Software Guide
Page 52
... then boots the system image from the bootflash. The system image is the main Cisco IOS software image with a BOOTP or RARP-obtained IP address, the information learned from... image stored on the supervisor engine Flash PC card, you need to change the configuration on the supervisor engine, we recommend that you reset or power cycle a switch with full multiprotocol routing support. Preparing to -point...to the in-band management interface on the supervisor Flash PC card, you must set to 0.0.0.0 (provided that has network interface code and end-host protocol code. To store the system ...
... then boots the system image from the bootflash. The system image is the main Cisco IOS software image with a BOOTP or RARP-obtained IP address, the information learned from... image stored on the supervisor engine Flash PC card, you need to change the configuration on the supervisor engine, we recommend that you reset or power cycle a switch with full multiprotocol routing support. Preparing to -point...to the in-band management interface on the supervisor Flash PC card, you must set to 0.0.0.0 (provided that has network interface code and end-host protocol code. To store the system ...
Software Guide
Page 61
... on all Ethernet ports 78-13315-02 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 4-3 Link Status Near End Up Up Up Down Far End Up Up Down Up Default Ethernet, Fast Ethernet, and Gigabit Ethernet Configuration Table 4-2 shows the Ethernet, Fast Ethernet, ...and Gigabit Ethernet default configuration. transmit (Tx) not supported Spanning Tree Protocol (STP) Enabled for VLAN 1 Native VLAN VLAN 1 Port VLAN cost...
... on all Ethernet ports 78-13315-02 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 4-3 Link Status Near End Up Up Up Down Far End Up Up Down Up Default Ethernet, Fast Ethernet, and Gigabit Ethernet Configuration Table 4-2 shows the Ethernet, Fast Ethernet, ...and Gigabit Ethernet default configuration. transmit (Tx) not supported Spanning Tree Protocol (STP) Enabled for VLAN 1 Native VLAN VLAN 1 Port VLAN cost...
Software Guide
Page 64
... desired The port uses flow control if the neighboring port uses it . The port sends flow-control frames to flow-control requests. Supported only on ports. To configure flow control, perform this task in privileged mode: Task Step 1 Set the flow-control parameters. Command... Function receive on port 2/1: Console> (enable) set port duplex 2/1 half Port 2/1 set port flowcontrol 3/1 receive on Port 3/1 will require far end to far end. Console> (enable) set to half-duplex. other devices. receive off | on | desired} show port flowcontrol This example shows how to turn...
... desired The port uses flow control if the neighboring port uses it . The port sends flow-control frames to flow-control requests. Supported only on ports. To configure flow control, perform this task in privileged mode: Task Step 1 Set the flow-control parameters. Command... Function receive on port 2/1: Console> (enable) set port duplex 2/1 half Port 2/1 set port flowcontrol 3/1 receive on Port 3/1 will require far end to far end. Console> (enable) set to half-duplex. other devices. receive off | on | desired} show port flowcontrol This example shows how to turn...
Software Guide
Page 107
...the tunnel port is an 802.1Q tunnel. To keep customer traffic segregated, each customer requires a separate VLAN, but that one end is configured as required to support the customer devices that you dedicate to tunneling. The tunnel ports do not have as many tunnel ports as a tunnel port.... With 802.1Q tunneling, tagged traffic comes from the frame header; A tunnel can cross other network links and other end is configured as ...
...the tunnel port is an 802.1Q tunnel. To keep customer traffic segregated, each customer requires a separate VLAN, but that one end is configured as required to support the customer devices that you dedicate to tunneling. The tunnel ports do not have as many tunnel ports as a tunnel port.... With 802.1Q tunneling, tagged traffic comes from the frame header; A tunnel can cross other network links and other end is configured as ...
Software Guide
Page 184
... 6.4 78-13315-02 There are organized into several ranges; For example, all the end stations in a particular IP subnet belong to the in the network when you can ...in -band interface. you use a management protocol, such as Logically Defined Networks Engineering VLAN Marketing VLAN Cisco router Fast Ethernet Accounting VLAN Floor 3 Floor 2 16751 Floor 1 VLANs are propagated... to any VLAN, so you use each applicable switch. VLAN Ranges Catalyst 6000 family switches support...
