Software Guide
Page 2
... INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. All rights reserved. IF YOU ARE UNABLE TO LOCATE THE...
... INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. All rights reserved. IF YOU ARE UNABLE TO LOCATE THE...
Software Guide
Page 3
...Related Publications xxx Obtaining Documentation, Obtaining Support, and Security Guidelines xxxii Overview 1-1 Features 1-1 Ease-of-Deployment and Ease-of-Use Features 1-1 Performance Features 1-2 Management Options 1-3 Manageability Features 1-4 Availability and Redundancy Features 1-6 VLAN Features 1-7 Security Features 1-7 ...Default Settings After Initial Switch Configuration 1-10 Network Configuration Examples 1-12 Design Concepts for Using the Switch 1-12 Small to Medium-Sized Network Using Catalyst 2960 Switches 1-16 Long-Distance, High-Bandwidth Transport Configuration 1-17 Where to Go ...
...Related Publications xxx Obtaining Documentation, Obtaining Support, and Security Guidelines xxxii Overview 1-1 Features 1-1 Ease-of-Deployment and Ease-of-Use Features 1-1 Performance Features 1-2 Management Options 1-3 Manageability Features 1-4 Availability and Redundancy Features 1-6 VLAN Features 1-7 Security Features 1-7 ...Default Settings After Initial Switch Configuration 1-10 Network Configuration Examples 1-12 Design Concepts for Using the Switch 1-12 Small to Medium-Sized Network Using Catalyst 2960 Switches 1-16 Long-Distance, High-Bandwidth Transport Configuration 1-17 Where to Go ...
Software Guide
Page 4
... History 2-6 Changing the Command History Buffer Size 2-6 Recalling Commands 2-6 Disabling the Command History Feature 2-7 Using Editing Features 2-7 Enabling and Disabling Editing Features 2-7 Editing Commands through Keystrokes 2-7 Editing Command Lines that Wrap 2-9 Searching and Filtering Output of show and more Commands 2-...
... History 2-6 Changing the Command History Buffer Size 2-6 Recalling Commands 2-6 Disabling the Command History Feature 2-7 Using Editing Features 2-7 Enabling and Disabling Editing Features 2-7 Editing Commands through Keystrokes 2-7 Editing Command Lines that Wrap 2-9 Searching and Filtering Output of show and more Commands 2-...
Software Guide
Page 5
... the CNS IDs and Device Hostnames 4-3 ConfigID 4-3 DeviceID 4-4 Hostname and DeviceID 4-4 Using Hostname, DeviceID, and ConfigID 4-4 Understanding Cisco IOS Agents 4-5 Initial Configuration 4-5 Incremental (Partial) Configuration 4-6 Synchronized Configuration 4-6 Configuring Cisco IOS Agents 4-6 Enabling Automated CNS Configuration 4-6 Enabling the CNS Event Agent 4-8 Enabling the Cisco IOS CNS Agent 4-9 Enabling an Initial Configuration 4-9 Enabling a Partial Configuration 4-11...
... the CNS IDs and Device Hostnames 4-3 ConfigID 4-3 DeviceID 4-4 Hostname and DeviceID 4-4 Using Hostname, DeviceID, and ConfigID 4-4 Understanding Cisco IOS Agents 4-5 Initial Configuration 4-5 Incremental (Partial) Configuration 4-6 Synchronized Configuration 4-6 Configuring Cisco IOS Agents 4-6 Enabling Automated CNS Configuration 4-6 Enabling the CNS Event Agent 4-8 Enabling the Cisco IOS CNS Agent 4-9 Enabling an Initial Configuration 4-9 Enabling a Partial Configuration 4-11...
Software Guide
Page 6
Contents Hostnames 5-12 Passwords 5-13 SNMP Community Strings 5-13 TACACS+ and RADIUS 5-14 LRE Profiles 5-14 Using the CLI to Manage Switch Clusters 5-14 Catalyst 1900 and Catalyst 2820 CLI Considerations 5-14 Using SNMP to Manage Switch Clusters 5-15 6 C H A P T E R Administering the Switch 6-1 Managing the System Time and Date 6-1 Understanding the System Clock 6-1 Understanding...
Contents Hostnames 5-12 Passwords 5-13 SNMP Community Strings 5-13 TACACS+ and RADIUS 5-14 LRE Profiles 5-14 Using the CLI to Manage Switch Clusters 5-14 Catalyst 1900 and Catalyst 2820 CLI Considerations 5-14 Using SNMP to Manage Switch Clusters 5-15 6 C H A P T E R Administering the Switch 6-1 Managing the System Time and Date 6-1 Understanding the System Clock 6-1 Understanding...
