Configuration Guide
Page 11
... Using IEEE 802.1x Authentication with Voice VLAN Ports 10-16 Using IEEE 802.1x Authentication with Port Security 10-17 Using IEEE 802.1x Authentication with Wake-on-LAN 10-18 Using IEEE 802.1x Authentication with MAC Authentication Bypass 10-18 Using Network Admission Control Layer 2 IEEE 802.1x Validation 10-19... IEEE 802.1x Authentication Configuration Guidelines 10-23 IEEE 802.1x Authentication 10-23 VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass 10-24 MAC Authentication Bypass 10-25 Catalyst 3750 Switch Software Configuration Guide xi
... Using IEEE 802.1x Authentication with Voice VLAN Ports 10-16 Using IEEE 802.1x Authentication with Port Security 10-17 Using IEEE 802.1x Authentication with Wake-on-LAN 10-18 Using IEEE 802.1x Authentication with MAC Authentication Bypass 10-18 Using Network Admission Control Layer 2 IEEE 802.1x Validation 10-19... IEEE 802.1x Authentication Configuration Guidelines 10-23 IEEE 802.1x Authentication 10-23 VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass 10-24 MAC Authentication Bypass 10-25 Catalyst 3750 Switch Software Configuration Guide xi
Configuration Guide
Page 13
... IEEE 802.3x Flow Control 11-19 Configuring Auto-MDIX on an Interface 11-20 Configuring a Power Management Mode on a PoE Port 11-21 Budgeting Power for Devices Connected to a PoE Port 11-23 Adding a Description for an Interface 11-24 Configuring Layer 3 Interfaces ... 12-3 Creating Smartports Macros 12-4 Applying Smartports Macros 12-5 Applying Cisco-Default Smartports Macros 12-6 Displaying Smartports Macros 12-8 Configuring VLANs 13-1 Understanding VLANs 13-1 Supported VLANs 13-2 VLAN Port Membership Modes 13-3 Contents OL-8550-02 Catalyst 3750 Switch Software Configuration Guide xiii
... IEEE 802.3x Flow Control 11-19 Configuring Auto-MDIX on an Interface 11-20 Configuring a Power Management Mode on a PoE Port 11-21 Budgeting Power for Devices Connected to a PoE Port 11-23 Adding a Description for an Interface 11-24 Configuring Layer 3 Interfaces ... 12-3 Creating Smartports Macros 12-4 Applying Smartports Macros 12-5 Applying Cisco-Default Smartports Macros 12-6 Displaying Smartports Macros 12-8 Configuring VLANs 13-1 Understanding VLANs 13-1 Supported VLANs 13-2 VLAN Port Membership Modes 13-3 Contents OL-8550-02 Catalyst 3750 Switch Software Configuration Guide xiii
Configuration Guide
Page 14
...21 Changing the Pruning-Eligible List 13-22 Configuring the Native VLAN for Untagged Traffic 13-23 Configuring Trunk Ports for Load Sharing 13-24 Load Sharing Using STP Port Priorities 13-24 Load Sharing Using STP Path Cost 13-26 Configuring VMPS 13-28 Understanding VMPS 13-28 Dynamic-Access... Port VLAN Membership 13-29 Default VMPS Client Configuration 13-29 VMPS Configuration Guidelines 13-29 Catalyst 3750 Switch Software ...
...21 Changing the Pruning-Eligible List 13-22 Configuring the Native VLAN for Untagged Traffic 13-23 Configuring Trunk Ports for Load Sharing 13-24 Load Sharing Using STP Port Priorities 13-24 Load Sharing Using STP Path Cost 13-26 Configuring VMPS 13-28 Understanding VMPS 13-28 Dynamic-Access... Port VLAN Membership 13-29 Default VMPS Client Configuration 13-29 VMPS Configuration Guidelines 13-29 Catalyst 3750 Switch Software ...
