ملخص المحتوى في الصفحة رقم 1
Catalyst 3550 Multilayer Switch
Software Configuration Guide
Cisco IOS Release 12.1(8)EA1
February 2002
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7811194=
Text Part Number: 78-11194-03
ملخص المحتوى في الصفحة رقم 2
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE
ملخص المحتوى في الصفحة رقم 3
CONTENTS Preface xxvii Audience xxvii Purpose xxvii Organization xxviii Conventions xxx Related Publications xxxi Obtaining Documentation xxxi World Wide Web xxxi Documentation CD-ROM xxxi Ordering Documentation xxxii Documentation Feedback xxxii Obtaining Technical Assistance xxxii Cisco.com xxxiii Technical Assistance Center xxxiii Cisco TAC Web Site xxxiii Cisco TAC Escalation Center xxxiv CHAPTER 1 Overview 1-1 Features 1-1 Management Options 1-5 Management Interface Options 1-5 Advantages
ملخص المحتوى في الصفحة رقم 4
Contents Understanding CLI Messages 2-4 Using Command History 2-5 Changing the Command History Buffer Size 2-5 Recalling Commands 2-5 Disabling the Command History Feature 2-5 Using Editing Features 2-6 Enabling and Disabling Editing Features 2-6 Editing Commands through Keystrokes 2-6 Editing Command Lines that Wrap 2-8 Searching and Filtering Output of show and more Commands 2-8 Accessing the CLI 2-9 CHAPTER 3 Getting Started with CMS 3-1 Features 3-2 Front Panel View 3-4 Cluster Tree 3-5 Fr
ملخص المحتوى في الصفحة رقم 5
Contents Tool Tips 3-27 Online Help 3-27 CMS Window Components 3-28 Host Name List 3-28 Tabs, Lists, and Tables 3-29 Icons Used in Windows 3-29 Buttons 3-29 Accessing CMS 3-30 Access Modes in CMS 3-31 HTTP Access to CMS 3-31 Verifying Your Changes 3-32 Change Notification 3-32 Error Checking 3-32 Saving Your Changes 3-32 Using Different Versions of CMS 3-33 Where to Go Next 3-33 CHAPTER 4 Assigning the Switch IP Address and Default Gateway 4-1 Understanding the Boot Process 4-1 Assigning Switc
ملخص المحتوى في الصفحة رقم 6
Contents Scheduling a Reload of the Software Image 4-17 Configuring a Scheduled Reload 4-17 Displaying Scheduled Reload Information 4-18 CHAPTER 5 Clustering Switches 5-1 Understanding Switch Clusters 5-2 Command Switch Characteristics 5-2 Standby Command Switch Characteristics 5-3 Candidate and Member Switches Characteristics 5-3 Planning a Switch Cluster 5-4 Automatic Discovery of Cluster Candidates and Members 5-4 Discovery through CDP Hops 5-5 Discovery through Non-CDP-Capable and Nonclust
ملخص المحتوى في الصفحة رقم 7
Contents CHAPTER 6 Administering the Switch 6-1 Preventing Unauthorized Access to Your Switch 6-1 Protecting Access to Privileged EXEC Commands 6-2 Default Password and Privilege Level Configuration 6-3 Setting or Changing a Static Enable Password 6-3 Protecting Enable and Enable Secret Passwords with Encryption 6-4 Disabling Password Recovery 6-5 Setting a Telnet Password for a Terminal Line 6-6 Configuring Username and Password Pairs 6-7 Configuring Multiple Privilege Levels 6-8 Setting the
ملخص المحتوى في الصفحة رقم 8
Contents Managing the System Time and Date 6-32 Understanding the System Clock 6-32 Understanding Network Time Protocol 6-32 Configuring NTP 6-34 Default NTP Configuration 6-35 Configuring NTP Authentication 6-35 Configuring NTP Associations 6-36 Configuring NTP Broadcast Service 6-37 Configuring NTP Access Restrictions 6-38 Configuring the Source IP Address for NTP Packets 6-40 Displaying the NTP Configuration 6-41 Configuring Time and Date Manually 6-41 Setting the System Clock 6-42 Displayi
