Software Guide
Page 16
...the ROM-Monitor Console-Port Baud Rate 6 Setting CONFIG_FILE Recurrence 7 Setting CONFIG_FILE Overwrite 7 Setting CONFIG_FILE Synchronization 8 Setting the Switch to Ignore the NVRAM Configuration 9 Setting the Configuration Register Value 10 Setting the BOOT Environment Variable 10 Setting the BOOT ... the Flash File System Works 1 Working with the Flash File System 1 Setting the Default Flash Device 2 Setting the Text File Configuration Mode 2 Listing the Files on a Flash Device 3 Copying Files 4 Deleting Files 6 Restoring Deleted Files 7 Verifying a File Checksum 7 Formatting a Flash Device...
...the ROM-Monitor Console-Port Baud Rate 6 Setting CONFIG_FILE Recurrence 7 Setting CONFIG_FILE Overwrite 7 Setting CONFIG_FILE Synchronization 8 Setting the Switch to Ignore the NVRAM Configuration 9 Setting the Configuration Register Value 10 Setting the BOOT Environment Variable 10 Setting the BOOT ... the Flash File System Works 1 Working with the Flash File System 1 Setting the Default Flash Device 2 Setting the Text File Configuration Mode 2 Listing the Files on a Flash Device 3 Copying Files 4 Deleting Files 6 Restoring Deleted Files 7 Verifying a File Checksum 7 Formatting a Flash Device...
Software Guide
Page 19
... 3 Disabling Layer 3 Protocol Filtering 3 Configuring the IP Permit List 1 Understanding How the IP Permit List Works 1 IP Permit List Default Configuration 2 Configuring the IP Permit List 2 Adding IP Addresses to the IP Permit List 2 Enabling the IP Permit List 3 Disabling the IP Permit List 4 Clearing an IP Permit List Entry 4 Configuring Port Security 1 Understanding How Port Security Works...
... 3 Disabling Layer 3 Protocol Filtering 3 Configuring the IP Permit List 1 Understanding How the IP Permit List Works 1 IP Permit List Default Configuration 2 Configuring the IP Permit List 2 Adding IP Addresses to the IP Permit List 2 Enabling the IP Permit List 3 Disabling the IP Permit List 4 Clearing an IP Permit List Entry 4 Configuring Port Security 1 Understanding How Port Security Works...
Software Guide
Page 28
... and control access to configure access control lists (ACLs). Configuring NTP Describes how to configure system message logging (syslog). Administering the Switch Describes how to configure GARP VLAN Registration Protocol (GVRP) on the switch. Working with the Flash file system....to configure Domain Name System (DNS). Configuring DNS Describes how to configure Cisco Discovery Protocol (CDP). Configuring Layer 3 Protocol Filtering Describes how to create, download, and upload switch configuration files. Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4...
... and control access to configure access control lists (ACLs). Configuring NTP Describes how to configure system message logging (syslog). Administering the Switch Describes how to configure GARP VLAN Registration Protocol (GVRP) on the switch. Working with the Flash file system....to configure Domain Name System (DNS). Configuring DNS Describes how to configure Cisco Discovery Protocol (CDP). Configuring Layer 3 Protocol Filtering Describes how to create, download, and upload switch configuration files. Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4...
Software Guide
Page 34
...• Packet magazine is a quarterly journal published by Cisco Systems as well as ordering and customer support services. Cisco suggests these titles for engineering professionals involved in network training listed at this URL: http://www.cisco.com/en/US/about the field of networking. You can... access Packet magazine at this URL: http://www.cisco.com/en/US/learning/...
...• Packet magazine is a quarterly journal published by Cisco Systems as well as ordering and customer support services. Cisco suggests these titles for engineering professionals involved in network training listed at this URL: http://www.cisco.com/en/US/about the field of networking. You can... access Packet magazine at this URL: http://www.cisco.com/en/US/learning/...
Software Guide
Page 41
.... Modules, ports, and VLANs are password protected. For example, 3/1 denotes module 3, port 1. Both modes are numbered starting with the switch CLI: • Switch CLI Command Modes, page 2-5 • Designating Modules, Ports, and VLANs on module 3 78-13315-02 Catalyst 6000 Family Software Configuration ...Guide-Releases 6.3 and 6.4 2-5 You can enter lists of ports, use the module number. If your switch has a redundant supervisor engine, the supervisor engines reside in slot 1. In some commands, such as they...
.... Modules, ports, and VLANs are password protected. For example, 3/1 denotes module 3, port 1. Both modes are numbered starting with the switch CLI: • Switch CLI Command Modes, page 2-5 • Designating Modules, Ports, and VLANs on module 3 78-13315-02 Catalyst 6000 Family Software Configuration ...Guide-Releases 6.3 and 6.4 2-5 You can enter lists of ports, use the module number. If your switch has a redundant supervisor engine, the supervisor engines reside in slot 1. In some commands, such as they...
