Software Configuration Guide
Page 29
... Password 35-4 Procedure with Password Recovery Enabled 35-5 Procedure with Password Recovery Disabled 35-6 Recovering from a Command Switch Failure 35-8 Replacing a Failed Command Switch with a Cluster Member 35-8 Replacing a Failed Command Switch with Another Switch 35-10 Recovering from Lost Cluster Member Connectivity 35-11 Preventing Autonegotiation Mismatches 35-12 Troubleshooting Power over Ethernet... Error Message Output 35-19 Using the show platform forward Command 35-19 Using the crashinfo File 35-22 Contents 78-16156-01 Catalyst 3560 Switch Software Configuration Guide xxix
... Password 35-4 Procedure with Password Recovery Enabled 35-5 Procedure with Password Recovery Disabled 35-6 Recovering from a Command Switch Failure 35-8 Replacing a Failed Command Switch with a Cluster Member 35-8 Replacing a Failed Command Switch with Another Switch 35-10 Recovering from Lost Cluster Member Connectivity 35-11 Preventing Autonegotiation Mismatches 35-12 Troubleshooting Power over Ethernet... Error Message Output 35-19 Using the show platform forward Command 35-19 Using the crashinfo File 35-22 Contents 78-16156-01 Catalyst 3560 Switch Software Configuration Guide xxix
Software Configuration Guide
Page 83
... LANs. A router does not forward broadcast packets, but it forwards packets based on your switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 4-3 No default gateway is needed on your switch. DHCP is defined. The DHCP server or the DHCP server feature running on a different LAN... and a Domain Name System (DNS) server. If the DHCP server is running on your switch can act as both a DHCP client and a DHCP server. DHCP-based autoconfiguration replaces the BOOTP client functionality on the destination IP address in which designated DHCP servers allocate network addresses...
... LANs. A router does not forward broadcast packets, but it forwards packets based on your switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 4-3 No default gateway is needed on your switch. DHCP is defined. The DHCP server or the DHCP server feature running on a different LAN... and a Domain Name System (DNS) server. If the DHCP server is running on your switch can act as both a DHCP client and a DHCP server. DHCP-based autoconfiguration replaces the BOOTP client functionality on the destination IP address in which designated DHCP servers allocate network addresses...
Software Configuration Guide
Page 201
...some examples of the interaction between 802.1X and port security on page 9-2), only one client is replaced with Port Security You can be taken by the first authenticated host, the port becomes error-disabled ...logoff message is guaranteed an entry in the secure host table can be connected to the 802.1X-enabled switch port. Figure 9-3 Wireless LAN Example Wireless clients Access point Authentication server (RADIUS) 101227 Using 802.1X ...and 802.1X on page 20-9. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 9-5 These are granted access to the up normally.
...some examples of the interaction between 802.1X and port security on page 9-2), only one client is replaced with Port Security You can be taken by the first authenticated host, the port becomes error-disabled ...logoff message is guaranteed an entry in the secure host table can be connected to the 802.1X-enabled switch port. Figure 9-3 Wireless LAN Example Wireless clients Access point Authentication server (RADIUS) 101227 Using 802.1X ...and 802.1X on page 20-9. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 9-5 These are granted access to the up normally.
Software Configuration Guide
Page 360
Verify your entries. (Optional) Save your switch is running -config startup-config (Optional) Save your entries. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the configuration file. You can enable this feature if your entries in the root-...end Return to privileged EXEC mode. To disable root guard, use the no spanning-tree guard interface configuration command. 17-14 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Return to privileged EXEC mode. To disable the BackboneFast feature, use the no spanning-tree ...
Verify your entries. (Optional) Save your switch is running -config startup-config (Optional) Save your entries. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the configuration file. You can enable this feature if your entries in the root-...end Return to privileged EXEC mode. To disable root guard, use the no spanning-tree guard interface configuration command. 17-14 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Return to privileged EXEC mode. To disable the BackboneFast feature, use the no spanning-tree ...
Software Configuration Guide
Page 392
... the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups action {deny | replace} command has no effect. 19-24 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 The range is no ip igmp max-groups interface configuration command. Verify the configuration. (... form of this command on a logical EtherChannel interface but cannot use it by using the ip igmp max-groups action replace interface configuration command. Enter interface configuration mode, and enter the interface to privileged EXEC mode. Use the no maximum set.
