Configuration Guide
Page 2
...ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. All other countries. Catalyst 3750 Switch Software Configuration Guide Copyright © 2004-2006 Cisco Systems, Inc. Copyright © 1981, Regents of...in this document or Website are the property of Cisco Systems, Inc. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. All rights reserved. Any use of the word partner does not imply a partnership relationship between Cisco and any other company. (0609R) Any Internet ...
...ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. All other countries. Catalyst 3750 Switch Software Configuration Guide Copyright © 2004-2006 Cisco Systems, Inc. Copyright © 1981, Regents of...in this document or Website are the property of Cisco Systems, Inc. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. All rights reserved. Any use of the word partner does not imply a partnership relationship between Cisco and any other company. (0609R) Any Internet ...
Configuration Guide
Page 95
Use a DHCP server for centralized control and automatic assignment of two components: one for delivering ...configuration information to dynamically configured devices. If you are defined. No password is Switch. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 3-3 The factory-assigned default hostname is defined. Disabled. No password is... Cluster name Default Setting No IP address or subnet mask are an experienced user familiar with the switch configuration steps, manually configure the switch. During DHCP-based autoconfiguration, your network, change the IP...
Use a DHCP server for centralized control and automatic assignment of two components: one for delivering ...configuration information to dynamically configured devices. If you are defined. No password is Switch. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 3-3 The factory-assigned default hostname is defined. Disabled. No password is... Cluster name Default Setting No IP address or subnet mask are an experienced user familiar with the switch configuration steps, manually configure the switch. During DHCP-based autoconfiguration, your network, change the IP...
Configuration Guide
Page 109
... specify the month and day, the reload takes place at keyword only if the switch system clock has been set to manually boot, it from the remote user's control. The reload command halts the system. If you do not reload it reboots itself. You can specify the reason for 19...longer exists. Use the reload command after you modify your switch is scheduled to the configured time zone on the switch. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 3-17 If you to the startup configuration (copy running-config startup-config). The time is not set (through...
... specify the month and day, the reload takes place at keyword only if the switch system clock has been set to manually boot, it from the remote user's control. The reload command halts the system. If you do not reload it reboots itself. You can specify the reason for 19...longer exists. Use the reload command after you modify your switch is scheduled to the configured time zone on the switch. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 3-17 If you to the startup configuration (copy running-config startup-config). The time is not set (through...
Configuration Guide
Page 128
...used by another member in the stack, the switch selects the lowest available number in the "Controlling Environment Variables" section on page 3-15. For more information, see the "Assigning a Stack ...by another member in the stack. • If you manually change the stack member number by using the show switch user EXEC command. You cannot use the switch current-stack-member... about merging switch stacks, see the "Switch Stack Configuration Files" section on page 5-22. Catalyst 3750 Switch Software Configuration Guide 5-6 OL-8550-02 If the stack master changes, the MAC address...
...used by another member in the stack, the switch selects the lowest available number in the "Controlling Environment Variables" section on page 3-15. For more information, see the "Assigning a Stack ...by another member in the stack. • If you manually change the stack member number by using the show switch user EXEC command. You cannot use the switch current-stack-member... about merging switch stacks, see the "Switch Stack Configuration Files" section on page 5-22. Catalyst 3750 Switch Software Configuration Guide 5-6 OL-8550-02 If the stack master changes, the MAC address...
Configuration Guide
Page 129
... member priority value is part of the stack. You manually create the provisioned configuration through the switch stack-member-number...accepts the configuration, and the information appears in the running Cisco IOS Release 12.2(20)SE or later and when no shutdown...user EXEC command. The switch stack retains the provisioned configuration in the running -config startup-config privileged EXEC command. OL-8550-02 Catalyst...member by changing the SWITCH_PRIORITY environment variable, as explained in the "Controlling Environment Variables" section on page 5-22. This ensures that you configure...
... member priority value is part of the stack. You manually create the provisioned configuration through the switch stack-member-number...accepts the configuration, and the information appears in the running Cisco IOS Release 12.2(20)SE or later and when no shutdown...user EXEC command. The switch stack retains the provisioned configuration in the running -config startup-config privileged EXEC command. OL-8550-02 Catalyst...member by changing the SWITCH_PRIORITY environment variable, as explained in the "Controlling Environment Variables" section on page 5-22. This ensures that you configure...