Software Guide
Page 42
...commands stored in place of VLANs. For information on using the VLAN ID, a single number associated with the VLAN. Table 2-3 lists the keyboard shortcuts to use a comma-separated list (do not insert spaces) to specify individual VLANs or a hyphen (-) between the VLAN numbers to designate VLANs and VLAN ranges... commands require a MAC address, IP address, or IP alias, which must be designated in place of VLANs, use when entering and editing switch commands. Command Line Editing You can use an IP address, except for most commands that use DNS host names in the history buffer, and...
...commands stored in place of VLANs. For information on using the VLAN ID, a single number associated with the VLAN. Table 2-3 lists the keyboard shortcuts to use a comma-separated list (do not insert spaces) to specify individual VLANs or a hyphen (-) between the VLAN numbers to designate VLANs and VLAN ranges... commands require a MAC address, IP address, or IP alias, which must be designated in place of VLANs, use when entering and editing switch commands. Command Line Editing You can use an IP address, except for most commands that use DNS host names in the history buffer, and...
Software Guide
Page 43
... 20 commands you to the end of the command containing the string aaa. 78-13315-02 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 2-7 Table 2-4 lists the history substitution commands. Ctrl-L; reenter command after using special abbreviated commands. To add a string to the end of a previous command and repeat it: !!aaa...
... 20 commands you to the end of the command containing the string aaa. 78-13315-02 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 2-7 Table 2-4 lists the history substitution commands. Ctrl-L; reenter command after using special abbreviated commands. To add a string to the end of a previous command and repeat it: !!aaa...
Software Guide
Page 44
... the MSFC. For more information, see the commands available in . Table 2-5 lists and describes the most commonly used when the switch cannot boot properly. To have access to a command category displays a list of the commands are one-time commands, such as a command usage description. ...ROM monitor mode is a separate mode used Cisco IOS modes. On selected commands, entering...
... the MSFC. For more information, see the commands available in . Table 2-5 lists and describes the most commonly used when the switch cannot boot properly. To have access to a command category displays a list of the commands are one-time commands, such as a command usage description. ...ROM monitor mode is a separate mode used Cisco IOS modes. On selected commands, entering...
Software Guide
Page 45
...of available commands by entering just enough characters to config t. Prompt Router> Router# Router(config)# Router(config-if)# Router(config-line)# The Cisco IOS command interpreter, called word help is called the EXEC, interprets and executes the commands you . Chapter 2 Command-Line Interfaces MSFC Command...and the configure terminal command to make the command unique from other command modes. For example, you type exit, the switch backs out one level. To obtain a list of Use How to Access Connect to privileged EXEC mode, press Ctrl-Z. Do not include a space. configure 78-...
...of available commands by entering just enough characters to config t. Prompt Router> Router# Router(config)# Router(config-if)# Router(config-line)# The Cisco IOS command interpreter, called word help is called the EXEC, interprets and executes the commands you . Chapter 2 Command-Line Interfaces MSFC Command...and the configure terminal command to make the command unique from other command modes. For example, you type exit, the switch backs out one level. To obtain a list of Use How to Access Connect to privileged EXEC mode, press Ctrl-Z. Do not include a space. configure 78-...
Software Guide
Page 46
... from a Telnet session, see the last 20 commands you are in the switch CLI, enter Console> switch console [mod] the MSFC CLI. Cisco IOS Command-Line Interface These sections describe basic Cisco IOS configuration tasks you need to understand before the question mark. This form of...the command, keywords, and arguments you are having trouble entering a command, check the system prompt, and enter the question mark (?) for a list of a keyword or argument. Router# configure ? memory network overwrite-network terminal Configure from NV memory Configure from a TFTP network host Overwrite NV ...
... from a Telnet session, see the last 20 commands you are in the switch CLI, enter Console> switch console [mod] the MSFC CLI. Cisco IOS Command-Line Interface These sections describe basic Cisco IOS configuration tasks you need to understand before the question mark. This form of...the command, keywords, and arguments you are having trouble entering a command, check the system prompt, and enter the question mark (?) for a list of a keyword or argument. Router# configure ? memory network overwrite-network terminal Configure from NV memory Configure from a TFTP network host Overwrite NV ...
Software Guide
Page 60
...link must have the same setting. When the destination station replies, the switch adds its address table, it is shared by a configurable aging timer, so if an address remains inactive for a destination address not listed in its relevant source address and port ID to the address table.... The switch uses an aging mechanism, defined by all other ). Configure port negotiation with the set port speed ...
