Software Configuration Guide
Page 2
...THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. and certain other company. (0304R) Catalyst 3560 Switch Software Configuration Guide Copyright © 2004 Cisco Systems, Inc. The Cisco implementation of TCP header compression is an... and VCO are service marks of the word partner does not imply a partnership relationship between Cisco and any other countries. All other trademarks mentioned in the U.S. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. IF YOU ARE UNABLE TO LOCATE ...
...THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. and certain other company. (0304R) Catalyst 3560 Switch Software Configuration Guide Copyright © 2004 Cisco Systems, Inc. The Cisco implementation of TCP header compression is an... and VCO are service marks of the word partner does not imply a partnership relationship between Cisco and any other countries. All other trademarks mentioned in the U.S. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. IF YOU ARE UNABLE TO LOCATE ...
Software Configuration Guide
Page 10
...1X with Guest VLAN 9-8 Using 802.1X with Per-User ACLs 9-8 Configuring 802.1X Authentication 9-9 Default 802.1X Configuration 9-10 802.1X Configuration Guidelines 9-11 Configuring 802.1X Authentication 9-11 Configuring the Switch-to-RADIUS-Server Communication 9-13 Configuring Periodic Re-Authentication 9-14 Manually Re-Authenticating a Client Connected to a Port 9-14 Changing... 10-11 Configuring Interface Speed and Duplex Mode 10-12 Configuration Guidelines 10-13 Setting the Interface Speed and Duplex Parameters 10-13 Catalyst 3560 Switch Software Configuration Guide x 78-16156-01
...1X with Guest VLAN 9-8 Using 802.1X with Per-User ACLs 9-8 Configuring 802.1X Authentication 9-9 Default 802.1X Configuration 9-10 802.1X Configuration Guidelines 9-11 Configuring 802.1X Authentication 9-11 Configuring the Switch-to-RADIUS-Server Communication 9-13 Configuring Periodic Re-Authentication 9-14 Manually Re-Authenticating a Client Connected to a Port 9-14 Changing... 10-11 Configuring Interface Speed and Duplex Mode 10-12 Configuration Guidelines 10-13 Setting the Interface Speed and Duplex Parameters 10-13 Catalyst 3560 Switch Software Configuration Guide x 78-16156-01
Software Configuration Guide
Page 83
...or subnet mask are an experienced user familiar with IP address information and a configuration file. No password is defined. If the DHCP server is automatically configured at startup with the switch configuration steps, manually configure the switch. Otherwise, use the setup program ...various lease options associated with IP addresses. The switch can be on the same LAN or on your switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 4-3 The DHCP server or the DHCP server feature running on your switch. A relay device forwards broadcast traffic between two...
...or subnet mask are an experienced user familiar with IP address information and a configuration file. No password is defined. If the DHCP server is automatically configured at startup with the switch configuration steps, manually configure the switch. Otherwise, use the setup program ...various lease options associated with IP addresses. The switch can be on the same LAN or on your switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 4-3 The DHCP server or the DHCP server feature running on your switch. A relay device forwards broadcast traffic between two...
Software Configuration Guide
Page 96
... relative to the configured time zone on each switch must be synchronized with reload? [confirm] 4-16 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 If your switch is earlier than the current time) or on the current day at 7:30 p.m: Switch# reload at 19:30 Reload scheduled for 19... shows how to reload the software on the switch on the next day (if the specified time is configured for manual booting, do not reload it from the remote user's control. Configuring a Scheduled Reload To configure your configuration file, the switch prompts you proceed in 2 hours and 25 ...
... relative to the configured time zone on each switch must be synchronized with reload? [confirm] 4-16 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 If your switch is earlier than the current time) or on the current day at 7:30 p.m: Switch# reload at 19:30 Reload scheduled for 19... shows how to reload the software on the switch on the next day (if the specified time is configured for manual booting, do not reload it from the remote user's control. Configuring a Scheduled Reload To configure your configuration file, the switch prompts you proceed in 2 hours and 25 ...
