background image

793

   

Configuring Embedded Event Manager

Prerequisites

an interface link status changes.

an interface line status changes.

Identity—Generates an event when AAA authorization and authentication is successful, when failure occurs, or after 
normal user traffic on the port is allowed to flow.

Mac-Address-Table—Generates an event when a MAC address is learned in the MAC address table.

Note: 

The Mac-Address-Table event detector is supported only on switch platforms and can be used only on Layer 

2 interfaces where MAC addresses are learned. Layer 3 interfaces do not learn addresses, and routers do not usually 
support the MAC address-table infrastructure needed to notify EEM of a learned MAC address.

EEM 3.2 also introduces CLI commands to support the applets to work with the new event detectors.

Prerequisites

Review the 

Information About Embedded Event Manager, page 789

.

If the 

action snmp-trap

 command is used, the 

snmp-server enable traps event-manager

 command must be 

enabled to permit SNMP traps to be sent from the Cisco IOS device to the SNMP server. Other relevant 

snmp-server 

commands must also be configured; for details see the 

action snmp-trap 

command page.

Guidelines and Limitations

The EEM feature is supported with both Lanbase and IP Services license starting with the 15.2(4)EC release for the IE 
4010 and with the15.2(5)E release for IE 4000 and IE 5000. Prior to the 15.2(5)E release, IP Services license was required 
on the IE 4000 and IE 5000 platforms.

For complete information about configuring embedded event manager, see

 Embedded Event Manager Configuration 

Guide, Cisco IOS Release 15M&T

.

Default Settings

No EEM policies are registered.

Configuring Embedded Event Manager 

Registering and Defining an Embedded Event Manager Applet, page 793

Registering and Defining an Embedded Event Manager TCL Script, page 794

Registering and Defining an Embedded Event Manager Applet 

BEFORE YOU BEGIN

Review the 

Information About Embedded Event Manager, page 789

.

DETAILED STEPS

Note: 

Only one event applet command is allowed in an EEM applet. Multiple action applet commands are permitted. If 

you do not specify the

 no event

 and 

no action

 commands, the applet is removed when you exit configuration mode. 

Содержание IE 4000

Страница 1: ...tems Inc www cisco com Cisco Industrial Ethernet 4000 4010 and 5000 Switch Software Configuration Guide All Cisco IOS Releases up to 15 2 5 E and 15 2 4 EC First Published September 2016 Last Updated March 2018 ...

Страница 2: ...ENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT SPECIAL CONSEQUENTIAL OR INCIDENTAL DAMAGES INCLUDING WITHOUT LIMITATION LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES Any Internet Protocol IP addresses and phone numbers used in this document are not intend...

Страница 3: ...al user interfaces GUIs for the embedded Device Manager However the concepts in this guide are applicable to the GUI user For information about Device Manager see the switch online help For documentation updates see the release notes for this release Conventions This publication uses these conventions to convey instructions and information Command descriptions use these conventions Commands and ke...

Страница 4: ...the Switch with the CLI Based Setup Program appendix in the hardware installation guide For Device Manager requirements see the System Requirements section in the release notes not orderable but available on Cisco com For upgrading information see the Downloading Software section in the release notes See these documents for other information about the switch Release Notes Software Configuration Gu...

Страница 5: ...switches datasheet listing html http www cisco com c en us products switches industrial ethernet 4000 series switches datasheet listing html Feature Software Licensing Software Licensing is now simplified with the introduction of right to use RTU licensing This allows you to order and activate a specific license type and level via command line Uploading an extra license file is no longer necessary...

Страница 6: ...e In Use License Priority High License Count Non Counted Index 3 Feature mrp manager Period left 8 weeks 4 days License Type Evaluation License State Active Not in Use EULA not accepted License Priority None License Count 1 0 0 Active In use Violation Index 4 Feature mrp client Period left 8 weeks 4 days License Type Evaluation License State Active Not in Use EULA not accepted License Priority Non...

