Software Guide
Page 24
... Forgotten Password 32-3 Procedure with Password Recovery Enabled 32-4 Procedure with Password Recovery Disabled 32-6 Recovering from a Command Switch Failure 32-7 Replacing a Failed Command Switch with a Cluster Member 32-8 Replacing a Failed Command Switch with Another Switch 32-10 Recovering from Lost Cluster Member Connectivity 32-11 Preventing Autonegotiation Mismatches 32-11 SFP...
... Forgotten Password 32-3 Procedure with Password Recovery Enabled 32-4 Procedure with Password Recovery Disabled 32-6 Recovering from a Command Switch Failure 32-7 Replacing a Failed Command Switch with a Cluster Member 32-8 Replacing a Failed Command Switch with Another Switch 32-10 Recovering from Lost Cluster Member Connectivity 32-11 Preventing Autonegotiation Mismatches 32-11 SFP...
Software Guide
Page 25
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the ...19 Clearing the Startup Configuration File B-19 Deleting a Stored Configuration File B-19 Replacing and Rolling Back Configurations B-19 Understanding Configuration Replacement and Rollback B-19 Configuration Guidelines B-21 Configuring the Configuration Archive B-21 Performing a Configuration Replacement or Rollback Operation B-22 OL-8603-04 Catalyst 2960 Switch Software Configuration Guide ...
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the ...19 Clearing the Startup Configuration File B-19 Deleting a Stored Configuration File B-19 Replacing and Rolling Back Configurations B-19 Understanding Configuration Replacement and Rollback B-19 Configuration Guidelines B-21 Configuring the Configuration Archive B-21 Performing a Configuration Replacement or Rollback Operation B-22 OL-8603-04 Catalyst 2960 Switch Software Configuration Guide ...
Software Guide
Page 37
... (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) • Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 1-5
... (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) • Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 1-5
Software Guide
Page 63
... DHCP server for allocating network addresses to a device and a mechanism for various lease options associated with IP address information and a configuration file. DHCP-based autoconfiguration replaces the BOOTP client functionality on your switch can act as both a DHCP client and a DHCP server. The factory-assigned default hostname is defined. Understanding DHCP...
... DHCP server for allocating network addresses to a device and a mechanism for various lease options associated with IP address information and a configuration file. DHCP-based autoconfiguration replaces the BOOTP client functionality on your switch can act as both a DHCP client and a DHCP server. The factory-assigned default hostname is defined. Understanding DHCP...
Software Guide
Page 87
...connect through FastEthernet0/1, the command config-cli ip route 0.0.0.0 0.0.0.0 & generates the command ip route 0.0.0.0 0.0.0.0 FastEthernet0/1. You can enable the Cisco IOS agent with the interface name. The range is 1 to 30. The range is 1 to enable the CNS configuration agent and initiate...an Initial Configuration Beginning in cns config connect-intf. Enter line-cli to connect to the Configuration Engine whose IP address is replaced with these steps to 30 seconds. Establish a static route to the Configuration Engine through the interface defined in privileged EXEC mode...
...connect through FastEthernet0/1, the command config-cli ip route 0.0.0.0 0.0.0.0 & generates the command ip route 0.0.0.0 0.0.0.0 FastEthernet0/1. You can enable the Cisco IOS agent with the interface name. The range is 1 to 30. The range is 1 to enable the CNS configuration agent and initiate...an Initial Configuration Beginning in cns config connect-intf. Enter line-cli to connect to the Configuration Engine whose IP address is replaced with these steps to 30 seconds. Establish a static route to the Configuration Engine through the interface defined in privileged EXEC mode...
Software Guide
Page 179
...] [des-cbc-sha]} end show running -config startup-config Purpose Enter global configuration mode. (Optional) Specify the CA trustpoint to negotiate a CipherSuite that provides a secure replacement for Secure Copy Protocol Configuring the Secure HTTP Client The standard HTTP client and secure HTTP client are always enabled. OL-8603-04 Catalyst 2960...
...] [des-cbc-sha]} end show running -config startup-config Purpose Enter global configuration mode. (Optional) Specify the CA trustpoint to negotiate a CipherSuite that provides a secure replacement for Secure Copy Protocol Configuring the Secure HTTP Client The standard HTTP client and secure HTTP client are always enabled. OL-8603-04 Catalyst 2960...
Software Guide
Page 187
... the IEEE 802.1x-enabled switch port. If the authentication server cannot be reached, the switch can resend the request. If a client leaves or is replaced with another client, the switch changes the port link state to down to the unauthorized state. The port starts in the unauthorized state, but authentication...
