Sign In
Upload
Manuals
Brands
Cisco Manuals
Software
Catalyst Supervisor Engine 32 PISA
Cisco Catalyst Supervisor Engine 32 PISA Manuals
Manuals and User Guides for Cisco Catalyst Supervisor Engine 32 PISA. We have
1
Cisco Catalyst Supervisor Engine 32 PISA manual available for free PDF download: Software Configuration Manual
Cisco Catalyst Supervisor Engine 32 PISA Software Configuration Manual (894 pages)
Software Configuration Guide
Brand:
Cisco
| Category:
Software
| Size: 9.81 MB
Table of Contents
Table of Contents
3
Related Documentation
29
Obtaining Documentation and Submitting a Service Request
31
Product Overview
33
Supported Hardware and Software
33
User Interfaces
33
Configuring Embedded Ciscoview Support
34
Understanding Embedded Ciscoview
34
Installing and Configuring Embedded Ciscoview
34
Displaying Embedded Ciscoview Information
35
Software Features Supported in Hardware by the PFC3B
35
Command-Line Interfaces
39
Accessing the CLI
39
Accessing the CLI through the EIA/TIA-232 Console Interface
40
Accessing the CLI through Telnet
40
Performing Command Line Processing
41
Performing History Substitution
41
Cisco IOS Command Modes
42
Displaying a List of Cisco IOS Commands and Syntax
43
Securing the CLI
44
ROM-Monitor Command-Line Interface
45
Configuring the Switch for the First Time
47
Default Configuration
47
Configuring the Switch
48
Using the Setup Facility or the Setup Command
48
Configuring Interfaces
54
Using Configuration Mode
56
Checking the Running Configuration before Saving
56
Saving the Running Configuration Settings
57
Reviewing the Configuration
57
Configuring a Static Route
57
Configuring a BOOTP Server
59
Protecting Access to Privileged EXEC Commands
60
Setting or Changing a Static Enable Password
60
Using the Enable Password and Enable Secret Commands
61
Setting or Changing a Line Password
61
Setting TACACS+ Password Protection for Privileged EXEC Mode
62
Encrypting Passwords
62
Configuring Multiple Privilege Levels
63
Recovering a Lost Enable Password
64
Modifying the Supervisor Engine Startup Configuration
65
Understanding the Supervisor Engine Boot Configuration
65
Configuring the Software Configuration Register
66
Specifying the Startup System Image
69
Understanding Flash Memory
70
CONFIG_FILE Environment Variable
71
Controlling Environment Variables
71
Configuring a Supervisor Engine 32 PISA
73
Flash Memory on a Supervisor Engine 32 PISA
74
Supervisor Engine 32 PISA Ports
74
Supervisor Engine 32 PISA Management Ports
74
Supervisor Engine 32 PISA Data Ports
74
Configuring Full PISA Etherchannel Bandwidth
75
Displaying PISA Platform Statistics
76
Configuring NSF with SSO Supervisor Engine Redundancy
80
Understanding NSF with SSO Supervisor Engine Redundancy
80
NSF with SSO Supervisor Engine Redundancy Overview
80
SSO Operation
80
NSF Operation
80
Cisco Express Forwarding
81
Multicast MLS NSF with SSO
81
Routing Protocols
82
NSF Benefits and Restrictions
85
Supervisor Engine Configuration Synchronization
87
Supervisor Engine Redundancy Guidelines and Restrictions
87
Redundancy Configuration Guidelines and Restrictions
87
Hardware Configuration Guidelines and Restrictions
87
Configuration Mode Restrictions
88
NSF Configuration Tasks
88
Configuring SSO
89
Configuring Multicast MLS NSF with SSO
89
Verifying Multicast NSF with SSO
90
Configuring CEF NSF
90
Verifying CEF NSF
90
Configuring BGP NSF
91
Verifying BGP NSF
91
Configuring OSPF NSF
92
Verifying OSPF NSF
92
Configuring IS-IS NSF
93
Verifying IS-IS NSF
94
Configuring EIGRP NSF
96
Verifying EIGRP NSF
96
Synchronizing the Supervisor Engine Configurations
97
Copying Files to the Redundant Supervisor Engine
97
Configuring RPR Supervisor Engine Redundancy
99
Understanding RPR
100
Supervisor Engine Redundancy Overview
100
RPR Operation
100
Supervisor Engine Configuration Synchronization
101
Supervisor Engine Redundancy Guidelines and Restrictions
101
Redundancy Guidelines and Restrictions
101
Hardware Configuration Guidelines and Restrictions
101
Configuration Mode Restrictions
102
Configuring Supervisor Engine Redundancy
102
Configuring Redundancy
102
Synchronizing the Supervisor Engine Configurations
103
Displaying the Redundancy States
103
Performing a Fast Software Upgrade
104
Copying Files to the Redundant Supervisor Engine
105
Configuring Interfaces
107
Configuring Interfaces
108