... 6.4 78-13315-02 There are organized into several ranges; For example, all the end stations in a particular IP subnet belong to the in the network when you can ...in -band interface. you use a management protocol, such as Logically Defined Networks Engineering VLAN Marketing VLAN Cisco router Fast Ethernet Accounting VLAN Floor 3 Floor 2 16751 Floor 1 VLANs are propagated... to any VLAN, so you use each applicable switch. VLAN Ranges Catalyst 6000 family switches support...
Software Guide
Page 252
...comprises a separate flow from the server to the client are connectionless-they deliver every packet independently of every other packet. MLS supports unicast and multicast flows: • A unicast flow can only do MLS internally with MLS. Telnet traffic transferred from a particular... protocol and transport-layer information from a particular source to -end conversations, or flows, between the same source and destination. Understanding How Layer 3 Switching Works Chapter 14 Configuring MLS Understanding MLS Note Supervisor Engine 1, PFC, and MSFC or MSFC2 can be used in place...
...comprises a separate flow from the server to the client are connectionless-they deliver every packet independently of every other packet. MLS supports unicast and multicast flows: • A unicast flow can only do MLS internally with MLS. Telnet traffic transferred from a particular... protocol and transport-layer information from a particular source to -end conversations, or flows, between the same source and destination. Understanding How Layer 3 Switching Works Chapter 14 Configuring MLS Understanding MLS Note Supervisor Engine 1, PFC, and MSFC or MSFC2 can be used in place...
Software Guide
Page 311
... VACLs on packets before NAT translation. If a flow matches a VACL deny or redirect clause in the hardware. a packet is not supported. These sections describe Cisco IOS ACL and VACL configuration guidelines and guidelines for Layer 4 operations: • Guidelines for Using Layer 4 Operations, page 16-20 ...event of the IOS ACL configuration, the flow is supported in the software. Note Drop-suppress statistics for RPF validation. Note VACLs have an implicit deny at the end of Cisco IOS ACLs and VACLs. Using VACLs with Cisco IOS ACLs To access control both input and output ...
... VACLs on packets before NAT translation. If a flow matches a VACL deny or redirect clause in the hardware. a packet is not supported. These sections describe Cisco IOS ACL and VACL configuration guidelines and guidelines for Layer 4 operations: • Guidelines for Using Layer 4 Operations, page 16-20 ...event of the IOS ACL configuration, the flow is supported in the software. Note Drop-suppress statistics for RPF validation. Note VACLs have an implicit deny at the end of Cisco IOS ACLs and VACLs. Using VACLs with Cisco IOS ACLs To access control both input and output ...
Software Guide
Page 325
... trunk to allow multiple VLANs to a VLAN, perform these guidelines for using the same basic steps. You might have an implicit deny feature at the end of a VACL, page 16-36 • Showing VACL-to multiple ports. These tasks are listed in the order that are coming in from many ...VLANs, the redirect port should be performed. Note that the traffic is denied if it to go out a port that supports the VLAN that the redirect option only involves taking packets and sending them out the redirect port; Configuring VACLs From the CLI This section describes...
... trunk to allow multiple VLANs to a VLAN, perform these guidelines for using the same basic steps. You might have an implicit deny feature at the end of a VACL, page 16-36 • Showing VACL-to multiple ports. These tasks are listed in the order that are coming in from many ...VLANs, the redirect port should be performed. Note that the traffic is denied if it to go out a port that supports the VLAN that the redirect option only involves taking packets and sending them out the redirect port; Configuring VACLs From the CLI This section describes...
Software Guide
Page 350
PBF Limitations PBF does not support ARP; For example, if host 10.0.0.1 on VLAN 50, and assuming the PBF MAC address is 00-11-11-11-11-11, the static ARP ....0.0.1 10.0.0.2 16-54 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Using the example above, you need to communicate with Sun Workstation end hosts, note that there are limitations you must define a default gateway. If the Sun Workstation needs to communicate to the destination host. These IP addresses...
PBF Limitations PBF does not support ARP; For example, if host 10.0.0.1 on VLAN 50, and assuming the PBF MAC address is 00-11-11-11-11-11, the static ARP ....0.0.1 10.0.0.2 16-54 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 Using the example above, you need to communicate with Sun Workstation end hosts, note that there are limitations you must define a default gateway. If the Sun Workstation needs to communicate to the destination host. These IP addresses...
Software Guide
Page 419
...interval • Specify the authenticator to supplicant retransmission time interval • Specify the back-end authenticator to supplicant retransmission time interval • Specify the back-end authenticator to authentication server retransmission time interval • Specify the number of frames retransmitted from..., but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of EAP frames built into it. 802.1x Parameters Configurable on the Switch You can restrict traffic in both ...