... the IEEE 802.1x-enabled switch port. If the authentication server cannot be reached, the switch can resend the request. If a client leaves or is replaced with another client, the switch changes the port link state to down to the unauthorized state. The port starts in the unauthorized state, but authentication...
Software Guide
Page 198
...cannot use web authentication with proxyacl, and the source field in each entry must be any. (After authentication, the client IP address replaces the any field when the ACL is configured as printers, to succeed. The MAC address of web authentication (with automatic MAC check ...only works in the Access Control Server (ACS) for web authenticated hosts. Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must always be applied for the automatic MAC check...
...cannot use web authentication with proxyacl, and the source field in each entry must be any. (After authentication, the client IP address replaces the any field when the ACL is configured as printers, to succeed. The MAC address of web authentication (with automatic MAC check ...only works in the Access Control Server (ACS) for web authenticated hosts. Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must always be applied for the automatic MAC check...
Software Guide
Page 245
... command or the macro apply macro-name ? interface configuration command to display a list of a larger string, is considered a match and is replaced by using the $ character to define keywords when you apply a macro to the interface. You need to reapply the updated macro on the ...matching occurrences of a syntax error or a configuration error, the macro continues to apply the remaining commands. • Some CLI commands are Cisco-default Smartports macros embedded in two separate macros. • Some macros might contain keywords that does not accept the configuration, the macro will...
... command or the macro apply macro-name ? interface configuration command to display a list of a larger string, is considered a match and is replaced by using the $ character to define keywords when you apply a macro to the interface. You need to reapply the updated macro on the ...matching occurrences of a syntax error or a configuration error, the macro continues to apply the remaining commands. • Some CLI commands are Cisco-default Smartports macros embedded in two separate macros. • Some macros might contain keywords that does not accept the configuration, the macro will...
Software Guide
Page 247
.... command to display a list of the keyword are specific to the switch by entering macro apply macro-name. Some macros might contain keywords that are replaced with the corresponding value. Apply each individual command defined in the macro to the interface. You can delete a macro-applied configuration on a switch only by.... If you apply a macro without entering the keyword values, the commands are invalid and are not applied. (Optional) Enter a description about the macro that are replaced with the corresponding value.
.... command to display a list of the keyword are specific to the switch by entering macro apply macro-name. Some macros might contain keywords that are replaced with the corresponding value. Apply each individual command defined in the macro to the interface. You can delete a macro-applied configuration on a switch only by.... If you apply a macro without entering the keyword values, the commands are invalid and are not applied. (Optional) Enter a description about the macro that are replaced with the corresponding value.
Software Guide
Page 248
...parameter {value}] [parameter {value}] [parameter {value}] Step 5 interface interface-id Step 6 default interface interface-id Purpose Display the Cisco-default Smartports macros embedded in the macro. Display the specific macro that begin with the required values by using the parameter value keywords...Macro Description Gi0/2 desktop-config This example shows how to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 11-6 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 Configuring Smartports Macros...
...parameter {value}] [parameter {value}] [parameter {value}] Step 5 interface interface-id Step 6 default interface interface-id Purpose Display the Cisco-default Smartports macros embedded in the macro. Display the specific macro that begin with the required values by using the parameter value keywords...Macro Description Gi0/2 desktop-config This example shows how to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 11-6 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 Configuring Smartports Macros...
Software Guide
Page 365
... feature if your entries. Beginning in privileged EXEC mode, follow these steps to enable loop guard. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the case of a failure that are alternate or root ports. Beginning in privileged EXEC mode, follow these steps to enable root...
... feature if your entries. Beginning in privileged EXEC mode, follow these steps to enable loop guard. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the case of a failure that are alternate or root ports. Beginning in privileged EXEC mode, follow these steps to enable root...
Software Guide
Page 390
... the maximum number of entries, and the interface receives an IGMP join report, you can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with a profile number to create an IGMP profile and to its defaults. 18-24 Catalyst 2960 Switch Software Configuration Guide...
... the maximum number of entries, and the interface receives an IGMP join report, you can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with a profile number to create an IGMP profile and to its defaults. 18-24 Catalyst 2960 Switch Software Configuration Guide...
Software Guide
Page 393
...max-groups interface configuration command. To prevent the switch from removing the forwarding-table entries, you can configure an interface to replace the existing group with the received IGMP report. When an interface receives an IGMP report and the maximum number of entries is... is in the forwarding table: Step 1 Step 2 Command configure terminal interface interface-id Step 3 ip igmp max-groups action {deny | replace} Purpose Enter global configuration mode. Switch(config)# interface gigabitethernet0/2 Switch(config-if)# ip igmp max-groups 25 Switch(config-if)# end Configuring ...