Страница 7: ... Protocol SNMP information through a browser based program User defined and Cisco default Smartports macros for creating custom switch configurations for simplified deployment across the network A removable SD flash card that stores the Cisco IOS software image and configuration files for the switch You can replace and upgrade the switch without reconfiguring the software features An embedded Devi...

Страница 8: ...raffic convergence time after a FlexLink failure RADIUS server load balancing to allow access and authentication requests to be distributed evenly across a server group Support for QoS marking of CPU generated traffic and queue CPU generated traffic on the egress network ports Management Options An embedded Device Manager Device Manager is a GUI application that is integrated in the software image...

Страница 9: ...he embedded Profinet GSD file allows user to bring up Cisco IE switch using Siemens STEP7 or TIA Portal software then monitor the functionality via command line or Web based Device Manger Default Settings After Initial Switch Configuration The switch is designed for plug and play operation requiring only that you assign basic IP information to the switch and connect it to the other devices in your...

Страница 10: ...sabled FlexLinks are not configured DHCP snooping is disabled IP source guard is disabled DHCP server port based address allocation is disabled Dynamic ARP inspection is disabled on all VLANs IGMP snooping is enabled No IGMP filters are applied IGMP throttling setting is deny The IGMP snooping querier feature is disabled MVR is disabled Port based traffic Broadcast multicast and unicast storm cont...

Страница 11: ...ault Settings After Initial Switch Configuration Syslog messages are enabled and appear on the console SNMP is enabled Version 1 No ACLs are configured QoS is enabled No EtherChannels are configured IP unicast routing is disabled ...

Страница 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...

Страница 13: ...d or enter global configuration mode Using the configuration modes global interface and line you can make changes to the running configuration If you save the configuration these commands are stored and used when the switch reboots To access the various configuration modes you must start at global configuration mode From global configuration mode you can enter interface configuration mode and line...

Страница 14: ...arameters for VLANs 1 to 1005 in the VLAN database Interface configuration While in global configuration mode enter the interface command with a specific interface Switch config if To exit to global configuration mode enter exit To return to privileged EXEC mode press Ctrl Z or enter end Use this mode to configure parameters for the Ethernet ports Line configuration While in global configuration m...

Страница 15: ...t Configuration commands can also have a default form The default form of a command returns the command setting to its default Most commands are disabled by default so the default form is the same as the no form However some commands are enabled by default and have variables set to certain default values In these cases the default command enables the command and sets variables to their default val...

Страница 16: ...he Command History Feature page 13 optional Changing the Command History Buffer Size By default the switch records ten command lines in its history buffer You can alter this number for a current terminal session or for all sessions on a particular line These procedures are optional Beginning in privileged EXEC mode enter this command to change the number of command lines that the switch records du...

Страница 17: ... Enabling and Disabling Editing Features page 13 optional Editing Commands Through Keystrokes page 14 optional Editing Command Lines That Wrap page 15 optional Enabling and Disabling Editing Features Although enhanced editing mode is automatically enabled you can disable it reenable it or configure a specific line to have enhanced editing These procedures are optional To globally disable enhanced ...

Страница 18: ...or forward one word Press Ctrl T Transpose the character to the left of the cursor with the character located at the cursor Recall commands from the buffer and paste them in the command line The switch provides a buffer with the last ten items that you deleted Press Ctrl Y Recall the most recent entry in the buffer Press Esc Y Recall the next buffer entry The buffer contains only the last 10 items...

Страница 19: ...1 108 1 20 255 255 255 0 eq 45 After you complete the entry press Ctrl A to check the complete syntax before pressing the Return key to execute the command The dollar sign appears at the end of the line to show that the line has been scrolled to the right Switch config access list 101 permit tcp 131 108 2 5 255 255 255 0 131 108 1 The software assumes you have a terminal screen that is 80 columns ...