Software Guide
Page 8
... RADIUS Authorization for User Privileged Access and Network Services 8-27 Starting RADIUS Accounting 8-28 Configuring Settings for All RADIUS Servers 8-29 Configuring the Switch to Use Vendor-Specific RADIUS Attributes 8-29 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 8-31 Displaying the RADIUS Configuration 8-31 Configuring the Switch for Local...
... RADIUS Authorization for User Privileged Access and Network Services 8-27 Starting RADIUS Accounting 8-28 Configuring Settings for All RADIUS Servers 8-29 Configuring the Switch to Use Vendor-Specific RADIUS Attributes 8-29 Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 8-31 Displaying the RADIUS Configuration 8-31 Configuring the Switch for Local...
Software Guide
Page 9
....1x Accounting 9-8 IEEE 802.1x Accounting Attribute-Value Pairs 9-8 Using IEEE 802.1x Authentication with VLAN Assignment 9-9 Using IEEE 802.1x Authentication with Guest VLAN 9-11 Using IEEE 802.1x Authentication with Restricted VLAN 9-12 Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 9-13 Using IEEE 802.1x Authentication with Voice VLAN Ports 9-14...
....1x Accounting 9-8 IEEE 802.1x Accounting Attribute-Value Pairs 9-8 Using IEEE 802.1x Authentication with VLAN Assignment 9-9 Using IEEE 802.1x Authentication with Guest VLAN 9-11 Using IEEE 802.1x Authentication with Restricted VLAN 9-12 Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 9-13 Using IEEE 802.1x Authentication with Voice VLAN Ports 9-14...
Software Guide
Page 10
... Ports 10-2 Trunk Ports 10-3 EtherChannel Port Groups 10-3 Dual-Purpose Uplink Ports 10-4 Connecting Interfaces 10-4 Using Interface Configuration Mode 10-4 Procedures for Configuring Interfaces 10-5 Configuring a Range of Interfaces 10-6 Configuring and Using Interface Range Macros 10-7 Configuring Ethernet Interfaces 10-9 Default Ethernet Interface Configuration 10-9 Setting the Type of...
... Ports 10-2 Trunk Ports 10-3 EtherChannel Port Groups 10-3 Dual-Purpose Uplink Ports 10-4 Connecting Interfaces 10-4 Using Interface Configuration Mode 10-4 Procedures for Configuring Interfaces 10-5 Configuring a Range of Interfaces 10-6 Configuring and Using Interface Range Macros 10-7 Configuring Ethernet Interfaces 10-9 Default Ethernet Interface Configuration 10-9 Setting the Type of...
Software Guide
Page 12
Contents 13 C H A P T E R Load Sharing Using STP Port Priorities 12-20 Load Sharing Using STP Path Cost 12-22 Configuring VMPS 12-23 Understanding VMPS 12-24 Dynamic-Access Port VLAN Membership 12-24 Default VMPS Client Configuration 12-...
Contents 13 C H A P T E R Load Sharing Using STP Port Priorities 12-20 Load Sharing Using STP Path Cost 12-22 Configuring VMPS 12-23 Understanding VMPS 12-24 Dynamic-Access Port VLAN Membership 12-24 Default VMPS Client Configuration 12-...
Software Guide
Page 15
...-9 Optional Spanning-Tree Configuration Guidelines 17-10 Enabling Port Fast 17-10 Enabling BPDU Guard 17-11 Enabling BPDU Filtering 17-12 Enabling UplinkFast for Use with Redundant Links 17-13 Enabling BackboneFast 17-13 Enabling EtherChannel Guard 17-14 Enabling Root Guard 17-15 Enabling Loop Guard 17-15 Displaying...
...-9 Optional Spanning-Tree Configuration Guidelines 17-10 Enabling Port Fast 17-10 Enabling BPDU Guard 17-11 Enabling BPDU Filtering 17-12 Enabling UplinkFast for Use with Redundant Links 17-13 Enabling BackboneFast 17-13 Enabling EtherChannel Guard 17-14 Enabling Root Guard 17-15 Enabling Loop Guard 17-15 Displaying...
Software Guide
Page 16
... Configuring the IGMP Snooping Querier 18-14 Disabling IGMP Report Suppression 18-15 Displaying IGMP Snooping Information 18-15 Understanding Multicast VLAN Registration 18-17 Using MVR in a Multicast Television Application 18-18 Configuring MVR 18-19 Default MVR Configuration 18-19 MVR Configuration Guidelines and Limitations 18-20 Configuring MVR...