...interval • Specify the authenticator to supplicant retransmission time interval • Specify the back-end authenticator to supplicant retransmission time interval • Specify the back-end authenticator to authentication server retransmission time interval • Specify the number of frames retransmitted from..., but we recommend RADIUS for authentication, particularly when the authentication server is located remotely, because RADIUS has extensions that support encapsulation of EAP frames built into it. 802.1x Parameters Configurable on the Switch You can restrict traffic in both ...
Software Guide
Page 421
...Configuring Authentication Table 21-3 Authentication Default Configuration (continued) Feature 802.1x back-end authenticator to authentication server retransmission time 802.1x number of frames retransmitted from back-end authenticator to supplicant 802.1x automatic supplicant reauthentication time 802.1x automatic authenticator ...feature on a secure port until you can specify a server as primary by using the primary keyword. • RADIUS and TACACS+ support one privileged mode only (level 1). • Kerberos authentication does not work if TACACS+ is also used as a SPAN source port....
...Configuring Authentication Table 21-3 Authentication Default Configuration (continued) Feature 802.1x back-end authenticator to authentication server retransmission time 802.1x number of frames retransmitted from back-end authenticator to supplicant 802.1x automatic supplicant reauthentication time 802.1x automatic authenticator ...feature on a secure port until you can specify a server as primary by using the primary keyword. • RADIUS and TACACS+ support one privileged mode only (level 1). • Kerberos authentication does not work if TACACS+ is also used as a SPAN source port....
Software Guide
Page 500
...-hop, unicast redundancy. Configuring Redundancy with Sup #1 (unless high-availability versioning is now the designated MSFC. You can configure end stations and other devices to use the HSRP address as the HSRP group number. 22-26 Catalyst 6000 Family Software Configuration Guide... HSRP group. Note PFC2: The PFC2 supports a maximum of these MLS entries using its image and configuration with HSRP Although the supervisor engine software high-availability feature maintains the protocol state between redundant MSFCs. The standby supervisor engine maintains the Layer 2 state so that ...
...-hop, unicast redundancy. Configuring Redundancy with Sup #1 (unless high-availability versioning is now the designated MSFC. You can configure end stations and other devices to use the HSRP address as the HSRP group number. 22-26 Catalyst 6000 Family Software Configuration Guide... HSRP group. Note PFC2: The PFC2 supports a maximum of these MLS entries using its image and configuration with HSRP Although the supervisor engine software high-availability feature maintains the protocol state between redundant MSFCs. The standby supervisor engine maintains the Layer 2 state so that ...
Software Guide
Page 506
...Before enabling synchronization, you enter either of the startup configuration and running configuration synchronization. Caution Configuration synchronization is only supported for all protocols. Type ^C^C^C to Router-16. When you enable high-availability redundancy, the startup configuration of the... mem • copy source startup-config 22-32 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 End with CNTL/Z. MSFC Redundancy Chapter 22 Configuring Redundancy Router(config-if)# ^Z Router# ^C^C^C Console> (enable) switch console 16 Trying...
...Before enabling synchronization, you enter either of the startup configuration and running configuration synchronization. Caution Configuration synchronization is only supported for all protocols. Type ^C^C^C to Router-16. When you enable high-availability redundancy, the startup configuration of the... mem • copy source startup-config 22-32 Catalyst 6000 Family Software Configuration Guide-Releases 6.3 and 6.4 78-13315-02 End with CNTL/Z. MSFC Redundancy Chapter 22 Configuring Redundancy Router(config-if)# ^Z Router# ^C^C^C Console> (enable) switch console 16 Trying...
Software Guide
Page 602
...144608 Default UDLD Configuration Table 30-1 shows the default UDLD configuration. Previously, the message interval was fixed at 60 seconds. Note With supervisor engine software release 5.4(3) and later releases, you can send packets to a neighbor switch but is not able to receive packets from the...it is locally disabled on copper ports to avoid sending unnecessary control traffic on both ends of a unidirectional link condition. Figure 30-1 shows an example of the link must support UDLD in order for the protocol to successfully identify and disable unidirectional links. Default...
...144608 Default UDLD Configuration Table 30-1 shows the default UDLD configuration. Previously, the message interval was fixed at 60 seconds. Note With supervisor engine software release 5.4(3) and later releases, you can send packets to a neighbor switch but is not able to receive packets from the...it is locally disabled on copper ports to avoid sending unnecessary control traffic on both ends of a unidirectional link condition. Figure 30-1 shows an example of the link must support UDLD in order for the protocol to successfully identify and disable unidirectional links. Default...
