Cisco Systems 3750E, Webcam 3750E User manual

  • Hello! I am an AI chatbot trained to assist you with the Cisco Systems 3750E User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Catalyst 3750-E and 3560-E Switch
Software Configuration Guide
Cisco IOS Release 12.2(37)SE
May 2007
Text Part Number: OL-9775-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of
Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo,
Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step,
Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study,
LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Packet, PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise,
The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other
countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0704R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
© 2007 Cisco Systems, Inc. All rights reserved.
iii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
CONTENTS
Preface xliii
Audience xliii
Purpose xliii
Conventions xliii
Related Publications xliv
Obtaining Documentation, Obtaining Support, and Security Guidelines xlvi
CHAPTER
1 Overview 1-1
Features 1-1
Deployment Features 1-2
Performance Features 1-4
Management Options 1-5
Manageability Features 1-6
Availability and Redundancy Features 1-7
VLAN Features 1-8
Security Features 1-8
QoS and CoS Features 1-10
Layer 3 Features 1-11
Power over Ethernet Features 1-12
Monitoring Features 1-13
Default Settings After Initial Switch Configuration 1-13
Network Configuration Examples 1-16
Design Concepts for Using the Switch 1-16
Small to Medium-Sized Network Using Catalyst 3750-E and 3560-E Switches 1-23
Large Network Using Catalyst 3750-E and 3560-E Switches 1-26
Multidwelling Network Using Catalyst 3750-E Switches 1-29
Long-Distance, High-Bandwidth Transport Configuration 1-30
Where to Go Next 1-31
CHAPTER
2 Using the Command-Line Interface 2-1
Understanding Command Modes 2-1
Understanding the Help System 2-3
Contents
iv
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Understanding Abbreviated Commands 2-4
Understanding no and default Forms of Commands 2-4
Understanding CLI Error Messages 2-5
Using Configuration Logging 2-5
Using Command History 2-6
Changing the Command History Buffer Size 2-6
Recalling Commands 2-6
Disabling the Command History Feature 2-7
Using Editing Features 2-7
Enabling and Disabling Editing Features 2-7
Editing Commands through Keystrokes 2-8
Editing Command Lines that Wrap 2-9
Searching and Filtering Output of show and more Commands 2-10
Accessing the CLI 2-10
Accessing the CLI through a Console Connection or through Telnet 2-11
CHAPTER
3 Assigning the Switch IP Address and Default Gateway 3-1
Understanding the Boot Process 3-1
Assigning Switch Information 3-2
Default Switch Information 3-3
Understanding DHCP-Based Autoconfiguration 3-3
DHCP Client Request Process 3-4
Configuring DHCP-Based Autoconfiguration 3-5
DHCP Server Configuration Guidelines 3-5
Configuring the TFTP Server 3-6
Configuring the DNS 3-6
Configuring the Relay Device 3-7
Obtaining Configuration Files 3-7
Example Configuration 3-8
Manually Assigning IP Information 3-10
Checking and Saving the Running Configuration 3-11
Modifying the Startup Configuration 3-12
Default Boot Configuration 3-12
Automatically Downloading a Configuration File 3-12
Specifying the Filename to Read and Write the System Configuration 3-12
Booting Manually 3-13
Booting a Specific Software Image 3-14