Страница 20: ...To understand the boot process and the options available for assigning IP information see Performing Switch Setup Configuration page 59 If your switch is already configured you can access the CLI through a local console connection or through a remote Telnet session but your switch must first be configured for this type of access For more information see Setting the Telnet Password for a Terminal L...

Страница 21: ...s for physical interface characteristics UNI NNI and ENI Port Types page 17 Port Based VLANs page 18 Switch Ports page 19 Routed Ports page 20 Switch Ports page 19 Switch Virtual Interfaces page 20 EtherChannel Port Groups page 20 Power over Ethernet Ports page 21 Connecting Interfaces page 25 UNI NNI and ENI Port Types The switch supports user network interfaces UNIs network node interfaces NNIs ...

Страница 22: ...r 3 device to route traffic between the VLANs VLAN partitions provide hard firewalls for traffic in the VLAN and each VLAN has its own MAC address table A VLAN comes into existence when a local port is associated with the VLAN ID or when a user creates te VLAN ID To isolate VLANs of different customers in a service provider network the switch uses UNI ENI VLANs UNI ENI VLANs isolate user network i...

Страница 23: ...n forwarding packets as soon as they are enabled Dynamic access ports on the switch are assigned to a VLAN by a VLAN Membership Policy Server VMPS Dynamic access ports for VMPS are only supported on UNIs and ENIs Trunk Ports An 802 1Q trunk port carries the traffic of multiple VLANs and by default is a member of all VLANs in the VLAN database A trunk port supports simultaneous tagged and untagged ...

Страница 24: ...N of switch ports as one interface to the routing or bridging function in the system Only one SVI can be associated with a VLAN but you need to configure an SVI for a VLAN only when you wish to route between VLANs or to provide IP host connectivity to the switch By default an SVI is created for the default VLAN VLAN 1 to permit remote switch administration Additional SVIs must be explicitly config...

Страница 25: ...device power requirements and then grants or denies power to the device The switch can also sense the real time power consumption of the device by monitoring and policing the power usage This section has this PoE information Supported Protocols and Standards page 21 Powered Device Detection and Initial Power Allocation page 22 Power Management Modes page 22 Supported Protocols and Standards The sw...

Страница 26: ...powered devices and the switch adjusts the power budget accordingly This does not apply to third party PoE devices The switch processes a request and either grants or denies power If the request is granted the switch updates the power budget If the request is denied the switch ensures that power to the port is turned off generates a syslog message and updates the LEDs Powered devices can also nego...

Страница 27: ... to be powered when it is connected to the static port The port no longer participates in the first come first served model However if the powered device IEEE class is greater than the maximum wattage the switch does not supply power to it If the switch learns through CDP messages that the powered device needs more than the maximum wattage the powered device is shutdown If you do not specify a wat...

Страница 28: ...value by entering the power inline consumption default wattage or the power inline auto static max max wattage command If you are not manually configuring the cutoff power value the switch automatically determines the value by using CDP power negotiation or the device IEEE classification which is the third method in the previous list If the switch cannot determine the value by using one of these m...

Страница 29: ...t still has power available the switch then grants power to the PoE ports in auto mode in ascending order of the port numbers Dual Purpose Ports on IE 4000 Each dual purpose port is considered a single interface with dual front ends an RJ 45 connector and an SFP module connector The dual front ends are not redundant interfaces the switch activates only one connector of the pair By default dual pur...

Страница 30: ...input from the RJ 45 console is immediately disabled and input from the USB console is enabled Removing the USB connection immediately reenables input from the RJ 45 console connection A LED on the switch shows which console connection is in use Console Port Change Logs At software startup a log shows whether the USB or the RJ 45 console port is active The switch first displays the RJ 45 media typ...

Страница 31: ...stem configuration media type remains RJ45 This example reverses the previous configuration and immediately activates the USB console that is connected Switch configure terminal Switch config line console 0 Switch config line no media type rj45 Using Interface Configuration Mode The switch supports these interface types Physical ports switch ports routed ports UNIs NNIs and ENIs VLANs switch virtu...

