Software Guide
Page 327
... ACE. Use 'commit' command to replace an existing ACE with the destination address of the IP ToS byte as defined by RFC-1349. The precedence is bits 3 through 2 as defined by RFC-791. Optionally, you can be used as an abbreviation for IPACL2 to redirect IP traffic to NVRAM: Console> (enable) commit...
... ACE. Use 'commit' command to replace an existing ACE with the destination address of the IP ToS byte as defined by RFC-1349. The precedence is bits 3 through 2 as defined by RFC-791. Optionally, you can be used as an abbreviation for IPACL2 to redirect IP traffic to NVRAM: Console> (enable) commit...
Software Guide
Page 413
..., while all traffic between a network device and a centralized database to determine the identity of TACACS, a User Datagram Protocol (UDP)-based access-control protocol specified by RFC 1492. TACACS+ works with many authentication types, including fixed password, one another, so a given TACACS+ configuration can configure a TACACS+ key on the TACACS+ servers. This...
..., while all traffic between a network device and a centralized database to determine the identity of TACACS, a User Datagram Protocol (UDP)-based access-control protocol specified by RFC 1492. TACACS+ works with many authentication types, including fixed password, one another, so a given TACACS+ configuration can configure a TACACS+ key on the TACACS+ servers. This...
Software Guide
Page 414
... network in place of the RADIUS servers • Specify the RADIUS key used to a network device. The RADIUS clients and servers use the key to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." Note For more than the Kerberos server, for a particular service. You can specify which method to validate...
... network in place of the RADIUS servers • Specify the RADIUS key used to a network device. The RADIUS clients and servers use the key to RFC 2138, "Remote Authentication Dial In User Service (RADIUS)." Note For more than the Kerberos server, for a particular service. You can specify which method to validate...
Software Guide
Page 607
... describes how to describe how many NTP hops away a machine is extremely efficient; Note For complete syntax and usage information for the commands used in RFC 1305. NTP is from an authoritative time source, such as Greenwich Mean Time. NTP has two ways to avoid synchronizing to a machine whose time might...
... describes how to describe how many NTP hops away a machine is extremely efficient; Note For complete syntax and usage information for the commands used in RFC 1305. NTP is from an authoritative time source, such as Greenwich Mean Time. NTP has two ways to avoid synchronizing to a machine whose time might...
Software Guide
Page 610
... all printable characters and spaces To authenticate the message, the client authentication key must match that is, the client administrator must be securely distributed in RFC 1305. When you enable the authentication feature, the client switch sends time-of the server. Each authentication key is documented in advance (that of -day...
... all printable characters and spaces To authenticate the message, the client authentication key must match that is, the client administrator must be securely distributed in RFC 1305. When you enable the authentication feature, the client switch sends time-of the server. Each authentication key is documented in advance (that of -day...
Software Guide
Page 641
...36 Configuring SNMP Understanding SNMP Table 36-1 SNMP Terminology (continued) Term SNMP engine SNMP entity SNMP group SNMP user SNMP view write view Definition A copy of SNMP that defines an access policy, in RFC 1902, has additions and enhancements to data types, counter size, and ...protocol operations. These concepts have different access rights in each group; Users belonging to a particular SNMP group inherit all of an SNMP engine and SNMP applications.
...36 Configuring SNMP Understanding SNMP Table 36-1 SNMP Terminology (continued) Term SNMP engine SNMP entity SNMP group SNMP user SNMP view write view Definition A copy of SNMP that defines an access policy, in RFC 1902, has additions and enhancements to data types, counter size, and ...protocol operations. These concepts have different access rights in each group; Users belonging to a particular SNMP group inherit all of an SNMP engine and SNMP applications.
Software Guide
Page 647
... or Inform messages. • Notification receivers-Receive and process Trap or Inform messages. • Proxy forwarders-Forward messages between SNMP entities There are used in RFC 2274. One access control model, the view-based access control model (VACM), currently has been defined. For example, processing get, get-next, get-bulk and...
... or Inform messages. • Notification receivers-Receive and process Trap or Inform messages. • Proxy forwarders-Forward messages between SNMP entities There are used in RFC 2274. One access control model, the view-based access control model (VACM), currently has been defined. For example, processing get, get-next, get-bulk and...
Software Guide
Page 653
... exchange network monitoring data. History (RMON group 2) for Ethernet, Fast Ethernet, Fast EtherChannel, and Gigabit Ethernet switch ports (uses 3 KB of supervisor engine RAM for Ethernet, Fast Ethernet, Fast EtherChannel, and Gigabit Ethernet switch ports (uses 140 bytes of the RMON specification (see the "Supported RMON...the first 50 buckets; Note For complete syntax and usage information for details): • The following RMON2 groups are defined in RFC 1757: - Configuring RMON 37 C H A P T E R This chapter describes how to configure RMON on page 37-2 for the commands used in...
... exchange network monitoring data. History (RMON group 2) for Ethernet, Fast Ethernet, Fast EtherChannel, and Gigabit Ethernet switch ports (uses 3 KB of supervisor engine RAM for Ethernet, Fast Ethernet, Fast EtherChannel, and Gigabit Ethernet switch ports (uses 140 bytes of the RMON specification (see the "Supported RMON...the first 50 buckets; Note For complete syntax and usage information for details): • The following RMON2 groups are defined in RFC 1757: - Configuring RMON 37 C H A P T E R This chapter describes how to configure RMON on page 37-2 for the commands used in...
