Software Guide
Page 24
... Forgotten Password 32-3 Procedure with Password Recovery Enabled 32-4 Procedure with Password Recovery Disabled 32-6 Recovering from a Command Switch Failure 32-7 Replacing a Failed Command Switch with a Cluster Member 32-8 Replacing a Failed Command Switch with Another Switch 32-10 Recovering from Lost Cluster Member Connectivity 32-11 Preventing Autonegotiation Mismatches 32-11 SFP...
... Forgotten Password 32-3 Procedure with Password Recovery Enabled 32-4 Procedure with Password Recovery Disabled 32-6 Recovering from a Command Switch Failure 32-7 Replacing a Failed Command Switch with a Cluster Member 32-8 Replacing a Failed Command Switch with Another Switch 32-10 Recovering from Lost Cluster Member Connectivity 32-11 Preventing Autonegotiation Mismatches 32-11 SFP...
Software Guide
Page 25
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the ...19 Clearing the Startup Configuration File B-19 Deleting a Stored Configuration File B-19 Replacing and Rolling Back Configurations B-19 Understanding Configuration Replacement and Rollback B-19 Configuration Guidelines B-21 Configuring the Configuration Archive B-21 Performing a Configuration Replacement or Rollback Operation B-22 OL-8603-04 Catalyst 2960 Switch Software Configuration Guide ...
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the ...19 Clearing the Startup Configuration File B-19 Deleting a Stored Configuration File B-19 Replacing and Rolling Back Configurations B-19 Understanding Configuration Replacement and Rollback B-19 Configuration Guidelines B-21 Configuring the Configuration Archive B-21 Performing a Configuration Replacement or Rollback Operation B-22 OL-8603-04 Catalyst 2960 Switch Software Configuration Guide ...
Software Guide
Page 37
... (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) • Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 1-5
... (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) • Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 1-5
Software Guide
Page 63
... the switch. The factory-assigned default hostname is defined. No cluster name is defined. A relay device forwards broadcast traffic between your switch. DHCP-based autoconfiguration replaces the BOOTP client functionality on a client-server model, in the received packet. Understanding DHCP-Based Autoconfiguration DHCP provides configuration information to devices. DHCP is automatically...
... the switch. The factory-assigned default hostname is defined. No cluster name is defined. A relay device forwards broadcast traffic between your switch. DHCP-based autoconfiguration replaces the BOOTP client functionality on a client-server model, in the received packet. Understanding DHCP-Based Autoconfiguration DHCP provides configuration information to devices. DHCP is automatically...
Software Guide
Page 87
... through the interface defined in privileged EXEC mode, follow these commands: • The cns config initial global configuration command enables the Cisco IOS agent and initiates an initial configuration on the switch. • The cns config partial global configuration command enables the...After enabling the CNS event agent, start the Cisco IOS CNS agent on the switch. The default is 5. Note The config-cli interface configuration command accepts the special character & that acts as a placeholder for the switch. The range is replaced with these steps to global configuration mode. ...
... through the interface defined in privileged EXEC mode, follow these commands: • The cns config initial global configuration command enables the Cisco IOS agent and initiates an initial configuration on the switch. • The cns config partial global configuration command enables the...After enabling the CNS event agent, start the Cisco IOS CNS agent on the switch. The default is 5. Note The config-cli interface configuration command accepts the special character & that acts as a placeholder for the switch. The range is replaced with these steps to global configuration mode. ...
Software Guide
Page 179
... the configuration file. Use the no ip http client secure-trustpoint name to the secure HTTP client fail. Using this command assumes that provides a secure replacement for the client. Return to remove a previously configured CipherSuite specification for the Berkeley r-tools. Display the status of the HTTP secure server to negotiate a CipherSuite...
... the configuration file. Use the no ip http client secure-trustpoint name to the secure HTTP client fail. Using this command assumes that provides a secure replacement for the client. Return to remove a previously configured CipherSuite specification for the Berkeley r-tools. Display the status of the HTTP secure server to negotiate a CipherSuite...
Software Guide
Page 187
... network access is not configured as a voice VLAN port disallows all frames from the server after the specified number of times. If the client is replaced with another client, the switch changes the port link state to down , or if an EAPOL-logoff frame is not granted access to the unauthorized...
... network access is not configured as a voice VLAN port disallows all frames from the server after the specified number of times. If the client is replaced with another client, the switch changes the port link state to down , or if an EAPOL-logoff frame is not granted access to the unauthorized...
