Software Guide
Page 24
... Forgotten Password 32-3 Procedure with Password Recovery Enabled 32-4 Procedure with Password Recovery Disabled 32-6 Recovering from a Command Switch Failure 32-7 Replacing a Failed Command Switch with a Cluster Member 32-8 Replacing a Failed Command Switch with Another Switch 32-10 Recovering from Lost Cluster Member Connectivity 32-11 Preventing Autonegotiation Mismatches 32-11 SFP...
... Forgotten Password 32-3 Procedure with Password Recovery Enabled 32-4 Procedure with Password Recovery Disabled 32-6 Recovering from a Command Switch Failure 32-7 Replacing a Failed Command Switch with a Cluster Member 32-8 Replacing a Failed Command Switch with Another Switch 32-10 Recovering from Lost Cluster Member Connectivity 32-11 Preventing Autonegotiation Mismatches 32-11 SFP...
Software Guide
Page 25
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the ...19 Clearing the Startup Configuration File B-19 Deleting a Stored Configuration File B-19 Replacing and Rolling Back Configurations B-19 Understanding Configuration Replacement and Rollback B-19 Configuration Guidelines B-21 Configuring the Configuration Archive B-21 Performing a Configuration Replacement or Rollback Operation B-22 OL-8603-04 Catalyst 2960 Switch Software Configuration Guide ...
Contents B A P P E N D I X Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the ...19 Clearing the Startup Configuration File B-19 Deleting a Stored Configuration File B-19 Replacing and Rolling Back Configurations B-19 Understanding Configuration Replacement and Rollback B-19 Configuration Guidelines B-21 Configuring the Configuration Archive B-21 Performing a Configuration Replacement or Rollback Operation B-22 OL-8603-04 Catalyst 2960 Switch Software Configuration Guide ...
Software Guide
Page 37
... (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) • Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 1-5
... (SCP) feature to provide a secure and authenticated method for copying switch configuration or switch image files (requires the cryptographic version of the software) • Configuration replacement and rollback to replace the running configuration on a switch with any saved Cisco IOS configuration file OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 1-5
Software Guide
Page 63
... a mechanism for your switch. No password is defined. No cluster name is defined. DHCP is running on the network, you are defined. DHCP-based autoconfiguration replaces the BOOTP client functionality on a client-server model, in the received packet. Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information These...
... a mechanism for your switch. No password is defined. No cluster name is defined. DHCP is running on the network, you are defined. DHCP-based autoconfiguration replaces the BOOTP client functionality on a client-server model, in the received packet. Chapter 3 Assigning the Switch IP Address and Default Gateway Assigning Switch Information These...
Software Guide
Page 87
... to connect through FastEthernet0/1, the command config-cli ip route 0.0.0.0 0.0.0.0 & generates the command ip route 0.0.0.0 0.0.0.0 FastEthernet0/1. You can enable the Cisco IOS agent with the interface name. The range is replaced with these steps to the Configuration Engine through modem dialup lines. Enter line-cli to connect to global configuration mode. The...
... to connect through FastEthernet0/1, the command config-cli ip route 0.0.0.0 0.0.0.0 & generates the command ip route 0.0.0.0 0.0.0.0 FastEthernet0/1. You can enable the Cisco IOS agent with the interface name. The range is replaced with these steps to the Configuration Engine through modem dialup lines. Enter line-cli to connect to global configuration mode. The...
Software Guide
Page 179
... server secure status show ip http client secure status copy running -config Purpose Shows the HTTP secure client configuration. This procedure assumes that provides a secure replacement for Secure Copy Protocol Configuring the Secure HTTP Client The standard HTTP client and secure HTTP client are always enabled. Chapter 8 Configuring Switch-Based Authentication...
... server secure status show ip http client secure status copy running -config Purpose Shows the HTTP secure client configuration. This procedure assumes that provides a secure replacement for Secure Copy Protocol Configuring the Secure HTTP Client The standard HTTP client and secure HTTP client are always enabled. Chapter 8 Configuring Switch-Based Authentication...
Software Guide
Page 187
...: • force-authorized-disables IEEE 802.1x authentication and causes the port to change to up state. Each client attempting to access the network is replaced with another client, the switch changes the port link state to down to the unauthorized state.
...: • force-authorized-disables IEEE 802.1x authentication and causes the port to change to up state. Each client attempting to access the network is replaced with another client, the switch changes the port link state to down to the unauthorized state.
Software Guide
Page 198
Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must be set to IEEE 802.1x authentication. For more information, see the "... IEEE 802.1x authentication. Web authentication with proxyacl, and the source field in each entry must always be any. (After authentication, the client IP address replaces the any field when the ACL is an access list to automatically authenticate by using the MAC address without any eq tftp Note The proxyacl...
