Software Configuration Guide
Page 2
...THE POSSIBILITY OF SUCH DAMAGES. and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel,... OF ANY KIND, EXPRESS OR IMPLIED. and certain other company. (0304R) Catalyst 3560 Switch Software Configuration Guide Copyright © 2004 Cisco Systems, Inc. All rights reserved. The use of Cisco Systems, Inc. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS ...
...THE POSSIBILITY OF SUCH DAMAGES. and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel,... OF ANY KIND, EXPRESS OR IMPLIED. and certain other company. (0304R) Catalyst 3560 Switch Software Configuration Guide Copyright © 2004 Cisco Systems, Inc. All rights reserved. The use of Cisco Systems, Inc. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS ...
Software Configuration Guide
Page 165
...the TACACS+ daemon. Enable AAA. For example, a message could notify users that their passwords must be changed because of the company's password aging policy. • Authorization-Provides fine-grained control over user capabilities for example, after a username and password are ...stop times, executed commands (such as required. Set an authentication key (also configure the same key on your switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 8-11 The TACACS+ authentication service can provide these services: • Authentication-Provides complete control of...
...the TACACS+ daemon. Enable AAA. For example, a message could notify users that their passwords must be changed because of the company's password aging policy. • Authorization-Provides fine-grained control over user capabilities for example, after a username and password are ...stop times, executed commands (such as required. Set an authentication key (also configure the same key on your switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 8-11 The TACACS+ authentication service can provide these services: • Authentication-Provides complete control of...
Software Configuration Guide
Page 499
... an extended ACL that denies TCP traffic from any time-range workhours (inactive) 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 27-17 This example shows how to configure time ranges for workhours and for company holidays and to permit and deny the same traffic. Chapter 27 Configuring Network Security with ACLs...
... an extended ACL that denies TCP traffic from any time-range workhours (inactive) 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 27-17 This example shows how to configure time ranges for workhours and for company holidays and to permit and deny the same traffic. Chapter 27 Configuring Network Security with ACLs...
Software Configuration Guide
Page 730
... boundary mechanism. Configuring an IP Multicast Boundary Administratively-scoped boundaries can limit how long the entry remains active so that Company XYZ has an administratively-scoped boundary set for multicast traffic in the range 239.0.0.0 through 239.128.255.255 from entering...If you configure an administratively-scoped boundary on all routed interfaces at the perimeter of their respective networks. 32-34 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Similarly, the engineering and marketing departments have an administratively-scoped boundary of 239.128.0.0/...
... boundary mechanism. Configuring an IP Multicast Boundary Administratively-scoped boundaries can limit how long the entry remains active so that Company XYZ has an administratively-scoped boundary set for multicast traffic in the range 239.0.0.0 through 239.128.255.255 from entering...If you configure an administratively-scoped boundary on all routed interfaces at the perimeter of their respective networks. 32-34 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Similarly, the engineering and marketing departments have an administratively-scoped boundary of 239.128.0.0/...
Software Configuration Guide
Page 731
.... • For access-list-number, the range is 1 to be reused in the configuration file. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 32-35 This procedure is defined, no multicast data packets are allowed to ignore. The permit keyword permits... an administratively-scoped boundary. When a boundary is optional. Chapter 32 Configuring IP Multicast Routing Figure 32-5 Administratively-Scoped Boundaries Company XYZ Engineering Marketing Configuring Optional Multicast Routing Features 45154 239.128.0.0/16 239.0.0.0/8 You can then be reused in domains administered ...
.... • For access-list-number, the range is 1 to be reused in the configuration file. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 32-35 This procedure is defined, no multicast data packets are allowed to ignore. The permit keyword permits... an administratively-scoped boundary. When a boundary is optional. Chapter 32 Configuring IP Multicast Routing Figure 32-5 Administratively-Scoped Boundaries Company XYZ Engineering Marketing Configuring Optional Multicast Routing Features 45154 239.128.0.0/16 239.0.0.0/8 You can then be reused in domains administered ...
Software Configuration Guide
Page 821
...username User0 If the switch IP address translates to Switch1.company.com, the .rhosts file for User0 on the RCP server should contain this line: Switch1.company.com Switch1 For more ...5). (Optional) Specify the remote username. Enter global configuration mode. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with an IP address of 172.16....-config Purpose Verify that the switch contains these steps to download a configuration file by rcp from 172.16.101.101 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-17 This...
...username User0 If the switch IP address translates to Switch1.company.com, the .rhosts file for User0 on the RCP server should contain this line: Switch1.company.com Switch1 For more ...5). (Optional) Specify the remote username. Enter global configuration mode. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with an IP address of 172.16....-config Purpose Verify that the switch contains these steps to download a configuration file by rcp from 172.16.101.101 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-17 This...
Software Configuration Guide
Page 834
... used , and there is written to or copied from the directory associated with the Cisco IOS File System, Configuration Files, and Software Images RCP requires a client to send ...have a valid username, this username is used during all archive operations. B-30 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Check connectivity to the RCP server by using the ping... these configuration lines: hostname Switch1 ip rcmd remote-username User0 If the switch IP address translates to Switch1.company.com, the .rhosts file for the RCP download. The new username ...
... used , and there is written to or copied from the directory associated with the Cisco IOS File System, Configuration Files, and Software Images RCP requires a client to send ...have a valid username, this username is used during all archive operations. B-30 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Check connectivity to the RCP server by using the ping... these configuration lines: hostname Switch1 ip rcmd remote-username User0 If the switch IP address translates to Switch1.company.com, the .rhosts file for the RCP download. The new username ...