Cisco Catalyst 2950 Software Configuration Manual page 23

Hide thumbs Also See for Catalyst 2950:
Table of Contents

Advertisement

Preface
Chapter 7, "Administering the Switch,"
switch. It describes how to prevent unauthorized access to your switch through the use of passwords,
privilege levels, the Terminal Access Controller Access Control System Plus (TACACS+), the Remote
Authentication Dial-In User Service (RADIUS) and the Secure Shell (SSH) Protocol. It also describes
how to set the system date and time, set system name and prompt, create a login banner, and how to
manage the MAC address and ARP tables.
Chapter 8, "Configuring 802.1X Port-Based Authentication,"
port-based authentication to prevent unauthorized devices (clients) from gaining access to the network.
As LANs extend to hotels, airports, and corporate lobbies, insecure environments could be created.
Chapter 9, "Configuring Interface Characteristics,"
describes the interface global configuration command and provides procedures for configuring physical
interfaces.
Chapter 10, "Configuring STP,"
switch.
Chapter 11, "Configuring RSTP and MSTP,"
the IEEE 802.1W Rapid STP (RSTP) and the IEEE 802.1S Multiple STP (MSTP) on your switch. RSTP
provides rapid convergence, and MSTP enables VLANs to be grouped into a spanning-tree instance.
Chapter 12, "Configuring Optional Spanning-Tree Features,"
spanning-tree features that can be used when your switch is running the per-VLAN spanning-tree
(PVST) or the MSTP.
Chapter 13, "Configuring VLANs,"
information about the VLAN database, VLAN configuration modes, extended-range VLANs, VLAN
trunks, and the VLAN Membership Policy Server (VMPS).
Chapter 14, "Configuring VTP,"
database for managing VLANs. It includes VTP characteristics and configuration.
Chapter 15, "Configuring Voice VLAN,"
connection to an IP phone.
Chapter 16, "Configuring IGMP Snooping and MVR,"
Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR), a local
IGMP snooping feature available on the switch, and how to use IGMP filtering to control multicast group
membership.
Chapter 17, "Configuring Port-Based Traffic Control,"
broadcast, multicast, and unicast storm-control threshold levels; how to protect ports from receiving
traffic from other ports on a switch; how to configure port security by using secure MAC addresses; and
how to set the aging time for all secure addresses.
Chapter 19, "Configuring CDP,"
switch.
Chapter 20, "Configuring SPAN,"
selects network traffic for analysis by a network analyzer such as a SwitchProbe device or other Remote
Monitoring (RMON) probe. SPAN mirrors traffic received or sent (or both) on a source port, or traffic
received on one or more source ports or source VLANs, to a destination port.
Chapter 21, "Configuring System Message Logging,"
logging. It describes the message format, how to change the message display destination device, limit
the type of messages sent, configure UNIX server syslog daemon, and define the UNIX system logging
facility, and timestamp messages.
78-11380-04
describes how to perform one-time operations to administer your
defines the types of interfaces on the switch. It
describes how to configure the Spanning Tree Protocol (STP) on your
describes how to configure the Cisco implementation of
describes how to create and maintain VLANs. It includes
describes how to use the VLAN Trunking Protocol (VTP) VLAN
describes how to configure voice VLAN on the switch for a
describes how to configure Internet Group
describes how to reduce traffic storms by setting
describes how to configure Cisco Discovery Protocol (CDP) on your
describes how to configure Switch Port Analyzer (SPAN), which
describes how to configure system message
Catalyst 2950 Desktop Switch Software Configuration Guide
describes how to configure 802.1X
describes how to configure optional
Organization
xxiii

Advertisement

Table of Contents
loading

Table of Contents