Software Guide
Page 198
... such as printers, to IEEE 802.1X per-user ACLs. The MAC address of the device must be any. (After authentication, the client IP address replaces the any eq tftp Note The proxyacl entry determines the type of ip:inacl, this attribute must begin with proxyacl, and the source field in... Switch Software Configuration Guide OL-8603-04 You can use IEEE 802.1x authentication and then to skip web authentication. Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must be configured in web authentication standalone mode.
... such as printers, to IEEE 802.1X per-user ACLs. The MAC address of the device must be any. (After authentication, the client IP address replaces the any eq tftp Note The proxyacl entry determines the type of ip:inacl, this attribute must begin with proxyacl, and the source field in... Switch Software Configuration Guide OL-8603-04 You can use IEEE 802.1x authentication and then to skip web authentication. Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must be configured in web authentication standalone mode.
Software Guide
Page 245
... 11 Configuring Smartports Macros Configuring Smartports Macros • When creating a macro that requires the assignment of the keyword are replaced with the corresponding value. All matching occurrences of unique values, use the parameter value keywords to designate values specific to ...a macro to define keywords when you apply a Cisco-default Smartports macro on an interface: • Display all existing configuration on using the show parser macro user EXEC command. There are not reflected on one interface, it is replaced by using the show parser macro user EXEC command...
... 11 Configuring Smartports Macros Configuring Smartports Macros • When creating a macro that requires the assignment of the keyword are replaced with the corresponding value. All matching occurrences of unique values, use the parameter value keywords to designate values specific to ...a macro to define keywords when you apply a Cisco-default Smartports macro on an interface: • Display all existing configuration on using the show parser macro user EXEC command. There are not reflected on one interface, it is replaced by using the show parser macro user EXEC command...
Software Guide
Page 247
...use the macro global apply macro-name ? If you apply a macro without entering the keyword values, the commands are invalid and are replaced with the corresponding value. All matching occurrences of the keyword are not applied. (Optional) Enter a description about the macro that is applied...Beginning in the macro. Apply each individual command defined in the macro to the interface. Some macros might contain keywords that are replaced with the corresponding value. Specify macro trace macro-name to apply and debug a macro to the interface by entering the default interface...
...use the macro global apply macro-name ? If you apply a macro without entering the keyword values, the commands are invalid and are replaced with the corresponding value. All matching occurrences of the keyword are not applied. (Optional) Enter a description about the macro that is applied...Beginning in the macro. Apply each individual command defined in the macro to the interface. Some macros might contain keywords that are replaced with the corresponding value. Specify macro trace macro-name to apply and debug a macro to the interface by entering the default interface...
Software Guide
Page 248
... Macro Description Gi0/2 desktop-config This example shows how to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 11-6 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 Display the specific macro...parameter {value}] [parameter {value}] [parameter {value}] Step 5 interface interface-id Step 6 default interface interface-id Purpose Display the Cisco-default Smartports macros embedded in the macro. You can use the macro global apply macro-name ? Configuring Smartports Macros Chapter 11 Configuring ...
... Macro Description Gi0/2 desktop-config This example shows how to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 11-6 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 Display the specific macro...parameter {value}] [parameter {value}] [parameter {value}] Step 5 interface interface-id Step 6 default interface interface-id Purpose Display the Cisco-default Smartports macros embedded in the macro. You can use the macro global apply macro-name ? Configuring Smartports Macros Chapter 11 Configuring ...
Software Guide
Page 365
..., all interfaces. Note You cannot enable both root guard and loop guard at the same time. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in privileged EXEC mode, follow these steps to -point by the UplinkFast feature. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command Purpose configure...
..., all interfaces. Note You cannot enable both root guard and loop guard at the same time. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in privileged EXEC mode, follow these steps to -point by the UplinkFast feature. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command Purpose configure...
Software Guide
Page 390
... the maximum number of entries, and the interface receives an IGMP join report, you can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with a profile number to create an IGMP profile and to its defaults. 18-24 Catalyst 2960 Switch Software Configuration Guide...
... the maximum number of entries, and the interface receives an IGMP join report, you can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with a profile number to create an IGMP profile and to its defaults. 18-24 Catalyst 2960 Switch Software Configuration Guide...
Software Guide
Page 393
.... After these steps to configure the throttling action when the maximum number of entries is in the forwarding table, the switch replaces a randomly selected entry with the new group for which the IGMP report was received. Specify the physical interface to an EtherChannel... and enter interface configuration mode. To prevent the switch from removing the forwarding-table entries, you configure the throttling action as replace, the entries that were previously in the forwarding table are removed. Chapter 18 Configuring IGMP Snooping and MVR Configuring IGMP Filtering and...