Controlling Environment Variables 3-15
Contents
v
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Scheduling a Reload of the Software Image 3-17
Configuring a Scheduled Reload 3-17
Displaying Scheduled Reload Information 3-18
CHAPTER
4 Configuring Cisco IOS CNS Agents 4-1
Understanding Cisco Configuration Engine Software 4-1
Configuration Service 4-2
Event Service 4-3
NameSpace Mapper 4-3
What You Should Know About the CNS IDs and Device Hostnames 4-3
ConfigID 4-3
DeviceID 4-4
Hostname and DeviceID 4-4
Using Hostname, DeviceID, and ConfigID 4-4
Understanding Cisco IOS Agents 4-5
Initial Configuration 4-5
Incremental (Partial) Configuration 4-6
Synchronized Configuration 4-6
Configuring Cisco IOS Agents 4-6
Enabling Automated CNS Configuration 4-6
Enabling the CNS Event Agent 4-8
Enabling the Cisco IOS CNS Agent 4-9
Enabling an Initial Configuration 4-9
Enabling a Partial Configuration 4-11
Displaying CNS Configuration 4-12
CHAPTER
5 Managing Switch Stacks 5-1
Understanding Switch Stacks 5-1
Switch Stack Membership 5-3
Stack Master Election and Re-Election 5-5
Switch Stack Bridge ID and Router MAC Address 5-6
Stack Member Numbers 5-6
Stack Member Priority Values 5-7
Switch Stack Offline Configuration 5-8
Effects of Adding a Provisioned Switch to a Switch Stack 5-8
Effects of Replacing a Provisioned Switch in a Switch Stack 5-10
Effects of Removing a Provisioned Switch from a Switch Stack 5-10
Hardware Compatibility and SDM Mismatch Mode in Switch Stacks 5-10
Switch Stack Software Compatibility Recommendations 5-10
Contents
vi
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Stack Protocol Version Compatibility 5-11
Major Version Number Incompatibility Among Switches 5-11
Minor Version Number Incompatibility Among Switches 5-11
Understanding Auto-Upgrade and Auto-Advise 5-12
Auto-Upgrade and Auto-Advise Example Messages 5-13
Incompatible Software and Stack Member Image Upgrades 5-15
Switch Stack Configuration Files 5-15
Additional Considerations for System-Wide Configuration on Switch Stacks 5-16
Switch Stack Management Connectivity 5-16
Connectivity to the Switch Stack Through an IP Address 5-17
Connectivity to the Switch Stack Through an SSH Session 5-17
Connectivity to the Switch Stack Through Console Ports or Ethernet Management Ports 5-17
Connectivity to Specific Stack Members 5-17
Switch Stack Configuration Scenarios 5-18
Configuring the Switch Stack 5-20
Default Switch Stack Configuration 5-20
Enabling Persistent MAC Address 5-20
Assigning Stack Member Information 5-22
Assigning a Stack Member Number 5-22
Setting the Stack Member Priority Value 5-22
Provisioning a New Member for a Switch Stack 5-23
Accessing the CLI of a Specific Stack Member 5-24
Displaying Switch Stack Information 5-24
CHAPTER
6 Clustering Switches 6-1
Understanding Switch Clusters 6-1
Cluster Command Switch Characteristics 6-3
Standby Cluster Command Switch Characteristics 6-3
Candidate Switch and Cluster Member Switch Characteristics 6-4
Planning a Switch Cluster 6-4
Automatic Discovery of Cluster Candidates and Members 6-5
Discovery Through CDP Hops 6-5
Discovery Through Non-CDP-Capable and Noncluster-Capable Devices 6-6
Discovery Through Different VLANs 6-7
Discovery Through Different Management VLANs 6-8
Discovery Through Routed Ports 6-9
Discovery of Newly Installed Switches 6-10
Contents
vii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
HSRP and Standby Cluster Command Switches 6-11
