Cisco WS-C2960S-48LPD-L Software Configuration Manual

Cisco WS-C2960S-48LPD-L Software Configuration Manual

Software guide
Table of Contents

Advertisement

Catalyst 2960 Switch
Software Configuration Guide
Cisco IOS Release 12.2(40)SE
Revised September 2007
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Text Part Number: OL-8603-04

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the WS-C2960S-48LPD-L and is the answer not in the manual?

Questions and answers

Summarization of Contents

CHAPTER 1 Overview
Features
Some features described in this chapter are available only on the cryptographic (supports encryption) version of the software.
Management Options
These are the options for configuring and managing the switch:
Default Settings After Initial Switch Configuration
The switch is designed for plug-and-play operation, requiring only that you assign basic IP information to the switch.
Network Configuration Examples
This section provides network configuration concepts and includes examples of using the switch to create dedicated network segments.
CHAPTER 2 Using the Command-Line Interface
Understanding Command Modes
The Cisco IOS user interface is divided into many different modes. The commands available to you depend on which mode you are currently in.
Using Configuration Logging
Beginning with Cisco IOS Release 12.2(25)SED, you can log and view changes to the switch configuration.
Using Editing Features
This section describes the editing features that can help you manipulate the command line.
Accessing the CLI
You can access the CLI through a console connection, through Telnet, or by using the browser.
CHAPTER 3 Assigning the Switch IP Address and Default Gateway
Understanding the Boot Process
To start your switch, you need to follow the procedures in the Getting Started Guide or the hardware installation guide.
Understanding DHCP-Based Autoconfiguration
DHCP provides configuration information to Internet hosts and internetworking devices. This protocol consists of two components.
Checking and Saving the Running Configuration
You can check the configuration settings that you entered or changes that you made by entering this privileged EXEC command:
Modifying the Startup Configuration
These sections describe how to modify the switch startup configuration:
CHAPTER 4 Configuring Cisco IOS CNS Agents
Understanding Cisco Configuration Engine Software
The Cisco Configuration Engine is network management software that acts as a configuration service for automating the deployment and management of network devices.
Configuring Cisco IOS Agents
The Cisco IOS agents embedded in the switch Cisco IOS software allow the switch to be connected and automatically configured.
CHAPTER 5 Clustering Switches
Understanding Switch Clusters
A switch cluster is a set of up to 16 connected, cluster-capable Catalyst switches that are managed as a single entity.
Planning a Switch Cluster
Anticipating conflicts and compatibility issues is a high priority when you manage several switches through a cluster.
Using the CLI to Manage Switch Clusters
You can configure cluster member switches from the CLI by first logging into the cluster command switch.
CHAPTER 6 Administering the Switch
Managing the System Time and Date
You can manage the system time and date on your switch using automatic configuration, such as the Network Time Protocol (NTP), or manual configuration methods.
Configuring a System Name and Prompt
You configure the system name on the switch to identify it. By default, the system name and prompt are Switch.
Managing the MAC Address Table
The MAC address table contains address information that the switch uses to forward traffic between ports.
CHAPTER 7 Configuring SDM Templates
Understanding the SDM Templates
You can use SDM templates to configure system resources in the switch to optimize support for specific features, depending on how the switch is used.
Configuring the Switch SDM Template
These sections contain this configuration information:
CHAPTER 8 Configuring Switch-Based Authentication
Preventing Unauthorized Access to Your Switch
You can prevent unauthorized users from reconfiguring your switch and viewing configuration information.
Protecting Access to Privileged EXEC Commands
A simple way of providing terminal access control in your network is to use passwords and assign privilege levels.
Controlling Switch Access with TACACS+
This section describes how to enable and configure Terminal Access Controller Access Control System Plus (TACACS+).
Controlling Switch Access with RADIUS
This section describes how to enable and configure the RADIUS, which provides detailed accounting information.