Страница 32: ... space between the interface type and interface number For example in the preceding line you can specify either fastethernet 0 1 fastethernet0 1 fa 0 1 or fa0 1 3 If you are configuring a UNI or ENI enter the no shutdown interface configuration command to enable the interface Switch config if no shutdown 4 Follow each interface command with the interface configuration commands that the interface r...

Страница 33: ...ch configure terminal Switch config interface range fastethernet0 1 2 Switch config if range no shutdown Switch config if range speed 100 This example shows how to use a comma to add different interface type strings to the range to enable Fast Ethernet ports 1 to 3 and Gigabit Ethernet ports 1 and 2 to receive 802 3x flow control pause frames Switch configure terminal Switch config interface range...

Страница 34: ...e first port last port where the module is always 1 tengigabitethernet module first port last port where the module is always 1 port channel port channel number port channel number where the port channel number is 1 to 10 When you use the interface ranges with port channels the first and last port channel number must be active port channels You must add a space between the first interface number a...

Страница 35: ...f the interfaces in the range to a VLAN Switch configure terminal Switch config define interface range macro1 fastethernet0 1 2 GigabitEthernet1 17 2 Switch config interface range macro macro1 Switch config if range switchport access vlan 20 Switch config if range no shut Switch config if range end This example shows how to enter interface range configuration mode for the interface range macro ene...

Страница 36: ...ng Operating mode Layer 2 or switching mode switchport command Allowed VLAN range VLANs 1 4094 Default VLAN for access ports VLAN 1 Layer 2 interfaces only Native VLAN for 802 1Q trunks VLAN 1 Layer 2 interfaces only VLAN trunking Switchport mode access Layer 2 interfaces only Port enable state Enabled Port description None defined Speed Autonegotiate Duplex mode Full 802 3x flow control Flow cont...

Страница 37: ...he default setting by entering the no keepalive interface configuration command If you enter the keepalive command with no arguments keepalive packets are sent with the default time interval 10 seconds and number of retries 5 Entering the no keepalive command disables keepalive packets on the interface Beginning in privileged EXEC mode follow these steps to configure the port type on an interface ...

Страница 38: ...ex Parameters page 35 Speed and Duplex Configuration Guidelines When configuring an interface speed and duplex mode note these guidelines You can configure interface speed on Fast Ethernet 10 100 Mbps and Gigabit Ethernet 10 100 1000 Mbps ports You can configure Fast Ethernet ports to full duplex half duplex or to autonegotiate mode You can configure Gigabit Ethernet ports to full duplex mode or t...

Страница 39: ...de configuration might shut down and re enable the interface during the reconfiguration Setting the Interface Speed and Duplex Parameters Beginning in privileged EXEC mode follow these steps to set the speed and duplex mode for a physical interface Command Purpose 1 configure terminal Enter global configuration mode 2 interface interface id Specify the physical interface to be configured and enter...

Страница 40: ...port might not be powered up again For example port 1 is in the auto and on state and you configure it for static mode The switch removes power from port 1 detects the powered device and repowers the port If port 1 is in the auto and on state and you configure it with a maximum wattage of 10 W the switch removes power from the port and then redetects the powered device The switch repowers the port...

Страница 41: ...nd make certain not to oversubscribe the power supply Note When you manually configure the power budget you must also consider the power loss over the cable between the switch and the powered device Command Purpose 1 configure terminal Enter global configuration mode 2 interface interface id Specify the physical port to be configured and enter interface configuration mode 3 power inline auto max m...

Страница 42: ...mand Beginning in privileged EXEC mode follow these steps to configure amount of power budgeted to a powered device connected to a specific PoE port To return to the default setting use the no power inline consumption interface configuration command Command Purpose 1 configure terminal Enter global configuration mode 2 no cdp run Optional Disable CDP 3 power inline consumption default wattage Conf...

