Configuration Guide
Page 6
... 4-6 Enabling Automated CNS Configuration 4-6 Enabling the CNS Event Agent 4-8 Enabling the Cisco IOS CNS Agent 4-9 Enabling an Initial Configuration 4-9 Enabling a Partial Configuration 4-11... Member Priority Values 5-7 Switch Stack Offline Configuration 5-7 Effects of Adding a Provisioned Switch to a Switch Stack 5-8 Effects of Replacing a Provisioned Switch in a Switch Stack 5-9 Effects of Removing a Provisioned Switch from a Switch Stack 5-9 Hardware Compatibility and SDM... Members 5-17 Switch Stack Configuration Scenarios 5-17 Catalyst 3750 Switch Software Configuration Guide vi OL-8550-02
... 4-6 Enabling Automated CNS Configuration 4-6 Enabling the CNS Event Agent 4-8 Enabling the Cisco IOS CNS Agent 4-9 Enabling an Initial Configuration 4-9 Enabling a Partial Configuration 4-11... Member Priority Values 5-7 Switch Stack Offline Configuration 5-7 Effects of Adding a Provisioned Switch to a Switch Stack 5-8 Effects of Replacing a Provisioned Switch in a Switch Stack 5-9 Effects of Removing a Provisioned Switch from a Switch Stack 5-9 Hardware Compatibility and SDM... Members 5-17 Switch Stack Configuration Scenarios 5-17 Catalyst 3750 Switch Software Configuration Guide vi OL-8550-02
Configuration Guide
Page 37
... Recovery Enabled 43-4 Procedure with Password Recovery Disabled 43-6 Preventing Switch Stack Problems 43-7 Recovering from a Command Switch Failure 43-8 Replacing a Failed Command Switch with a Cluster Member 43-9 Replacing a Failed Command Switch with Another Switch 43-11 Recovering from Lost Cluster Member Connectivity 43-12 Preventing Autonegotiation Mismatches 43-12 Troubleshooting... Using Layer 2 Traceroute 43-16 Understanding Layer 2 Traceroute 43-16 Usage Guidelines 43-16 Displaying the Physical Path 43-17 Contents OL-8550-02 Catalyst 3750 Switch Software Configuration Guide xxxvii
... Recovery Enabled 43-4 Procedure with Password Recovery Disabled 43-6 Preventing Switch Stack Problems 43-7 Recovering from a Command Switch Failure 43-8 Replacing a Failed Command Switch with a Cluster Member 43-9 Replacing a Failed Command Switch with Another Switch 43-11 Recovering from Lost Cluster Member Connectivity 43-12 Preventing Autonegotiation Mismatches 43-12 Troubleshooting... Using Layer 2 Traceroute 43-16 Understanding Layer 2 Traceroute 43-16 Usage Guidelines 43-16 Displaying the Physical Path 43-17 Contents OL-8550-02 Catalyst 3750 Switch Software Configuration Guide xxxvii
Configuration Guide
Page 55
... part of frames sent by each stack member to a switch. - Adding, removing, and replacing switches in configuring complex features such as a single switch or switch-router in advance the interface... interface (CLI) commands to nine switches through a single IP address. - OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 1-3 The system, redundant power system (RPS), and port LED... on the images are not directly connected to those used on the front-panel images. Automatic Cisco IOS version-check of a switch or multiple switches from a TFTP server. - and switch-level...
... part of frames sent by each stack member to a switch. - Adding, removing, and replacing switches in configuring complex features such as a single switch or switch-router in advance the interface... interface (CLI) commands to nine switches through a single IP address. - OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 1-3 The system, redundant power system (RPS), and port LED... on the images are not directly connected to those used on the front-panel images. Automatic Cisco IOS version-check of a switch or multiple switches from a TFTP server. - and switch-level...
Configuration Guide
Page 58
...Catalyst 3750G Integrated Wireless LAN Controller Switch only, an integrated Catalyst 3750 switch and Cisco 4400 series wireless LAN controller that supports up to 25 or 50 lightweight access points Availability and Redundancy Features These are the availability and redundancy features: • HSRP for command switch and Layer 3 router redundancy • Automatic stack master re-election for replacing...NTP) for providing a consistent time stamp to all switches from an external source • Cisco IOS File System (IFS) for providing a single interface to all file systems that become ...
...Catalyst 3750G Integrated Wireless LAN Controller Switch only, an integrated Catalyst 3750 switch and Cisco 4400 series wireless LAN controller that supports up to 25 or 50 lightweight access points Availability and Redundancy Features These are the availability and redundancy features: • HSRP for command switch and Layer 3 router redundancy • Automatic stack master re-election for replacing...NTP) for providing a consistent time stamp to all switches from an external source • Cisco IOS File System (IFS) for providing a single interface to all file systems that become ...
