Cisco Industrial Ethernet 2000 Series Switches, IE 2000-8TC-G Industrial Ethernet Switch Configuration Guide

  • Hello! I am an AI chatbot trained to assist you with the Cisco Industrial Ethernet 2000 Series Switches Configuration Guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Cisco IE 2000 Switch Software
Configuration Guide
Cisco IOS Release 15.0(2)EB
February 2013
Text Part Number: 78-21162-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Cisco IE 2000 Switch Software Configuration Guide
Cisco IOS Release 15.0(2)EB
© 2012 Cisco Systems, Inc. All rights reserved.
iii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
CONTENTS
Preface 1
Audience 1
Purpose 1
Conventions 1
Related Publications 2
Obtaining Documentation, Obtaining Support, and Security Guidelines 3
CHAPTER
1Configuration Overview 1-1
Features 1-1
Feature Software Licensing 1-1
Ease-of-Deployment and Ease-of-Use Features 1-2
Performance Features 1-2
Management Options 1-3
Industrial Application 1-4
Manageability Features 1-4
Availability and Redundancy Features 1-5
VLAN Features 1-6
Security Features 1-7
QoS and CoS Features 1-10
Monitoring Features 1-11
Default Settings After Initial Switch Configuration 1-11
Network Configuration Examples 1-14
Design Concepts for Using the Switch 1-14
Ethernet-to-the-Factory Architecture 1-15
Where to Go Next 1-21
CHAPTER
2Using the Command-Line Interface 2-1
Information About Using the Command-Line Interface 2-1
Command Modes 2-1
Help System 2-3
Understanding Abbreviated Commands 2-4
No and default Forms of Commands 2-4
CLI Error Messages 2-5
Configuration Logging 2-5
Contents
iv
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
How to Use the CLI to Configure Features 2-6
Configuring the Command History 2-6
Using Editing Features 2-7
Searching and Filtering Output of show and more Commands 2-10
Accessing the CLI 2-10
CHAPTER
3Configuring Switch Alarms 3-1
Finding Feature Information 3-1
Information About Switch Alarms 3-1
Global Status Monitoring Alarms 3-2
FCS Error Hysteresis Threshold 3-2
Port Status Monitoring Alarms 3-2
Triggering Alarm Options 3-3
External Alarms 3-4
Default Switch Alarm Settings 3-5
How to Configure Switch Alarms 3-5
Configuring External Alarms 3-5
Configuring the Power Supply Alarms 3-6
Configuring the Switch Temperature Alarms 3-6
Associating the Temperature Alarms to a Relay 3-7
Configuring the FCS Bit Error Rate Alarm 3-7
Configuring Alarm Profiles 3-8
Enabling SNMP Traps 3-9
Monitoring and Maintaining Switch Alarms Status 3-9
Configuration Examples for Switch Alarms 3-10
Configuring External Alarms: Example 3-10
Associating Temperature Alarms to a Relay: Examples 3-10
Creating or Modifying an Alarm Profile: Example 3-10
Setting the FCS Error Hysteresis Threshold: Example 3-11
Configuring a Dual Power Supply: Examples 3-11
Displaying Alarm Settings: Example 3-11
Additional References 3-12
Related Documents 3-12
Standards 3-12
MIBs 3-12
RFCs 3-13
Technical Assistance 3-13
Contents
v
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
CHAPTER
4Performing Switch Setup Configuration 4-1
Restrictions for Performing Switch Setup Configuration 4-1
Information About Performing Switch Setup Configuration 4-1
Switch Boot Process 4-1
Default Switch Boot Settings 4-3
Switch Boot Optimization 4-3
Switch Information Assignment 4-4
Switch Default Settings 4-4
DHCP-Based Autoconfiguration Overview 4-4
DHCP-Based Autoconfiguration and Image Update 4-6
DHCP Server Configuration Guidelines 4-7
TFTP Server 4-7
DNS Server 4-8
Relay Device 4-8
How to Obtain Configuration Files 4-9
How to Control Environment Variables 4-10
Scheduled Reload of the Software Image 4-11
How to Perform Switch Setup Configuration 4-12