...link must have the same setting. When the destination station replies, the switch adds its address table, it is shared by a configurable aging timer, so if an address remains inactive for a destination address not listed in its relevant source address and port ID to the address table.... The switch uses an aging mechanism, defined by all other ). Configure port negotiation with the set port speed ...
Software Guide
Page 64
...the neighboring port asks to use it and does not use flow control if the neighboring port does not use flow control. Table 4-3 lists the set port flow control command to configure flow control on ports. Console> (enable) set to half-duplex. The port sends flow...for a specified period of time; Console> (enable) Configuring IEEE 802.3X Flow Control Gigabit Ethernet ports on the Catalyst 6000 family switches use flow control to respond to flow-control requests. other devices. Setting the Port Configuration Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit ...
...the neighboring port asks to use it and does not use flow control if the neighboring port does not use flow control. Table 4-3 lists the set port flow control command to configure flow control on ports. Console> (enable) set to half-duplex. The port sends flow...for a specified period of time; Console> (enable) Configuring IEEE 802.3X Flow Control Gigabit Ethernet ports on the Catalyst 6000 family switches use flow control to respond to flow-control requests. other devices. Setting the Port Configuration Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit ...
Software Guide
Page 67
... timer for the port is enabled (you have not disabled the port), the port status is shown as errdisable. Step 2 Verify that occurs before the switch notifies the main processor of the port is configured correctly. Once a port is in errdisable state; Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit Ethernet...
... timer for the port is enabled (you have not disabled the port), the port status is shown as errdisable. Step 2 Verify that occurs before the switch notifies the main processor of the port is configured correctly. Once a port is in errdisable state; Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit Ethernet...
Software Guide
Page 68
...timeout enable bpdu-guard Successfully enabled errdisable-timeout for bpdu-guard. Setting the Port Configuration Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit Ethernet Switching A port enters errdisable state for the following reasons (these reasons appear as configuration options with the set errdisable-timeout enable command): •...errdisable-timeout ErrDisable Reason Timeout Status bpdu-guard Enable channel-misconfig Disable duplex-mismatch Enable udld Enable other than the above listed reasons. If you specify "all," all ports errdisabled by default.
...timeout enable bpdu-guard Successfully enabled errdisable-timeout for bpdu-guard. Setting the Port Configuration Chapter 4 Configuring Ethernet, Fast Ethernet, and Gigabit Ethernet Switching A port enters errdisable state for the following reasons (these reasons appear as configuration options with the set errdisable-timeout enable command): •...errdisable-timeout ErrDisable Reason Timeout Status bpdu-guard Enable channel-misconfig Disable duplex-mismatch Enable udld Enable other than the above listed reasons. If you specify "all," all ports errdisabled by default.
Software Guide
Page 74
...port actively attempt to convert the link to become a trunk, even if it is in the same VLAN Trunking Protocol (VTP) domain. Table 5-2 lists the encapsulation types used with the set to establish a trunk link. Specifies that the port negotiate with the set to a trunk link. Ethernet trunk... to force a port to the change . Trunk negotiation is the default mode for all Ethernet ports. Trunking Modes and Encapsulation Types Table 5-1 lists the trunking modes used with the neighboring port to a trunk link. The port becomes a trunk port if the neighboring port is set trunk ...
...port actively attempt to convert the link to become a trunk, even if it is in the same VLAN Trunking Protocol (VTP) domain. Table 5-2 lists the encapsulation types used with the set to establish a trunk link. Specifies that the port negotiate with the set to a trunk link. Ethernet trunk... to force a port to the change . Trunk negotiation is the default mode for all Ethernet ports. Trunking Modes and Encapsulation Types Table 5-1 lists the trunking modes used with the neighboring port to a trunk link. The port becomes a trunk port if the neighboring port is set trunk ...
Software Guide
Page 79
...1,5,10-32,55,101-120,998-1000 Console> (enable) Defining the Allowed VLANs on a Trunk When you can remove VLANs from the allowed list to prevent traffic for that the neighboring port is in privileged mode: Step 1 Step 2 Task Configure a port to isl or negotiate. Command ... the encapsulation type and how to verify the trunk configuration. However, you configure a trunk port, all VLANs are added to the allowed VLANs list for those VLANs from passing over the trunk. 78-13315-02 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 5-7 This example assumes ...
...1,5,10-32,55,101-120,998-1000 Console> (enable) Defining the Allowed VLANs on a Trunk When you can remove VLANs from the allowed list to prevent traffic for that the neighboring port is in privileged mode: Step 1 Step 2 Task Configure a port to isl or negotiate. Command ... the encapsulation type and how to verify the trunk configuration. However, you configure a trunk port, all VLANs are added to the allowed VLANs list for those VLANs from passing over the trunk. 78-13315-02 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 5-7 This example assumes ...