Configuration Guide
Page 96
...request is removed from the server. However, you need to relay the configuration file location on a different LAN than the switch. DHCP-based autoconfiguration replaces the BOOTP client functionality on the destination IP address in case one of information the switch receives depends on... addresses. If the configuration file is present and the configuration includes the ip address dhcp interface configuration command on page 3-6. Catalyst 3750 Switch Software Configuration Guide 3-4 OL-8550-02 Note We recommend a redundant connection between your switch can reclaim the IP...
...request is removed from the server. However, you need to relay the configuration file location on a different LAN than the switch. DHCP-based autoconfiguration replaces the BOOTP client functionality on the destination IP address in case one of information the switch receives depends on... addresses. If the configuration file is present and the configuration includes the ip address dhcp interface configuration command on page 3-6. Catalyst 3750 Switch Software Configuration Guide 3-4 OL-8550-02 Note We recommend a redundant connection between your switch can reclaim the IP...
Configuration Guide
Page 119
...(Optional) For retries num, enter the number of ping retries. When the configuration is applied, the & is network-number. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 4-9 The default is 5. For example, to global configuration mode. Return to connect through modem dialup lines. Enabling... & that acts as a placeholder for the switch. You can enable the Cisco IOS agent with the interface name. Enter line-cli to connect to the Configuration Engine whose IP address is replaced with these steps to the switch. Establish a static route to the Configuration ...
...(Optional) For retries num, enter the number of ping retries. When the configuration is applied, the & is network-number. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 4-9 The default is 5. For example, to global configuration mode. Return to connect through modem dialup lines. Enabling... & that acts as a placeholder for the switch. You can enable the Cisco IOS agent with the interface name. Enter line-cli to connect to the Configuration Engine whose IP address is replaced with these steps to the switch. Establish a static route to the Configuration ...
Configuration Guide
Page 125
..."Planning and Creating Clusters" chapter in the Getting Started with Cisco Network Assistant, available on page 5-7. Chapter 5 Managing Switch ...stacks to partition the switch stack: a. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-3 You can connect standalone switches..., on any of the switches, one of switches connected through their LAN ports, such as stack members. A switch cluster is operating at ...on page 5-4) to divide (partition) into two or more information about replacing a failed switch, see the "Switch Installation" chapter in the hardware ...
..."Planning and Creating Clusters" chapter in the Getting Started with Cisco Network Assistant, available on page 5-7. Chapter 5 Managing Switch ...stacks to partition the switch stack: a. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-3 You can connect standalone switches..., on any of the switches, one of switches connected through their LAN ports, such as stack members. A switch cluster is operating at ...on page 5-4) to divide (partition) into two or more information about replacing a failed switch, see the "Switch Installation" chapter in the hardware ...
Configuration Guide
Page 131
... powered-down . In addition, any configured PoE-related commands that matches the new switch. Note If the switch stack is running Cisco IOS Release 12.2(20)SE or later and you add a provisioned switch that occur when the switch stack compares the provisioned configuration .... To completely remove the configuration, use the no switch stack-member-number provision global configuration command. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-9 Effects of Replacing a Provisioned Switch in a Switch Stack When a provisioned switch in a switch stack fails, is removed from the ...
... powered-down . In addition, any configured PoE-related commands that matches the new switch. Note If the switch stack is running Cisco IOS Release 12.2(20)SE or later and you add a provisioned switch that occur when the switch stack compares the provisioned configuration .... To completely remove the configuration, use the no switch stack-member-number provision global configuration command. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-9 Effects of Replacing a Provisioned Switch in a Switch Stack When a provisioned switch in a switch stack fails, is removed from the ...
Configuration Guide
Page 137
...changed or they are already used by another member in the Getting Started with the Cisco IOS File System, Configuration Files, and Software Images." If a stack member fails and you replace with it uses the system-level settings of that the interface-specific settings of provisioning ...interface-specific configuration as the failed switch. Hence, you would for configuring system-wide features on page 34-10 OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-15 For information about file systems and configuration files, see the "Switch Stack Offline Configuration" ...
...changed or they are already used by another member in the Getting Started with the Cisco IOS File System, Configuration Files, and Software Images." If a stack member fails and you replace with it uses the system-level settings of that the interface-specific settings of provisioning ...interface-specific configuration as the failed switch. Hence, you would for configuring system-wide features on page 34-10 OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 5-15 For information about file systems and configuration files, see the "Switch Stack Offline Configuration" ...