Virtual IP Addresses 6-12
Other Considerations for Cluster Standby Groups 6-12
Automatic Recovery of Cluster Configuration 6-13
IP Addresses 6-14
Hostnames 6-14
Passwords 6-15
SNMP Community Strings 6-15
Switch Clusters and Switch Stacks 6-16
TACACS+ and RADIUS 6-17
LRE Profiles 6-17
Using the CLI to Manage Switch Clusters 6-18
Catalyst 1900 and Catalyst 2820 CLI Considerations 6-18
Using SNMP to Manage Switch Clusters 6-19
CHAPTER
7 Administering the Switch 7-1
Managing the System Time and Date 7-1
Understanding the System Clock 7-1
Understanding Network Time Protocol 7-2
Configuring NTP 7-3
Default NTP Configuration 7-4
Configuring NTP Authentication 7-4
Configuring NTP Associations 7-5
Configuring NTP Broadcast Service 7-6
Configuring NTP Access Restrictions 7-8
Configuring the Source IP Address for NTP Packets 7-10
Displaying the NTP Configuration 7-11
Configuring Time and Date Manually 7-11
Setting the System Clock 7-11
Displaying the Time and Date Configuration 7-12
Configuring the Time Zone 7-12
Configuring Summer Time (Daylight Saving Time) 7-13
Configuring a System Name and Prompt 7-14
Default System Name and Prompt Configuration 7-15
Configuring a System Name 7-15
Understanding DNS 7-15
Default DNS Configuration 7-16
Setting Up DNS 7-16
Displaying the DNS Configuration 7-17
Contents
viii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Creating a Banner 7-17
Default Banner Configuration 7-17
Configuring a Message-of-the-Day Login Banner 7-18
Configuring a Login Banner 7-19
Managing the MAC Address Table 7-19
Building the Address Table 7-20
MAC Addresses and VLANs 7-20
MAC Addresses and Switch Stacks 7-21
Default MAC Address Table Configuration 7-21
Changing the Address Aging Time 7-21
Removing Dynamic Address Entries 7-22
Configuring MAC Address Notification Traps 7-22
Adding and Removing Static Address Entries 7-24
Configuring Unicast MAC Address Filtering 7-25
Displaying Address Table Entries 7-27
Managing the ARP Table 7-27
CHAPTER
8 Configuring SDM Templates 8-1
Understanding the SDM Templates 8-1
Dual IPv4 and IPv6 SDM Templates 8-2
SDM Templates and Switch Stacks 8-3
Configuring the Switch SDM Template 8-4
Default SDM Template 8-4
SDM Template Configuration Guidelines 8-4
Setting the SDM Template 8-5
Displaying the SDM Templates 8-6
CHAPTER
9 Configuring Switch-Based Authentication 9-1
Preventing Unauthorized Access to Your Switch 9-1
Protecting Access to Privileged EXEC Commands 9-2
Default Password and Privilege Level Configuration 9-2
Setting or Changing a Static Enable Password 9-3
Protecting Enable and Enable Secret Passwords with Encryption 9-3
Disabling Password Recovery 9-5
Setting a Telnet Password for a Terminal Line 9-6
Configuring Username and Password Pairs 9-6
Contents
ix
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring Multiple Privilege Levels 9-7
Setting the Privilege Level for a Command 9-8
Changing the Default Privilege Level for Lines 9-9
Logging into and Exiting a Privilege Level 9-9
Controlling Switch Access with TACACS+ 9-10
Understanding TACACS+ 9-10
TACACS+ Operation 9-12
Configuring TACACS+ 9-12
Default TACACS+ Configuration 9-13
Identifying the TACACS+ Server Host and Setting the Authentication Key 9-13
Configuring TACACS+ Login Authentication 9-14
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services 9-16
Starting TACACS+ Accounting 9-17
Displaying the TACACS+ Configuration 9-17