Understanding Interface Configuration
108
Using the Interface Command
108
Configuring a Range of Interfaces
110
Defining and Using Interface-Range Macros
111
Configuring Optional Interface Features
112
Configuring Ethernet Interface Speed and Duplex Mode
113
Configuring Jumbo Frame Support
116
Configuring IEEE 802.3X Flow Control
119
Configuring the Port Debounce Timer
120
Adding a Description for an Interface
121
Understanding Online Insertion and Removal
122
Monitoring and Maintaining Interfaces
122
Monitoring Interface Status
123
Clearing Counters on an Interface
123
Resetting an Interface
124
Shutting down and Restarting an Interface
124
Checking the Cable Status Using the TDR
125
Configuring LAN Ports for Layer 2 Switching
127
Understanding How Layer 2 Switching Works
127
Understanding Layer 2 Ethernet Switching
127
Understanding VLAN Trunks
128
Trunking Overview
129
Layer 2 LAN Port Modes
130
Default Layer 2 LAN Interface Configuration
131
Layer 2 LAN Interface Configuration Guidelines and Restrictions
131
Configuring LAN Interfaces for Layer 2 Switching
132
Configuring a LAN Port for Layer 2 Switching
133
Configuring a Layer 2 Switching Port as a Trunk
134
Configuring a LAN Interface as a Layer 2 Access Port
140
Configuring a Custom IEEE 802.1Q Ethertype Field Value
141
Configuring Flex Links
143
Understanding Flex Links
143
Flex Links Default Configuration
144
Configuring Flex Links
144
Flex Links Configuration Guidelines and Restrictions
144
Monitoring Flex Links
145
Configuring Flex Links
145
Configuring Etherchannels
147
Understanding How Etherchannels Work
147
Etherchannel Feature Overview
147
Understanding How Etherchannels Are Configured
148
Understanding Port Channel Interfaces
150
Understanding Load Balancing
150
Etherchannel Feature Configuration Guidelines and Restrictions
151
Configuring Etherchannels
152
Configuring Port Channel Logical Interfaces for Layer 3 Etherchannels
152
Configuring Channel Groups
153
Configuring the LACP System Priority and System ID
156
Configuring Etherchannel Load Balancing
156
Configuring the Etherchannel Min-Links Feature
157
Configuring VTP
159
Understanding How VTP Works
159
Understanding the VTP Domain
160
Understanding VTP Modes
160
Understanding VTP Advertisements
161
Understanding VTP Version 2
161
Understanding VTP Pruning
161
VTP Default Configuration
163
VTP Configuration Guidelines and Restrictions
163
Configuring VTP Global Parameters
164
Enabling Vtp Pruning
165
Configuring the VTP Mode
166
Displaying VTP Statistics
168
Configuring Vlans
169
Understanding How Vlans Work
169
VLAN Overview
169
VLAN Ranges
170
Configurable VLAN Parameters
171
Understanding Token Ring Vlans
171
VLAN Default Configuration
174
VLAN Configuration Guidelines and Restrictions
176
VLAN Configuration Options
177
Configuring Vlans
177
Creating or Modifying an Ethernet VLAN
178
Assigning a Layer 2 LAN Interface to a VLAN
179
Configuring the Internal VLAN Allocation Policy
180
Configuring VLAN Translation
180
Mapping 802.1Q Vlans to ISL Vlans
183
Saving VLAN Information
184
Configuring Private Vlans
185
Understanding How Private Vlans Work
185
Private VLAN Domains
186
Private VLAN Ports
187
Primary, Isolated, and Community Vlans
187
Private VLAN Port Isolation
188
IP Addressing Scheme with Private Vlans
188
Private Vlans Across Multiple Switches
189
Private VLAN Interaction with Other Features
189
Private VLAN Configuration Guidelines and Restrictions
190
Secondary and Primary VLAN Configuration
191
Private VLAN Port Configuration
193
Limitations with Other Features
193
Configuring a VLAN as a Private VLAN
195
Configuring Private Vlans
195
Associating Secondary Vlans with a Primary VLAN
196
Mapping Secondary Vlans to the Layer 3 VLAN Interface of a Primary VLAN
197
Configuring a Layer 2 Interface as a Private VLAN Host Port
198
Configuring a Layer 2 Interface as a Private VLAN Promiscuous Port
199
Monitoring Private Vlans
201
Configuring Cisco IP Phone Support
203
Understanding Cisco IP Phone Support
203
Cisco IP Phone Connections
203
Cisco IP Phone Voice Traffic
204
Cisco IP Phone Data Traffic
205
Cisco IP Phone Power Configurations
205
Default Cisco IP Phone Support Configuration
207
Cisco IP Phone Support Configuration Guidelines and Restrictions
208
Configuring Cisco IP Phone Support
208
Configuring Voice Traffic Support
209
Configuring Data Traffic Support