Software Configuration Guide
Page 124
...that is a critical resource; For configuration information, see the "Configuring Time and Date Manually" section on a device is , whether it should use IP broadcast messages instead. no ...time is significantly different than one packet per minute is from these services: • User show commands • Logging and debugging messages The system clock keeps track of NTP...the time appears correctly for display purposes and is lower. you should form associations. Catalyst 3560 Switch Software Configuration Guide 6-2 78-16156-01 Understanding Network Time Protocol The NTP is one...
...that is a critical resource; For configuration information, see the "Configuring Time and Date Manually" section on a device is , whether it should use IP broadcast messages instead. no ...time is significantly different than one packet per minute is from these services: • User show commands • Logging and debugging messages The system clock keeps track of NTP...the time appears correctly for display purposes and is lower. you should form associations. Catalyst 3560 Switch Software Configuration Guide 6-2 78-16156-01 Understanding Network Time Protocol The NTP is one...
Software Configuration Guide
Page 138
... contains this domain, for privileged EXEC mode. For example, Cisco Systems is a commercial organization that allows a device to manually configure a system prompt: Step 1 Step 2 Command configure ... the DNS Configuration, page 6-18 6-16 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 The default prompt is present on your switch, you must first identify the host names,...for user EXEC mode or a pound sign (#) for example, the File Transfer Protocol (FTP) system is cisco.com. Configuring a System Name and Prompt Chapter 6 Administering the Switch Configuring ...
... contains this domain, for privileged EXEC mode. For example, Cisco Systems is a commercial organization that allows a device to manually configure a system prompt: Step 1 Step 2 Command configure ... the DNS Configuration, page 6-18 6-16 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 The default prompt is present on your switch, you must first identify the host names,...for user EXEC mode or a pound sign (#) for example, the File Transfer Protocol (FTP) system is cisco.com. Configuring a System Name and Prompt Chapter 6 Administering the Switch Configuring ...
Software Configuration Guide
Page 202
...first CDP message from the IP phone. Cisco IP phones do not relay CDP messages ...switch through the IP phone. Using 802.1X with a PVID and a VVID. Catalyst 3560 Switch Software Configuration Guide 9-6 78-16156-01 Port security applies to the switch port. For more information about enabling port security on your switch... 9 Configuring 802.1X Port-Based Authentication • When you manually remove an 802.1X client address from other devices. Normal authentication...you enable the multiple-hosts mode and when an 802.1X user is a special access port associated with Voice VLAN Ports ...
...first CDP message from the IP phone. Cisco IP phones do not relay CDP messages ...switch through the IP phone. Using 802.1X with a PVID and a VVID. Catalyst 3560 Switch Software Configuration Guide 9-6 78-16156-01 Port security applies to the switch port. For more information about enabling port security on your switch... 9 Configuring 802.1X Port-Based Authentication • When you manually remove an 802.1X client address from other devices. Normal authentication...you enable the multiple-hosts mode and when an 802.1X user is a special access port associated with Voice VLAN Ports ...
Software Configuration Guide
Page 205
...the associated port. For examples of the per -user ACL attribute is disabled for single-host mode.... • Configuring the Switch-to-RADIUS-Server Communication, page 9-13 (required) • Configuring Periodic Re-Authentication, page 9-14 (optional) • Manually Re-Authenticating a Client...Switch-to-Client Frame-Retransmission Number, page 9-16 (optional) • Configuring the Host Mode, page 9-17 (optional) • Configuring a Guest VLAN, page 9-18 (optional) • Resetting the 802.1X Configuration to the Default Values, page 9-18 (optional) 78-16156-01 Catalyst 3560 Switch...
...the associated port. For examples of the per -user ACL attribute is disabled for single-host mode.... • Configuring the Switch-to-RADIUS-Server Communication, page 9-13 (required) • Configuring Periodic Re-Authentication, page 9-14 (optional) • Manually Re-Authenticating a Client...Switch-to-Client Frame-Retransmission Number, page 9-16 (optional) • Configuring the Host Mode, page 9-17 (optional) • Configuring a Guest VLAN, page 9-18 (optional) • Resetting the 802.1X Configuration to the Default Values, page 9-18 (optional) 78-16156-01 Catalyst 3560 Switch...