Controlling Switch Access with RADIUS 9-17
Understanding RADIUS 9-18
RADIUS Operation 9-19
Configuring RADIUS 9-20
Default RADIUS Configuration 9-20
Identifying the RADIUS Server Host 9-20
Configuring RADIUS Login Authentication 9-23
Defining AAA Server Groups 9-25
Configuring RADIUS Authorization for User Privileged Access and Network Services 9-27
Starting RADIUS Accounting 9-28
Configuring Settings for All RADIUS Servers 9-29
Configuring the Switch to Use Vendor-Specific RADIUS Attributes 9-29
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication 9-30
Displaying the RADIUS Configuration 9-31
Controlling Switch Access with Kerberos 9-31
Understanding Kerberos 9-32
Kerberos Operation 9-34
Authenticating to a Boundary Switch 9-34
Obtaining a TGT from a KDC 9-35
Authenticating to Network Services 9-35
Configuring Kerberos 9-35
Configuring the Switch for Local Authentication and Authorization 9-36
Contents
x
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring the Switch for Secure Shell 9-37
Understanding SSH 9-38
SSH Servers, Integrated Clients, and Supported Versions 9-38
Limitations 9-39
Configuring SSH 9-39
Configuration Guidelines 9-39
Setting Up the Switch to Run SSH 9-40
Configuring the SSH Server 9-41
Displaying the SSH Configuration and Status 9-41
Configuring the Switch for Secure Socket Layer HTTP 9-42
Understanding Secure HTTP Servers and Clients 9-42
Certificate Authority Trustpoints 9-42
CipherSuites 9-44
Configuring Secure HTTP Servers and Clients 9-44
Default SSL Configuration 9-44
SSL Configuration Guidelines 9-45
Configuring a CA Trustpoint 9-45
Configuring the Secure HTTP Server 9-46
Configuring the Secure HTTP Client 9-47
Displaying Secure HTTP Server and Client Status 9-48
Configuring the Switch for Secure Copy Protocol 9-48
Information About Secure Copy 9-49
CHAPTER
10 Configuring IEEE 802.1x Port-Based Authentication 10-1
Understanding IEEE 802.1x Port-Based Authentication 10-1
Device Roles 10-2
Authentication Process 10-3
Authentication Initiation and Message Exchange 10-5
Ports in Authorized and Unauthorized States 10-7
IEEE 802.1x Authentication and Switch Stacks 10-7
IEEE 802.1x Host Mode 10-8
IEEE 802.1x Accounting 10-9
IEEE 802.1x Accounting Attribute-Value Pairs 10-9
Using IEEE 802.1x Authentication with VLAN Assignment 10-10
Using IEEE 802.1x Authentication with Per-User ACLs 10-11
Using IEEE 802.1x Authentication with Guest VLAN 10-12
Using IEEE 802.1x Authentication with Restricted VLAN 10-13
Using IEEE 802.1x Authentication with Inaccessible Authentication Bypass 10-14
Using IEEE 802.1x Authentication with Voice VLAN Ports 10-15
Contents
xi
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Using IEEE 802.1x Authentication with Port Security 10-16
Using IEEE 802.1x Authentication with Wake-on-LAN 10-17
Using IEEE 802.1x Authentication with MAC Authentication Bypass 10-17
Network Admission Control Layer 2 IEEE 802.1x Validation 10-19
Using Multidomain Authentication 10-19
Using Web Authentication 10-20
Configuring IEEE 802.1x Authentication 10-21
Default IEEE 802.1x Authentication Configuration 10-22
IEEE 802.1x Authentication Configuration Guidelines 10-23
IEEE 802.1x Authentication 10-23
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication
Bypass
10-24
MAC Authentication Bypass 10-25
Configuring IEEE 802.1x Authentication 10-25
Configuring the Switch-to-RADIUS-Server Communication 10-26
Configuring the Host Mode 10-28