210
Configuring Inline Power Support
211
Configuring IEEE 802.1Q Tunneling
213
Understanding How 802.1Q Tunneling Works
213
Q Tunneling Configuration Guidelines and Restrictions
215
Configuring 802.1Q Tunneling
218
Configuring 802.1Q Tunnel Ports
218
Configuring the Switch to Tag Native VLAN Traffic
218
Configuring Layer 2 Protocol Tunneling
221
Understanding How Layer 2 Protocol Tunneling Works
221
Configuring Support for Layer 2 Protocol Tunneling
222
Configuring STP and MST
225
Understanding How STP Works
225
STP Overview
226
Understanding the Bridge ID
226
Understanding Bridge Protocol Data Units
227
Election of the Root Bridge
228
STP Protocol Timers
228
Creating the Spanning Tree Topology
228
STP Port States
229
Blocking State
231
Listening State
231
Learning State
232
Forwarding State
233
Disabled State
234
STP and IEEE 802.1Q Trunks
235
Understanding How IEEE 802.1W RSTP Works
236
Port Roles and the Active Topology
236
Rapid Convergence
237
Synchronization of Port Roles
238
Bridge Protocol Data Unit Format and Processing
239
Processing Superior Bpdu Information
240
Processing Inferior Bpdu Information
240
Topology Changes
241
Rapid-PVST
241
Understanding MST
241
MST Overview
242
MST Regions
242
IST, CIST, and CST
243
Hop Count
246
Boundary Ports
246
Standard-Compliant MST Implementation
247
Interoperability with IEEE 802.1D-1998 STP
249
Configuring STP
249
Default STP Configuration
250
Enabling STP
250
Enabling the Extended System ID
252
Configuring the Root Bridge
252
Configuring a Secondary Root Bridge
253
Configuring STP Port Priority
254
Configuring STP Port Cost
256
Configuring the Bridge Priority of a VLAN
257
Configuring the Hello Time
258
Configuring the Forward-Delay Time for a VLAN
259
Configuring the Maximum Aging Time for a VLAN
259
Enabling Rapid-PVST
260
Configuring MST
261
Default MST Configuration
261
MST Configuration Guidelines and Restrictions
262
Specifying the MST Region Configuration and Enabling MST
262
Configuring the Root Bridge
264
Configuring a Secondary Root Bridge
265
Configuring Port Priority
266
Configuring Path Cost
267
Configuring the Switch Priority
268
Configuring the Hello Time
269
Configuring the Forwarding-Delay Time
270
Configuring the Transmit Hold Count
270
Configuring the Maximum-Aging Time
271
Configuring the Maximum-Hop Count
271
Specifying the Link Type to Ensure Rapid Transitions
271
Designating the Neighbor Type
272
Restarting the Protocol Migration Process
273
Displaying the MST Configuration and Status
273
Configuring Optional STP Features
275
Understanding How Portfast Works
276
Understanding How BPDU Guard Works
276
Understanding How Portfast BPDU Filtering Works
276
Understanding How Uplinkfast Works
277
Understanding How Backbonefast Works
278
Understanding How Etherchannel Guard Works
280
Understanding How Root Guard Works
280
Understanding How Loop Guard Works
280
Enabling Portfast
282
Enabling Portfast BPDU Filtering
284
Enabling BPDU Guard
285
Enabling Uplinkfast
286
Enabling Backbonefast
287
Enabling Etherchannel Guard
288
Enabling Root Guard
288
Enabling Loop Guard
289
Configuring Layer 3 Interfaces
291
Layer 3 Interface Configuration Guidelines and Restrictions
291
Configuring Subinterfaces on Layer 3 Interfaces
292
Configuring Ipv4 Routing and Addresses
293
Configuring IPX Routing and Network Numbers
296
Configuring Appletalk Routing, Cable Ranges, and Zones
297
Configuring Other Protocols on Layer 3 Interfaces
298
Configuring UDE and UDLR
299
UDE and UDLR Overview
299
Understanding UDE and UDLR
299
Supported Hardware
300
Understanding UDE
300
Understanding UDLR
301
Configuring UDE and UDLR
301
Configuring UDLR
304
Configuring Multiprotocol Label Switching
307
MPLS Label Switching
307
Understanding MPLS
308
Understanding MPLS Label Switching
308
Supported Hardware Features
310
Supported Cisco IOS Features
311
MPLS Guidelines and Restrictions
313
MPLS Supported Commands
313
Configuring MPLS
313
MPLS Per-Label Load Balancing
313
MPLS Configuration Examples
314
VPN Switching
315
VPN Switching Operation
316
MPLS VPN Guidelines and Restrictions
317
MPLS VPN Supported Commands
317
Configuring MPLS VPN
317
MPLS VPN Sample Configuration
318
Any Transport over MPLS
319
Atom Load Balancing
320
Understanding Eompls
320
Eompls Guidelines and Restrictions
320
Configuring Eompls
322
Configuring Ipv4 Multicast VPN Support