Configuring the Switch for Secure Shell
This section describes how to configure the Secure Shell (SSH) feature.
CHAPTER 9 Configuring IEEE 802.1x Port-Based Authentication
Understanding IEEE 802.1x Port-Based Authentication
The IEEE 802.1x standard defines a client-server-based access control and authentication protocol that prevents clients from connecting to a LAN.
Authentication Process
When IEEE 802.1x port-based authentication is enabled and the client supports IEEE 802.1x-compliant client software, these events occur:
Configuring IEEE 802.1x Authentication
To configure IEEE 802.1x port-based authentication, you must enable authentication, authorization, and accounting (AAA).
CHAPTER 10 Configuring Interface Characteristics
Understanding Interface Types
This section describes the different types of interfaces supported by the switch with references to chapters that contain more detailed information.
Port-Based VLANs
A VLAN is a switched network that is logically segmented by function, team, or application, without regard to the physical locations of the users.
Procedures for Configuring Interfaces
These general instructions apply to all interface configuration processes.
Configuring Ethernet Interfaces
These sections contain this configuration information:
CHAPTER 12 Configuring VLANs
Understanding VLANs
A VLAN is a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users.
Configuring Normal-Range VLANs
Normal-range VLANs are VLANs with VLAN IDs 1 to 1005. If the switch is in VTP server or VTP transparent mode, you can add, modify or remove configurations for VLANs 2 to 1001.
Configuring Extended-Range VLANs
When the switch is in VTP transparent mode (VTP disabled), you can create extended-range VLANs (in the range 1006 to 4094).
Configuring VLAN Trunks
These sections contain this conceptual information:
CHAPTER 13 Configuring VTP
Understanding VTP
VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition, deletion, and renaming of VLANs on a network-wide basis.
The VTP Domain
A VTP domain (also called a VLAN management domain) consists of one switch or several interconnected switches under the same administrative responsibility.
VTP Modes
You can configure a supported switch to be in one of the VTP modes listed in Table 13-1.
Configuring VTP
These sections contain this configuration information:
Configuring a VTP Server
When a switch is in VTP server mode, you can change the VLAN configuration and have it propagated throughout the network.
CHAPTER 14 Configuring Voice VLAN
Understanding Voice VLAN
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone.
Configuring Voice VLAN
These sections contain this configuration information:
Configuring a Port Connected to a Cisco 7960 IP Phone
Because a Cisco 7960 IP Phone also supports a connection to a PC or other device, a port connecting the switch to a Cisco IP Phone can carry mixed traffic.
CHAPTER 15 Configuring STP
Understanding Spanning-Tree Features
These sections contain this conceptual information:
Spanning-Tree Interface States
Each Layer 2 interface on a switch using spanning tree exists in one of these states:
Configuring Spanning-Tree Features
These sections contain this configuration information:
Changing the Spanning-Tree Mode.
The switch supports three spanning-tree modes: PVST+, rapid PVST+, or MSTP. By default, the switch runs the PVST+ protocol.
CHAPTER 16 Configuring MSTP
Understanding MSTP
This chapter consists of these sections:
Multiple Spanning-Tree Regions
For switches to participate in multiple spanning-tree (MST) instances, you must consistently configure the switches with the same MST configuration information.
Configuring MSTP Features
These sections contain this configuration information:
Specifying the MST Region Configuration and Enabling MSTP
For two or more switches to be in the same MST region, they must have the same VLAN-to-instance mapping, the same configuration revision number, and the same name.
CHAPTER 17 Configuring Optional Spanning-Tree Features
Understanding Optional Spanning-Tree Features
These sections contain this conceptual information:
Understanding Port Fast
Port Fast immediately brings an interface configured as an access or trunk port to the forwarding state from a blocking state, bypassing the listening and learning states.
Enabling Port Fast
You can enable this feature if your switch is running PVST+, rapid PVST+, or MSTP.
CHAPTER 18 Configuring IGMP Snooping and MVR
Understanding IGMP Snooping
Layer 2 switches can use IGMP snooping to constrain the flooding of multicast traffic by dynamically configuring Layer 2 interfaces.