Configuring DHCP Autoconfiguration (Only Configuration File) 4-12
Manually Assigning IP Information on a Routed Port 4-14
Manually Assigning IP Information to SVIs 4-15
Modifying the Startup Configuration 4-15
Monitoring Switch Setup Configuration 4-17
Verifying the Switch Running Configuration 4-17
Configuration Examples for Performing Switch Setup Configuration 4-18
Retrieving IP Information Using DHCP-Based Autoconfiguration: Example 4-18
Scheduling Software Image Reload: Examples 4-20
Configuring DHCP Auto-Image Update: Example 4-20
Configuring a Switch as a DHCP Server: Example 4-20
Configuring Client to Download Files from DHCP Server 4-21
Additional References 4-22
Related Documents 4-22
Standards 4-22
MIBs 4-22
RFCs 4-22
Technical Assistance 4-22
CHAPTER
5Configuring Cisco IOS Configuration Engine 5-1
Finding Feature Information 5-1
Contents
vi
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Prerequisites for Configuring Cisco IOS Configuration Engine 5-1
Information About Configuring Cisco IOS Configuration Engine 5-2
Configuration Service 5-3
Event Service 5-3
NameSpace Mapper 5-4
CNS IDs and Device Hostnames 5-4
Cisco IOS Agents 5-5
How to Configure Cisco IOS Configuration Engine 5-7
Configuring Cisco IOS Agents 5-7
Enabling CNS Event Agent 5-7
Enabling Cisco IOS CNS Agent and an Initial Configuration 5-8
Enabling a Partial Configuration 5-10
Monitoring and Maintaining Cisco IOS Configuration Engine 5-11
Configuration Examples for Cisco IOS Configuration Engine 5-11
Enabling the CNS Event Agent: Example 5-11
Configuring an Initial CNS Configuration: Examples 5-11
Additional References 5-12
Related Documents 5-12
Standards 5-12
MIBs 5-12
RFCs 5-12
Technical Assistance 5-13
CHAPTER
6Configuring Switch Clusters 6-1
Finding Feature Information 6-1
Prerequisites for Configuring Switch Clusters 6-1
Cluster Command Switch Characteristics 6-1
Standby Cluster Command Switch Characteristics 6-2
Candidate Switch and Cluster Member Switch Characteristics 6-2
Restrictions for Configuring Switch Clusters 6-3
Information About Configuring Switch Clusters 6-3
Benefits of Clustering Switches 6-3
Eligible Cluster Switches 6-3
How to Plan for Switch Clustering 6-4
Automatic Discovery of Cluster Candidates and Members 6-5
IP Addresses 6-11
Hostnames 6-11
Passwords 6-12
Contents
vii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
SNMP Community Strings 6-12
TACACS+ and RADIUS 6-12
LRE Profiles 6-13
Managing Switch Clusters 6-13
Using the CLI to Manage Switch Clusters 6-13
Using SNMP to Manage Switch Clusters 6-14
Additional References 6-15
Related Documents 6-15
Standards 6-15
MIBs 6-15
RFCs 6-15
Technical Assistance 6-15
CHAPTER
7Performing Switch Administration 7-1
Finding Feature Information 7-1
Information About Performing Switch Administration 7-1
System Time and Date Management 7-1
DNS 7-4
Login Banners 7-4
System Name and Prompt 7-5
MAC Address Table 7-5
ARP Table Management 7-8
How to Perform Switch Administration 7-9
Configuring Time and Date Manually 7-9
Configuring a System Name 7-11
Setting Up DNS 7-11
Configuring Login Banners 7-12
Managing the MAC Address Table 7-13
Monitoring and Maintaining Switch Administration 7-18
Configuration Examples for Performing Switch Admininistration 7-18
Setting the System Clock: Example 7-18
Configuring Summer Time: Examples 7-18
Configuring a MOTD Banner: Examples 7-19
Configuring a Login Banner: Example 7-19
Configuring MAC Address Change Notification Traps: Example 7-19
Sending MAC Address Move Notification Traps: Example 7-20
Configuring MAC Threshold Notification Traps: Example 7-20
Adding the Static Address to the MAC Address Table: Example 7-20
Configuring Unicast MAC Address Filtering: Example 7-20
Contents