Configuring Periodic Re-Authentication 10-29
Manually Re-Authenticating a Client Connected to a Port 10-29
Changing the Quiet Period 10-30
Changing the Switch-to-Client Retransmission Time 10-30
Setting the Switch-to-Client Frame-Retransmission Number 10-31
Setting the Re-Authentication Number 10-32
Configuring IEEE 802.1x Accounting 10-32
Configuring a Guest VLAN 10-33
Configuring a Restricted VLAN 10-34
Configuring the Inaccessible Authentication Bypass Feature 10-36
Configuring IEEE 802.1x Authentication with WoL 10-38
Configuring MAC Authentication Bypass 10-39
Configuring NAC Layer 2 IEEE 802.1x Validation 10-40
Configuring Web Authentication 10-41
Disabling IEEE 802.1x Authentication on the Port 10-43
Resetting the IEEE 802.1x Authentication Configuration to the Default Values 10-44
Displaying IEEE 802.1x Statistics and Status 10-44
Contents
xii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
CHAPTER
11 Configuring Interface Characteristics 11-1
Understanding Interface Types 11-1
Port-Based VLANs 11-2
Switch Ports 11-2
Access Ports 11-3
Trunk Ports 11-3
Tunnel Ports 11-4
Routed Ports 11-4
Switch Virtual Interfaces 11-5
EtherChannel Port Groups 11-5
10-Gigabit Ethernet Interfaces 11-6
Power over Ethernet Ports 11-6
Supported Protocols and Standards 11-6
Powered-Device Detection and Initial Power Allocation 11-7
Power Management Modes 11-8
Power Monitoring and Power Policing 11-9
Connecting Interfaces 11-11
Ethernet Management Port 11-12
Using Interface Configuration Mode 11-15
Procedures for Configuring Interfaces 11-16
Configuring a Range of Interfaces 11-17
Configuring and Using Interface Range Macros 11-19
Configuring Ethernet Interfaces 11-20
Default Ethernet Interface Configuration 11-21
Configuring Interface Speed and Duplex Mode 11-22
Speed and Duplex Configuration Guidelines 11-22
Setting the Interface Speed and Duplex Parameters 11-23
Configuring IEEE 802.3x Flow Control 11-24
Configuring Auto-MDIX on an Interface 11-25
Configuring a Power Management Mode on a PoE Port 11-26
Budgeting Power for Devices Connected to a PoE Port 11-27
Configuring Power Policing 11-29
Adding a Description for an Interface 11-30
Configuring Ethernet Management Ports 11-31
Configuring Layer 3 Interfaces 11-31
Configuring the System MTU 11-33
Configuring the Cisco Redundant Power System 2300 11-35
Contents
xiii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring the Power Supplies 11-37
Monitoring and Maintaining the Interfaces 11-38
Monitoring Interface Status 11-38
Clearing and Resetting Interfaces and Counters 11-39
Shutting Down and Restarting the Interface 11-40
CHAPTER
12 Configuring Smartports Macros 12-1
Understanding Smartports Macros 12-1
Configuring Smartports Macros 12-2
Default Smartports Macro Configuration 12-2
Smartports Macro Configuration Guidelines 12-3
Creating Smartports Macros 12-4
Applying Smartports Macros 12-5
Applying Cisco-Default Smartports Macros 12-6
Displaying Smartports Macros 12-8
CHAPTER
13 Configuring VLANs 13-1
Understanding VLANs 13-1
Supported VLANs 13-3
VLAN Port Membership Modes 13-3
Configuring Normal-Range VLANs 13-4
Token Ring VLANs 13-6
Normal-Range VLAN Configuration Guidelines 13-6
VLAN Configuration Mode Options 13-7
VLAN Configuration in config-vlan Mode 13-7
VLAN Configuration in VLAN Database Configuration Mode 13-7
Saving VLAN Configuration 13-7
Default Ethernet VLAN Configuration 13-8
Creating or Modifying an Ethernet VLAN 13-9