Configuration Guide
Page 168
...clock can provide time to these services: • User show commands • Logging and debugging messages The ... configuration information, see the "Configuring Time and Date Manually" section on the IP Internet. This alternative reduces ...use the security features of devices. However, in a LAN environment, NTP can be derived from an authoritative time...NTP uses the concept of an incorrect time. Catalyst 3750 Switch Software Configuration Guide 7-2 OL-8550-02... with the lowest stratum number with an association. Cisco's implementation of NTP speakers. NTP also compares the...
...clock can provide time to these services: • User show commands • Logging and debugging messages The ... configuration information, see the "Configuring Time and Date Manually" section on the IP Internet. This alternative reduces ...use the security features of devices. However, in a LAN environment, NTP can be derived from an authoritative time...NTP uses the concept of an incorrect time. Catalyst 3750 Switch Software Configuration Guide 7-2 OL-8550-02... with the lowest stratum number with an association. Cisco's implementation of NTP speakers. NTP also compares the...
Configuration Guide
Page 185
...your entries in the message. All MAC addresses in use. • Static address: a manually entered unicast address that does not age and that the switch uses to privileged EXEC mode. ... associated VLAN ID, and port number associated with one or more ports. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 7-19 Characters after the MOTD banner and before the login prompt... ($) symbol as the beginning and ending delimiter: Switch(config)# banner login $ Access for authorized users only. You cannot use the no banner login global configuration command. This example shows how to...
...your entries in the message. All MAC addresses in use. • Static address: a manually entered unicast address that does not age and that the switch uses to privileged EXEC mode. ... associated VLAN ID, and port number associated with one or more ports. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 7-19 Characters after the MOTD banner and before the login prompt... ($) symbol as the beginning and ending delimiter: Switch(config)# banner login $ Access for authorized users only. You cannot use the no banner login global configuration command. This example shows how to...
Configuration Guide
Page 209
...is power cycled. This command produces the boot loader prompt (switch:) after the switch is not accessible by the boot loader and the Cisco IOS image, but the configuration file (config.text) and the VLAN database file (vlan.dat) are deleted. Return to disable password ...user can interrupt the boot process only by agreeing to set the switch to boot manually by interrupting the boot process while the switch is operating in an area of the command output. The password-recovery disable feature protects access to default values. When this functionality. OL-8550-02 Catalyst...
...is power cycled. This command produces the boot loader prompt (switch:) after the switch is not accessible by the boot loader and the Cisco IOS image, but the configuration file (config.text) and the VLAN database file (vlan.dat) are deleted. Return to disable password ...user can interrupt the boot process only by agreeing to set the switch to boot manually by interrupting the boot process while the switch is operating in an area of the command output. The password-recovery disable feature protects access to default values. When this functionality. OL-8550-02 Catalyst...
Configuration Guide
Page 302
...VLAN database configuration mode. VLANs can be formed with the VLAN, when the VLAN Trunking Protocol (VTP) learns of the users. The VLAN configurations for traffic in the stack build the same VLAN database. All switches in the VLAN, and each VLAN... saved in the Catalyst 3750G Integrated Wireless LAN ,Controller switch, see Chapter 13, "Configuring VLANs." Switch ports are forwarded only to ports that is logically segmented by negotiating with one or more information about the internal ports in the switch running configuration, and you must manually configure tunnel ports...
...VLAN database configuration mode. VLANs can be formed with the VLAN, when the VLAN Trunking Protocol (VTP) learns of the users. The VLAN configurations for traffic in the stack build the same VLAN database. All switches in the VLAN, and each VLAN... saved in the Catalyst 3750G Integrated Wireless LAN ,Controller switch, see Chapter 13, "Configuring VLANs." Switch ports are forwarded only to ports that is logically segmented by negotiating with one or more information about the internal ports in the switch running configuration, and you must manually configure tunnel ports...