Software Guide
Page 80
...[mod/port] Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 5-8 78-13315-02 Port(s) 1/1 allowed vlans modified to allowed list. Command set trunk 1/1 2500 Adding vlans 2500 to 1-100,500-1005,2500. Console> (enable) set trunk mod/port off trunking ... and active in management domain 1/1 1,521-524 Port Vlans in privileged mode: Step 1 Step 2 Step 3 Task Command Remove VLANs from allowed list. Console> (enable) show trunk 1/1 Port Mode Encapsulation Status Native vlan 1/1 desirable isl trunking 1 Port Vlans allowed on a port, perform this...
...[mod/port] Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 5-8 78-13315-02 Port(s) 1/1 allowed vlans modified to allowed list. Command set trunk 1/1 2500 Adding vlans 2500 to 1-100,500-1005,2500. Console> (enable) set trunk mod/port off trunking ... and active in management domain 1/1 1,521-524 Port Vlans in privileged mode: Step 1 Step 2 Step 3 Task Command Remove VLANs from allowed list. Console> (enable) show trunk 1/1 Port Mode Encapsulation Status Native vlan 1/1 desirable isl trunking 1 Port Vlans allowed on a port, perform this...
Software Guide
Page 82
... the VLANs that should not pass traffic over an EtherChannel link between two switches. Figure 5-1 shows two switches connected through two 100BASE-TX Fast Ethernet ports. Figure 5-1 ISL Trunk Over Fast EtherChannel Link Switch A 1/1 1/2 3/1 Switch B 3/2 23925 Fast EtherChannel ISL trunk link This example shows how to ...1/1 1,521-524 Port Vlans in spanning tree forwarding state and not pruned 1/1 Switch1> (enable) Define the allowed VLAN list for the trunk by entering the ping command. Switch1> (enable) clear trunk 1/1 531-1005 Removing Vlan(s) 531-1005 from allowed...
... the VLANs that should not pass traffic over an EtherChannel link between two switches. Figure 5-1 shows two switches connected through two 100BASE-TX Fast Ethernet ports. Figure 5-1 ISL Trunk Over Fast EtherChannel Link Switch A 1/1 1/2 3/1 Switch B 3/2 23925 Fast EtherChannel ISL trunk link This example shows how to ...1/1 1,521-524 Port Vlans in spanning tree forwarding state and not pruned 1/1 Switch1> (enable) Define the allowed VLAN list for the trunk by entering the ping command. Switch1> (enable) clear trunk 1/1 531-1005 Removing Vlan(s) 531-1005 from allowed...
Software Guide
Page 95
...mod/port] This example shows how to transmit and receive packets from allowed list. When a trunk port with VLAN 1 disabled becomes a nontrunk port, it... the configuration: Console> (enable) clear trunk 8/1 1 Removing Vlan(s) 1 from control protocols such as Cisco Discovery Protocol (CDP), VTP, Port Aggregation Protocol (PAgP), and DTP. Console> (enable) show trunk ... on isl trunking Native vlan ----------1 Port Vlans allowed on Trunks On the Catalyst 6000 family switches, VLAN 1 is enabled on trunk interfaces. Chapter 5 Configuring Ethernet VLAN Trunks Disabling VLAN 1...
...mod/port] This example shows how to transmit and receive packets from allowed list. When a trunk port with VLAN 1 disabled becomes a nontrunk port, it... the configuration: Console> (enable) clear trunk 8/1 1 Removing Vlan(s) 1 from control protocols such as Cisco Discovery Protocol (CDP), VTP, Port Aggregation Protocol (PAgP), and DTP. Console> (enable) show trunk ... on isl trunking Native vlan ----------1 Port Vlans allowed on Trunks On the Catalyst 6000 family switches, VLAN 1 is enabled on trunk interfaces. Chapter 5 Configuring Ethernet VLAN Trunks Disabling VLAN 1...
Software Guide
Page 100
... Use the option that have to avoid configuration problems: • You can have a maximum of VLANs is not the same for a port list, the ports do not have different GARP VLAN Registration Protocol (GVRP), GARP Multicast Registration Protocol (GMRP), and quality of the ports is a ...with the set port channel command. • Ports with ports where the port security feature is set spantree portcost command, can adversely affect switch performance. • An EtherChannel will not form with ports that provides the greatest variety in an EtherChannel. • An EtherChannel will not...
... Use the option that have to avoid configuration problems: • You can have a maximum of VLANs is not the same for a port list, the ports do not have different GARP VLAN Registration Protocol (GVRP), GARP Multicast Registration Protocol (GMRP), and quality of the ports is a ...with the set port channel command. • Ports with ports where the port security feature is set spantree portcost command, can adversely affect switch performance. • An EtherChannel will not form with ports that provides the greatest variety in an EtherChannel. • An EtherChannel will not...