Страница 43: ...l settings on the device receive on or desired The port cannot send pause frames but can operate with an attached device that is required to or can send pause frames the port can receive pause frames receive off 802 3x flow control does not operate in either direction In case of congestion no indication is given to the link partner and no pause frames are sent or received by either device Beginnin...

Страница 44: ...uplex on the interface to auto so that the feature operates correctly Auto MDIX is supported on all 10 100 and 10 100 1000 Mbps interfaces and on Cisco 10 100 1000 BASE T TX SFP module interfaces It is not supported on 1000 BASE SX or LX SFP module interfaces Table 4 shows the link states that result from auto MDIX settings and correct and incorrect cabling Beginning in privileged EXEC mode follow...

Страница 45: ...ption Switch config terminal Enter configuration commands one per line End with CNTL Z Switch config interface GigabitEthernet1 18 Switch config if description Connects to Marketing Switch config if end Switch show interfaces GigabitEthernet1 18 description Interface Status Protocol Description Gi 0 2 admin down down Connects to Marketing 7 end Return to privileged EXEC mode 8 show controllers eth...

Страница 46: ...ror message is generated and the extended range VLAN is rejected If the switch attempts to boot up with a configuration that has more VLANs and routed ports than hardware can support the VLANs are created but the routed ports are shut down and the switch sends a message that this was due to insufficient hardware resources All Layer 3 interfaces require an IP address to route traffic This procedure...

Страница 47: ... you do not configure the system mtu jumbo command the setting of the system mtu command applies to all Gigabit Ethernet interfaces You cannot set the MTU size for an individual interface you set it for all 10 100 or all Gigabit Ethernet interfaces on the switch When you change the system MTU size you must reset the switch before the new configuration takes effect The system mtu routing command do...

Страница 48: ...ped Beginning in privileged EXEC mode follow these steps to change the MTU size for all 10 100 or Gigabit Ethernet interfaces If you enter a value that is outside the allowed range for the specific type of interface the value is not accepted Once the switch reloads you can verify your settings by entering the show system mtu privileged EXEC command This example shows how to set the maximum packet ...

Страница 49: ...commands by using the show command at the privileged EXEC prompt Table 8 Show Commands for Interfaces Command Purpose show interfaces interface id Display the status and configuration of all interfaces or a specific interface show interfaces interface id status err disabled Display interface status or a list of interfaces in an error disabled state show interfaces interface id switchport Display a...

Страница 50: ... enabled globally and not configurable on the switch however it applies only to the fiber Fast Ethernet SFP interfaces on the switch show interfaces interface id transceiver detail dom supported list module number properties threshold table Display these physical and operational status about an SFP module interface id Optional Display configuration and status for a specified physical interface det...

Страница 51: ...ng the Interface Shutting down an interface disables all functions on the specified interface and marks the interface as unavailable on all monitoring command displays This information is communicated to other network servers through all dynamic routing protocols The interface is not mentioned in any routing updates Beginning in privileged EXEC mode follow these steps to shut down an interface Use...

Страница 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...

Страница 53: ...the alarm set threshold expressed as a percentage value For example if the FCS bit error rate alarm value is configured to 10 8 that value is the alarm set threshold To set the alarm clear threshold at 5 10 10 the hysteresis value h is determined as follows Table 10 Global Status Monitoring Alarms Alarm Description Power supply alarm The switch monitors dual power supply levels If there are two po...

Страница 54: ... by alarms for global port status and SD flash card conditions You can configure the relay to send a fault signal to an external alarm device such as a bell light or other signaling device You can associate any alarm condition with the alarm relay Each fault condition is assigned a severity level based on the Cisco IOS System Error Message Severity Level See Configuring the Power Supply Alarms pag...