Configuration Guide
Page 514
... byte N bytes (N = 3-63) Remote ID Suboption Frame Format (for user-configured remote-ID and circuit-ID suboptions The switch uses these fields in the Cisco IOS DHCP server database. For more information about manual and automatic address bindings, see the "Configuring DHCP" chapter of the string ...option format-type circuit-id string interface configuration command are variable, depending on the length of the Cisco IOS IP Configuration Guide, Release 12.2. 22-6 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 The circuit-ID type is 1. - Understanding DHCP ...
... byte N bytes (N = 3-63) Remote ID Suboption Frame Format (for user-configured remote-ID and circuit-ID suboptions The switch uses these fields in the Cisco IOS DHCP server database. For more information about manual and automatic address bindings, see the "Configuring DHCP" chapter of the string ...option format-type circuit-id string interface configuration command are variable, depending on the length of the Cisco IOS IP Configuration Guide, Release 12.2. 22-6 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 The circuit-ID type is 1. - Understanding DHCP ...
Configuration Guide
Page 561
... igmp snooping groups [count |dynamic Display multicast table information for the switch or about a specific [count] | user [count]] parameter: • count-Display the total number of entries for the specified command options instead of the...VLAN ID range is 1 to 1001 and 1006 to display information for all VLANs on dynamically learned and manually configured multicast router interfaces. show ip igmp snooping [vlan vlan-id] Display the snooping configuration information for...These are dynamically learned interfaces. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 24-17
... igmp snooping groups [count |dynamic Display multicast table information for the switch or about a specific [count] | user [count]] parameter: • count-Display the total number of entries for the specified command options instead of the...VLAN ID range is 1 to 1001 and 1006 to display information for all VLANs on dynamically learned and manually configured multicast router interfaces. show ip igmp snooping [vlan vlan-id] Display the snooping configuration information for...These are dynamically learned interfaces. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 24-17
Configuration Guide
Page 615
The destination port can use VTP to the user. If a port is removed from a monitored EtherChannel group, it is disabled. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 28-9 For VLANs 1 to 1005 that are propagated by using the remote-span VLAN configuration mode ... No MAC address learning occurs on the RSPAN VLAN. • RSPAN VLAN traffic only flows on trunk ports. • RSPAN VLANs must manually configure all intermediate switches. Changes in VLAN membership or trunk settings for a destination port do not take effect, and the respective SPAN sessions ...
The destination port can use VTP to the user. If a port is removed from a monitored EtherChannel group, it is disabled. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 28-9 For VLANs 1 to 1005 that are propagated by using the remote-span VLAN configuration mode ... No MAC address learning occurs on the RSPAN VLAN. • RSPAN VLAN traffic only flows on trunk ports. • RSPAN VLANs must manually configure all intermediate switches. Changes in VLAN membership or trunk settings for a destination port do not take effect, and the respective SPAN sessions ...
Configuration Guide
Page 652
... User process UNIX-to syslog servers, enter the no logging host global configuration command, and specify the syslog server IP address. For more information about the fields in this display, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. 30-14 Catalyst ...3750 Switch Software Configuration Guide OL-8550-02 For information about these facilities, consult the operator's manual for your UNIX operating system. To disable logging ...
... User process UNIX-to syslog servers, enter the no logging host global configuration command, and specify the syslog server IP address. For more information about the fields in this display, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. 30-14 Catalyst ...3750 Switch Software Configuration Guide OL-8550-02 For information about these facilities, consult the operator's manual for your UNIX operating system. To disable logging ...
Configuration Guide
Page 948
... specified VLAN and IPv6 multicast vlan-id [ipv6-multicast-address] address. 37-12 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 When you enable MLD snooping, the .... show ipv6 mld snooping mrouter [vlan vlan-id] Display information on dynamically learned and manually configured multicast router interfaces. These are dynamically learned interfaces. (Optional) Enter vlan vlan-id... for all IPv6 multicast address information or specific IPv6 vlan-id] [count | dynamic | user] multicast address information for the switch or a VLAN. • Enter count to show the...
... specified VLAN and IPv6 multicast vlan-id [ipv6-multicast-address] address. 37-12 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 When you enable MLD snooping, the .... show ipv6 mld snooping mrouter [vlan vlan-id] Display information on dynamically learned and manually configured multicast router interfaces. These are dynamically learned interfaces. (Optional) Enter vlan vlan-id... for all IPv6 multicast address information or specific IPv6 vlan-id] [count | dynamic | user] multicast address information for the switch or a VLAN. • Enter count to show the...
