Brochure
Page 4
...order in the shared buffer. Network Availability To provide efficient use of Service and Rate Limiting The Cisco Catalyst 2950 Series offers superior, highly granular QoS based on Layer 2 to 4 information, helping to prioritize mission-critical and/or bandwidth-intensive traffic, such as ... quality implications, such as the source/destination IP address, source/destination MAC address, or the Layer 4 Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) ports. Cisco Catalyst 2950 Series switches support up to six policers per port, which allows the network administrator ...
...order in the shared buffer. Network Availability To provide efficient use of Service and Rate Limiting The Cisco Catalyst 2950 Series offers superior, highly granular QoS based on Layer 2 to 4 information, helping to prioritize mission-critical and/or bandwidth-intensive traffic, such as ... quality implications, such as the source/destination IP address, source/destination MAC address, or the Layer 4 Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) ports. Cisco Catalyst 2950 Series switches support up to six policers per port, which allows the network administrator ...
Brochure
Page 6
... frame formats: Ethernet II (tagged and untagged) and 802.3 (Subnetwork Access Protocol [SNAP] encapsulated tagged and untagged frames). © 2004 Cisco Systems, Inc. Page 6 of six switches, for improved fault tolerance and network uptime. • Redundant stacking connections provide support for a redundant...VLAN while isolating the streams from degrading overall systems performance. • Per virtual LAN (VLAN) Spanning Tree Plus (PVST+ allows for Layer 2 load sharing on redundant links, to efficiently use the extra capacity inherent in a redundant design. • IEEE 802.1s Multiple ...
... frame formats: Ethernet II (tagged and untagged) and 802.3 (Subnetwork Access Protocol [SNAP] encapsulated tagged and untagged frames). © 2004 Cisco Systems, Inc. Page 6 of six switches, for improved fault tolerance and network uptime. • Redundant stacking connections provide support for a redundant...VLAN while isolating the streams from degrading overall systems performance. • Per virtual LAN (VLAN) Spanning Tree Plus (PVST+ allows for Layer 2 load sharing on redundant links, to efficiently use the extra capacity inherent in a redundant design. • IEEE 802.1s Multiple ...
Brochure
Page 7
...SSHv2 and SNMPv3 provide network security by filtering out nonsubscribers and limits the number of concurrent multicast streams available per port. © 2004 Cisco Systems, Inc. IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of where the user is...classification of incoming packets: source Media Access Control (MAC) address, destination MAC address, and 16-bit Ethertype. • The following Layer 3 and Layer 4 fields or a combination can be applied to filter based on DSCP values. • Time-based ACLs allow another device to connect...
...SSHv2 and SNMPv3 provide network security by filtering out nonsubscribers and limits the number of concurrent multicast streams available per port. © 2004 Cisco Systems, Inc. IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of where the user is...classification of incoming packets: source Media Access Control (MAC) address, destination MAC address, and 16-bit Ethertype. • The following Layer 3 and Layer 4 fields or a combination can be applied to filter based on DSCP values. • Time-based ACLs allow another device to connect...
Brochure
Page 8
... Layer 4 fields (or a combination) can be used DSCP values. • The switches support classifying or reclassifying packets based on the uplink. © 2004 Cisco Systems, Inc. Sophisticated Traffic Management • The switch offers the ability to limit data flows based on MAC source...of IP address. • SPAN support of Intrusion Detection Systems (IDSs) to monitor, repel, and report network security violations • Cisco Network Assistant Software Security Wizards ease the deployment of security features for restricting user access to DSCP. • The switches support 14 well...
... Layer 4 fields (or a combination) can be used DSCP values. • The switches support classifying or reclassifying packets based on the uplink. © 2004 Cisco Systems, Inc. Sophisticated Traffic Management • The switch offers the ability to limit data flows based on MAC source...of IP address. • SPAN support of Intrusion Detection Systems (IDSs) to monitor, repel, and report network security violations • Cisco Network Assistant Software Security Wizards ease the deployment of security features for restricting user access to DSCP. • The switches support 14 well...