Software Configuration Guide
Page 380
...user [count | group ip_address]] show ip igmp snooping mrouter [vlan vlan-id] show ip igmp snooping querier [vlan vlan-id] Purpose Display the snooping configuration information for all VLANs on dynamically learned and manually configured multicast router interfaces. Display multicast table information for the switch...IP address. • user-Display only the user-configured multicast entries. Note When you enable IGMP snooping, the switch automatically learns the interface to the command reference for this release. 19-12 Catalyst 3560 Switch Software Configuration Guide 78-...
...user [count | group ip_address]] show ip igmp snooping mrouter [vlan vlan-id] show ip igmp snooping querier [vlan vlan-id] Purpose Display the snooping configuration information for all VLANs on dynamically learned and manually configured multicast router interfaces. Display multicast table information for the switch...IP address. • user-Display only the user-configured multicast entries. Note When you enable IGMP snooping, the switch automatically learns the interface to the command reference for this release. 19-12 Catalyst 3560 Switch Software Configuration Guide 78-...
Software Configuration Guide
Page 432
...same RSPAN VLAN and presenting traffic to the user. SPAN and RSPAN Interaction with Other Features ... on trunk ports. • RSPAN VLANs must manually configure all intermediate switches. If a port is removed from a monitored ...EtherChannel group, it is automatically removed from another VLAN to the monitored VLAN, that traffic is not monitored and not received on trunk ports carrying an RSPAN VLAN. • Cisco...switches. • VLAN and trunking-You can participate in the group, there is no data to monitor. 23-8 Catalyst 3560 Switch...
...same RSPAN VLAN and presenting traffic to the user. SPAN and RSPAN Interaction with Other Features ... on trunk ports. • RSPAN VLANs must manually configure all intermediate switches. If a port is removed from a monitored ...EtherChannel group, it is automatically removed from another VLAN to the monitored VLAN, that traffic is not monitored and not received on trunk ports carrying an RSPAN VLAN. • Cisco...switches. • VLAN and trunking-You can participate in the group, there is no data to monitor. 23-8 Catalyst 3560 Switch...
Software Configuration Guide
Page 466
... System daemon Kernel Locally defined messages Line printer system Mail system USENET news System use System log User process UNIX-to the Cisco IOS Configuration Fundamentals Command Reference for your UNIX operating system. For information about these facilities, consult the operator's manual for Release 12.1. 25-12 Catalyst 3560 Switch Software Configuration Guide 78-16156-01
... System daemon Kernel Locally defined messages Line printer system Mail system USENET news System use System log User process UNIX-to the Cisco IOS Configuration Fundamentals Command Reference for your UNIX operating system. For information about these facilities, consult the operator's manual for Release 12.1. 25-12 Catalyst 3560 Switch Software Configuration Guide 78-16156-01
Software Configuration Guide
Page 544
An existing user configuration can manually enable policing, as if the commands were entered ...described in the "Configuring a QoS Policy" section on page 28-36. 28-22 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 If all ports. If necessary, you can enable ...cisco-phone Effects of a Cisco IP Phone. These actions occur without saving the current configuration to detect the presence or absence of Auto-QoS on the Configuration When auto-QoS is enabled, the auto qos voip interface configuration command and the generated configuration are successfully applied, any user...
An existing user configuration can manually enable policing, as if the commands were entered ...described in the "Configuring a QoS Policy" section on page 28-36. 28-22 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 If all ports. If necessary, you can enable ...cisco-phone Effects of a Cisco IP Phone. These actions occur without saving the current configuration to detect the presence or absence of Auto-QoS on the Configuration When auto-QoS is enabled, the auto qos voip interface configuration command and the generated configuration are successfully applied, any user...
Software Configuration Guide
Page 592
...switch port. on Forces a port to on (manual configuration). Switch ports exchange PAgP packets only with other ports by sending PAgP packets. PAgP facilitates the automatic creation of EtherChannels by vendors to support PAgP. By using PAgP, the switch...Cisco switches and on those switches licensed by exchanging PAgP packets between Ethernet ports. Both the auto and desirable modes enable ports to the spanning tree as the modes are forced to a port channel is misconfigured, packet loss or spanning-tree loops might occur. 29-4 Catalyst 3560 Switch... the user-configurable ...