329
Understanding How MVPN Works
329
MVPN Overview
329
Multicast Routing and Forwarding and Multicast Domains
330
Multicast Distribution Trees
330
Multicast Tunnel Interfaces
333
PE Router Routing Table Support for MVPN
334
Multicast Distributed Switching Support
334
Hardware-Assisted Ipv4 Multicast
334
MVPN Configuration Guidelines and Restrictions
335
Configuring MVPN
336
Forcing Ingress Multicast Replication Mode (Optional)
336
Configuring a Multicast VPN Routing and Forwarding Instance
337
Configuring Multicast VRF Routing
343
Enabling Ipv4 Multicast Routing Globally
344
Configuring Interfaces for Multicast Routing to Support MVPN
348
Sample Configurations for MVPN
350
MVPN Configuration with Default Mdts Only
350
MVPN Configuration with Default and Data Mdts
352
Configuring IP Unicast Layer 3 Switching
357
Understanding How Layer 3 Switching Works
357
Understanding Hardware Layer 3 Switching
358
Understanding Layer 3-Switched Packet Rewrite
358
Default Hardware Layer 3 Switching Configuration
360
Configuration Guidelines and Restrictions
360
Configuring Hardware Layer 3 Switching
360
Displaying Hardware Layer 3 Switching Statistics
361
Configuring Ipv6 Multicast PFC3B Layer 3 Switching
363
Features that Support Ipv6 Multicast
363
Ipv6 Multicast Guidelines and Restrictions
364
New or Changed Ipv6 Multicast Commands
365
Configuring Ipv6 Multicast Layer 3 Switching
365
Using Show Commands to Verify Ipv6 Multicast Layer 3 Switching
365
Verifying MFIB Clients
366
Displaying the Switching Capability
366
Verifying the (S,G) Forwarding Capability
366
Verifying the (*,G) Forwarding Capability
367
Verifying the Subnet Entry Support Status
367
Verifying the Current Replication Mode
367
Displaying the Replication Mode Auto Detection Status
367
Displaying the Replication Mode Capabilities
367
Displaying Subnet Entries
368
Displaying the Ipv6 Multicast Summary
368
Displaying the Netflow Hardware Forwarding Count
368
Displaying the FIB Hardware Bridging and Drop Counts
369
Displaying the Shared and Well-Known Hardware Adjacency Counters
369
Configuring Ipv4 Multicast Layer 3 Switching
371
Understanding How Ipv4 Multicast Layer 3 Switching Works
371
Ipv4 Multicast Layer 3 Switching Overview
372
Multicast Layer 3 Switching Cache
372
Layer 3-Switched Multicast Packet Rewrite
373
Partially and Completely Switched Flows
373
Non-RPF Traffic Processing
375
Understanding How Ipv4 Bidirectional PIM Works
376
Default Ipv4 Multicast Layer 3 Switching Configuration
376
Ipv4 Multicast Layer 3 Switching Configuration Guidelines and Restrictions
377
Unsupported Features
378
Configuring Ipv4 Multicast Layer 3 Switching
378
Source-Specific Multicast with Igmpv3, IGMP V3Lite, and URD
379
Enabling Ipv4 Multicast Routing Globally
379
Enabling Ipv4 PIM on Layer 3 Interfaces
379
Enabling IP Multicast Layer 3 Switching Globally
380
Enabling IP Multicast Layer 3 Switching on Layer 3 Interfaces
380
Specifying the Maximum Number of Multicast Routes
381
Configuring the Layer 3 Switching Global Threshold
381
Enabling Installation of Directly Connected Subnets
382
Specifying the Flow Statistics Message Interval
382
Enabling Shortcut-Consistency Checking
382
Configuring ACL-Based Filtering of RPF Failures
383
Displaying RPF Failure Rate-Limiting Information
383
Displaying Ipv4 Multicast Layer 3 Hardware Switching Summary
384
Displaying the Ipv4 Multicast Routing Table
386
Displaying Ipv4 Multicast Layer 3 Switching Statistics
387
Configuring Ipv4 Bidirectional PIM
388
Enabling Ipv4 Bidirectional PIM Globally
388
Configuring the Rendezvous Point for Ipv4 Bidirectional PIM Groups
389
Setting the Ipv4 Bidirectional PIM Scan Interval
389
Displaying Ipv4 Bidirectional PIM Information
390
Using Ipv4 Debug Commands
392
Clearing Ipv4 Multicast Layer 3 Switching Statistics
392
Redundancy for Multicast Traffic
393
Configuring Mldv2 Snooping for Ipv6 Multicast Traffic
395
Understanding How Mldv2 Snooping Works
395
Mldv2 Snooping Overview
396
Mldv2 Messages
396
Source-Based Filtering
397
Explicit Host Tracking
397
Mldv2 Snooping Proxy Reporting
397
Joining an Ipv6 Multicast Group
398
Leaving a Multicast Group
400
Understanding the Mldv2 Snooping Querier
401
Default Mldv2 Snooping Configuration
401
Mldv2 Snooping Configuration Guidelines and Restrictions
401
Mldv2 Snooping Querier Configuration Guidelines and Restrictions