Brochure
Page 9
... • Remote SPAN (RSPAN) allows network administrators to locally monitor ports in a Layer 2 switch network from any interface. • RTTMON-MIB allows users to monitor network performance between a Cisco Catalyst switch and a remote device. • Multifunction LEDs per port for port status... allows users to 250 users. . can be found on configuration capabilities of any other settings within the intranet. • Layer 2 traceroute eases troubleshooting by identifying the physical path that simplifies the administration of networks of up to modify polling intervals, table...
... • Remote SPAN (RSPAN) allows network administrators to locally monitor ports in a Layer 2 switch network from any interface. • RTTMON-MIB allows users to monitor network performance between a Cisco Catalyst switch and a remote device. • Multifunction LEDs per port for port status... allows users to 250 users. . can be found on configuration capabilities of any other settings within the intranet. • Layer 2 traceroute eases troubleshooting by identifying the physical path that simplifies the administration of networks of up to modify polling intervals, table...
Hardware Installation Guide
Page 138
...to access privileged EXEC (enable) mode. Example: myrouter# end Configuring the Enable and Enable Secret Passwords To provide an additional layer of the Cisco IOS software or if you can use the enable secret command because it takes precedence over the enable password command; Also ...see the "Configuring Passwords and Privileges" chapter in effect simultaneously. end 6. end 4-10 Cisco 2900 and 3900 Series Hardware Installation OL-18712-01 Purpose - We recommend that do not recognize the enable secret command. enable password ...
...to access privileged EXEC (enable) mode. Example: myrouter# end Configuring the Enable and Enable Secret Passwords To provide an additional layer of the Cisco IOS software or if you can use the enable secret command because it takes precedence over the enable password command; Also ...see the "Configuring Passwords and Privileges" chapter in effect simultaneously. end 6. end 4-10 Cisco 2900 and 3900 Series Hardware Installation OL-18712-01 Purpose - We recommend that do not recognize the enable secret command. enable password ...
Hardware Installation Guide
Page 139
...the console line, see the "Configuring Operating Characteristics for the terminal that your password if prompted. Specifies an additional layer of the Cisco IOS software or if you boot older boot ROMs that you are using. By default, the privileged EXEC command ...interpreter waits 10 minutes to privileged EXEC mode. In particular, see the Cisco IOS Configuration Fundamentals and Network Management Configuration Guide. Step 6 Example: Router(config)# end enable Step 7 Example: Router> enable end Enables...
...the console line, see the "Configuring Operating Characteristics for the terminal that your password if prompted. Specifies an additional layer of the Cisco IOS software or if you boot older boot ROMs that you are using. By default, the privileged EXEC command ...interpreter waits 10 minutes to privileged EXEC mode. In particular, see the Cisco IOS Configuration Fundamentals and Network Management Configuration Guide. Step 6 Example: Router(config)# end enable Step 7 Example: Router> enable end Enables...
Software Configuration Guide
Page 103
Log in Internet Explorer): ftp://ftp.cisco.com Use the mouse to navigate to the folders listed above. You can also access this server from your network management software 78-6511-05 ... • wsc3500xl for the password. At the ftp> prompt, change directories to access the server ftp.cisco.com. Using SNMP to Access MIB Variables The switch MIB variables are accessible through SNMP, an application-layer protocol facilitating the exchange of your e-mail username when prompted for a list of Catalyst 3500 XL MIBs...
Log in Internet Explorer): ftp://ftp.cisco.com Use the mouse to navigate to the folders listed above. You can also access this server from your network management software 78-6511-05 ... • wsc3500xl for the password. At the ftp> prompt, change directories to access the server ftp.cisco.com. Using SNMP to Access MIB Variables The switch MIB variables are accessible through SNMP, an application-layer protocol facilitating the exchange of your e-mail username when prompted for a list of Catalyst 3500 XL MIBs...