... Configuring the IGMP Snooping Querier 18-14 Disabling IGMP Report Suppression 18-15 Displaying IGMP Snooping Information 18-15 Understanding Multicast VLAN Registration 18-17 Using MVR in a Multicast Television Application 18-18 Configuring MVR 18-19 Default MVR Configuration 18-19 MVR Configuration Guidelines and Limitations 18-20 Configuring MVR...
Software Guide
Page 19
... Logging Configuration 25-13 Configuring SNMP 26-1 Understanding SNMP 26-1 SNMP Versions 26-2 SNMP Manager Functions 26-3 SNMP Agent Functions 26-4 SNMP Community Strings 26-4 Using SNMP to Access MIB Variables 26-4 Catalyst 2960 Switch Software Configuration Guide xix
... Logging Configuration 25-13 Configuring SNMP 26-1 Understanding SNMP 26-1 SNMP Versions 26-2 SNMP Manager Functions 26-3 SNMP Agent Functions 26-4 SNMP Community Strings 26-4 Using SNMP to Access MIB Variables 26-4 Catalyst 2960 Switch Software Configuration Guide xix
Software Guide
Page 20
...-12 Setting the Agent Contact and Location Information 26-15 Limiting TFTP Servers Used Through SNMP 26-16 SNMP Examples 26-17 Displaying SNMP Status 26-18 27 C H A P T E R Configuring Cisco IOS IP SLAs Operations 27-1 Understanding Cisco IOS IP SLAs 27-1 Using Cisco IOS IP SLAs to Measure Network Performance 27-2 IP SLAs Responder and...
...-12 Setting the Agent Contact and Location Information 26-15 Limiting TFTP Servers Used Through SNMP 26-16 SNMP Examples 26-17 Displaying SNMP Status 26-18 27 C H A P T E R Configuring Cisco IOS IP SLAs Operations 27-1 Understanding Cisco IOS IP SLAs 27-1 Using Cisco IOS IP SLAs to Measure Network Performance 27-2 IP SLAs Responder and...
Software Guide
Page 21
...Guidelines 28-32 QoS ACL Guidelines 28-32 Policing Guidelines 28-32 General QoS Guidelines 28-33 Enabling QoS Globally 28-33 Configuring Classification Using Port Trust States 28-34 Configuring the Trust State on Ports within the QoS Domain 28-34 Configuring the CoS Value for an ...38 Configuring a QoS Policy 28-40 Classifying Traffic by Using ACLs 28-41 Classifying Traffic by Using Class Maps 28-44 Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps 28-46 Classifying, Policing, and Marking Traffic by Using Aggregate Policers 28-49 Configuring DSCP Maps 28-51 ...
...Guidelines 28-32 QoS ACL Guidelines 28-32 Policing Guidelines 28-32 General QoS Guidelines 28-33 Enabling QoS Globally 28-33 Configuring Classification Using Port Trust States 28-34 Configuring the Trust State on Ports within the QoS Domain 28-34 Configuring the CoS Value for an ...38 Configuring a QoS Policy 28-40 Classifying Traffic by Using ACLs 28-41 Classifying Traffic by Using Class Maps 28-44 Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps 28-46 Classifying, Policing, and Marking Traffic by Using Aggregate Policers 28-49 Configuring DSCP Maps 28-51 ...
Software Guide
Page 24
...11 Preventing Autonegotiation Mismatches 32-11 SFP Module Security and Identification 32-12 Monitoring SFP Module Status 32-12 Using Ping 32-12 Understanding Ping 32-13 Executing Ping 32-13 Using Layer 2 Traceroute 32-14 Understanding Layer 2 Traceroute 32-14 Usage Guidelines 32-14 Displaying the Physical ... Debugging on a Specific Feature 32-18 Enabling All-System Diagnostics 32-19 Redirecting Debug and Error Message Output 32-19 Using the show platform forward Command 32-20 Using the crashinfo Files 32-21 Basic crashinfo Files 32-21 Extended crashinfo Files 32-22 Supported MIBs A-1 MIB List...
...11 Preventing Autonegotiation Mismatches 32-11 SFP Module Security and Identification 32-12 Monitoring SFP Module Status 32-12 Using Ping 32-12 Understanding Ping 32-13 Executing Ping 32-13 Using Layer 2 Traceroute 32-14 Understanding Layer 2 Traceroute 32-14 Usage Guidelines 32-14 Displaying the Physical ... Debugging on a Specific Feature 32-18 Enabling All-System Diagnostics 32-19 Redirecting Debug and Error Message Output 32-19 Using the show platform forward Command 32-20 Using the crashinfo Files 32-21 Basic crashinfo Files 32-21 Extended crashinfo Files 32-22 Supported MIBs A-1 MIB List...