Страница 55: ...o alarm In dual power supply mode the default alarm notification is a system message to the console Primary temperature alarm Enabled for switch temperature range of 203o F 95o C maximum to 4 F 20o C minimum The primary switch temperature alarm is associated with the major relay Secondary temperature alarm Disabled Output relay mode alarm Normally deenergized The alarm output has switched off or i...

Страница 56: ...s global configuration mode 2 alarm facility temperature primary secondary high threshold Sets the high temperature threshold value Set the threshold from 238 F 150 C to 572 F 300 C 3 alarm facility temperature primary low threshold Sets the low temperature threshold value Set the threshold from 328 F 200 C to 482 F 250 C 4 end Returns to privileged EXEC mode 5 show alarm settings Verifies the con...

Страница 57: ...e is 6 to 11 to set a maximum bit error rate of 10 6 to 10 11 By default the FCS bit error rate is 10 8 4 end Returns to privileged EXEC mode 5 show fcs threshold Verifies the setting 6 copy running config startup config Optional Saves your entries in the configuration file Command Purpose 1 configure terminal Enters global configuration mode 2 alarm facility fcs hysteresis percentage Sets the hys...

Страница 58: ...Configures the alarm to send an alarm trap to a syslog server Command Purpose 1 configure terminal Enters global configuration mode 2 interface port interface Enters interface configuration mode 3 alarm profile name Attaches the specified profile to the interface 4 end Returns to privileged EXEC mode 5 show alarm profile Verifies the configuration 6 copy running config startup config Optional Save...

Страница 59: ...alue of 113o F 45o C All alarms and traps associated with this alarm are sent to a syslog server and an SNMP server Switch config alarm facility temperature secondary high 45 Switch config alarm facility temperature secondary relay major Switch config alarm facility temperature secondary syslog Switch config alarm facility temperature secondary notifies This example sets the first primary temperat...

Страница 60: ...LACK Displaying Alarm Settings Example Switch show alarm settings Alarm relay mode De energized Power Supply Alarm Enabled Relay Notifies Disabled Syslog Enabled Temperature Primary Alarm Enabled Thresholds MAX 95C MIN 20C Relay MAJ Notifies Enabled Syslog Enabled Temperature Secondary Alarm Disabled Threshold Relay Notifies Disabled Syslog Disabled License File Corrupt Alarm Enabled Relay Notifie...

Страница 61: ...Card Alarm Disabled Relay Notifies Disabled Syslog Enabled Input Alarm 1 Alarm Enabled Relay Notifies Disabled Syslog Enabled Input Alarm 2 Alarm Enabled Relay Notifies Disabled Syslog Enabled Additional References The following sections provide references related to switch administration ...

Страница 62: ...sco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of page...

Страница 63: ...llation Guide Hardware Technical Guide for installing and powering on the switch and for setting up the initial switch configuration IP address subnet mask default gateway secret and Telnet passwords and so forth The normal boot process involves the operation of the boot loader software which performs these activities Performs low level CPU initialization Initializes the CPU registers which contro...

Страница 64: ...bits default is 1 Parity settings default is none Default Switch Boot Settings Switch Boot Optimization The normal switch boot process involves a memory test file system check FSCK and power on self test POST The boot fast command in global configuration mode is enabled by default to permit switch boot optimization which disables these tests and minimizes the bootup time However after a system cra...

Страница 65: ...is reenabled after the system comes up successfully Switch Information Assignment You can assign IP information through the switch setup program through a DHCP server or manually Use the switch setup program if you want to be prompted for specific IP information With this program you can also configure a hostname and an enable secret password The program gives you the option of assigning a Telnet ...

Страница 66: ...on the same LAN or on a different LAN than the switch If the DHCP server is running on a different LAN you should configure a DHCP relay device between your switch and the DHCP server A relay device forwards broadcast traffic between two directly connected LANs A router does not forward broadcast packets but it forwards packets based on the destination IP address in the received packet DHCP based ...