Software Configuration Guide
Page 114
...connected. The following sections list the requirements for the following requirements: • It is running Cisco IOS Release 12.0(5)XP or later. • It has an IP address. • It has Cisco Discovery Protocol (CDP) version 2 enabled (the default). • It is not a command ...• Candidate and member switches Note Refer to configure, manage, and monitor the member switches. You can be distributed across a contiguous Layer 2 network. Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide 5-2 78-6511-05 All communication with cluster members if...
...connected. The following sections list the requirements for the following requirements: • It is running Cisco IOS Release 12.0(5)XP or later. • It has an IP address. • It has Cisco Discovery Protocol (CDP) version 2 enabled (the default). • It is not a command ...• Candidate and member switches Note Refer to configure, manage, and monitor the member switches. You can be distributed across a contiguous Layer 2 network. Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide 5-2 78-6511-05 All communication with cluster members if...
Software Configuration Guide
Page 163
... Acceptable for Option 3 1 6 4 Figure 6-5 Gigabit Ethernet Clusters Catalyst 5000 series switch Catalyst 2900 and 3500 XL switches Cisco 7000 router Catalyst 2900 and 3500 XL switches Catalyst 2900 and 3500 XL switches Catalyst 5000 series/ 6000 backbone Catalyst 6000 switch... Layer 3 backbone Cisco 7000 router 33021 Option 1: standalone cascaded cluster Option 2: cascaded cluster connected to a Layer 2 backbone Option 3: cascaded cluster connected to a Layer 3 backbone Enabling UplinkFast on all cluster switches can...
... Acceptable for Option 3 1 6 4 Figure 6-5 Gigabit Ethernet Clusters Catalyst 5000 series switch Catalyst 2900 and 3500 XL switches Cisco 7000 router Catalyst 2900 and 3500 XL switches Catalyst 2900 and 3500 XL switches Catalyst 5000 series/ 6000 backbone Catalyst 6000 switch... Layer 3 backbone Cisco 7000 router 33021 Option 1: standalone cascaded cluster Option 2: cascaded cluster connected to a Layer 2 backbone Option 3: cascaded cluster connected to a Layer 3 backbone Enabling UplinkFast on all cluster switches can...
Software Configuration Guide
Page 167
... state. As shown in the stack use the GigaStack GBICs connected in less than 2 seconds under normal network conditions) across the switches at the access layer. Link A, the root link, is elected as the path to the root. stack ports are in the STP forwarding state; The stack root port on...
... state. As shown in the stack use the GigaStack GBICs connected in less than 2 seconds under normal network conditions) across the switches at the access layer. Link A, the root link, is elected as the path to the root. stack ports are in the STP forwarding state; The stack root port on...
Software Configuration Guide
Page 180
... Misuse of this situation by the SP. If a switch outside of your customer's network. Configuring STP Chapter 6 Configuring the System Configuring STP Root Guard The Layer 2 network of a service provider (SP) can reconfigure itself and select a customer switch as the STP root switch, as the root port, root guard then places...
... Misuse of this situation by the SP. If a switch outside of your customer's network. Configuring STP Chapter 6 Configuring the System Configuring STP Root Guard The Layer 2 network of a service provider (SP) can reconfigure itself and select a customer switch as the STP root switch, as the root port, root guard then places...
Software Configuration Guide
Page 181
... of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the arpa keyword) is stored in a link-layer frame and sent over Ethernet, for rapid retrieval. Once a MAC address is determined, the IP-MAC address association is enabled on the port. Then the...
... of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the arpa keyword) is stored in a link-layer frame and sent over Ethernet, for rapid retrieval. Once a MAC address is determined, the IP-MAC address association is enabled on the port. Then the...