Software Guide
Page 25
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the Default File System...a Configuration File By Using FTP B-13 Downloading a Configuration File By Using FTP B-13 Uploading a Configuration File By Using FTP B-14 Copying Configuration Files By Using RCP B-15 Preparing to Download or Upload a Configuration File By Using RCP B-16 Downloading a Configuration File By Using RCP B-17 Uploading a Configuration File By Using RCP B-18 Clearing Configuration...
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the Default File System...a Configuration File By Using FTP B-13 Downloading a Configuration File By Using FTP B-13 Uploading a Configuration File By Using FTP B-14 Copying Configuration Files By Using RCP B-15 Preparing to Download or Upload a Configuration File By Using RCP B-16 Downloading a Configuration File By Using RCP B-17 Uploading a Configuration File By Using RCP B-18 Clearing Configuration...
Software Guide
Page 26
... Format of Images on a Server or Cisco.com B-24 Copying Image Files By Using TFTP B-25 Preparing to Download or Upload an Image File By Using TFTP B-26 Downloading an Image File By Using TFTP B-27 Uploading an Image File By Using TFTP B-28 Copying Image Files By Using FTP B-29 Preparing to Download or Upload...
... Format of Images on a Server or Cisco.com B-24 Copying Image Files By Using TFTP B-25 Preparing to Download or Upload an Image File By Using TFTP B-26 Downloading an Image File By Using TFTP B-27 Uploading an Image File By Using TFTP B-28 Copying Image Files By Using FTP B-29 Preparing to Download or Upload...
Software Guide
Page 29
...QoS) features. For information about these commands. For information about Network Assistant, see the release notes for use to configure Cisco IOS software features on Cisco.com. OL-8603-04 Catalyst 2960 Switch Software Configuration Guide xxix The Catalyst 2960 software provides enterprise-class ...or changed for this release and the Catalyst 2960 Switch Hardware Installation Guide. Before using the commands that you need to manage the switch. This guide provides procedures for Cisco Network Assistant (hereafter referred to the GUI user. This guide does not provide...
...QoS) features. For information about these commands. For information about Network Assistant, see the release notes for use to configure Cisco IOS software features on Cisco.com. OL-8603-04 Catalyst 2960 Switch Software Configuration Guide xxix The Catalyst 2960 software provides enterprise-class ...or changed for this release and the Catalyst 2960 Switch Hardware Installation Guide. Before using the commands that you need to manage the switch. This guide provides procedures for Cisco Network Assistant (hereafter referred to the GUI user. This guide does not provide...
Software Guide
Page 30
Conventions Preface Conventions This publication uses these conventions to materials not contained in this manual. In this Cisco.com site: http://www.cisco.com/en/US/products/ps6406/tsd_products_support_series_home.html Note Before installing, configuring, or upgrading the...8226; For device manager requirements, see the Getting Started with Cisco Network Assistant (not orderable but available on Cisco.com). Notes contain helpful suggestions or references to convey instructions and information: Command descriptions use these conventions: • Commands and keywords are in boldface...
Conventions Preface Conventions This publication uses these conventions to materials not contained in this manual. In this Cisco.com site: http://www.cisco.com/en/US/products/ps6406/tsd_products_support_series_home.html Note Before installing, configuring, or upgrading the...8226; For device manager requirements, see the Getting Started with Cisco Network Assistant (not orderable but available on Cisco.com). Notes contain helpful suggestions or references to convey instructions and information: Command descriptions use these conventions: • Commands and keywords are in boldface...
Software Guide
Page 33
... available only on the cryptographic (supports encryption) version of the software. Features Some features described in this feature and to download the cryptographic version of -Use Features The switch ships with these topics about the Catalyst 2960 switch software: • Features, page 1-1 • Default Settings After Initial Switch Configuration, page... of the software) • QoS and CoS Features, page 1-9 • Monitoring Features, page 1-10 Ease-of-Deployment and Ease-of the software from Cisco.com. You must obtain authorization to Go Next, page 1-18 In this release.
... available only on the cryptographic (supports encryption) version of the software. Features Some features described in this feature and to download the cryptographic version of -Use Features The switch ships with these topics about the Catalyst 2960 switch software: • Features, page 1-1 • Default Settings After Initial Switch Configuration, page... of the software) • QoS and CoS Features, page 1-9 • Monitoring Features, page 1-10 Ease-of-Deployment and Ease-of the software from Cisco.com. You must obtain authorization to Go Next, page 1-18 In this release.