... the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups action {deny | replace} command has no effect. 19-24 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 The range is no ip igmp max-groups interface configuration command. Verify the configuration. (... form of this command on a logical EtherChannel interface but cannot use it by using the ip igmp max-groups action replace interface configuration command. Enter interface configuration mode, and enter the interface to privileged EXEC mode. Use the no maximum set.
Software Configuration Guide
Page 393
...that the interface takes: • deny-Drop the report. • replace-Remove a randomly selected multicast entry in the forwarding table, and add the IGMP group in the forwarding table, the switch drops the next IGMP report received on the throttling action. - If ...the switch from removing the forwarding-table entries, you configure the throttling action as replace, the entries that were previously in the configuration file. Switch(config)# interface gigabitethernet0/1 Switch(config-if)# ip igmp max-groups action replace Switch(config-if)# end 78-16156-01 Catalyst 3560 Switch ...
...that the interface takes: • deny-Drop the report. • replace-Remove a randomly selected multicast entry in the forwarding table, and add the IGMP group in the forwarding table, the switch drops the next IGMP report received on the throttling action. - If ...the switch from removing the forwarding-table entries, you configure the throttling action as replace, the entries that were previously in the configuration file. Switch(config)# interface gigabitethernet0/1 Switch(config-if)# ip igmp max-groups action replace Switch(config-if)# end 78-16156-01 Catalyst 3560 Switch ...
Software Configuration Guide
Page 397
...visible in the CLI. Default Storm Control Configuration By default, unicast, broadcast, and multicast storm control is supported only on the switch interfaces; You use the storm-control interface configuration commands to monitor traffic on the sizes of the packets making up the incoming ..., the 200-millisecond time interval during which packets of different sizes are counted, threshold percentages are obsolete, replaced by the storm-control interface configuration commands. that no limit is blocked. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 20-3
...visible in the CLI. Default Storm Control Configuration By default, unicast, broadcast, and multicast storm control is supported only on the switch interfaces; You use the storm-control interface configuration commands to monitor traffic on the sizes of the packets making up the incoming ..., the 200-millisecond time interval during which packets of different sizes are counted, threshold percentages are obsolete, replaced by the storm-control interface configuration commands. that no limit is blocked. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 20-3
Software Configuration Guide
Page 418
... cannot send or receive traffic. • On fiber-optic or twisted-pair links, one . If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. UDLD sends at Layer 1. Conversely, the loss of the fiber strands... in aggressive mode detects whether those fiber strands are connected correctly but the traffic is one message to inform the neighbors to keep the caches synchronized. 22-2 Catalyst 3560 Switch...
... cannot send or receive traffic. • On fiber-optic or twisted-pair links, one . If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. UDLD sends at Layer 1. Conversely, the loss of the fiber strands... in aggressive mode detects whether those fiber strands are connected correctly but the traffic is one message to inform the neighbors to keep the caches synchronized. 22-2 Catalyst 3560 Switch...
Software Configuration Guide
Page 468
... and large quantities of information, minimizing the number of security. these conditions are SNMPv1, SNMPv2C, and SNMPv3. 26-2 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 SNMPv3 provides for SNMPv2, an Experimental Internet Protocol defined in SNMPv1. A combination of ...SNMP versions: • SNMPv1-The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of the Simple Network Management Protocol, a Draft Internet Standard, defined in RFCs 1902 through ...
... and large quantities of information, minimizing the number of security. these conditions are SNMPv1, SNMPv2C, and SNMPv3. 26-2 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 SNMPv3 provides for SNMPv2, an Experimental Internet Protocol defined in SNMPv1. A combination of ...SNMP versions: • SNMPv1-The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of the Simple Network Management Protocol, a Draft Internet Standard, defined in RFCs 1902 through ...
Software Configuration Guide
Page 486
...for IP traffic. You can configure VLAN maps to match Layer 3 addresses for a given interface, and one VLAN map to a VLAN. 27-4 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 you cannot enforce VLAN maps on traffic between hosts on a hub or on the same Layer 2 interface by ... more than one IP access list and one MAC access list to the interface, the new ACL replaces the previously configured one router ACL in each direction on the action specified in the switch. When a single router ACL is used for specific directions (inbound or outbound). However, router ACLs...