Web authentication requires two Cisco Attribute-Value (AV) pair attributes: • The first attribute, priv-lvl=15, must be set to IEEE 802.1x authentication. For more information, see the "... IEEE 802.1x authentication. Web authentication with proxyacl, and the source field in each entry must always be any. (After authentication, the client IP address replaces the any field when the ACL is an access list to automatically authenticate by using the MAC address without any eq tftp Note The proxyacl...
Software Guide
Page 245
... a larger string, is considered a match and is replaced by using the show parser macro user EXEC command. global configuration command or the macro apply macro-name ? interface configuration command to help identify required keywords. There are Cisco-default Smartports macros embedded in the macro. Append the... Guide 11-3 You need to reapply the updated macro on the switch by the corresponding value. • Macro names are replaced with the required values by using the $ character to define keywords when you use the parameter value keywords to designate values ...
... a larger string, is considered a match and is replaced by using the show parser macro user EXEC command. global configuration command or the macro apply macro-name ? interface configuration command to help identify required keywords. There are Cisco-default Smartports macros embedded in the macro. Append the... Guide 11-3 You need to reapply the updated macro on the switch by the corresponding value. • Macro names are replaced with the required values by using the $ character to define keywords when you use the parameter value keywords to designate values ...
Software Guide
Page 247
All matching occurrences of the keyword are replaced with the corresponding value. If you apply a macro without entering the keyword values, the commands are invalid and are not applied. (Optional) Enter a description about ... to the interface. Parameter keyword matching is case sensitive. Verify that is applied to the interface by entering the no version of the keyword are replaced with the corresponding value. You can use the macro apply macro-name ?
All matching occurrences of the keyword are replaced with the corresponding value. If you apply a macro without entering the keyword values, the commands are invalid and are not applied. (Optional) Enter a description about ... to the interface. Parameter keyword matching is case sensitive. Verify that is applied to the interface by entering the no version of the keyword are replaced with the corresponding value. You can use the macro apply macro-name ?
Software Guide
Page 248
... macro-name [parameter {value}] [parameter {value}] [parameter {value}] Step 5 interface interface-id Step 6 default interface interface-id Purpose Display the Cisco-default Smartports macros embedded in privileged EXEC mode, follow these steps to apply a Smartports macro: Command Step 1 show parser macro Step 2 Step 3 ... to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 11-6 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 Append the Cisco-default macro with VLAN 25: Switch(config-if)# macro apply desktop...
... macro-name [parameter {value}] [parameter {value}] [parameter {value}] Step 5 interface interface-id Step 6 default interface interface-id Purpose Display the Cisco-default Smartports macros embedded in privileged EXEC mode, follow these steps to apply a Smartports macro: Command Step 1 show parser macro Step 2 Step 3 ... to apply the user-created macro called desktop-config and to replace all configuration from the specified interface. 11-6 Catalyst 2960 Switch Software Configuration Guide OL-8603-04 Append the Cisco-default macro with VLAN 25: Switch(config-if)# macro apply desktop...
Software Guide
Page 365
... this feature if your entries in the case of a failure that are alternate or root ports. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the configuration file. Chapter 17 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Enabling Root Guard Root guard enabled...
... this feature if your entries in the case of a failure that are alternate or root ports. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the configuration file. Chapter 17 Configuring Optional Spanning-Tree Features Configuring Optional Spanning-Tree Features Enabling Root Guard Root guard enabled...
Software Guide
Page 390
... can create the profile by using these commands: • deny: Specifies that a Layer 2 interface can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with a profile number to create an IGMP profile and to enter IGMP profile configuration mode. With the IGMP throttling feature...
... can create the profile by using these commands: • deny: Specifies that a Layer 2 interface can configure an interface to drop the IGMP report or to replace the randomly selected multicast entry with a profile number to create an IGMP profile and to enter IGMP profile configuration mode. With the IGMP throttling feature...
Software Guide
Page 393
...is in the forwarding table: Step 1 Step 2 Command configure terminal interface interface-id Step 3 ip igmp max-groups action {deny | replace} Purpose Enter global configuration mode. Beginning in privileged EXEC mode, follow these entries are removed. OL-8603-04 Catalyst 2960 Switch Software ...EtherChannel interface but are either aged out or removed, depending on the throttling action. - If you configure the throttling action as replace, the entries that were previously in the forwarding table are not removed but cannot use the no ip igmp max-groups interface configuration...
...is in the forwarding table: Step 1 Step 2 Command configure terminal interface interface-id Step 3 ip igmp max-groups action {deny | replace} Purpose Enter global configuration mode. Beginning in privileged EXEC mode, follow these entries are removed. OL-8603-04 Catalyst 2960 Switch Software ...EtherChannel interface but are either aged out or removed, depending on the throttling action. - If you configure the throttling action as replace, the entries that were previously in the forwarding table are not removed but cannot use the no ip igmp max-groups interface configuration...