Configuration Guide
Page 18
... Time for a VLAN 18-23 Configuring the Maximum-Aging Time for a VLAN 18-23 Configuring the Transmit Hold-Count 18-24 Displaying the Spanning-Tree Status 18-24 Configuring MSTP 19-1 Understanding MSTP 19-2 Multiple Spanning-Tree Regions 19-2 IST, CIST, and CST 19-3 Operations Within an ... 19-7 Detecting Unidirectional Link Failure 19-8 MSTP and Switch Stacks 19-8 Interoperability with IEEE 802.1D STP 19-9 Understanding RSTP 19-9 Port Roles and the Active Topology 19-9 Rapid Convergence 19-10 Synchronization of Port Roles 19-11 xviii Catalyst 3750 Switch Software Configuration Guide OL-8550-02
... Time for a VLAN 18-23 Configuring the Maximum-Aging Time for a VLAN 18-23 Configuring the Transmit Hold-Count 18-24 Displaying the Spanning-Tree Status 18-24 Configuring MSTP 19-1 Understanding MSTP 19-2 Multiple Spanning-Tree Regions 19-2 IST, CIST, and CST 19-3 Operations Within an ... 19-7 Detecting Unidirectional Link Failure 19-8 MSTP and Switch Stacks 19-8 Interoperability with IEEE 802.1D STP 19-9 Understanding RSTP 19-9 Port Roles and the Active Topology 19-9 Rapid Convergence 19-10 Synchronization of Port Roles 19-11 xviii Catalyst 3750 Switch Software Configuration Guide OL-8550-02
Configuration Guide
Page 19
... the Hello Time 19-22 Configuring the Forwarding-Delay Time 19-23 Configuring the Maximum-Aging Time 19-24 Configuring the Maximum-Hop Count 19-24 Specifying the Link Type to Ensure Rapid Transitions 19-24 Designating the Neighbor Type 19-25 Restarting the Protocol Migration Process 19-26 Displaying the MST Configuration... Guard 20-11 Configuring Optional Spanning-Tree Features 20-11 Default Optional Spanning-Tree Configuration 20-12 Optional Spanning-Tree Configuration Guidelines 20-12 Enabling Port Fast 20-12 Catalyst 3750 Switch Software Configuration Guide xix
... the Hello Time 19-22 Configuring the Forwarding-Delay Time 19-23 Configuring the Maximum-Aging Time 19-24 Configuring the Maximum-Hop Count 19-24 Specifying the Link Type to Ensure Rapid Transitions 19-24 Designating the Neighbor Type 19-25 Restarting the Protocol Migration Process 19-26 Displaying the MST Configuration... Guard 20-11 Configuring Optional Spanning-Tree Features 20-11 Default Optional Spanning-Tree Configuration 20-12 Optional Spanning-Tree Configuration Guidelines 20-12 Enabling Port Fast 20-12 Catalyst 3750 Switch Software Configuration Guide xix
Configuration Guide
Page 22
... Setting the Maximum Number of IGMP Groups 24-27 Configuring the IGMP Throttling Action 24-28 Displaying IGMP Filtering and Throttling Configuration 24-29 Configuring Port-Based Traffic Control 25-1 Configuring Storm Control 25-1 Understanding Storm Control 25-1 Default Storm Control Configuration 25-3 Configuring Storm Control and Threshold Levels 25-3 Catalyst 3750 Switch Software Configuration Guide xxii OL-8550-02
... Setting the Maximum Number of IGMP Groups 24-27 Configuring the IGMP Throttling Action 24-28 Displaying IGMP Filtering and Throttling Configuration 24-29 Configuring Port-Based Traffic Control 25-1 Configuring Storm Control 25-1 Understanding Storm Control 25-1 Default Storm Control Configuration 25-3 Configuring Storm Control and Threshold Levels 25-3 Catalyst 3750 Switch Software Configuration Guide xxii OL-8550-02
Configuration Guide
Page 24
...SPAN and RSPAN Concepts and Terminology 28-4 SPAN Sessions 28-4 Monitored Traffic 28-5 Source Ports 28-6 Source VLANs 28-7 VLAN Filtering 28-7 Destination Port 28-8 RSPAN VLAN 28-9 SPAN and RSPAN Interaction with Other Features 28-9 SPAN and...28-21 Creating an RSPAN Destination Session and Configuring Incoming Traffic 28-22 Specifying VLANs to Filter 28-24 Displaying SPAN and RSPAN Status 28-25 Configuring RMON 29-1 Understanding RMON 29-1 Configuring RMON 29-2 Default... Statistics on an Interface 29-5 Displaying RMON Status 29-6 xxiv Catalyst 3750 Switch Software Configuration Guide OL-8550-02
...SPAN and RSPAN Concepts and Terminology 28-4 SPAN Sessions 28-4 Monitored Traffic 28-5 Source Ports 28-6 Source VLANs 28-7 VLAN Filtering 28-7 Destination Port 28-8 RSPAN VLAN 28-9 SPAN and RSPAN Interaction with Other Features 28-9 SPAN and...28-21 Creating an RSPAN Destination Session and Configuring Incoming Traffic 28-22 Specifying VLANs to Filter 28-24 Displaying SPAN and RSPAN Status 28-25 Configuring RMON 29-1 Understanding RMON 29-1 Configuring RMON 29-2 Default... Statistics on an Interface 29-5 Displaying RMON Status 29-6 xxiv Catalyst 3750 Switch Software Configuration Guide OL-8550-02