Deleting a VLAN 13-10
Assigning Static-Access Ports to a VLAN 13-11
Configuring Extended-Range VLANs 13-12
Default VLAN Configuration 13-12
Extended-Range VLAN Configuration Guidelines 13-13
Creating an Extended-Range VLAN 13-14
Creating an Extended-Range VLAN with an Internal VLAN ID 13-15
Displaying VLANs 13-16
Configuring VLAN Trunks 13-16
Contents
xiv
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Trunking Overview 13-16
Encapsulation Types 13-18
IEEE 802.1Q Configuration Considerations 13-19
Default Layer 2 Ethernet Interface VLAN Configuration 13-19
Configuring an Ethernet Interface as a Trunk Port 13-19
Interaction with Other Features 13-20
Configuring a Trunk Port 13-20
Defining the Allowed VLANs on a Trunk 13-21
Changing the Pruning-Eligible List 13-22
Configuring the Native VLAN for Untagged Traffic 13-23
Configuring Trunk Ports for Load Sharing 13-24
Load Sharing Using STP Port Priorities 13-24
Load Sharing Using STP Path Cost 13-26
Configuring VMPS 13-28
Understanding VMPS 13-28
Dynamic-Access Port VLAN Membership 13-29
Default VMPS Client Configuration 13-29
VMPS Configuration Guidelines 13-29
Configuring the VMPS Client 13-30
Entering the IP Address of the VMPS 13-30
Configuring Dynamic-Access Ports on VMPS Clients 13-31
Reconfirming VLAN Memberships 13-31
Changing the Reconfirmation Interval 13-32
Changing the Retry Count 13-32
Monitoring the VMPS 13-33
Troubleshooting Dynamic-Access Port VLAN Membership 13-33
VMPS Configuration Example 13-33
CHAPTER
14 Configuring VTP 14-1
Understanding VTP 14-1
The VTP Domain 14-2
VTP Modes 14-3
VTP Advertisements 14-3
VTP Version 2 14-4
VTP Pruning 14-4
VTP and Switch Stacks 14-6
Contents
xv
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring VTP 14-6
Default VTP Configuration 14-7
VTP Configuration Options 14-7
VTP Configuration in Global Configuration Mode 14-7
VTP Configuration in VLAN Database Configuration Mode 14-8
VTP Configuration Guidelines 14-8
Domain Names 14-8
Passwords 14-8
VTP Version 14-9
Configuration Requirements 14-9
Configuring a VTP Server 14-9
Configuring a VTP Client 14-11
Disabling VTP (VTP Transparent Mode) 14-12
Enabling VTP Version 2 14-13
Enabling VTP Pruning 14-14
Adding a VTP Client Switch to a VTP Domain 14-14
Monitoring VTP 14-16
CHAPTER
15 Configuring Voice VLAN 15-1
Understanding Voice VLAN 15-1
Cisco IP Phone Voice Traffic 15-2
Cisco IP Phone Data Traffic 15-2
Configuring Voice VLAN 15-3
Default Voice VLAN Configuration 15-3
Voice VLAN Configuration Guidelines 15-3
Configuring a Port Connected to a Cisco 7960 IP Phone 15-4
Configuring Cisco IP Phone Voice Traffic 15-5
Configuring the Priority of Incoming Data Frames 15-6
Displaying Voice VLAN 15-7
CHAPTER
16 Configuring Private VLANs 16-1
Understanding Private VLANs 16-1
IP Addressing Scheme with Private VLANs 16-3
Private VLANs across Multiple Switches 16-4
Private-VLAN Interaction with Other Features 16-4
Private VLANs and Unicast, Broadcast, and Multicast Traffic 16-5
Private VLANs and SVIs 16-5
Private VLANs and Switch Stacks 16-6
Contents
xvi
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring Private VLANs 16-6
Tasks for Configuring Private VLANs 16-6
Default Private-VLAN Configuration 16-7
Private-VLAN Configuration Guidelines 16-7
Secondary and Primary VLAN Configuration 16-7
Private-VLAN Port Configuration 16-8
Limitations with Other Features 16-9
Configuring and Associating VLANs in a Private VLAN 16-10