Software Configuration Guide
Page 185
... the appropriate multicast. When a subscriber changes channels or turns off the television, the set -top box or PC sends an IGMP report to the access layer switch (S1 switch) to include this receiver port and VLAN as a receiver of generating IGMP version-2 messages. It allows the single multicast VLAN to isolate...
... the appropriate multicast. When a subscriber changes channels or turns off the television, the set -top box or PC sends an IGMP report to the access layer switch (S1 switch) to include this receiver port and VLAN as a receiver of generating IGMP version-2 messages. It allows the single multicast VLAN to isolate...
Software Configuration Guide
Page 187
.... 78-6511-05 Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide 6-51 Configuration Guidelines and Limitations Follow these steps: a. The access layer switch (S1 switch) modifies the forwarding behavior to allow the traffic to be initiated by a port in the multicast VLAN rather than in each VLAN...
.... 78-6511-05 Catalyst 2900 Series XL and Catalyst 3500 Series XL Software Configuration Guide 6-51 Configuration Guidelines and Limitations Follow these steps: a. The access layer switch (S1 switch) modifies the forwarding behavior to allow the traffic to be initiated by a port in the multicast VLAN rather than in each VLAN...
Software Configuration Guide
Page 188
... mvr entries is already a CGMP group member to be an MVR group member, remove the address from the MVR group. d. The receiver VLAN is one Layer 2 MAC address. If you want an address that are no remaining receiver ports on page 6-46. 6-52 Catalyst 2900 Series XL and Catalyst 3500 Series...
... mvr entries is already a CGMP group member to be an MVR group member, remove the address from the MVR group. d. The receiver VLAN is one Layer 2 MAC address. If you want an address that are no remaining receiver ports on page 6-46. 6-52 Catalyst 2900 Series XL and Catalyst 3500 Series...
Software Configuration Guide
Page 213
... a specific port. Verify the entry by UDLD. Chapter 7 Configuring the Switch Ports Configuring UniDirectional Link Detection Configuring UniDirectional Link Detection UniDirectional Link Detection (UDLD) is a Layer 2 protocol that have been shut down unidirectional links.
... a specific port. Verify the entry by UDLD. Chapter 7 Configuring the Switch Ports Configuring UniDirectional Link Detection Configuring UniDirectional Link Detection UniDirectional Link Detection (UDLD) is a Layer 2 protocol that have been shut down unidirectional links.
Software Configuration Guide
Page 217
... ports on the same switch is flooded to a protected port because a MAC address has timed out or has not been learned by the Layer 2 protocol between ports on the switch, and traffic between protected ports-unicast, broadcast, and multicast-must be forwarded through... to protected ports on other switches. Enable protected port on page 7-4 for more information. Use the no unicast and multicast traffic is forwarded through a Layer 3 device. Use the port block command to guarantee that in privileged EXEC mode, follow these steps to be configured. In such an environment, there ...
... ports on the same switch is flooded to a protected port because a MAC address has timed out or has not been learned by the Layer 2 protocol between ports on the switch, and traffic between protected ports-unicast, broadcast, and multicast-must be forwarded through... to protected ports on other switches. Enable protected port on page 7-4 for more information. Use the no unicast and multicast traffic is forwarded through a Layer 3 device. Use the port block command to guarantee that in privileged EXEC mode, follow these steps to be configured. In such an environment, there ...
Software Configuration Guide
Page 244
... VTP to transition to transparent mode, which disables VTP. switchport multi vlan vlan-list Assign the port to privileged EXEC mode. Using VTP VTP is a Layer 2 messaging protocol that can make configuration changes centrally on a network-wide basis. switchport mode multi Enter the VLAN membership mode for multi-VLAN ports. interface...
... VTP to transition to transparent mode, which disables VTP. switchport multi vlan vlan-list Assign the port to privileged EXEC mode. Using VTP VTP is a Layer 2 messaging protocol that can make configuration changes centrally on a network-wide basis. switchport mode multi Enter the VLAN membership mode for multi-VLAN ports. interface...