-42
wiring closet configuration example
modifying
multicast
32-32
examples of ACLs and VLAN maps
removing
32-36
17-3
11-2, 13-1
displaying
32-31
VLAN maps
configuration guidelines
13-10
13-10
described
VLAN map entries, order of
13-9
customer numbering in service-provider networks
7-27
VLAN management domain
13-13
11-9
creating in config-vlan mode
28-7
13-6
13-1
connecting through SVIs
17-5
13-13
13-7
configuring IDs 1006 to 4094
13-7
vlan dot1q tag native command
common uses for
13-3, 13-6, 13-13
configuration guidelines, extended-range VLANs
13-8
14-1
configuring
18-10
and spanning-tree instances
and startup configuration file
applying
13-9
aging dynamic addresses
13-8
and VTP
13-31
VLAN Query Protocol
See VLAN maps
saving
confirming
1-7
13-5
port membership modes
static-access ports
13-3
13-11
Catalyst 3750 Switch Software Configuration Guide
IN-52
OL-8550-01
Index
VLANs (continued)
voice VLAN (continued)
STP and IEEE 802.1Q trunks
supported
displaying
18-11
IP phone data traffic, described
13-2
Token Ring
traffic between
configuring routing in
18-11, 42-2
forwarding
14-3
VLAN Trunking Protocol
routes
VQP
13-33
configuration example
default configuration
tables
13-29
35-63
adding a client to a domain
advertisements
13-29
14-14
13-19, 14-3
and extended-range VLANs
13-32
troubleshooting
35-66
VTP
13-28
reconfirming
1-7, 13-28
defining
13-29
dynamic port membership
and normal-range VLANs
13-33
entering server address
client mode, configuring
13-30
mapping MAC addresses to VLANs
13-28
14-2
14-2
14-11
configuration
global configuration mode
13-33
reconfirmation interval, changing
reconfirming membership
retry count, changing
guidelines
13-32
requirements
13-32
saving
15-1
14-7
14-8
privileged EXEC mode
13-31
voice VLAN
14-7
14-9
14-7
VLAN configuration mode
Cisco 7960 phone, port connections
configuration guidelines
15-1
15-3
configuring IP phones for data traffic
override CoS of incoming frame
configuring ports for voice traffic in
802.1p priority tagged frames
802.1Q frames
15-5
connecting to an IP phone
default configuration
15-1
15-3
15-4
15-5
14-8
configuration mode options
14-7
configuration requirements
14-9
configuration revision number
guideline
15-6
trust CoS priority of incoming frame
described
35-64
VRF
13-33
configuration guidelines
voice-over-IP
35-63
See VRF
administering
monitoring
35-66
VPN routing and forwarding table
13-16
VMPS
described
35-69
in service provider networks
See VTP
description
15-2
VPN
13-2
VLAN-bridge STP
VLAN trunks
15-2
IP phone voice traffic, described
13-6
VTP modes
15-6
15-6
resetting
14-14
14-15
configuring
client mode
14-11
server mode
14-9
transparent mode
consistency checks
default configuration
14-12
14-4
14-7
Catalyst 3750 Switch Software Configuration Guide
OL-8550-01
IN-53
Index
VTP (continued)
W
described
14-1
disabling
14-12
domain names
domains
weighted tail drop
See WTD
14-8
wizards
14-2
Layer 2 protocol tunneling
17-8
WTD
described
modes
client
14-3, 14-11
server
14-3, 14-9
transitions
monitoring
egress queue-sets
ingress queues
support for
14-3, 14-12
33-72
33-68
1-10, 1-11
14-16
passwords
14-8
X
pruning
disabling
14-14
enabling
14-14
examples
14-5
overview
14-4
support for
Xmodem protocol
43-2
1-7
pruning-eligible list, changing
server mode, configuring
statistics
33-13
setting thresholds
14-3
transparent
13-23
14-9
14-16
support for
1-7
Token Ring support
14-4
transparent mode, configuring
using
1-3
14-12
14-1
version, guidelines
Version 1
14-9
14-4
Version 2
configuration guidelines
disabling
14-13
enabling
14-13
overview
14-4
14-9
Catalyst 3750 Switch Software Configuration Guide
IN-54
OL-8550-01