Страница 67: ...ple DHCP or BOOTP servers and can accept any of the offers however the client usually accepts the first offer it receives The offer from the DHCP server is not a guarantee that the IP address is allocated to the switch However the server usually reserves the address until the client has had a chance to formally request the address If the switch accepts replies from a BOOTP server and configures it...

Страница 68: ...er Configuration Guidelines page 64 and the Configuring DHCP section of the IP addressing and Services section of the Cisco IOS IP DHCP Configuration Guide Release 15 0 After you install the switch in your network the auto image update feature starts The downloaded configuration file is saved in the running configuration of the switch and the new image is downloaded and installed on the switch Whe...

Страница 69: ...rver must contain one or more configuration files in its base directory The files can include these files The configuration file named in the DHCP reply the actual switch configuration file The network confg or the cisconet cfg file known as the default configuration files The router confg or the ciscortr cfg file These files contain commands common to all switches Normally if the DHCP and TFTP se...

Страница 70: ...nfiguration filename from the DHCP server The switch sends a unicast message to the TFTP server to retrieve the named configuration file from the base directory of the server and upon receipt it completes its boot up process The IP address and the configuration filename is reserved for the switch but the TFTP server address is not provided in the DHCP reply one file read method The switch receives...

Страница 71: ...he power cord You can release the Mode button a second or two after the LED above port 1 turns off Then the boot loader switch prompt appears The switch boot loader software provides support for nonvolatile environment variables which can be used to control how the boot loader or any other software running on the system behaves Boot loader environment variables are similar to environment variables...

Страница 72: ...ment Variables Variable Boot Loader Command Cisco IOS Global Configuration Command BOOT set BOOT filesystem file url A semicolon separated list of executable files to try to load and execute when automatically booting If the BOOT environment variable is not set the system attempts to load and execute the first executable image it can find by using a recursive depth first search through the flash f...

Страница 73: ...oconfiguration to configure TFTP and DHCP settings on a new switch to download a new image and a new configuration file Command Purpose 1 configure terminal Enters global configuration mode 2 ip dhcp poolname Creates a name for the DHCP Server address pool and enters DHCP pool configuration mode 3 bootfile filename Specifies the name of the configuration file that is used as a boot image 4 network...

Страница 74: ... address Specifies the IP address of the TFTP server 7 option 125 hex Specifies the path to the text file that describes the path to the image file 8 copy tftp flash filename txt Uploads the text file to the switch 9 copy tftp flash imagename tar Uploads the tar file for the new image to the switch 10 exit Returns to global configuration mode 11 tftp server flash config text Specifies the Cisco IO...

Страница 75: ...exit Returns to global configuration mode 6 ip default gateway ip address Enters the IP address of the next hop router interface that is directly connected to the switch where a default gateway is being configured The default gateway receives IP packets with unresolved destination IP addresses from the switch Once the default gateway is configured the switch has connectivity to the remote networks...

Страница 76: ...he default gateway is configured the switch has connectivity to the remote networks with which a host needs to communicate Note When your switch is configured to route with IP it does not need to have a default gateway set 6 end Returns to privileged EXEC mode 7 show interfaces vlan vlan id Verifies the configured IP address 8 show ip redirects Verifies the configured default gateway 9 copy runnin...

Страница 77: ...he switch is in boot loader mode shown by the switch prompt To boot up the system use the boot filesystem file url boot loader command For filesystem use flash for the system board flash device For file url specify the path directory and the name of the bootable image Filenames and directory names are case sensitive 5 copy running config startup config Optional Saves your entries in the configurat...

Страница 78: ...50 255 255 255 0 no ip directed broadcast ip default gateway 172 20 137 1 snmp server community private RW snmp server community public RO snmp server community private es0 RW snmp server community public es0 RO snmp server chassis id 0x12 end To store the configuration or changes you have made to your startup configuration in flash memory enter this privileged EXEC command Switch copy running con...