Configuration Guide
Page 1183
... authentication 10-26 guest VLAN 10-34 host mode 10-29 inaccessible authentication bypass 10-37 OL-8550-02 Index port-based authentication (continued) configuring manual re-authentication of a client 10-30 periodic re-authentication 10-30 quiet period 10-31 RADIUS server 10-28 RADIUS server parameters on the switch... described 10-15 guidelines 10-25 initiation and message exchange 10-5 magic packet 10-18 method lists 10-26 multiple-hosts mode, described 10-8 per-user ACLs AAA authorization 10-26 configuration tasks 10-12 described 10-11 RADIUS server attributes 10-12...
... authentication 10-26 guest VLAN 10-34 host mode 10-29 inaccessible authentication bypass 10-37 OL-8550-02 Index port-based authentication (continued) configuring manual re-authentication of a client 10-30 periodic re-authentication 10-30 quiet period 10-31 RADIUS server 10-28 RADIUS server parameters on the switch... described 10-15 guidelines 10-25 initiation and message exchange 10-5 magic packet 10-18 method lists 10-26 multiple-hosts mode, described 10-8 per-user ACLs AAA authorization 10-26 configuration tasks 10-12 described 10-11 RADIUS server attributes 10-12...
Configuration Guide
Page 1198
...name default configuration 7-15 default setting 7-15 manual configuration 7-15 See also DNS system prompt, default setting 7-14, 7-15 system resources, optimizing 8-1 IN-48 Catalyst 3750 Switch Software Configuration Guide T TACACS+ ...user 9-17 tagged packets IEEE 802.1Q 17-3 Layer 2 protocol 17-8 tar files creating C-6 displaying the contents of C-7 extracting C-7 image file format C-20 TDR 1-12 Telnet accessing management interfaces 2-11 number of connections 1-6 setting a password 9-6 templates, SDM 8-2 temporary self-signed certificate 9-43 Terminal Access Controller Access Control...
...name default configuration 7-15 default setting 7-15 manual configuration 7-15 See also DNS system prompt, default setting 7-14, 7-15 system resources, optimizing 8-1 IN-48 Catalyst 3750 Switch Software Configuration Guide T TACACS+ ...user 9-17 tagged packets IEEE 802.1Q 17-3 Layer 2 protocol 17-8 tar files creating C-6 displaying the contents of C-7 extracting C-7 image file format C-20 TDR 1-12 Telnet accessing management interfaces 2-11 number of connections 1-6 setting a password 9-6 templates, SDM 8-2 temporary self-signed certificate 9-43 Terminal Access Controller Access Control...
Configuration Guide
Page 1201
Index unicast storm 25-1 unicast storm control command 25-4 unicast traffic, blocking 25-7 UniDirectional Link Detection protocol See UDLD UNIX syslog ... Protocol See UDP user EXEC mode 2-2 username-based authentication 9-6 OL-8550-02 V version-dependent transparent mode 14-4 version-mismatch (VM) mode automatic upgrades with auto-upgrade 5-11 described 5-11 displaying 5-11 manual upgrades with auto-advise 5-12 upgrades with auto-extract 5-11 ...management domain 14-2 VLAN Management Policy Server See VMPS VLAN map entries, order of 32-30 Catalyst 3750 Switch Software Configuration Guide IN-51
Index unicast storm 25-1 unicast storm control command 25-4 unicast traffic, blocking 25-7 UniDirectional Link Detection protocol See UDLD UNIX syslog ... Protocol See UDP user EXEC mode 2-2 username-based authentication 9-6 OL-8550-02 V version-dependent transparent mode 14-4 version-mismatch (VM) mode automatic upgrades with auto-upgrade 5-11 described 5-11 displaying 5-11 manual upgrades with auto-advise 5-12 upgrades with auto-extract 5-11 ...management domain 14-2 VLAN Management Policy Server See VMPS VLAN map entries, order of 32-30 Catalyst 3750 Switch Software Configuration Guide IN-51