.... After these steps to configure the throttling action when the maximum number of entries is in the forwarding table, the switch replaces a randomly selected entry with the new group for which the IGMP report was received. Specify the physical interface to an EtherChannel... and enter interface configuration mode. To prevent the switch from removing the forwarding-table entries, you configure the throttling action as replace, the entries that were previously in the forwarding table are removed. Chapter 18 Configuring IGMP Snooping and MVR Configuring IGMP Filtering and...
Software Guide
Page 428
.... 22-2 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. When the switch receives a hello message, it caches the information until the age time (hold time or time-to...
.... 22-2 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. When the switch receives a hello message, it caches the information until the age time (hold time or time-to...
Software Guide
Page 476
...-6 SNMP Versions This software release supports these SNMP versions: • SNMPv1-The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with in SNMPv2C report the error type. SNMPv2C includes a bulk retrieval mechanism and more detailed error...
...-6 SNMP Versions This software release supports these SNMP versions: • SNMPv1-The Simple Network Management Protocol, a Full Internet Standard, defined in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with in SNMPv2C report the error type. SNMPv2C includes a bulk retrieval mechanism and more detailed error...
Software Guide
Page 571
... to a dual IPv4 and IPv6 template. For information about configuring IPv6 Multicast Listener Discovery (MLD) snooping, see the Cisco IOS documentation referenced in the procedures This chapter consists of these addresses are allocated to government agencies and large organizations, and... 29 C H A P T E R Configuring IPv6 Host Functions Internet Protocol Version 6 (IPv6) is rapidly decreasing. This chapter describes how to replace Version 4 (IPv4) in this chapter, see Chapter 30, "Configuring IPv6 MLD Snooping." Note For complete syntax and usage information for the commands used...
... to a dual IPv4 and IPv6 template. For information about configuring IPv6 Multicast Listener Discovery (MLD) snooping, see the Cisco IOS documentation referenced in the procedures This chapter consists of these addresses are allocated to government agencies and large organizations, and... 29 C H A P T E R Configuring IPv6 Host Functions Internet Protocol Version 6 (IPv6) is rapidly decreasing. This chapter describes how to replace Version 4 (IPv4) in this chapter, see Chapter 30, "Configuring IPv6 MLD Snooping." Note For complete syntax and usage information for the commands used...
Software Guide
Page 572
... provides newer unicast methods, introduces hexadecimal values into the IP address, and uses colons (:) instead of broadcast addresses. Multicast addresses replace the use two colons (::) to the "Implementing Addressing and Basic Connectivity" section of zeros, but does not require a specified DHCP... • Embedded IPsec (encrypted security) • Routing optimized for private addresses and the use this URL: http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a00807fcf4b. The switch does not support site-local unicast addresses, anycast addresses, or...
... provides newer unicast methods, introduces hexadecimal values into the IP address, and uses colons (:) instead of broadcast addresses. Multicast addresses replace the use two colons (::) to the "Implementing Addressing and Basic Connectivity" section of zeros, but does not require a specified DHCP... • Embedded IPsec (encrypted security) • Routing optimized for private addresses and the use this URL: http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a00807fcf4b. The switch does not support site-local unicast addresses, anycast addresses, or...
Software Guide
Page 626
... place of the failed command switch, and duplicate its connections to the cluster members. You can prepare for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 32-8 • Replacing a Failed Command Switch with the member switches is lost, and you must install a new command switch. ... are still connected is command-capable, making a note of the failed command switch. However, connectivity between the member switches and the replacement command switch. Recovering from the cluster. For information on the new command switch...
... place of the failed command switch, and duplicate its connections to the cluster members. You can prepare for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 32-8 • Replacing a Failed Command Switch with the member switches is lost, and you must install a new command switch. ... are still connected is command-capable, making a note of the failed command switch. However, connectivity between the member switches and the replacement command switch. Recovering from the cluster. For information on the new command switch...
Software Guide
Page 628
... setup will ask you may enter a question mark '?' This program prompts you selected to be from a Command Switch Failure Chapter 32 Troubleshooting Replacing a Failed Command Switch with Another Switch To replace a failed command switch with a switch that is case sensitive, allows spaces, but not part of the cluster, follow these steps: Step...
... setup will ask you may enter a question mark '?' This program prompts you selected to be from a Command Switch Failure Chapter 32 Troubleshooting Replacing a Failed Command Switch with Another Switch To replace a failed command switch with a switch that is case sensitive, allows spaces, but not part of the cluster, follow these steps: Step...