Configuration Guide
Page 138
... Through an IP Address The switch stack is running the cryptographic version of the IP base image or IP services image software, fails and is replaced by having two devices with the same IP address in your network, change the IP address or addresses of the IP base image or IP... of the IP base image or IP services image software be lost if a stack master, running a noncryptographic version of one or more stack members. 5-16 Catalyst 3750 Switch Software Configuration Guide OL-8550-02
... Through an IP Address The switch stack is running the cryptographic version of the IP base image or IP services image software, fails and is replaced by having two devices with the same IP address in your network, change the IP address or addresses of the IP base image or IP... of the IP base image or IP services image software be lost if a stack master, running a noncryptographic version of one or more stack members. 5-16 Catalyst 3750 Switch Software Configuration Guide OL-8550-02
Configuration Guide
Page 242
...IP services image (formerly known as the enhanced multilayer image [EMI]) software fails and is replaced by providing strong encryption when a device is running the SSH server. SSH supports the ...based user authentication. 9-38 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 This software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2). SSH Servers, Integrated Clients, and Supported Versions...for this release and with non-Cisco SSH servers. SSH provides more security for Cisco IOS Release 12.2 at this URL: http://www.cisco.com/univercd/cc/td/doc/...
...IP services image (formerly known as the enhanced multilayer image [EMI]) software fails and is replaced by providing strong encryption when a device is running the SSH server. SSH supports the ...based user authentication. 9-38 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 This software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2). SSH Servers, Integrated Clients, and Supported Versions...for this release and with non-Cisco SSH servers. SSH provides more security for Cisco IOS Release 12.2 at this URL: http://www.cisco.com/univercd/cc/td/doc/...
Configuration Guide
Page 252
...• Because SCP relies on SSH for its secure transport, the router must enter the password when prompted. 9-48 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Configuring the Switch for Secure Copy Protocol Chapter 9 Configuring Switch-Based Authentication ... -config startup-config Purpose (Optional) Specify the CipherSuites (encryption algorithms) to negotiate a CipherSuite that provides a secure replacement for the Berkeley r-tools. This is the default. Shows the generated self-signed certificate for copying switch configurations or switch image files.
...• Because SCP relies on SSH for its secure transport, the router must enter the password when prompted. 9-48 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Configuring the Switch for Secure Copy Protocol Chapter 9 Configuring Switch-Based Authentication ... -config startup-config Purpose (Optional) Specify the CipherSuites (encryption algorithms) to negotiate a CipherSuite that provides a secure replacement for the Berkeley r-tools. This is the default. Shows the generated self-signed certificate for copying switch configurations or switch image files.
Configuration Guide
Page 262
...-hosts mode, you can be granted network access. If the port becomes 10-8 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Understanding IEEE 802.1x Port-Based Authentication...remains in the unauthorized state, but authentication can have periodic re-authentication enabled remain in a wireless LAN. If no server connectivity. Note that was connected to be retried. If IP connectivity ...connectivity to the RADIUS server is re-established by the time the authentication is replaced with the RADIUS server is a redundant connection to it sends an EAPOL-logoff message...
...-hosts mode, you can be granted network access. If the port becomes 10-8 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Understanding IEEE 802.1x Port-Based Authentication...remains in the unauthorized state, but authentication can have periodic re-authentication enabled remain in a wireless LAN. If no server connectivity. Note that was connected to be retried. If IP connectivity ...connectivity to the RADIUS server is re-established by the time the authentication is replaced with the RADIUS server is a redundant connection to it sends an EAPOL-logoff message...
Configuration Guide
Page 275
... data device remains authorized on page 10-41. Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must be any. (After authentication, the client IP address replaces the any field when the ACL is applied .) For example: proxyacl#....1x Authentication, page 10-26 (required) • Configuring the Switch-to-RADIUS-Server Communication, page 10-27 (required) OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 10-21 or multihost mode to trigger authentication. • We do not recommend per -user ACL policy might ...
... data device remains authorized on page 10-41. Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must be any. (After authentication, the client IP address replaces the any field when the ACL is applied .) For example: proxyacl#....1x Authentication, page 10-26 (required) • Configuring the Switch-to-RADIUS-Server Communication, page 10-27 (required) OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 10-21 or multihost mode to trigger authentication. • We do not recommend per -user ACL policy might ...
Configuration Guide
Page 333
... contain by using the show running-config user EXEC command. Keyword matching is replaced by using the show parser macro user EXEC command. If a macro is applied... • When a macro is applied sequentially to a single interface. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 12-3 This is helpful when applying an incremental configuration. ...configuration error, the macro continues to apply the remaining commands. • Some CLI commands are Cisco-default Smartports macros embedded in the same configuration mode. • When creating a macro that requires...