Software Guide
Page 620
Flood traffic for each protocol group is forwarded out a port only if that supports both IP and Internetwork Packet Exchange (IPX) is connected to a switch port configured as auto for IPX, but the host is transmitting only IP traffic, ... the IPX group, allowing the port to on a protocol basis. However, if the host sends an IPX packet, the supervisor engine software detects the protocol traffic and the port is a directly connected end station out the port. If the host stops sending IPX traffic for IPX and Group is removed from the IPX...
Flood traffic for each protocol group is forwarded out a port only if that supports both IP and Internetwork Packet Exchange (IPX) is connected to a switch port configured as auto for IPX, but the host is transmitting only IP traffic, ... the IPX group, allowing the port to on a protocol basis. However, if the host sends an IPX packet, the supervisor engine software detects the protocol traffic and the port is a directly connected end station out the port. If the host stops sending IPX traffic for IPX and Group is removed from the IPX...
Software Guide
Page 665
Supervisor Engine 2, PFC2, and MSFC2: WS-X6K-S1A-MSFC2 • For destination or intermediate switches-Any Cisco switch supporting RSPAN VLAN No third party or other Cisco switches can be placed in the end-to carry RSPAN traffic. The traffic type for sources (ingress, egress, or both SPAN and RSPAN configuration. Supervisor Engine 1 and Policy Feature Card (PFC): WS-X6K-SUP1A-PFC - RSPAN has...
Supervisor Engine 2, PFC2, and MSFC2: WS-X6K-S1A-MSFC2 • For destination or intermediate switches-Any Cisco switch supporting RSPAN VLAN No third party or other Cisco switches can be placed in the end-to carry RSPAN traffic. The traffic type for sources (ingress, egress, or both SPAN and RSPAN configuration. Supervisor Engine 1 and Policy Feature Card (PFC): WS-X6K-SUP1A-PFC - RSPAN has...
Software Guide
Page 821
...Similar to the trunk lines coming from the PSTN. The analog trunk gateway does not provide ring voltage as it is managed by Cisco CallManager. The gateway supports up to eight trunks to the PSTN and appears like a phone to the analog station gateway, the analog trunk gateway provides line... How a VoIP Network Works The 24-port FXS analog interface module features are listed in its domain, and is not connected to POTS end devices such as POTS-phones or fax machines. voice activity detection Comfort noise generation Ringer, software programmable frequency and cadence, based on country ...
...Similar to the trunk lines coming from the PSTN. The analog trunk gateway does not provide ring voltage as it is managed by Cisco CallManager. The gateway supports up to eight trunks to the PSTN and appears like a phone to the analog station gateway, the analog trunk gateway provides line... How a VoIP Network Works The 24-port FXS analog interface module features are listed in its domain, and is not connected to POTS end devices such as POTS-phones or fax machines. voice activity detection Comfort noise generation Ringer, software programmable frequency and cadence, based on country ...
Software Guide
Page 870
...time 10 within a specific timeframe 10 scheduling system reset 9 retransmission time authenticator-to-supplicant 44 back-end authenticator-to-authentication-server 45 back-end authenticator-to-supplicant 44 Reverse Address Resolution Protocol See RARP rewrite, packet CEF 2 MLS 2 RGMP configuring... ports 24 RGMP-related router commands 25 RGMP statistics displaying 23 statistics clearing 25 VLAN statistics displaying 23 RMON 1 enabling 2 overview 1 supported MIB objects 2 viewing data 2 ROM monitor BOOT environment variable and 3 boot process and 2 CLI 1 configuration register and 2 console ...
...time 10 within a specific timeframe 10 scheduling system reset 9 retransmission time authenticator-to-supplicant 44 back-end authenticator-to-authentication-server 45 back-end authenticator-to-supplicant 44 Reverse Address Resolution Protocol See RARP rewrite, packet CEF 2 MLS 2 RGMP configuring... ports 24 RGMP-related router commands 25 RGMP statistics displaying 23 statistics clearing 25 VLAN statistics displaying 23 RMON 1 enabling 2 overview 1 supported MIB objects 2 viewing data 2 ROM monitor BOOT environment variable and 3 boot process and 2 CLI 1 configuration register and 2 console ...