402
Enabling the Mldv2 Snooping Querier
402
Configuring Mldv2 Snooping
403
Enabling Mldv2 Snooping
403
Configuring a Static Connection to a Multicast Receiver
404
Configuring a Multicast Router Port Statically
405
Configuring the MLD Snooping Query Interval
405
Enabling Fast-Leave Processing
406
Enabling SSM Safe Reporting
406
Configuring Explicit Host Tracking
407
Configuring Report Suppression
407
Displaying Mldv6 Snooping Information
408
Configuring IGMP Snooping for Ipv4 Multicast Traffic
411
Understanding How IGMP Snooping Works
411
IGMP Snooping Overview
412
Joining a Multicast Group
412
Leaving a Multicast Group
414
Understanding the IGMP Snooping Querier
415
Understanding IGMP Version 3 Support
415
Default IGMP Snooping Configuration
417
IGMP Snooping Configuration Guidelines and Restrictions
417
IGMP Snooping Querier Configuration Guidelines and Restrictions
418
Enabling the IGMP Snooping Querier
418
Configuring IGMP Snooping
419
Enabling IGMP Snooping
420
Configuring the IGMP Snooping Query Interval
421
Configuring a Static Connection to a Multicast Receiver
421
Configuring a Multicast Router Port Statically
421
Enabling IGMP Fast-Leave Processing
422
Configuring Source Specific Multicast (SSM) Mapping
422
Configuring Igmpv3 Explicit Host Tracking
423
Displaying IGMP Snooping Information
424
Configuring PIM Snooping
427
Understanding How PIM Snooping Works
427
Default PIM Snooping Configuration
430
PIM Snooping Configuration Guidelines and Restrictions
430
Configuring PIM Snooping
430
Enabling PIM Snooping Globally
431
Enabling PIM Snooping in a VLAN
431
Disabling PIM Snooping Designated-Router Flooding
432
Configuring RGMP
433
Understanding How RGMP Works
433
Default RGMP Configuration
434
RGMP Configuration Guidelines and Restrictions
434
Enabling RGMP on Layer 3 Interfaces
435
Configuring Network Security
437
Configuring MAC Address-Based Traffic Blocking
437
Configuring TCP Intercept
438
Configuring Unicast Reverse Path Forwarding Check
438
Understanding PFC3B Unicast RPF Check Support
438
Unicast RPF Check Guidelines and Restrictions
439
Configuring Unicast RPF Check
439
Understanding Cisco IOS ACL Support
443
Cisco IOS ACL Configuration Guidelines and Restrictions
443
Hardware and Software ACL Support
444
Optimized ACL Logging with a PFC3B
445
Understanding OAL
445
OAL Guidelines and Restrictions
445
Configuring OAL
446
Guidelines and Restrictions for Using Layer 4 Operators in Acls
447
Determining Layer 4 Operation Usage
448
Determining Logical Operation Unit Usage
448
Configuring VLAN Acls
451
Understanding Vacls
451
VACL Overview
451
Bridged Packets
452
Routed Packets
452
Multicast Packets
454
Configuring Vacls
454
VACL Configuration Overview
455
Defining a VLAN Access Map
456
Configuring a Match Clause in a VLAN Access Map Sequence
456
Configuring an Action Clause in a VLAN Access Map Sequence
457
Applying a VLAN Access Map
458
Verifying VLAN Access Map Configuration
458
VLAN Access Map Configuration and Verification Examples
459
Configuring a Capture Port
459
Configuring VACL Logging
461
Configuring Denial of Service Protection
463
Understanding How Dos Protection Works
464
Dos Protection Default Configuration
475
Dos Protection Configuration Guidelines and Restrictions
476
Monitoring Packet Drop Statistics
476
Displaying Rate-Limiter Information
479
Understanding How Control Plane Policing Works
480
Copp Default Configuration
481
Copp Configuration Guidelines and Restrictions
481
Configuring Copp
482
Monitoring Copp
483
Defining Traffic Classification
484
Traffic Classification Overview
484
Traffic Classification Guidelines
485
Sample Basic Acls for Copp Traffic Classification
486
Configuring Sticky ARP
487
Configuring DHCP Snooping
489
Overview of DHCP Snooping
489
DHCP Snooping Option-82 Data Insertion
490
Overview of the DHCP Snooping Database Agent
492
Default Configuration for DHCP Snooping
493
DHCP Snooping Configuration Guidelines and Restrictions
494
Enabling DHCP Snooping Globally
495
Configuring DHCP Snooping
495
Enabling DHCP Option-82 Data Insertion
496
Enabling the DHCP Option 82 on Untrusted Port Feature
496
Enabling DHCP Snooping MAC Address Verification
497
Enabling DHCP Snooping on Vlans
497
Configuring the DHCP Trust State on Layer 2 LAN Interfaces
499
Configuring DHCP Snooping Rate Limiting on Layer 2 LAN Interfaces
500