...max-groups interface configuration command. To prevent the switch from removing the forwarding-table entries, you can configure an interface to replace the existing group with the received IGMP report. When an interface receives an IGMP report and the maximum number of entries is... is in the forwarding table: Step 1 Step 2 Command configure terminal interface interface-id Step 3 ip igmp max-groups action {deny | replace} Purpose Enter global configuration mode. Switch(config)# interface gigabitethernet0/2 Switch(config-if)# ip igmp max-groups 25 Switch(config-if)# end Configuring ...
Software Guide
Page 428
... re-establish a bidirectional link. Conversely, the loss of the link. If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. If the ports are connected correctly but the traffic is one way, UDLD does not detect the unidirectional link...
... re-establish a bidirectional link. Conversely, the loss of the link. If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. If the ports are connected correctly but the traffic is one way, UDLD does not detect the unidirectional link...
Software Guide
Page 476
... managers able to management stations. The SNMPv2C improved error-handling includes expanded error codes that a packet was not tampered with in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with the community-string-based Administrative Framework of SNMPv2C while retaining the bulk retrieval and improved...
... managers able to management stations. The SNMPv2C improved error-handling includes expanded error codes that a packet was not tampered with in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with the community-string-based Administrative Framework of SNMPv2C while retaining the bulk retrieval and improved...
Software Guide
Page 571
... rapidly increasing number of users and applications that require unique global IP addresses. For information about configuring IPv6 Multicast Listener Discovery (MLD) snooping, see the Cisco IOS documentation referenced in the procedures This chapter consists of these addresses are allocated to configure IPv6host functions on page 29-6. IPv4 uses 32-bit... 29-7 • "Displaying IPv6" section on page 29-11 Understanding IPv6 The primary reason for using IPv6 is to increase Internet global address space to replace Version 4 (IPv4) in the TCP/IP suite of protocols.
... rapidly increasing number of users and applications that require unique global IP addresses. For information about configuring IPv6 Multicast Listener Discovery (MLD) snooping, see the Cisco IOS documentation referenced in the procedures This chapter consists of these addresses are allocated to configure IPv6host functions on page 29-6. IPv4 uses 32-bit... 29-7 • "Displaying IPv6" section on page 29-11 Understanding IPv6 The primary reason for using IPv6 is to increase Internet global address space to replace Version 4 (IPv4) in the TCP/IP suite of protocols.
Software Guide
Page 572
...and the IPv6 packet header, go to this release. These sections are optional. Multicast addresses replace the use this short version only once in this URL: http://www.cisco.com//warp/public/732/Tech/ipv6/ This section describes IPv6 implementation on the switch. This...128-bit addresses are represented as a series of eight 16-bit hexadecimal fields separated by border routers at this URL: http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a00807fcf4b. IPv6 also provides these advantages over IPv4: • Easier address management and delegation...
...and the IPv6 packet header, go to this release. These sections are optional. Multicast addresses replace the use this short version only once in this URL: http://www.cisco.com//warp/public/732/Tech/ipv6/ This section describes IPv6 implementation on the switch. This...128-bit addresses are represented as a series of eight 16-bit hexadecimal fields separated by border routers at this URL: http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a00807fcf4b. IPv6 also provides these advantages over IPv4: • Easier address management and delegation...
Software Guide
Page 626
... switch. These sections describe two solutions for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 32-8 • Replacing a Failed Command Switch with a command-capable member in place of the failed command switch. Replacing a Failed Command Switch with a Cluster Member To replace a failed command switch with Another Switch, page 32-10...
... switch. These sections describe two solutions for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 32-8 • Replacing a Failed Command Switch with a command-capable member in place of the failed command switch. Replacing a Failed Command Switch with a Cluster Member To replace a failed command switch with Another Switch, page 32-10...
Software Guide
Page 628
... connections to the cluster members. From privileged EXEC mode, enter setup, and press Return. Recovering from a Command Switch Failure Chapter 32 Troubleshooting Replacing a Failed Command Switch with Another Switch To replace a failed command switch with a switch that is command-capable but not part of the cluster, follow these steps: Step 1 Step 2 Step...
... connections to the cluster members. From privileged EXEC mode, enter setup, and press Return. Recovering from a Command Switch Failure Chapter 32 Troubleshooting Replacing a Failed Command Switch with Another Switch To replace a failed command switch with a switch that is command-capable but not part of the cluster, follow these steps: Step 1 Step 2 Step...