viii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Additional References 7-21
Related Documents 7-21
Standards 7-21
MIBs 7-21
RFCs 7-21
Technical Assistance 7-21
CHAPTER
8Configuring PTP 8-1
Finding Feature Information 8-1
Prerequisites for Configuring PTP 8-1
Restrictions for Configuring PTP 8-1
Information About Configuring PTP 8-1
Precision Time Protocol 8-1
How to Configure PTP 8-2
Default PTP Settings 8-2
Setting Up PTP 8-3
Monitoring and Maintaining the PTP Configuration 8-3
Troubleshooting the PTP Configuration 8-4
Additional References 8-4
Related Documents 8-4
Standards 8-4
MIBs 8-4
RFCs 8-5
Technical Assistance 8-5
CHAPTER
9Configuring PROFINET 9-1
Finding Feature Information 9-1
Restrictions for Configuring PROFINET 9-1
Information About Configuring PROFINET 9-1
PROFINET Device Roles 9-2
PROFINET Device Data Exchange 9-2
How to Configure PROFINET 9-4
Configuring PROFINET 9-4
Default Configuration 9-4
Enabling PROFINET 9-4
Monitoring and Maintaining PROFINET 9-5
Troubleshooting PROFINET 9-5
Additional References 9-6
Contents
ix
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Related Documents 9-6
Standards 9-6
MIBs 9-6
RFCs 9-6
Technical Assistance 9-6
CHAPTER
10 Configuring CIP 10-1
Finding Feature Information 10-1
Restrictions for Configuring CIP 10-1
Information About Configuring CIP 10-1
How to Configure CIP 10-1
Default Configuration 10-1
Enabling CIP 10-2
Monitoring CIP 10-2
Troubleshooting CIP 10-2
Additional References 10-3
Related Documents 10-3
Standards 10-3
MIBs 10-3
RFCs 10-3
Technical Assistance 10-3
CHAPTER
11 Configuring SDM Templates 11-1
Finding Feature Information 11-1
Prerequisites for Configuring SDM Templates 11-1
Restrictions for Configuring SDM Templates 11-1
Information About Configuring SDM Templates 11-1
SDM Templates 11-1
Dual IPv4 and IPv6 SDM Default Template 11-3
How to Configure the Switch SDM Templates 11-4
Setting the SDM Template 11-4
Monitoring and Maintaining SDM Templates 11-4
Configuration Examples for Configuring SDM Templates 11-5
Configuring the IPv4-and-IPv6 Default Template: Example 11-5
Additional References 11-6
Related Documents 11-6
Standards 11-6
MIBs 11-6
Contents
x
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
RFCs 11-6
Technical Assistance 11-6
CHAPTER
12 Configuring Switch-Based Authentication 12-1
Finding Feature Information 12-1
Prerequisites for Configuring Switch-Based Authentication 12-1
Restrictions for Configuring Switch-Based Authentication 12-1
Information About Configuring Switch-Based Authentication 12-2
Prevention for Unauthorized Switch Access 12-2
Password Protection 12-2
Switch Access with TACACS+ 12-5
Switch Access with RADIUS 12-8
Switch Access with Kerberos 12-17
Local Authentication and Authorization 12-20
Secure Shell 12-21
Switch for Secure Socket Layer HTTP 12-22
Secure Copy Protocol 12-24
How to Configure Switch-Based Authentication 12-26
Configuring Password Protection 12-26
Configuring TACACS+ 12-30
Configuring Radius Server Communication 12-33
Configuring the Switch for Local Authentication and Authorization 12-39
Configuring Secure Shell 12-40
Configuring Secure HTTP Servers and Clients 12-42
Monitoring and Maintaining Switch-Based Authentication 12-44
Configuration Examples for Configuring Switch-Based Authentication 12-45
Changing the Enable Password: Example 12-45
Configuring the Encrypted Password: Example 12-45
Setting the Telnet Password for a Terminal Line: Example 12-45
Setting the Privilege Level for a Command: Example 12-45
Configuring the RADIUS Server: Examples 12-45
Defining AAA Server Groups: Example 12-46
Configuring Vendor-Specific RADIUS Attributes: Examples 12-46
Configuring a Vendor-Proprietary RADIUS Host: Example 12-46