Configuring the DHCP Snooping Database Agent
500
Configuration Examples for the Database Agent
501
Displaying a Binding Table
504
Configuring Dynamic ARP Inspection
505
Understanding DAI
505
Understanding ARP
505
Understanding ARP Spoofing Attacks
506
Understanding DAI and ARP Spoofing Attacks
506
Interface Trust States and Network Security
507
Rate Limiting of ARP Packets
508
Relative Priority of ARP Acls and DHCP Snooping Entries
508
Logging of Dropped Packets
508
Default DAI Configuration
509
DAI Configuration Guidelines and Restrictions
509
Configuring DAI
510
Enabling DAI on Vlans
511
Configuring the DAI Interface Trust State
511
Applying ARP Acls for DAI Filtering
512
Configuring ARP Packet Rate Limiting
513
Enabling DAI Error-Disabled Recovery
514
Enabling Additional Validation
515
Configuring DAI Logging
516
Displaying DAI Information
519
DAI Configuration Samples
520
Sample One: Two Switches Support DAI
520
Sample Two: One Switch Supports DAI
524
Verify the Configuration
525
Configuring Traffic Storm Control
527
Understanding Traffic Storm Control
527
Default Traffic Storm Control Configuration
528
Configuration Guidelines and Restrictions
529
Enabling Traffic Storm Control
529
Displaying Traffic Storm Control Settings
531
Configuring Unknown Unicast and Multicast Flood Blocking
533
Understanding Unknown Traffic Flood Control
533
Configuring UUFB or UMFB
534
Configuring PFC Qos
535
Understanding How PFC Qos Works
536
Overview
536
Component Overview
539
Understanding Classification and Marking
548
Policers
551
Understanding Port-Based Queue Types
553
PFC Qos Default Configuration
559
PFC Qos Global Settings
560
Default Values with PFC Qos Enabled
561
Default Values with PFC Qos Disabled
572
PFC Qos Configuration Guidelines and Restrictions
573
General Guidelines
573
PFC3B Guidelines
575
Class Map Command Restrictions
576
Policy Map Command Restrictions
576
Policy Map Class Command Restrictions
576
Supported Granularity for CIR and PIR Rate Values
576
Supported Granularity for CIR and PIR Token Bucket Sizes
577
IP Precedence and DSCP Values
578
Configuring PFC Qos
578
Enabling PFC Qos Globally
579
Enabling Ignore Port Trust
580
Configuring DSCP Transparency
580
Enabling Queueing-Only Mode
581
Enabling Microflow Policing of Bridged Traffic
582
Enabling VLAN-Based PFC Qos on Layer 2 LAN Ports
582
Enabling Egress ACL Support for Remarked DSCP
583
Creating Named Aggregate Policers
584
Configuring a PFC Qos Policy
586
Configuring a Policy Map
595
Configuring Egress DSCP Mutation on a PFC3B
602
Configuring Ingress Cos Mutation on IEEE 802.1Q Tunnel Ports
604
Configuring DSCP Value Maps
606
Configuring the Trust State of Ethernet LAN Ports
610
Configuring the Ingress LAN Port Cos Value
612
Configuring Standard-Queue Drop Threshold Percentages
612
Mapping Qos Labels to Queues and Drop Thresholds
618
Allocating Bandwidth between Standard Transmit Queues
622
Setting the Receive-Queue Size Ratio
624
Configuring the Transmit-Queue Size Ratio
625
Common Qos Scenarios
626
Sample Network Design Overview
626
Classifying Traffic from Pcs and IP Phones in the Access Layer
627
Accepting the Traffic Priority Value on Interswitch Links
630
Prioritizing Traffic on Interswitch Links
631
Using Policers to Limit the Amount of Traffic from a PC
634
PFC Qos Glossary
636
Configuring MPLS Qos
639
Terminology
640
MPLS Qos Features
641
MPLS Experimental Field
641
Trust
641
Classification
641
Policing and Marking
642
Preserving IP Tos
642
EXP Mutation
642
MPLS Diffserv Tunneling Modes
642
MPLS Qos Overview
642
Specifying the Qos in the IP Precedence Field
643
Mode MPLS Qos
643
Lers at the Input Edge of an MPLS Network
644
Lsrs in the Core of an MPLS Network
644
Lers at the Output Edge of an MPLS Network
645
Understanding MPLS Qos
645
Lers at the Eompls Edge
646
Lers at the IP Edge (MPLS, MPLS VPN)
647
Lsrs at the MPLS Core
651
MPLS Qos Default Configuration
653
MPLS Qos Commands
654
MPLS Qos Restrictions and Guidelines
655
Configuring MPLS Qos
655
Enabling Qos Globally
656
Enabling Queueing-Only Mode
657
Configuring a Class Map to Classify MPLS Packets
658
Configuring the MPLS Packet Trust State on Ingress Ports
660
Configuring a Policy Map
661
Displaying a Policy Map
665
Configuring MPLS Qos Egress EXP Mutation
666
Configuring EXP Value Maps
668
MPLS Diffserv Tunneling Modes
669
Short Pipe Mode
669
Uniform Mode