Software Guide
Page 654
For more information on page 36-6). Verify that supports RFC 1757 and RFC 2021 (see the "Using CiscoWorks2000" section on RMON, visit: http://www.cisco.com/en/US/docs/internetworking/technology/handbook/RMON.html Enabling RMON Note RMON is enabled. Console> (enable) ... task in privileged mode: Step 1 Step 2 Task Enable RMON on a network management system (NMS) that RMON is disabled by the supervisor engine software. 37-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Enabling RMON Chapter 37 Configuring RMON The embedded RMON...
For more information on page 36-6). Verify that supports RFC 1757 and RFC 2021 (see the "Using CiscoWorks2000" section on RMON, visit: http://www.cisco.com/en/US/docs/internetworking/technology/handbook/RMON.html Enabling RMON Note RMON is enabled. Console> (enable) ... task in privileged mode: Step 1 Step 2 Task Enable RMON on a network management system (NMS) that RMON is disabled by the supervisor engine software. 37-2 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Enabling RMON Chapter 37 Configuring RMON The embedded RMON...
Software Guide
Page 655
...Supervisor Engine RMON and RMON2 Support Object Identifier (OID) and Description Source ...mib-2(1).rmon(16).statistics(1).etherStatsTable(1) RFC 1757 (RMON-MIB) Counters for packets, octets, broadcasts, errors, etc. ...mib-2(1).rmon(16).history(2).historyControlTable(1) ...mib-2(1).rmon(16).history(2).etherHistoryTable(2) RFC 1757 (RMON-MIB) RFC... 1757 (RMON-MIB) Periodically samples and saves statistics group counters for later retrieval. ...mib-2(1).rmon(16).alarm(3) RFC 1757 (RMON-MIB) A threshold that...
...Supervisor Engine RMON and RMON2 Support Object Identifier (OID) and Description Source ...mib-2(1).rmon(16).statistics(1).etherStatsTable(1) RFC 1757 (RMON-MIB) Counters for packets, octets, broadcasts, errors, etc. ...mib-2(1).rmon(16).history(2).historyControlTable(1) ...mib-2(1).rmon(16).history(2).etherHistoryTable(2) RFC 1757 (RMON-MIB) RFC... 1757 (RMON-MIB) Periodically samples and saves statistics group counters for later retrieval. ...mib-2(1).rmon(16).alarm(3) RFC 1757 (RMON-MIB) A threshold that...
Software Guide
Page 682
...switch, IGMP control traffic is enabled on IP multicast and IGMP, refer to RFC 1112. A PFC is forwarded to snoop IGMP control traffic with IP multicast...entry. All hosts interested in the Layer 2 forwarding table for further processing. Cisco Group Management Protocol (CGMP) is not supported on the Catalyst 6000 family switches,... IGMP snooping on the MSFC. GMRP is supported on any Catalyst 6000 family supervisor engine model (Supervisor Engine 1, Supervisor Engine 1A, and Supervisor Engine 2). Multicast group membership lists can distinguish IGMP control traffic from all VLANs, ...
...switch, IGMP control traffic is enabled on IP multicast and IGMP, refer to RFC 1112. A PFC is forwarded to snoop IGMP control traffic with IP multicast...entry. All hosts interested in the Layer 2 forwarding table for further processing. Cisco Group Management Protocol (CGMP) is not supported on the Catalyst 6000 family switches,... IGMP snooping on the MSFC. GMRP is supported on any Catalyst 6000 family supervisor engine model (Supervisor Engine 1, Supervisor Engine 1A, and Supervisor Engine 2). Multicast group membership lists can distinguish IGMP control traffic from all VLANs, ...
Software Guide
Page 708
... bits of the 1-byte Type of the 1-byte ToS field as IP precedence. Layer 3 differentiated services code point (DSCP) values-The Internet Engineering Task Force (IETF) defines the six most significant bits, which are prioritization values carried in packets and frames: - Note Layer 3 IP packets... can be set equal to IP precedence values. • Classification is the selection of traffic to be marked. • Marking, according to RFC 2475, is the process of setting a Layer 3 DSCP value in the native VLAN. - These sections describe QoS: • Definitions, page 41-2 ...
... bits of the 1-byte Type of the 1-byte ToS field as IP precedence. Layer 3 differentiated services code point (DSCP) values-The Internet Engineering Task Force (IETF) defines the six most significant bits, which are prioritization values carried in packets and frames: - Note Layer 3 IP packets... can be set equal to IP precedence values. • Classification is the selection of traffic to be marked. • Marking, according to RFC 2475, is the process of setting a Layer 3 DSCP value in the native VLAN. - These sections describe QoS: • Definitions, page 41-2 ...
Software Guide
Page 789
...to allow the LocalDirector to the switch and specify the server and router configuration using the set lda server and set lda router commands. Supervisor Engine Follow these IP address configuration guidelines: Note You can specify an IP address for ASLB is as a guideline (the virtual-IP address in... the backup LocalDirector to ARP the real IP address of each server is 171.1.1.1. If the servers in your ASLB configuration need to follow RFC 1918 for privacy, use the following as follows (the virtual-IP address in this example is 171.1.1.200): Routers 171.1.1.1 Alias 10.1.1.1 ...
...to allow the LocalDirector to the switch and specify the server and router configuration using the set lda server and set lda router commands. Supervisor Engine Follow these IP address configuration guidelines: Note You can specify an IP address for ASLB is as a guideline (the virtual-IP address in... the backup LocalDirector to ARP the real IP address of each server is 171.1.1.1. If the servers in your ASLB configuration need to follow RFC 1918 for privacy, use the following as follows (the virtual-IP address in this example is 171.1.1.200): Routers 171.1.1.1 Alias 10.1.1.1 ...