Sample Output for a Self-Signed Certificate: Example 12-46
Verifying Secure HTTP Connection: Example 12-47
Additional References 12-47
Related Documents 12-47
Standards 12-48
Contents
xi
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
MIBs 12-48
RFCs 12-48
Technical Assistance 12-48
CHAPTER
13 Configuring IEEE 802.1x Port-Based Authentication 13-1
Finding Feature Information 13-1
Restrictions for Configuring IEEE 802.1x Port-Based Authentication 13-1
Information About Configuring IEEE 802.1x Port-Based Authentication 13-1
IEEE 802.1x Port-Based Authentication 13-1
Device Roles 13-2
Authentication Process 13-3
Switch-to-RADIUS-Server Communication 13-4
Authentication Initiation and Message Exchange 13-4
Authentication Manager 13-6
Ports in Authorized and Unauthorized States 13-9
802.1x Host Mode 13-9
Multidomain Authentication 13-10
802.1x Multiple Authentication Mode 13-11
MAC Move 13-12
MAC Replace 13-12
802.1x Accounting 13-13
802.1x Accounting Attribute-Value Pairs 13-13
802.1x Readiness Check 13-14
802.1x Authentication with VLAN Assignment 13-15
Voice Aware 802.1x Security 13-16
802.1x Authentication with Per-User ACLs 13-17
802.1x Authentication with Downloadable ACLs and Redirect URLs 13-18
802.1x Authentication with Guest VLAN 13-20
802.1x Authentication with Restricted VLAN 13-21
802.1x Authentication with Inaccessible Authentication Bypass 13-22
802.1x Authentication with Voice VLAN Ports 13-23
802.1x Authentication with Port Security 13-24
802.1x Authentication with Wake-on-LAN 13-24
802.1x Authentication with MAC Authentication Bypass 13-25
802.1x User Distribution 13-26
Network Admission Control Layer 2 802.1x Validation 13-27
Flexible Authentication Ordering 13-27
Open1x Authentication 13-28
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) 13-28
Contents
xii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Using IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute 13-29
Authentication Manager Common Session ID 13-30
Default 802.1x Authentication Settings 13-30
802.1x Accounting 13-31
802.1x Authentication Guidelines 13-32
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
Guidelines 13-33
MAC Authentication Bypass Guidelines 13-33
Maximum Number of Allowed Devices Per Port Guidelines 13-34
How to Configure IEEE 802.1x Port-Based Authentication 13-34
802.1x Authentication Configuration Process 13-34
Configuring the Switch-to-RADIUS-Server Communication 13-36
Configuring 802.1x Readiness Check 13-36
Enabling Voice Aware 802.1x Security 13-37
Configuring 802.1x Violation Modes 13-37
Configuring the Host Mode 13-38
Configuring Periodic Reauthentication 13-39
Configuring Optional 802.1x Authentication Features 13-40
Configuring 802.1x Accounting 13-42
Configuring a Guest VLAN 13-42
Configuring a Restricted VLAN 13-43
Configuring the Maximum Number of Authentication Attempts 13-43
Configuring Inaccessible Authentication Bypass 13-44
Configuring 802.1x User Distribution 13-46
Configuring NAC Layer 2 802.1x Validation 13-46
Configuring an Authenticator and Supplicant 13-47
Configuring a Supplicant Switch with NEAT 13-47
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs 13-48
Configuring Open1x 13-50
Resetting the 802.1x Authentication Configuration to the Default Values 13-51
Monitoring and Maintaining IEEE 802.1x Port-Based Authentication 13-51
Configuration Examples for Configuring IEEE 802.1x Port-Based Authentication 13-51
Enabling a Readiness Check: Example 13-51
Enabling 802.1x Authentication: Example 13-52
Enabling MDA: Example 13-52
Disabling the VLAN Upon Switch Violoation: Example 13-52
Configuring the Radius Server Parameters: Example 13-52
Configuring 802.1x Accounting: Example 13-52
Enabling an 802.1x Guest VLAN: Example 13-53