...for IP traffic. You can configure VLAN maps to match Layer 3 addresses for a given interface, and one VLAN map to a VLAN. 27-4 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 you cannot enforce VLAN maps on traffic between hosts on a hub or on the same Layer 2 interface by ... more than one IP access list and one MAC access list to the interface, the new ACL replaces the previously configured one router ACL in each direction on the action specified in the switch. When a single router ACL is used for specific directions (inbound or outbound). However, router ACLs...
Software Configuration Guide
Page 510
...ACL, you can apply it to a Layer 2 interface to filter non-IP traffic coming in that has a MAC ACL configured, the new ACL replaces the previously configured one. The IP access list filters only IP packets, and the MAC access list filters non-IP packets. • A Layer 2...supported only in } Control access to privileged EXEC mode. To remove the specified access group, use undefined ACLs for network security. 27-28 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 The interface must be a physical Layer 2 interface (port ACL). When you apply a MAC access list to...
...ACL, you can apply it to a Layer 2 interface to filter non-IP traffic coming in that has a MAC ACL configured, the new ACL replaces the previously configured one. The IP access list filters only IP packets, and the MAC access list filters non-IP packets. • A Layer 2...supported only in } Control access to privileged EXEC mode. To remove the specified access group, use undefined ACLs for network security. 27-28 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 The interface must be a physical Layer 2 interface (port ACL). When you apply a MAC access list to...
Software Configuration Guide
Page 678
...not necessarily translate into the metrics of one specified to verify configuration. (Optional) Save your entries in effect. 30-70 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 It does not change the metrics of 1 (directly connected). • IGRP can ...from other autonomous systems. • Any protocol can redistribute other IGRP-routed autonomous systems. IGRP assigns static routes a metric that replaces metric conversion, some automatic metric translations occur between routing protocols: • RIP can create routing loops and seriously degrade network ...
...not necessarily translate into the metrics of one specified to verify configuration. (Optional) Save your entries in effect. 30-70 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 It does not change the metrics of 1 (directly connected). • IGRP can ...from other autonomous systems. • Any protocol can redistribute other IGRP-routed autonomous systems. IGRP assigns static routes a metric that replaces metric conversion, some automatic metric translations occur between routing protocols: • RIP can create routing loops and seriously degrade network ...
Software Configuration Guide
Page 700
...have more flexible encoding for multiple address families. • A more flexible hello packet format replaces the query packet to encode current and future capability options. • Register messages to the... active rendezvous point (RP) exists per multicast group, with multiple backup RPs. Understanding Cisco's Implementation of multicast receivers. PIM Modes PIM DM PIM SM PIM can operate in dense...interface. In dense mode, a PIM DM router or multilayer switch assumes that all receivers. 32-4 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 they are properties of ...
...have more flexible encoding for multiple address families. • A more flexible hello packet format replaces the query packet to encode current and future capability options. • Register messages to the... active rendezvous point (RP) exists per multicast group, with multiple backup RPs. Understanding Cisco's Implementation of multicast receivers. PIM Modes PIM DM PIM SM PIM can operate in dense...interface. In dense mode, a PIM DM router or multilayer switch assumes that all receivers. 32-4 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 they are properties of ...
Software Configuration Guide
Page 786
... members. 35-8 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Insert the member switch in place of the failed command switch, and duplicate its connections to the release notes. This section describes two solutions for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 35-8 • Replacing a Failed Command Switch with Another Switch, page 35-10...
... members. 35-8 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Insert the member switch in place of the failed command switch, and duplicate its connections to the release notes. This section describes two solutions for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 35-8 • Replacing a Failed Command Switch with Another Switch, page 35-10...
Software Configuration Guide
Page 788
... setup program to enable the switch as the cluster command switch, and press Return. Switch# setup --- When prompted, make sure to configure the switch IP information. If this information is correct, enter Y, and press Return. Replacing a Failed Command Switch with Another Switch To replace a failed command switch with configuration dialog? [yes/no ]: 35-10 Catalyst 3560 Switch Software Configuration Guide 78...