Configuring IGMP Snooping
IGMP snooping allows switches to examine IGMP packets and make forwarding decisions based on their content.
Configuring the IGMP Snooping Querier
Follow these guidelines when configuring the IGMP snooping querier:
CHAPTER 19 Configuring Port-Based Traffic Control
Configuring Storm Control
These sections contain this conceptual and configuration information:
Configuring Protected Ports
Some applications require that no traffic be forwarded at Layer 2 between ports on the same switch so that one neighbor does not see the traffic generated by another neighbor.
Configuring Port Blocking
By default, the switch floods packets with unknown destination MAC addresses out of all ports.
Configuring Port Security
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port.
CHAPTER 20 Configuring CDP
Understanding CDP
CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices.
Default CDP Configuration
Table 20-1 shows the default CDP configuration.
Configuring the CDP Characteristics
You can configure the frequency of CDP updates, the amount of time to hold the information before discarding it, and whether or not to send Version-2 advertisements.
Disabling and Enabling CDP Globally
LLDP is enabled by default.
CHAPTER 21 Configuring LLDP and LLDP-MED
Understanding LLDP and LLDP-MED
This section contains this conceptual information:
Configuring LLDP and LLDP-MED
This section contains this configuration information:
Default LLDP Configuration
Table 21-1 shows the default LLDP configuration.
CHAPTER 22 Configuring UDLD
Understanding UDLD
UDLD is a Layer 2 protocol that enables devices connected through fiber-optic or twisted-pair Ethernet cables to monitor the physical configuration of the cables.
Modes of Operation
UDLD supports two modes of operation: normal (the default) and aggressive.
Configuring UDLD
These sections contain this configuration information:
Default UDLD Configuration
Table 22-1 shows the default UDLD configuration.
CHAPTER 23 Configuring SPAN and RSPAN
Understanding SPAN and RSPAN
This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 2960 switch.
SPAN and RSPAN Concepts and Terminology
This section describes concepts and terminology associated with SPAN and RSPAN configuration.
SPAN Sessions
SPAN sessions (local or remote) allow you to monitor traffic on one or more ports, or one or more VLANs, and send the monitored traffic to one or more destination ports.
Configuring SPAN and RSPAN
These sections contain this configuration information:
Default SPAN and RSPAN Configuration
Table 23-1 shows the default SPAN and RSPAN configuration.
Configuring Local SPAN
These sections contain this configuration information:
CHAPTER 24 Configuring RMON
Understanding RMON
RMON is an Internet Engineering Task Force (IETF) standard monitoring specification that allows various network agents and console systems to exchange network monitoring data.
Configuring RMON
These sections contain this configuration information:
Default RMON Configuration
RMON is disabled by default; no alarms or events are configured.
Configuring RMON Alarms and Events
You can configure your switch for RMON by using the command-line interface (CLI) or an SNMP-compatible network management station.
CHAPTER 25 Configuring System Message Logging
Understanding System Message Logging
By default, a switch sends the output from system messages and debug privileged EXEC commands to a logging process.
Configuring System Message Logging
These sections contain this configuration information:
System Log Message Format
System log messages can contain up to 80 characters and a percent sign (%), which follows the optional sequence number or time-stamp information.
Disabling Message Logging
Message logging is enabled by default. It must be enabled to send messages to any destination other than the console.
CHAPTER 26 Configuring SNMP
Understanding SNMP
SNMP is an application-layer protocol that provides a message format for communication between managers and agents.
SNMP Versions
This software release supports these SNMP versions:
Configuring SNMP
If the switch starts and the witch startup configuration has at least one snmp-server global configuration command, the SNMP agent is enabled.
Configuring Community Strings
You use the SNMP community string to define the relationship between the SNMP manager and the agent.
CHAPTER 27 Configuring Cisco IOS IP SLAs Operations
Understanding Cisco IOS IP SLAs
Cisco IOS IP SLAs sends data across the network to measure performance between multiple network locations or across multiple network paths.