ملخص المحتوى في الصفحة رقم 9
Contents CHAPTER 7 Configuring 802.1X Port-Based Authentication 7-1 Understanding 802.1X Port-Based Authentication 7-1 Device Roles 7-2 Authentication Initiation and Message Exchange 7-3 Ports in Authorized and Unauthorized States 7-4 Supported Topologies 7-4 Configuring 802.1X Authentication 7-5 Default 802.1X Configuration 7-6 802.1X Configuration Guidelines 7-7 Enabling 802.1X Authentication 7-8 Configuring the Switch-to-RADIUS-Server Communication 7-9 Enabling Periodic Re-Authentication 7-
ملخص المحتوى في الصفحة رقم 10
Contents Configuring IEEE 802.3X Flow Control 8-16 Adding a Description for an Interface 8-17 Monitoring and Maintaining the Layer 2 Interface 8-18 Monitoring Interface and Controller Status 8-18 Clearing and Resetting Interfaces and Counters 8-20 Shutting Down and Restarting the Interface 8-21 Configuring Layer 3 Interfaces 8-22 CHAPTER 9 Creating and Maintaining VLANs 9-1 Understanding VLANs 9-1 Number of Supported VLANs 9-2 VLAN Port Membership Modes 9-3 Using the VLAN Trunking Protocol 9-3
ملخص المحتوى في الصفحة رقم 11
Contents 802.1Q Configuration Considerations 9-24 Default Layer 2 Ethernet Interface VLAN Configuration 9-24 Configuring an Ethernet Interface as a Trunk Port 9-25 Configuring a Trunk Port 9-25 Defining the Allowed VLANs on a Trunk 9-27 Changing the Pruning-Eligible List 9-28 Configuring the Native VLAN for Untagged Traffic 9-29 Load Sharing Using STP 9-29 Load Sharing Using STP Port Priorities 9-30 Configuring STP Port Priorities and Load Sharing 9-30 Load Sharing Using STP Path Cost 9-32 Con
ملخص المحتوى في الصفحة رقم 12
Contents Learning State 10-7 Forwarding State 10-8 Disabled State 10-8 STP Address Management 10-8 STP and IEEE 802.1Q Trunks 10-8 VLAN-Bridge STP 10-9 STP and Redundant Connectivity 10-9 Accelerated Aging to Retain Connectivity 10-10 Understanding Advanced STP Features 10-10 Understanding Port Fast 10-10 Understanding BPDU Guard 10-11 Understanding UplinkFast 10-12 Understanding Cross-Stack UplinkFast 10-13 How CSUF Works 10-14 Events that Cause Fast Convergence 10-15 Limitations 10-16 Connec
ملخص المحتوى في الصفحة رقم 13
Contents Configuring Root Guard 10-36 Enabling EtherChannel Guard 10-37 CHAPTER 11 Configuring IGMP Snooping and MVR 11-1 Understanding IGMP Snooping 11-1 Joining a Multicast Group 11-2 Leaving a Multicast Group 11-4 Immediate-Leave Processing 11-4 Configuring IGMP Snooping 11-5 Default IGMP Snooping Configuration 11-5 Enabling or Disabling IGMP Snooping 11-5 Setting the Snooping Method 11-6 Configuring a Multicast Router Port 11-7 Configuring a Host Statically to Join a Group 11-8 Enabling IG
ملخص المحتوى في الصفحة رقم 14
Contents Configuring Port Blocking 12-6 Blocking Flooded Traffic on an Interface 12-6 Resuming Normal Forwarding on a Port 12-7 Configuring Port Security 12-8 Understanding Port Security 12-8 Default Port Security Configuration 12-9 Configuration Guidelines 12-9 Enabling and Configuring Port Security 12-9 Displaying Port-Based Traffic Control Settings 12-11 CHAPTER 13 Configuring CDP 13-1 Understanding CDP 13-1 Configuring CDP 13-2 Default CDP Configuration 13-2 Configuring the CDP Characteris