Configuring a Layer 2 Interface as a Private-VLAN Host Port 16-12
Configuring a Layer 2 Interface as a Private-VLAN Promiscuous Port 16-13
Mapping Secondary VLANs to a Primary VLAN Layer 3 VLAN Interface 16-14
Monitoring Private VLANs 16-15
CHAPTER
17 Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling 17-1
Understanding IEEE 802.1Q Tunneling 17-1
Configuring IEEE 802.1Q Tunneling 17-4
Default IEEE 802.1Q Tunneling Configuration 17-4
IEEE 802.1Q Tunneling Configuration Guidelines 17-4
Native VLANs 17-4
System MTU 17-5
IEEE 802.1Q Tunneling and Other Features 17-6
Configuring an IEEE 802.1Q Tunneling Port 17-7
Understanding Layer 2 Protocol Tunneling 17-8
Configuring Layer 2 Protocol Tunneling 17-10
Default Layer 2 Protocol Tunneling Configuration 17-11
Layer 2 Protocol Tunneling Configuration Guidelines 17-12
Configuring Layer 2 Protocol Tunneling 17-13
Configuring Layer 2 Tunneling for EtherChannels 17-14
Configuring the SP Edge Switch 17-14
Configuring the Customer Switch 17-16
Monitoring and Maintaining Tunneling Status 17-18
CHAPTER
18 Configuring STP 18-1
Understanding Spanning-Tree Features 18-1
STP Overview 18-2
Spanning-Tree Topology and BPDUs 18-3
Contents
xvii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Bridge ID, Switch Priority, and Extended System ID 18-4
Spanning-Tree Interface States 18-5
Blocking State 18-7
Listening State 18-7
Learning State 18-7
Forwarding State 18-7
Disabled State 18-8
How a Switch or Port Becomes the Root Switch or Root Port 18-8
Spanning Tree and Redundant Connectivity 18-9
Spanning-Tree Address Management 18-9
Accelerated Aging to Retain Connectivity 18-9
Spanning-Tree Modes and Protocols 18-10
Supported Spanning-Tree Instances 18-10
Spanning-Tree Interoperability and Backward Compatibility 18-11
STP and IEEE 802.1Q Trunks 18-11
VLAN-Bridge Spanning Tree 18-11
Spanning Tree and Switch Stacks 18-12
Configuring Spanning-Tree Features 18-12
Default Spanning-Tree Configuration 18-13
Spanning-Tree Configuration Guidelines 18-13
Changing the Spanning-Tree Mode. 18-15
Disabling Spanning Tree 18-16
Configuring the Root Switch 18-16
Configuring a Secondary Root Switch 18-18
Configuring Port Priority 18-18
Configuring Path Cost 18-20
Configuring the Switch Priority of a VLAN 18-21
Configuring Spanning-Tree Timers 18-22
Configuring the Hello Time 18-22
Configuring the Forwarding-Delay Time for a VLAN 18-23
Configuring the Maximum-Aging Time for a VLAN 18-23
Configuring the Transmit Hold-Count 18-24
Displaying the Spanning-Tree Status 18-24
Contents
xviii
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
CHAPTER
19 Configuring MSTP 19-1
Understanding MSTP 19-2
Multiple Spanning-Tree Regions 19-2
IST, CIST, and CST 19-3
Operations Within an MST Region 19-3
Operations Between MST Regions 19-4
IEEE 802.1s Terminology 19-5
Hop Count 19-5
Boundary Ports 19-6
IEEE 802.1s Implementation 19-6
Port Role Naming Change 19-7
Interoperation Between Legacy and Standard Switches 19-7
Detecting Unidirectional Link Failure 19-8
MSTP and Switch Stacks 19-8
Interoperability with IEEE 802.1D STP 19-9
Understanding RSTP 19-9
Port Roles and the Active Topology 19-9
Rapid Convergence 19-10
Synchronization of Port Roles 19-11
Bridge Protocol Data Unit Format and Processing 19-12
Processing Superior BPDU Information 19-13
Processing Inferior BPDU Information 19-13
Topology Changes 19-13
Configuring MSTP Features 19-14
Default MSTP Configuration 19-15
MSTP Configuration Guidelines 19-15