Displaying Authentication Manager Common Session ID: Examples 13-53
Contents
xiii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Configuring Inaccessible Authentication Bypass: Example 13-53
Configuring VLAN Groups: Examples 13-54
Configuring NAC Layer 2 802.1x Validation: Example 13-54
Configuring an 802.1x Authenticator Switch: Example 13-54
Configuring an 802.1x Supplicant Switch: Example 13-55
Configuring a Downloadable Policy: Example 13-55
Configuring Open 1x on a Port: Example 13-55
Additional References 13-56
Related Documents 13-56
Standards 13-56
MIBs 13-56
RFCs 13-56
Technical Assistance 13-57
CHAPTER
14 Configuring Web-Based Authentication 14-1
Finding Feature Information 14-1
Prerequisites for Configuring Web-Based Authentication 14-1
Restrictions for Configuring Web-Based Authentication 14-1
Information About Configuring Web-Based Authentication 14-2
Web-Based Authentication 14-2
Device Roles 14-2
Host Detection 14-3
Session Creation 14-3
Authentication Process 14-4
Local Web Authentication Banner 14-4
Web Authentication Customizable Web Pages 14-6
Web-Based Authentication Interactions with Other Features 14-8
Default Web-Based Authentication Settings 14-10
Configuring Switch-to-RADIUS-Server Communication 14-10
How to Configure Web-Based Authentication 14-11
Configuring the Authentication Rule and Interfaces 14-11
Configuring AAA Authentication 14-11
Configuring Switch-to-RADIUS-Server Communication 14-12
Configuring the HTTP Server 14-12
Configuring the Web-Based Authentication Parameters 14-13
Configuring a Web Authentication Local Banner 14-14
Removing Web-Based Authentication Cache Entries 14-14
Monitoring and Maintaining Web-Based Authentication 14-14
Configuration Examples for Configuring Web-Based Authentication 14-14
Contents
xiv
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Enabling and Displaying Web-Based Authentication: Examples 14-14
Enabling AAA: Example 14-15
Configuring the RADIUS Server Parameters: Example 14-15
Configuring a Custom Authentication Proxy Web Page: Example 14-15
Verifying a Custom Authentication Proxy Web Page: Example 14-15
Configuring a Redirection URL: Example 14-16
Verifying a Redirection URL: Example 14-16
Configuring a Local Banner: Example 14-16
Clearing the Web-Based Authentication Session: Example 14-16
Additional References 14-17
Related Documents 14-17
Standards 14-17
MIBs 14-17
RFCs 14-18
Technical Assistance 14-18
CHAPTER
15 Configuring Interface Characteristics 15-1
Finding Feature Information 15-1
Restrictions for Configuring Interface Characteristics 15-1
Information About Configuring Interface Characteristics 15-1
Interface Types 15-1
Using Interface Configuration Mode 15-6
Default Ethernet Interface Settings 15-8
Interface Speed and Duplex Mode 15-9
IEEE 802.3x Flow Control 15-9
Auto-MDIX on an Interface 15-10
SVI Autostate Exclude 15-10
System MTU 15-10
How to Configure Interface Characteristics 15-11
Configuring Layer 3 Interfaces 15-11
Configuring Interfaces 15-13
Configuring a Range of Interfaces 15-13
Configuring and Using Interface Range Macros 15-14
Configuring Ethernet Interfaces 15-15
Setting the Type of a Dual-Purpose Uplink Port 15-15
Setting the Interface Speed and Duplex Parameters 15-16
Configuring IEEE 802.3x Flow Control 15-16
Configuring Auto-MDIX on an Interface 15-17
Adding a Description for an Interface 15-17
Contents
xv
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Configuring SVI Autostate Exclude 15-17
Configuring the System MTU 15-18
Monitoring and Maintaining Interface Characteristics 15-18
Monitoring Interface Status 15-18
Clearing and Resetting Interfaces and Counters 15-19
Shutting Down and Restarting the Interface 15-19