670
MPLS Diffserv Tunneling Restrictions and Usage Guidelines
672
Configuring Short Pipe Mode
672
Ingress PE Router—Customer Facing Interface
672
Configuring Ingress PE Router—P Facing Interface
673
Configuration Example
674
Configuring the P Router—Output Interface
675
Configuring the Egress PE Router—Customer Facing Interface
676
Configuring Uniform Mode
677
Configuring the Ingress PE Router—Customer Facing Interface
677
Configuring the Ingress PE Router—P Facing Interface
678
Configuring the Egress PE Router—Customer Facing Interface
679
Configuring PFC Qos Statistics Data Export
681
Understanding PFC Qos Statistics Data Export
681
PFC Qos Statistics Data Export Default Configuration
682
Configuring PFC Qos Statistics Data Export
682
Configuring Network Admission Control
691
Understanding NAC
691
NAC Overview
692
NAC Device Roles
692
AAA down Policy
693
NAC Layer 2 IP Validation
694
Configuring NAC
701
Default NAC Configuration
701
NAC Layer 2 IP Guidelines, Limitations, and Restrictions
701
Configuring NAC Layer 2 IP Validation
703
Configuring Eapoudp
706
Configuring Identity Profiles and Policies
707
Configuring a NAC AAA down Policy
707
Monitoring and Maintaining NAC
711
Clearing Table Entries
711
Displaying NAC Information
711
Configuring IEEE 802.1X Port-Based Authentication
713
Understanding 802.1X Port-Based Authentication
713
Device Roles
714
Authentication Initiation and Message Exchange
715
Ports in Authorized and Unauthorized States
716
Supported Topologies
716
Default 802.1X Port-Based Authentication Configuration
717
X Port-Based Authentication Guidelines and Restrictions
718
Configuring 802.1X Port-Based Authentication
719
Enabling 802.1X Port-Based Authentication
719
Configuring Switch-To-RADIUS-Server Communication
720
Enabling Periodic Reauthentication
722
Manually Reauthenticating the Client Connected to a Port
723
Initializing Authentication for the Client Connected to a Port
723
Changing the Quiet Period
723
Changing the Switch-To-Client Retransmission Time
724
Setting the Switch-To-Client Retransmission Time for EAP-Request Frames
725
Setting the Switch-To-Authentication-Server Retransmission Time for Layer 4 Packets
725
Setting the Switch-To-Client Frame Retransmission Number
726
Enabling Multiple Hosts
726
Resetting the 802.1X Configuration to the Default Values
727
Displaying 802.1X Status
727
Configuring Port Security
729
Understanding Port Security
729
Port Security with Dynamically Learned and Static MAC Addresses
729
Port Security with Sticky MAC Addresses
730
Default Port Security Configuration
731
Port Security Guidelines and Restrictions
731
Enabling Port Security
732
Configuring Port Security
732
Configuring the Port Security Violation Mode on a Port
734
Configuring the Maximum Number of Secure MAC Addresses on a Port
735
Enabling Port Security with Sticky MAC Addresses on a Port
736
Configuring a Static Secure MAC Address on a Port
737
Configuring Secure MAC Address Aging on a Port
738
Displaying Port Security Settings
739
Configuring CDP
741
Understanding How CDP Works
741
Enabling CDP Globally
742
Displaying the CDP Global Configuration
742
Enabling CDP on a Port
742
Displaying the CDP Interface Configuration
743
Monitoring and Maintaining CDP
743
Configuring UDLD
745
Understanding How UDLD Works
745
UDLD Overview
745
UDLD Aggressive Mode
746
Default UDLD Configuration
747
Configuring UDLD
747
Enabling UDLD Globally
747
Enabling UDLD on Individual LAN Interfaces
748
Disabling UDLD on Fiber-Optic LAN Interfaces
748
Configuring the UDLD Probe Message Interval
749
Resetting Disabled LAN Interfaces
749
Configuring NDE
751
Understanding NDE
751
NDE Overview
751
NDE on the PFC3B
752
Default NDE Configuration
760
NDE Configuration Guidelines and Restrictions
760
Configuring NDE
760
Configuring NDE on the PFC3B
761
Configuring NDE on the PISA
763
Enabling NDE for Ingress-Bridged IP Traffic
764
Displaying the NDE Address and Port Configuration
765
Configuring NDE Flow Filters
766
Displaying the NDE Configuration
768
Configuring Netflow
769
Understanding Netflow
769
Netflow Overview
769
Netflow on the PISA
770
Netflow on the PFC3B
770
Default Netflow Configuration
773
Netflow Configuration Guidelines and Restrictions
773
Configuring Netflow on the PFC3B
774
Configuring Netflow on the PISA
778
Configuring Local SPAN, RSPAN, and ERSPAN
781