Specifying the MST Region Configuration and Enabling MSTP 19-16
Configuring the Root Switch 19-17
Configuring a Secondary Root Switch 19-19
Configuring Port Priority 19-20
Configuring Path Cost 19-21
Configuring the Switch Priority 19-22
Configuring the Hello Time 19-22
Configuring the Forwarding-Delay Time 19-23
Configuring the Maximum-Aging Time 19-24
Configuring the Maximum-Hop Count 19-24
Contents
xix
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Specifying the Link Type to Ensure Rapid Transitions 19-24
Designating the Neighbor Type 19-25
Restarting the Protocol Migration Process 19-26
Displaying the MST Configuration and Status 19-26
CHAPTER
20 Configuring Optional Spanning-Tree Features 20-1
Understanding Optional Spanning-Tree Features 20-1
Understanding Port Fast 20-2
Understanding BPDU Guard 20-2
Understanding BPDU Filtering 20-3
Understanding UplinkFast 20-3
Understanding Cross-Stack UplinkFast 20-5
How CSUF Works 20-6
Events that Cause Fast Convergence 20-7
Understanding BackboneFast 20-7
Understanding EtherChannel Guard 20-10
Understanding Root Guard 20-10
Understanding Loop Guard 20-11
Configuring Optional Spanning-Tree Features 20-11
Default Optional Spanning-Tree Configuration 20-12
Optional Spanning-Tree Configuration Guidelines 20-12
Enabling Port Fast 20-12
Enabling BPDU Guard 20-13
Enabling BPDU Filtering 20-14
Enabling UplinkFast for Use with Redundant Links 20-15
Enabling Cross-Stack UplinkFast 20-16
Enabling BackboneFast 20-16
Enabling EtherChannel Guard 20-17
Enabling Root Guard 20-18
Enabling Loop Guard 20-18
Displaying the Spanning-Tree Status 20-19
CHAPTER
21 Configuring Flex Links and the MAC Address-Table Move Update Feature 21-1
Understanding Flex Links and the MAC Address-Table Move Update 21-1
Flex Links 21-1
VLAN Flex Link Load Balancing and Support 21-2
MAC Address-Table Move Update 21-3
Contents
xx
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-02
Configuring Flex Links and MAC Address-Table Move Update 21-5
Configuration Guidelines 21-5
Default Configuration 21-5
Configuring Flex Links and MAC Address-Table Move Update 21-6
Configuring Flex Links 21-6
Configuring VLAN Load Balancing on Flex Links 21-8
Configuring the MAC Address-Table Move Update Feature 21-9
Monitoring Flex Links and the MAC Address-Table Move Update 21-11
CHAPTER
22 Configuring DHCP Features and IP Source Guard 22-1
Understanding DHCP Features 22-1
DHCP Server 22-2
DHCP Relay Agent 22-2
DHCP Snooping 22-2
Option-82 Data Insertion 22-3
Cisco IOS DHCP Server Database 22-6
DHCP Snooping Binding Database 22-6
DHCP Snooping and Switch Stacks 22-8
Configuring DHCP Features 22-8
Default DHCP Configuration 22-8
DHCP Snooping Configuration Guidelines 22-9
Configuring the DHCP Server 22-10
DHCP Server and Switch Stacks 22-10
Configuring the DHCP Relay Agent 22-11
Specifying the Packet Forwarding Address 22-11
Enabling DHCP Snooping and Option 82 22-12
Enabling DHCP Snooping on Private VLANs 22-14
Enabling the Cisco IOS DHCP Server Database 22-14
Enabling the DHCP Snooping Binding Database Agent 22-14
Displaying DHCP Snooping Information 22-15
Understanding IP Source Guard 22-16
Source IP Address Filtering 22-16
Source IP and MAC Address Filtering 22-17
Configuring IP Source Guard 22-17
Default IP Source Guard Configuration 22-17
IP Source Guard Configuration Guidelines 22-17
Enabling IP Source Guard 22-18
Displaying IP Source Guard Information 22-19
/