ملخص المحتوى في الصفحة رقم 15
Contents Configuring SPAN 15-6 Default SPAN Configuration 15-7 SPAN Configuration Guidelines 15-7 Creating a SPAN Session and Specifying Ports to Monitor 15-8 Removing Ports from a SPAN Session 15-10 Specifying VLANs to Monitor 15-11 Specifying VLANs to Filter 15-12 Displaying SPAN Status 15-13 CHAPTER 16 Configuring RMON 16-1 Understanding RMON 16-1 Configuring RMON 16-2 Default RMON Configuration 16-3 Configuring RMON Alarms and Events 16-3 Configuring RMON Collection on an Interface 16-5 Di
ملخص المحتوى في الصفحة رقم 16
Contents CHAPTER 18 Configuring SNMP 18-1 Understanding SNMP 18-1 SNMP Versions 18-2 SNMP Manager Functions 18-2 SNMP Agent Functions 18-3 SNMP Community Strings 18-3 Using SNMP to Access MIB Variables 18-3 Configuring SNMP 18-4 Default SNMP Configuration 18-4 Disabling the SNMP Agent 18-5 Configuring Community Strings 18-5 Configuring Trap Managers and Enabling Traps 18-7 Setting the Agent Contact and Location Information 18-9 Limiting TFTP Servers Used Through SNMP 18-9 SNMP Examples 18-10 D
ملخص المحتوى في الصفحة رقم 17
Contents Time Range Applied to an IP ACL 19-25 Commented IP ACL Entries 19-25 ACL Logging 19-26 Configuring VLAN Maps 19-27 VLAN Map Configuration Guidelines 19-28 Creating Named MAC Extended ACLs 19-28 Creating a VLAN Map 19-30 Examples of ACLs and VLAN Maps 19-30 Applying a VLAN Map to a VLAN 19-32 Displaying VLAN Map Information 19-33 Using VLAN Maps in Your Network 19-33 Wiring Closet Configuration 19-34 Denying Access to a Server on Another VLAN 19-35 Using VLAN Maps with Router ACLs 19-3
ملخص المحتوى في الصفحة رقم 18
Contents Configuring the Trust State on Ports within the QoS Domain 20-22 Configuring the CoS Value for an Interface 20-24 Configuring the DSCP Trust State on a Port Bordering Another QoS Domain 20-25 Configuring a QoS Policy 20-26 Classifying Traffic by Using ACLs 20-27 Classifying Traffic by Using Class Maps 20-30 Classifying, Policing, and Marking Traffic by Using Policy Maps 20-32 Classifying, Policing, and Marking Traffic by Using Aggregate Policers 20-37 Configuring DSCP Maps 20-39 Confi
ملخص المحتوى في الصفحة رقم 19
Contents Understanding Load Balancing and Forwarding Methods 21-5 Configuring EtherChannel 21-7 Default EtherChannel Configuration 21-7 EtherChannel Configuration Guidelines 21-8 Configuring Layer 2 EtherChannels 21-9 Configuring Layer 3 EtherChannels 21-11 Creating Port-Channel Logical Interfaces 21-11 Configuring the Physical Interfaces 21-12 Configuring EtherChannel Load Balancing 21-13 Configuring the PAgP Learn Method and Priority 21-14 Displaying EtherChannel and PAgP Status 21-16 CHAPTE
ملخص المحتوى في الصفحة رقم 20
Contents Configuring IGRP 22-30 Load Balancing and Traffic Distribution Control 22-31 Split Horizon 22-34 Configuring OSPF 22-35 OSPF Interface Parameters 22-38 OSPF Area Parameters 22-39 Other OSPF Behavior Parameters 22-41 Change LSA Group Pacing 22-43 Loopback Interface 22-43 Monitoring OSPF 22-44 Configuring EIGRP 22-46 EIGRP Router Mode Commands 22-48 EIGRP Interface Mode Commands 22-49 Configure EIGRP Route Authentication 22-50 Monitoring and Maintaining EIGRP 22-51 Configuring Protocol-