Configuration Guide
Page 26
...C H A P T E R Configuring Network Security with ACLs 32-1 Understanding ACLs 32-1 Supported ACLs 32-2 Port ACLs 32-3 Router ACLs 32-4 VLAN Maps 32-5 Handling Fragmented and Unfragmented Traffic 32-5 ACLs and Switch Stacks 32... and Software Treatment of IP ACLs 32-22 IPv4 ACL Configuration Examples 32-22 Numbered ACLs 32-24 Extended ACLs 32-24 Named ACLs 32-24 Time Range Applied to an IP ACL 32-25 Commented IP ACL Entries 32-25 ACL Logging ...34 Wiring Closet Configuration 32-34 Denying Access to a Server on Another VLAN 32-35 xxvi Catalyst 3750 Switch Software Configuration Guide OL-8550-02
...C H A P T E R Configuring Network Security with ACLs 32-1 Understanding ACLs 32-1 Supported ACLs 32-2 Port ACLs 32-3 Router ACLs 32-4 VLAN Maps 32-5 Handling Fragmented and Unfragmented Traffic 32-5 ACLs and Switch Stacks 32... and Software Treatment of IP ACLs 32-22 IPv4 ACL Configuration Examples 32-22 Numbered ACLs 32-24 Extended ACLs 32-24 Named ACLs 32-24 Time Range Applied to an IP ACL 32-25 Commented IP ACL Entries 32-25 ACL Logging ...34 Wiring Closet Configuration 32-34 Denying Access to a Server on Another VLAN 32-35 xxvi Catalyst 3750 Switch Software Configuration Guide OL-8550-02
Configuration Guide
Page 38
... Diagnostic Tests 44-3 Displaying Online Diagnostic Tests and Test Results 44-4 Configuring the Catalyst 3750G Integrated Wireless LAN Controller Switch A-1 Understanding the Wireless LAN Controller Switch A-2 The Wireless LAN Controller Switch and Switch Stacks A-2 Controller and Switch Interaction A-3 Internal Ports A-3 Configuring the Wireless LAN Controller Switch A-4 Internal Port Configuration A-4 Reconfiguring the Internal Ports A-5 Accessing the Controller A-6 Displaying Internal Wireless Controller Information A-7 Supported MIBs B-1 MIB List B-1 Using FTP to Access the MIB Files...
... Diagnostic Tests 44-3 Displaying Online Diagnostic Tests and Test Results 44-4 Configuring the Catalyst 3750G Integrated Wireless LAN Controller Switch A-1 Understanding the Wireless LAN Controller Switch A-2 The Wireless LAN Controller Switch and Switch Stacks A-2 Controller and Switch Interaction A-3 Internal Ports A-3 Configuring the Wireless LAN Controller Switch A-4 Internal Port Configuration A-4 Reconfiguring the Internal Ports A-5 Accessing the Controller A-6 Displaying Internal Wireless Controller Information A-7 Supported MIBs B-1 MIB List B-1 Using FTP to Access the MIB Files...
Configuration Guide
Page 66
... is server. For more information, see Chapter 25, "Configuring Port-Based Traffic Control." 1-14 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 For more information, see Chapter 24, "Configuring IGMP Snooping and MVR." • Port-based traffic - For more information, see Chapter 25, "Configuring Port-Based Traffic Control." - For more information, see Chapter 11, "Configuring Interface...
... is server. For more information, see Chapter 25, "Configuring Port-Based Traffic Control." 1-14 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 For more information, see Chapter 24, "Configuring IGMP Snooping and MVR." • Port-based traffic - For more information, see Chapter 25, "Configuring Port-Based Traffic Control." - For more information, see Chapter 11, "Configuring Interface...
Configuration Guide
Page 131
...the provisioned interfaces (potentially of the wrong type) are rejected, even for ports 1 through 48 is running Cisco IOS Release 12.2(20)SE or later and you add a provisioned switch... some commands are rejected, and some commands are the same as provisioned information. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-9 If you remove a provisioned switch from the stack, and is...configuration to the provisioned switch and adds it . In this situation, the configuration for ports 25 through 24. The switch stack then adds to it to a powered-down . However, during ...
...the provisioned interfaces (potentially of the wrong type) are rejected, even for ports 1 through 48 is running Cisco IOS Release 12.2(20)SE or later and you add a provisioned switch... some commands are rejected, and some commands are the same as provisioned information. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-9 If you remove a provisioned switch from the stack, and is...configuration to the provisioned switch and adds it . In this situation, the configuration for ports 25 through 24. The switch stack then adds to it to a powered-down . However, during ...