Configuration Examples for Configuring Interface Characteristics 15-20
Configuring the Interface Range: Examples 15-20
Configuring Interface Range Macros: Examples 15-20
Setting Speed and Duplex Parameters: Example 15-21
Enabling auto-MDIX: Example 15-21
Adding a Description on a Port: Example 15-21
Configuring SVI Autostate Exclude: Example 15-22
Additional References 15-22
Related Documents 15-22
Standards 15-22
MIBs 15-22
RFCs 15-23
CHAPTER
16 Configuring Smartports Macros 16-1
Finding Feature Information 16-1
Information About Configuring Smartports Macros 16-1
How to Configure Smartports Macros 16-1
Default Smartports Settings 16-1
Smartports Configuration Guidelines 16-2
Applying Smartports Macros 16-3
Monitoring and Maintaining Smartports Macros 16-4
Configuration Examples for Smartports Macros 16-4
Applying the Smartports Macro: Examples 16-4
Additional References 16-5
Related Documents 16-5
Standards 16-5
MIBs 16-5
RFCs 16-6
Technical Assistance 16-6
CHAPTER
17 Configuring VLANs 17-1
Finding Feature Information 17-1
Contents
xvi
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Information About Configuring VLANs 17-1
VLANs 17-1
Supported VLANs 17-2
VLAN Port Membership Modes 17-3
Normal-Range VLANs 17-4
Extended-Range VLANs 17-8
VLAN Trunks 17-9
VMPS 17-14
How to Configure VLANs 17-17
Creating or Modifying an Ethernet VLAN 17-17
Deleting a VLAN 17-17
Assigning Static-Access Ports to a VLAN 17-17
Creating an Extended-Range VLAN 17-18
Creating an Extended-Range VLAN with an Internal VLAN ID 17-18
Configuring an Ethernet Interface as a Trunk Port 17-19
Configuring the VMPS Client 17-22
Monitoring and Maintaining VLANs 17-23
Configuration Examples for Configuring VLANs 17-24
VMPS Network: Example 17-24
Configuring a VLAN: Example 17-25
Configuring an Access Port in a VLAN: Example 17-25
Configuring an Extended-Range VLAN: Example 17-25
Configuring a Trunk Port: Example 17-25
Removing a VLAN: Example 17-25
Show VMPS Output: Example 17-25
Additional References 17-26
Related Documents 17-26
Standards 17-26
MIBs 17-26
RFCs 17-26
CHAPTER
18 Configuring VTP 18-1
Finding VTP Feature Information 18-1
Prerequisites for Configuring VTP 18-1
Restrictions for Configuring VTP 18-1
Information About Configuring VTP 18-2
VTP 18-2
VTP Modes 18-3
VTP Pruning 18-7
Contents
xvii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Default VTP Settings 18-9
VTP Configuration Guidelines 18-9
Domain Names 18-10
Passwords 18-10
Adding a VTP Client Switch to a VTP Domain 18-10
How to Configure VTP 18-11
Configuring VTP Domain and Parameters 18-11
Configuring a VTP Version 3 Password 18-12
Enabling the VTP Version 18-12
Enabling VTP Pruning 18-13
Configuring VTP on a Per-Port Basis 18-13
Adding a VTP Client Switch to a VTP Domain 18-13
Monitoring and Maintaining VTP 18-14
Configuration Examples for Configuring VTP 18-14
Configuring a VTP Server: Example 18-14
Configuring a Hidden VTP Password: Example 18-15
Configuring a VTP Version 3 Primary Server: Example 18-15
Additional References for Configuring VTP 18-15
Related Documents 18-15
Standards 18-15
MIBs 18-16
RFCs 18-16
CHAPTER
19 Configuring Voice VLAN 19-1
Finding Feature Information 19-1
Information About Configuring Voice VLAN 19-1
Voice VLAN 19-1
Cisco IP Phone Voice Traffic 19-2
Cisco IP Phone Data Traffic 19-3
Default Voice VLAN Configuration 19-3
Voice VLAN Configuration Guidelines 19-3
Port Connection to a Cisco 7960 IP Phone 19-4
Priority of Incoming Data Frames 19-4
How to Configure VTP 19-5
Monitoring and Maintaining Voice VLAN 19-6
Configuration Examples for Configuring Voice VLAN 19-6
Configuring a Cisco IP Phone for Voice Traffic: Example 19-6
Configuring the Cisco IP Phone Priority of Incoming Data Frames: Example 19-6