... contain by using the show running-config user EXEC command. Keyword matching is replaced by using the show parser macro user EXEC command. If a macro is applied... • When a macro is applied sequentially to a single interface. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 12-3 This is helpful when applying an incremental configuration. ...configuration error, the macro continues to apply the remaining commands. • Some CLI commands are Cisco-default Smartports macros embedded in the same configuration mode. • When creating a macro that requires...
Configuration Guide
Page 335
...the switch. If you apply a macro without entering the keyword values, the commands are invalid and are replaced with the corresponding value. Verify that are replaced with the corresponding value. Parameter keyword matching is case sensitive. Apply each individual command defined in the ... command. All matching occurrences of each individual command defined in the macro to three keyword-value pairs. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 12-5 Parameter keyword matching is case sensitive. Apply each command that is in the macro....
...the switch. If you apply a macro without entering the keyword values, the commands are invalid and are replaced with the corresponding value. Verify that are replaced with the corresponding value. Parameter keyword matching is case sensitive. Apply each individual command defined in the ... command. All matching occurrences of each individual command defined in the macro to three keyword-value pairs. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 12-5 Parameter keyword matching is case sensitive. Apply each command that is in the macro....
Configuration Guide
Page 336
... ip precedence 7' This example shows how to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 12-6 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Keywords that begin with the required values by using the ......'snmp-server enable traps linkup' Applying command...'snmp-server enable traps linkdown' Applying command...'snmp-server host' %Error Unknown error. Append the Cisco-default macro with $ mean that you apply a macro without entering the keyword values, the commands are invalid and are not applied. ...
... ip precedence 7' This example shows how to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 12-6 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Keywords that begin with the required values by using the ......'snmp-server enable traps linkup' Applying command...'snmp-server enable traps linkdown' Applying command...'snmp-server host' %Error Unknown error. Append the Cisco-default macro with $ mean that you apply a macro without entering the keyword values, the commands are invalid and are not applied. ...
Configuration Guide
Page 421
... Setting Disabled. When the double-tagged packets enter Switch D, the outer VLAN tag 40 is removed, the well-known MAC address is replaced with the respective Layer 2 protocol MAC address, and the packet is enabled. Layer 2 protocol tunneling configuration is distributed among all local ...and distributed to all stack members. All Layer 2 protocol tunneling configuration is sent across all stack members. None set . OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 17-11 None set . Chapter 17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 ...
... Setting Disabled. When the double-tagged packets enter Switch D, the outer VLAN tag 40 is removed, the well-known MAC address is replaced with the respective Layer 2 protocol MAC address, and the packet is enabled. Layer 2 protocol tunneling configuration is distributed among all local ...and distributed to all stack members. All Layer 2 protocol tunneling configuration is sent across all stack members. None set . OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 17-11 None set . Chapter 17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling Configuring Layer 2 ...
Configuration Guide
Page 495
..., all the VLANs to detect an EtherChannel misconfiguration if your entries in the case of an EtherChannel misconfiguration. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 20-17 Verify your entries. (Optional) Save your switch is optional. With UplinkFast, the backup... interfaces (in the blocked state) replace the root port in the configuration file. To disable the BackboneFast feature, use the no shutdown interface configuration commands on interfaces to...
..., all the VLANs to detect an EtherChannel misconfiguration if your entries in the case of an EtherChannel misconfiguration. OL-8550-02 Catalyst 3750 Switch Software Configuration Guide 20-17 Verify your entries. (Optional) Save your switch is optional. With UplinkFast, the backup... interfaces (in the blocked state) replace the root port in the configuration file. To disable the BackboneFast feature, use the no shutdown interface configuration commands on interfaces to...
Configuration Guide
Page 516
...the relay agent information DHCP relay agent forwarding policy Default Setting Enabled in the stack master are dropped)2 Replace the existing relay agent information2 22-8 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Configuring DHCP Features These sections contain this configuration information: ... 22-12 • Enabling DHCP Snooping on the stack master. When a member leaves the stack, all DHCP snooping bindings in Cisco IOS software, requires configuration1 Enabled2 None configured Enabled (invalid messages are lost if it is a routed interface or a DHCP snooping...
...the relay agent information DHCP relay agent forwarding policy Default Setting Enabled in the stack master are dropped)2 Replace the existing relay agent information2 22-8 Catalyst 3750 Switch Software Configuration Guide OL-8550-02 Configuring DHCP Features These sections contain this configuration information: ... 22-12 • Enabling DHCP Snooping on the stack master. When a member leaves the stack, all DHCP snooping bindings in Cisco IOS software, requires configuration1 Enabled2 None configured Enabled (invalid messages are lost if it is a routed interface or a DHCP snooping...