Configuring IP SLAs Operations
This section does not include configuration information for all available operations.
Monitoring IP SLAs Operations
Use the User EXEC or Privileged EXEC commands in Table 27-1 to display IP SLAs operations configuration.
CHAPTER 28 Configuring QoS
Understanding QoS
Typically, networks operate on a best-effort delivery basis, which means that all traffic has equal priority and an equal chance of being delivered.
Classification
Classification is the process of distinguishing one kind of traffic from another by examining the fields in the packet.
Policing and Marking
After a packet is classified and has a DSCP-based or CoS-based QoS label assigned to it, the policing and marking process can begin.
Configuring Auto-QoS
You can use the auto-QoS feature to simplify the deployment of existing QoS features.
Configuring Standard QoS
Before configuring standard QoS, you must have a thorough understanding of these items:
CHAPTER 29 Configuring IPv6 Host Functions
Understanding IPv6
The primary reason for using IPv6 is to increase Internet global address space to accommodate the rapidly increasing number of users and applications.
Configuring IPv6
These sections contain this IPv6 forwarding configuration information:
Displaying IPv6
Table 29-3 shows the privileged EXEC commands for monitoring IPv6 on the switch.
CHAPTER 30 Configuring IPv6 MLD Snooping
Understanding MLD Snooping
In IPv4, Layer 2 switches can use IGMP snooping to limit the flooding of multicast traffic.
Configuring IPv6 MLD Snooping
These sections describe how to configure IPv6 MLD snooping:
Default MLD Snooping Configuration
Table 30-1 shows the default MLD snooping configuration.
CHAPTER 31 Configuring EtherChannels and Link-State Tracking
Understanding EtherChannels
This chapter describes how to configure EtherChannels on Layer 2 ports on the Catalyst 2960 switch.
Configuring EtherChannels
These sections contain this configuration information:
Configuring Layer 2 EtherChannels
You configure Layer 2 EtherChannels by assigning ports to a channel group with the channel-group interface configuration command.
Configuring EtherChannel Load Balancing
This section describes how to configure EtherChannel load balancing by using source-based or destination-based forwarding methods.
Understanding Link-State Tracking
Link-state tracking, also known as trunk failover, is a feature that binds the link state of multiple interfaces.
CHAPTER 32 Troubleshooting
Recovering from a Software Failure
Switch software can be corrupted during an upgrade, by downloading the wrong file, or by deleting the image file.
Recovering from a Lost or Forgotten Password
The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password.
Recovering from a Command Switch Failure
This section describes how to recover from a failed command switch.
Using Ping
The switch supports IP ping, which you can use to test connectivity to remote hosts.
Using IP Traceroute
You can use IP traceroute to identify the path that packets take through the network on a hop-by-hop basis.
APPENDIX B Working with the Cisco IOS File System, Configuration Files, and Software Images
Working with the Flash File System
The flash file system is a single flash device on which you can store files. It also provides several commands to help you manage software image and configuration files.
Working with Configuration Files
This section describes how to create, load, and maintain configuration files.
Working with Software Images
This section describes how to archive (download and upload) software image files, which contain the system software, the Cisco IOS code, and the embedded device manager software.
APPENDIX C Recommendations for Upgrading a Catalyst 2950 Switch to a Catalyst 2960 Switch
Configuration Compatibility Issues
The configuration commands between the two switch platforms differ for these reasons:
Feature Behavior Incompatibilities
Some features behave differently on the Catalyst 2950 and Catalyst 2960 switches, and some features are not supported on the Catalyst 2960 switch:
APPENDIX D Unsupported Commands in Cisco IOS Release 12.2(40)SE
Access Control Lists
Unsupported Privileged EXEC Commands
IGMP Snooping Commands
Unsupported Global Configuration Commands
MAC Address Commands
Unsupported Privileged EXEC Commands
QoS
Unsupported Global Configuration Command
RADIUS
Unsupported Global Configuration Commands
SNMP
Unsupported Global Configuration Commands
Spanning Tree
Unsupported Global Configuration Command
VLAN
Unsupported Global Configuration Command
VTP
Unsupported Privileged EXEC Commands

Table of Contents

Save PDF