Contents
xviii
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Additional References for Configuring Voice VLAN 19-6
Related Documents 19-6
Standards 19-7
MIBs 19-7
RFCs 19-7
CHAPTER
20 Configuring STP 20-1
Finding Feature Information 20-1
Prerequisites for Configuring STP 20-1
Restrictions for Configuring STP 20-1
Information About Configuring STP 20-1
STP 20-2
Spanning-Tree Topology and BPDUs 20-2
Bridge ID, Switch Priority, and Extended System ID 20-3
Spanning-Tree Interface States 20-4
How a Switch or Port Becomes the Root Switch or Root Port 20-7
Spanning Tree and Redundant Connectivity 20-7
Spanning-Tree Address Management 20-8
Accelerated Aging to Retain Connectivity 20-8
Spanning-Tree Modes and Protocols 20-9
Supported Spanning-Tree Instances 20-9
Spanning-Tree Interoperability and Backward Compatibility 20-10
STP and IEEE 802.1Q Trunks 20-10
VLAN-Bridge Spanning Tree 20-10
Default Spanning-Tree Settings 20-11
Disabling Spanning Tree 20-11
Root Switch 20-11
Secondary Root Switch 20-12
Port Priority 20-12
Path Cost 20-13
Spanning-Tree Timers 20-13
Spanning-Tree Configuration Guidelines 20-13
How to Configure STP 20-14
Changing the Spanning-Tree Mode 20-14
Configuring the Root Switch 20-15
Configuring a Secondary Root Switch 20-16
Configuring Port Priority 20-16
Configuring Path Cost 20-16
Configuring Optional STP Parameters 20-17
Contents
xix
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
Monitoring and Maintaining STP 20-17
Additional References 20-18
Related Documents 20-18
Standards 20-18
MIBs 20-18
RFCs 20-18
CHAPTER
21 Configuring MSTP 21-1
Finding Feature Information 21-1
Information About Configuring MSTP 21-1
MSTP 21-2
Multiple Spanning-Tree Regions 21-2
IST, CIST, and CST 21-2
Hop Count 21-5
Boundary Ports 21-5
IEEE 802.1s Implementation 21-6
Interoperability with IEEE 802.1D STP 21-8
RSTP 21-8
Default MSTP Settings 21-13
MSTP Configuration Guidelines 21-13
Root Switch 21-14
Secondary Root Switch 21-15
Port Priority 21-15
Path Cost 21-15
Link Type to Ensure Rapid Transitions 21-15
Neighbor Type 21-15
Restarting the Protocol Migration Process 21-16
How to Configure MSTP 21-16
Specifying the MST Region Configuration and Enabling MSTP 21-16
Configuring the Root Switch 21-17
Configuring the Optional MSTP Parameters 21-18
Monitoring and Maintaining MSTP 21-20
Configuration Examples for Configuring MSTP 21-20
Configuring the MST Region: Example 21-20
Additional References 21-21
Related Documents 21-21
Standards 21-21
MIBs 21-21
RFCs 21-21
Contents
xx
Cisco IE 2000 Switch Software Configuration Guide
78-21162-01
CHAPTER
22 Configuring Optional Spanning-Tree Features 22-1
Finding Feature Information 22-1
Prerequisites for the Optional Spanning-Tree Features 22-1
Restrictions for the Optional Spanning-Tree Features 22-1
Information About Configuring the Optional Spanning-Tree Features 22-1
PortFast 22-1
BPDU Guard 22-2
BPDU Filtering 22-3
UplinkFast 22-3
BackboneFast 22-5
EtherChannel Guard 22-7
Root Guard 22-7
Loop Guard 22-8
Default Optional Spanning-Tree Settings 22-9
How to Configure the Optional Spanning-Tree Features 22-9
Enabling Optional SPT Features 22-9
Maintaining and Monitoring Optional Spanning-Tree Features 22-10
Additional References 22-11
Related Documents 22-11
Standards 22-11
MIBs 22-11
RFCs 22-12
CHAPTER
23 Configuring Resilient Ethernet Protocol 23-1
Finding Feature Information 23-1
Prerequisites for REP 23-1
Restrictions for REP 23-1
Information About Configuring REP 23-1
REP 23-1
Link Integrity 23-4
Fast Convergence 23-4
VLAN Load Balancing 23-4
Spanning Tree Interaction 23-6
REP Ports 23-6
REP Segments 23-7
Default REP Configuration 23-7
REP Configuration Guidelines 23-7
REP Administrative VLAN 23-8
/