Understanding How Local SPAN, RSPAN, and ERSPAN Work
781
Local SPAN, RSPAN, and ERSPAN Overview
781
Monitored Traffic
784
Local SPAN, RSPAN, and ERSPAN Sources
785
Local SPAN, RSPAN, and ERSPAN Destination Ports
785
Local SPAN, RSPAN, and ERSPAN Configuration Guidelines and Restrictions
786
Feature Incompatiblities
786
Local SPAN, RSPAN, and ERSPAN Session Limits
787
Local SPAN, RSPAN, and ERSPAN Guidelines and Restrictions
787
VSPAN Guidelines and Restrictions
788
RSPAN Guidelines and Restrictions
789
ERSPAN Guidelines and Restrictions
789
Configuring Destination Port Permit Lists (Optional)
791
Configuring Local SPAN, RSPAN, and ERSPAN
791
Configuring Local SPAN
792
Configuring RSPAN
793
Configuring ERSPAN
796
Configuring Source VLAN Filtering for Local SPAN and RSPAN
800
Configuring a Destination Port as an Unconditional Trunk
801
Configuring Destination Trunk Port VLAN Filtering
801
Verifying the Configuration
803
Configuration Examples
803
Configuring SNMP Ifindex Persistence
805
Understanding SNMP Ifindex Persistence
805
Enabling SNMP Ifindex Persistence Globally
806
Configuring SNMP Ifindex Persistence
806
Disabling SNMP Ifindex Persistence Globally
806
Enabling and Disabling SNMP Ifindex Persistence on Specific Interfaces
806
Clearing SNMP Ifindex Persistence Configuration from a Specific Interface
807
Power Management and Environmental Monitoring
809
Understanding How Power Management Works
809
Enabling or Disabling Power Redundancy
810
Powering Modules off and on
811
Viewing System Power Status
812
Power Cycling Modules
813
Power Cycling Power Supplies
813
Determining System Power Requirements
813
Determining System Hardware Capacity
813
Determining Sensor Temperature Threshold
817
Understanding How Environmental Monitoring Works
818
Monitoring System Environmental Status
818
Understanding LED Environmental Indications
820
Configuring Online Diagnostics
823
Understanding How Online Diagnostics Work
823
Setting Bootup Online Diagnostics Level
824
Configuring Online Diagnostics
824
Configuring On-Demand Online Diagnostics
825
Scheduling Online Diagnostics
826
Configuring Health-Monitoring Diagnostics
827
Running Online Diagnostic Tests
828
Starting and Stopping Online Diagnostic Tests
828
Displaying Online Diagnostic Tests and Test Results
828
Schedule Switchover
832
Performing Memory Tests
832
Using Top-N Reports
833
Understanding Top-N Reports
833
Top-N Reports Overview
833
Understanding Top-N Reports Operation
834
Using Top-N Reports
834
Enabling Top-N Reports Creation
835
Displaying Top-N Reports
835
Clearing Top-N Reports
836
Using the Layer 2 Traceroute Utility
837
Understanding the Layer 2 Traceroute Utility
837
Usage Guidelines
837
Using the Layer 2 Traceroute Utility
838
Global Health-Monitoring Tests
841
Testsprpinbandping
841
Appendix A Online Diagnostic Test
842
Testspnpinbandping
842
Per-Port Tests
843
Testnondisruptiveloopback
843
Testloopback
844
Testactivetostandbyloopback
844
Testtransceiverintegrity
845
Testnetflowinlinerewrite
845
Testscratchregister
843
PFC Layer 2 Forwarding Engine Tests
846
Testnewindexlearn
846
Testdontconditionallearn
847
Testbadbpdutrap
847
Testmatchcapture
848
Teststaticentry
849
PFC Layer 3 Forwarding Engine Tests
849
Testfibdevices
850
Testipv4Fibshortcut
850
Testipv6Fibshortcut
851
Testmplsfibshortcut
851
Testnatfibshortcut
852
Testl3Capture2
852
Testaclpermit
853
Testacldeny
853
Testnetflowshortcut
854
Testqos
854
Replication Engine Tests
854
Testl3Vlanmet
855
Testingressspan
855
Testegressspan
856
Exhaustive Memory Tests
856
Testfibtcamssram
856
Testasicmemory
857
Testaclqostcam
857
Testnetflowtcam
858
Testqostcam
858
IPSEC Services Modules Tests
859
Testipsecclearpkt
859
Testhapiechopkt
859
Testipsecencryptdecryptpkt
860
Stress Tests
860
Testtrafficstress
860
Critical Recovery Test—Testl3Healthmonitoring
861
Testeobcstressping
861
General Tests
862
Scheduleswitchover
862
Testfirmwarediagstatus
862
Appendix B Acronym
864
Advertisement
Advertisement
Related Products
Cisco 3550-24 - Catalyst SMI Switch
Cisco 3.3
Cisco CallManager Release 3.0(10
Cisco 3002 - VPN Hardware Client
Cisco Catalyst Supervisor Engine 32 PISA 12.2ZY
Cisco 32369
Cisco 3200 Series
Cisco 3220
Cisco 1721 - 1721 Router 32F/96D
Cisco 3230
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Conference System
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL