xxviii
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-03
Preface
Organization
Organization
This guide is organized into these chapters:
Chapter 1, “Overview,”
lists the software features of this release and provides examples of how the
switch can be deployed in a network.
Chapter 2, “Using the Command-Line Interface,”
describes how to access the command modes, use the
command-line interface (CLI), and describes CLI messages that you might receive. It also describes how
to get help, abbreviate commands, use no and default forms of commands, use command history and
editing features, and how to search and filter the output of show and more commands.
Chapter 3, “Getting Started with CMS,”
describes the Cluster Management Suite (CMS) web-based,
switch management interface. For information on configuring your web browser and accessing CMS,
refer to the release notes. For field-level descriptions of all CMS windows and procedures for using the
CMS windows, refer to the online help.
Chapter 4, “Assigning the Switch IP Address and Default Gateway,”
describes how to create the initial
switch configuration (for example, assign the switch IP address and default gateway information) by
using a variety of automatic and manual methods. It also describes how to modify the switch startup
configuration.
Chapter 5, “Clustering Switches,”
describes switch clusters and the considerations for creating and
maintaining them. The online help provides the CMS procedures for configuring switch clusters.
Configuring switch clusters is most easily performed through CMS; therefore, CLI procedures are not
provided. Cluster commands are described in the Catalyst 3550 Multilayer Switch Command Reference.
Chapter 6, “Administering the Switch,”
describes how to perform one-time operations to administer
your switch. It describes how to prevent unauthorized access to your switch through the use of
passwords, privilege levels, the Terminal Access Controller Access Control System Plus (),
and the Remote Authentication Dial-In User Service (RADIUS). It also describes how to set the system
date and time, system name and prompt, create a login banner, how to manage the MAC address table,
and how to optimize system resources for user-selected features.
Chapter 7, “Configuring 802.1X Port-Based Authentication,”
describes how to configure 802.1X
port-based authentication to prevent unauthorized devices (clients) from gaining access to the network.
As LANs extend to hotels, airports, and corporate lobbies, insecure environments could be created.
Chapter 8, “Configuring Interface Characteristics,”
defines the types of Layer 2 and Layer 3 interfaces
on the switch. It describes the interface command and provides procedures for configuring physical
interfaces.
Chapter 9, “Creating and Maintaining VLANs,”
describes how to create and maintain VLANs. It
includes information about VLAN modes, the VLAN Trunking Protocol (VTP) database, and the VLAN
Membership Policy Server (VMPS).
Chapter 10, “Configuring STP,”
describes how to configure basic and advanced spanning-tree features.
Chapter 11, “Configuring IGMP Snooping and MVR,”
describes how to configure Layer 2 Internet
Group Management Protocol (IGMP) snooping. It also describes Multicast VLAN Registration (MVR),
a local IGMP snooping feature available on the switch, and how to use IGMP filtering to control
multicast group membership.
Chapter 12, “Configuring Port-Based Traffic Control,”
describes how to reduce traffic storms by setting
broadcast, multicast, and unicast storm-control threshold levels; how to protect ports from receiving
traffic from other ports on a switch; how to block unknown broadcast and unicast traffic; and how to
configure port security using secure MAC addresses.
Chapter 13, “Configuring CDP,”
describes how to configure Cisco Discovery Protocol (CDP) on your
switch.