...switch port. on Forces a port to on (manual configuration). Switch ports exchange PAgP packets only with other ports by sending PAgP packets. PAgP facilitates the automatic creation of EtherChannels by vendors to support PAgP. By using PAgP, the switch...Cisco switches and on those switches licensed by exchanging PAgP packets between Ethernet ports. Both the auto and desirable modes enable ports to the spanning tree as the modes are forced to a port channel is misconfigured, packet loss or spanning-tree loops might occur. 29-4 Catalyst 3560 Switch... the user-configurable ...
Software Configuration Guide
Page 876
...9-18 host mode 9-17 manual re-authentication of a client 9-14 periodic re-authentication 9-14 quiet period 9-15 RADIUS server 9-14 RADIUS server parameters on the switch 9-13 switch-to-client frame-retransmission number 9-16 switch-to-client retransmission time ... and message exchange 9-3 method lists 9-11 multiple-hosts mode, described 9-17 per-user ACLs AAA authorization 9-11 configuration tasks 9-9 described 9-8 RADIUS server attributes 9-8 IN-26 Catalyst 3560 Switch Software Configuration Guide port-based authentication (continued) ports authorization state and dot1x port-control...
...9-18 host mode 9-17 manual re-authentication of a client 9-14 periodic re-authentication 9-14 quiet period 9-15 RADIUS server 9-14 RADIUS server parameters on the switch 9-13 switch-to-client frame-retransmission number 9-16 switch-to-client retransmission time ... and message exchange 9-3 method lists 9-11 multiple-hosts mode, described 9-17 per-user ACLs AAA authorization 9-11 configuration tasks 9-9 described 9-8 RADIUS server attributes 9-8 IN-26 Catalyst 3560 Switch Software Configuration Guide port-based authentication (continued) ports authorization state and dot1x port-control...
Software Configuration Guide
Page 884
... on ingress queues 28-55 IN-34 Catalyst 3560 Switch Software Configuration Guide SRR (continued) described ...38 encryption methods 8-38 user authentication methods, supported 8-38 Standby Command Configuration window 5-20 standby command switch configuring 5-19 considerations 5-...11 defined 5-2 priority 5-10 requirements 5-3 virtual IP address 5-11 See also cluster standby group and HSRP standby group, cluster See cluster standby group and HSRP standby ip command 31-5 standby router 31-1 standby timers, HSRP 31-8 startup configuration booting manually...
... on ingress queues 28-55 IN-34 Catalyst 3560 Switch Software Configuration Guide SRR (continued) described ...38 encryption methods 8-38 user authentication methods, supported 8-38 Standby Command Configuration window 5-20 standby command switch configuring 5-19 considerations 5-...11 defined 5-2 priority 5-10 requirements 5-3 virtual IP address 5-11 See also cluster standby group and HSRP standby group, cluster See cluster standby group and HSRP standby ip command 31-5 standby router 31-1 standby timers, HSRP 31-8 startup configuration booting manually...
Software Configuration Guide
Page 887
... 6-15 default setting 6-15 manual configuration 6-15 See also DNS system prompt default setting 6-15 manual configuration 6-16 system resources, optimizing...user 8-17 tar files creating B-6 displaying the contents of B-6 extracting B-7 image file format B-21 Telnet accessing management interfaces 2-9 from a browser 2-9 number of connections 1-4 setting a password 8-6 templates, SDM 7-1 Terminal Access Controller Access Control System Plus See TACACS+ terminal lines, setting a password 8-6 TFTP configuration files downloading B-11 preparing the server B-10 uploading B-11 Catalyst 3560 Switch...
... 6-15 default setting 6-15 manual configuration 6-15 See also DNS system prompt default setting 6-15 manual configuration 6-16 system resources, optimizing...user 8-17 tar files creating B-6 displaying the contents of B-6 extracting B-7 image file format B-21 Telnet accessing management interfaces 2-9 from a browser 2-9 number of connections 1-4 setting a password 8-6 templates, SDM 7-1 Terminal Access Controller Access Control System Plus See TACACS+ terminal lines, setting a password 8-6 TFTP configuration files downloading B-11 preparing the server B-10 uploading B-11 Catalyst 3560 Switch...