Configuration Guide
Page 137
...section on page 19-8 • "DHCP Snooping and Switch Stacks" section on page 22-8 • "IGMP Snooping and Switch Stacks" section on page 24-7 • "Port Security and Switch Stacks" section on page 25-17 • "CDP and Switch Stacks" section on page 26-2 • "SPAN and RSPAN and Switch... are saved, in the "Stack Member Numbers" section on page 34-10 OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-15 As mentioned in case the stack master is associated with the Cisco IOS File System, Configuration Files, and Software Images." If a stack member fails and you ...
...section on page 19-8 • "DHCP Snooping and Switch Stacks" section on page 22-8 • "IGMP Snooping and Switch Stacks" section on page 24-7 • "Port Security and Switch Stacks" section on page 25-17 • "CDP and Switch Stacks" section on page 26-2 • "SPAN and RSPAN and Switch... are saved, in the "Stack Member Numbers" section on page 34-10 OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-15 As mentioned in case the stack master is associated with the Cisco IOS File System, Configuration Files, and Software Images." If a stack member fails and you ...
Configuration Guide
Page 186
...accelerate the aging interval on a per-VLAN basis. The switch sends packets between any port on the switch to individual workstations, repeaters, switches, routers, or other VLAN. 7-20 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Managing the MAC Address Table Chapter 7... Address Entries, page 7-22 • Configuring MAC Address Notification Traps, page 7-22 • Adding and Removing Static Address Entries, page 7-24 • Configuring Unicast MAC Address Filtering, page 7-25 • Displaying Address Table Entries, page 7-27 Building the Address Table With multiple ...
...accelerate the aging interval on a per-VLAN basis. The switch sends packets between any port on the switch to individual workstations, repeaters, switches, routers, or other VLAN. 7-20 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Managing the MAC Address Table Chapter 7... Address Entries, page 7-22 • Configuring MAC Address Notification Traps, page 7-22 • Adding and Removing Static Address Entries, page 7-24 • Configuring Unicast MAC Address Filtering, page 7-25 • Displaying Address Table Entries, page 7-27 Building the Address Table With multiple ...
Configuration Guide
Page 190
... private-VLAN primary or secondary VLAN are associated with this destination address are forwarded to another port for each source port. Because all ports are not replicated in all ports and not learned. Static MAC addresses configured in the configuration file. Managing the MAC Address Table... more information about private VLANs, see Chapter 16, "Configuring Private VLANs." 7-24 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 To disable the MAC address notification traps on the specified port. You can be a unicast or multicast address. • It does not...
... private-VLAN primary or secondary VLAN are associated with this destination address are forwarded to another port for each source port. Because all ports are not replicated in all ports and not learned. Static MAC addresses configured in the configuration file. Managing the MAC Address Table... more information about private VLANs, see Chapter 16, "Configuring Private VLANs." 7-24 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 To disable the MAC address notification traps on the specified port. You can be a unicast or multicast address. • It does not...
Configuration Guide
Page 228
...create a default list that is used when a named list is automatically applied to all ports. • For list-name, specify a character string to be used only if the... the username password global configuration command. - The additional methods of these methods: - Controlling Switch Access with the aaa authentication login command. enable-Use the enable password for authentication... database for authentication. You must enter username information in the configuration file. 9-24 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Select one of authentication are creating...
...create a default list that is used when a named list is automatically applied to all ports. • For list-name, specify a character string to be used only if the... the username password global configuration command. - The additional methods of these methods: - Controlling Switch Access with the aaa authentication login command. enable-Use the enable password for authentication... database for authentication. You must enter username information in the configuration file. 9-24 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Select one of authentication are creating...
Configuration Guide
Page 251
...-ciphersuite global configuration commands to return to the default settings. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 9-47 Chapter 9 Configuring Switch-Based Authentication Configuring ...CA trustpoint on a persistent connection. This procedure assumes that you must also specify the port number after the URL. If a CA trustpoint is 1. The default is not configured... and the remote HTTPS server requires client authentication, connections to 86400 seconds (24 hours). The command is optional if client authentication is 1 to the secure HTTP client...
...-ciphersuite global configuration commands to return to the default settings. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 9-47 Chapter 9 Configuring Switch-Based Authentication Configuring ...CA trustpoint on a persistent connection. This procedure assumes that you must also specify the port number after the URL. If a CA trustpoint is 1. The default is not configured... and the remote HTTPS server requires client authentication, connections to 86400 seconds (24 hours). The command is optional if client authentication is 1 to the secure HTTP client...