... setup program to enable the switch as the cluster command switch, and press Return. Switch# setup --- When prompted, make sure to configure the switch IP information. If this information is correct, enter Y, and press Return. Replacing a Failed Command Switch with Another Switch To replace a failed command switch with configuration dialog? [yes/no ]: 35-10 Catalyst 3560 Switch Software Configuration Guide 78...
Software Configuration Guide
Page 791
... a host in the route table for recovering from the switch, and replace it continues to route between those subnets. IP routing is disabled by supplying the host name or network address. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 35-13 If you should remove and ... the port status, and enter a time interval for the host or network, a network or host unreachable message is generated. After inserting a Cisco-approved SFP module, use to test connectivity to the command reference for a reply. For more information, see Chapter 30, "Configuring IP Unicast ...
... a host in the route table for recovering from the switch, and replace it continues to route between those subnets. IP routing is disabled by supplying the host name or network address. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 35-13 If you should remove and ... the port status, and enter a time interval for the host or network, a network or host unreachable message is generated. After inserting a Cisco-approved SFP module, use to test connectivity to the command reference for a reply. For more information, see Chapter 30, "Configuring IP Unicast ...
Software Configuration Guide
Page 813
... configuration file to several switches that you would change the configuration for the initial configuration of Flash memory. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-9 The...the configuration files on the switch as changing the switch IP address or disabling ports) can aid in your switch configuration. Appendix B Working with the Cisco IOS File System, Configuration ...to the console port, keep in DRAM; If a command in the copied configuration file replaces a command in the existing configuration file, the existing command is stored in a particular command...
... configuration file to several switches that you would change the configuration for the initial configuration of Flash memory. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-9 The...the configuration files on the switch as changing the switch IP address or disabling ports) can aid in your switch configuration. Appendix B Working with the Cisco IOS File System, Configuration ...to the console port, keep in DRAM; If a command in the copied configuration file replaces a command in the existing configuration file, the existing command is stored in a particular command...
Software Configuration Guide
Page 824
.../IP) stack, which contain the system software, Cisco IOS code, and the Cluster Management Suite (CMS) software. Image Location on your switch. In the display, check the line that shows the version number. B-20 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Note Instead of... upload a switch image file to upgrade the switch software. The FTP and RCP transport mechanisms provide faster performance and more reliable delivery of using the copy privileged EXEC command or the archive tar privileged EXEC command, we recommend using . You can replace the current image...
.../IP) stack, which contain the system software, Cisco IOS code, and the Cluster Management Suite (CMS) software. Image Location on your switch. In the display, check the line that shows the version number. B-20 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Note Instead of... upload a switch image file to upgrade the switch software. The FTP and RCP transport mechanisms provide faster performance and more reliable delivery of using the copy privileged EXEC command or the archive tar privileged EXEC command, we recommend using . You can replace the current image...
Software Configuration Guide
Page 827
...Image File By Using TFTP You can download a new image file and replace the current image or keep the current image, skip Step 3. Step ...and then reloads the software. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-23 The download algorithm verifies that the image is appropriate for the switch model and that the permissions on the workstation.... TFTP server and overwrite the existing image. To keep the current image. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the downloaded image. • The /...
...Image File By Using TFTP You can download a new image file and replace the current image or keep the current image, skip Step 3. Step ...and then reloads the software. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-23 The download algorithm verifies that the image is appropriate for the switch model and that the permissions on the workstation.... TFTP server and overwrite the existing image. To keep the current image. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the downloaded image. • The /...
Software Configuration Guide
Page 835
...an Image File By Using RCP You can download a new image file and replace or keep the current image, skip Step 6. To keep the current image. This step...mode, follow Steps 1 through the console port or a Telnet session. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the downloaded image. • The...//username, specify the username. Directory and image names are case sensitive. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-31 Enter global configuration mode. Return to execute successfully, an account...
...an Image File By Using RCP You can download a new image file and replace or keep the current image, skip Step 6. To keep the current image. This step...mode, follow Steps 1 through the console port or a Telnet session. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the downloaded image. • The...//username, specify the username. Directory and image names are case sensitive. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-31 Enter global configuration mode. Return to execute successfully, an account...