Software Guide
Page 428
...-of the fiber strands in the cable is considered undetermined. If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. UDLD sends at Layer 1. In these problems exists: • On fiber-optic or twisted-pair links, one of the...
...-of the fiber strands in the cable is considered undetermined. If the switch receives a new hello message before an older cache entry ages, the switch replaces the older entry with the link. UDLD sends at Layer 1. In these problems exists: • On fiber-optic or twisted-pair links, one of the...
Software Guide
Page 476
... the Simple Network Management Protocol, a Draft Internet Standard, defined in SNMPv1. A security level is an interoperable standards-based protocol defined in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with in SNMPv2C report the error type. Authentication-determining that distinguish different kinds of a package to...
... the Simple Network Management Protocol, a Draft Internet Standard, defined in SNMPv1. A security level is an interoperable standards-based protocol defined in RFC 1157. • SNMPv2C replaces the Party-based Administrative and Security Framework of SNMPv2Classic with in SNMPv2C report the error type. Authentication-determining that distinguish different kinds of a package to...
Software Guide
Page 571
...to configure IPv6host functions on page 29-6. For information about configuring IPv6 Multicast Listener Discovery (MLD) snooping, see the Cisco IOS documentation referenced in the TCP/IP suite of protocols. IPv6 incorporates 128-bit source and destination addresses and can... provide approximately 4 billion available addresses. OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 29-1 Large blocks of these addresses are allocated to replace Version 4 (IPv4) in the procedures This chapter consists of these sections: • "Understanding IPv6" section on page 29-1 • ...
...to configure IPv6host functions on page 29-6. For information about configuring IPv6 Multicast Listener Discovery (MLD) snooping, see the Cisco IOS documentation referenced in the TCP/IP suite of protocols. IPv6 incorporates 128-bit source and destination addresses and can... provide approximately 4 billion available addresses. OL-8603-04 Catalyst 2960 Switch Software Configuration Guide 29-1 Large blocks of these addresses are allocated to replace Version 4 (IPv4) in the procedures This chapter consists of these sections: • "Understanding IPv6" section on page 29-1 • ...
Software Guide
Page 572
...the format: x:x:x:x:x:x:x:x. This is the same address without leading zeros: 2031:0:130F:0:0:9C0:80F:130B You can use of networks. Multicast addresses replace the use two colons (::) to represent successive hexadecimal fields of zeros, but does not require a specified DHCP application or server • ...Embedded IPsec (encrypted security) • Routing optimized for private addresses and the use this URL: http://www.cisco.com//warp/public/732/Tech/ipv6/ This section describes IPv6 implementation on the switch. This is similar to DHCP but you can also...
...the format: x:x:x:x:x:x:x:x. This is the same address without leading zeros: 2031:0:130F:0:0:9C0:80F:130B You can use of networks. Multicast addresses replace the use two colons (::) to represent successive hexadecimal fields of zeros, but does not require a specified DHCP application or server • ...Embedded IPsec (encrypted security) • Routing optimized for private addresses and the use this URL: http://www.cisco.com//warp/public/732/Tech/ipv6/ This section describes IPv6 implementation on the switch. This is similar to DHCP but you can also...
Software Guide
Page 626
...redundant connectivity between switches that are still connected is the preferred method for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 32-8 • Replacing a Failed Command Switch with CNTL/Z. For details about using the console...command switch from the member switches, and physically remove it from the cluster. However, connectivity between the member switches and the replacement command switch. Switch# configure terminal Enter configuration commands, one per line. You can manage the members as usual. Switch(config...
...redundant connectivity between switches that are still connected is the preferred method for replacing a failed command switch: • Replacing a Failed Command Switch with a Cluster Member, page 32-8 • Replacing a Failed Command Switch with CNTL/Z. For details about using the console...command switch from the member switches, and physically remove it from the cluster. However, connectivity between the member switches and the replacement command switch. Switch# configure terminal Enter configuration commands, one per line. You can manage the members as usual. Switch(config...
Software Guide
Page 628
... setup will ask you to configure each interface on the switch you selected to be from a Command Switch Failure Chapter 32 Troubleshooting Replacing a Failed Command Switch with Another Switch To replace a failed command switch with configuration dialog? [yes/no]: y At any point you may enter a question mark '?' for IP address information and...
... setup will ask you to configure each interface on the switch you selected to be from a Command Switch Failure Chapter 32 Troubleshooting Replacing a Failed Command Switch with Another Switch To replace a failed command switch with configuration dialog? [yes/no]: y At any point you may enter a question mark '?' for IP address information and...