Configuration Guide
Page 277
...; IEEE 802.1x Authentication, page 10-23 • VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass, page 10-24 • MAC Authentication Bypass, page 10-25 IEEE 802.1x Authentication These are the IEEE 802.1x authentication configuration guidelines: •... When IEEE 802.1x authentication is enabled, ports are authenticated before resending the response to trunk), an error message appears, and the port mode is not changed. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 10-23 Disabled. This setting is...
...; IEEE 802.1x Authentication, page 10-23 • VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass, page 10-24 • MAC Authentication Bypass, page 10-25 IEEE 802.1x Authentication These are the IEEE 802.1x authentication configuration guidelines: •... When IEEE 802.1x authentication is enabled, ports are authenticated before resending the response to trunk), an error message appears, and the port mode is not changed. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 10-23 Disabled. This setting is...
Configuration Guide
Page 306
...to networks. These port groups act as Cisco IP Phones and Cisco Aironet access points) • IEEE 802.3af-compliant powered devices On a 24-port PoE switch, each 10/100 or 10/100/1000 PoE port provides up to an AC power source. 11-6 Catalyst 3750 Switch Software Configuration...see Chapter 34, "Configuring EtherChannels and Link-State Tracking." 10-Gigabit Ethernet Interfaces The Catalyst 3750G-16TD switch has one switch port. Exceptions are referred to two 10-Gigabit module ports. Power over the failed link changes to the EtherChannel. The 10-Gigabit Ethernet interface only...
...to networks. These port groups act as Cisco IP Phones and Cisco Aironet access points) • IEEE 802.3af-compliant powered devices On a 24-port PoE switch, each 10/100 or 10/100/1000 PoE port provides up to an AC power source. 11-6 Catalyst 3750 Switch Software Configuration...see Chapter 34, "Configuring EtherChannels and Link-State Tracking." 10-Gigabit Ethernet Interfaces The Catalyst 3750G-16TD switch has one switch port. Exceptions are referred to two 10-Gigabit module ports. Power over the failed link changes to the EtherChannel. The 10-Gigabit Ethernet interface only...
Configuration Guide
Page 323
... is 370,000 milliwatts. Return to oversubscribe the power supply. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 11-23 By using the power inline consumption wattage ...you must also consider the power loss over Ethernet Ports" section on a 24-port or 48-port switch is 15400 milliwatts. The range for each the PoE port on a switch: Step 1 Step 2 Step 3...Ethernet Interfaces Budgeting Power for Devices Connected to a PoE Port When Cisco powered devices are connected to PoE ports, the switch uses Cisco Discovery Protocol (CDP) to determine the actual power consumption...
... is 370,000 milliwatts. Return to oversubscribe the power supply. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 11-23 By using the power inline consumption wattage ...you must also consider the power loss over Ethernet Ports" section on a 24-port or 48-port switch is 15400 milliwatts. The range for each the PoE port on a switch: Step 1 Step 2 Step 3...Ethernet Interfaces Budgeting Power for Devices Connected to a PoE Port When Cisco powered devices are connected to PoE ports, the switch uses Cisco Discovery Protocol (CDP) to determine the actual power consumption...
Configuration Guide
Page 981
... a separate database for an RPF Check Network 151.10.0.0/16 198.14.32.0/32 204.1.16.0/24 Port Gigabit Ethernet 1/0/1 Gigabit Ethernet 1/0/3 Gigabit Ethernet 1/0/4 PIM uses both source trees and RP-rooted... section on the RP address (which are shared-tree states) are sent toward the RP. Cisco routers and multilayer switches run PIM and can interoperate with them over traditional media (such as ...and through a PIM cloud. Chapter 40 Configuring IP Multicast Routing Understanding Cisco's Implementation of IP Multicast Routing Figure 40-2 RPF Check Multicast packet from source 151.10.3....
... a separate database for an RPF Check Network 151.10.0.0/16 198.14.32.0/32 204.1.16.0/24 Port Gigabit Ethernet 1/0/1 Gigabit Ethernet 1/0/3 Gigabit Ethernet 1/0/4 PIM uses both source trees and RP-rooted... section on the RP address (which are shared-tree states) are sent toward the RP. Cisco routers and multilayer switches run PIM and can interoperate with them over traditional media (such as ...and through a PIM cloud. Chapter 40 Configuring IP Multicast Routing Understanding Cisco's Implementation of IP Multicast Routing Figure 40-2 RPF Check Multicast packet from source 151.10.3....