Страница 79: ...m the TFTP server Switches B through D retrieve their configuration files and IP addresses in the same way Figure 4 on page 75 shows a sample network for retrieving IP information by using DHCP based autoconfiguration Figure 4 DHCP Based Autoconfiguration Network Example Table 15 on page 75 shows the configuration of the reserved leases on the DHCP server Switch 1 00e0 9f1e 2001 Cisco router 11139...

Страница 80: ...ough Switch D Scheduling Software Image Reload Examples This example shows how to reload the software on the switch on the current day at 7 30 p m Switch reload at 19 30 Reload scheduled for 19 30 00 UTC Wed Jun 5 1996 in 2 hours and 25 minutes Proceed with reload confirm This example shows how to reload the software on the switch at a future time Switch reload at 02 00 jun 20 Reload scheduled for...

Страница 81: ...ftp server flash c ipservices mz 122 44 3 SE tar Switch config tftp server flash ies lanbase tar 122 44 EX tar Switch config tftp server flash boot config text Switch config tftp server flash autoinstall_dhcp Switch config interface GigabitEthernet1 18 Switch config if no switchport Switch config if ip address 10 10 10 1 255 255 255 0 Switch config if end Configuring Client to Download Files from ...

Страница 82: ... software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of pages of searc...

Страница 83: ...al configuration command at the switch Otherwise subsequent cns config partial global configuration command operations malfunction Enable Automated CNS Configuration To enable automated CNS configuration of the switch you must first complete the prerequisites in Table 1 When you complete them power on the switch At the setup prompt you do not need to enter a command The switch begins the initial c...

Страница 84: ...er Event service event gateway Data service directory data models and schema In standalone mode Cisco Configuration Engine supports an embedded directory service In this mode no external directory or other data store is required In server mode Cisco Configuration Engine supports a user defined external directory Device Required Configuration Access switch Factory default no configuration file Dist...

Страница 85: ...uration information in the form of CLI commands In the templates variables are specified using Lightweight Directory Access Protocol LDAP URLs that reference the device specific configuration information stored in a directory The Cisco IOS agent can perform a syntax check on received configuration files and publish events to show the success or failure of the syntax check The configuration agent c...

Страница 86: ...ine both ConfigID and Device ID for each configured switch Within the scope of a single instance of the configuration server no two configured switches can share the same value for ConfigID Within the scope of a single instance of the event bus no two configured switches can share the same value for DeviceID ConfigID Each configured switch has a unique ConfigID which serves as the key into the Con...

Страница 87: ...when you run Setup on Configuration Engine Cisco IOS Agents The CNS event agent feature allows the switch to publish and subscribe to events on the event bus and works with the Cisco IOS agent Initial Configuration When the switch first comes up it attempts to get an IP address by broadcasting a DHCP request on the network Assuming there is no DHCP server on the subnet the distribution switch acts...

Страница 88: ...figuration When the switch receives a configuration it can defer application of the configuration upon receipt of a write signal event The write signal event tells the switch not to save the updated configuration into its NVRAM The switch uses the updated configuration as its running configuration This ensures that the switch configuration is synchronized with other network activities before savin...

Страница 89: ...ers how often the switch sends keepalive messages For retry count enters the number of unanswered keepalive messages that the switch sends before the connection is terminated The default for each is 0 Optional reconnect time Enters the maximum time interval that the switch waits before trying to reconnect to the event gateway Optional source ip address Enters the source IP address of this device N...

Страница 90: ...e is 10 to 2000 seconds The default is 120 7 discover controller controller type dlci subinterface subinterface number interface interface type line line type Specifies the interface parameters in the CNS connect profile controller controller type Enters the controller type dlci Enters the active data link connection identifiers DLCIs Optional subinterface subinterface number Specifies the point t...

Страница 91: ...ne the unique ID dns reverse Retrieves the hostname and assigns it as the unique ID ipaddress Uses the IP address mac address Uses the MAC address as the unique ID Optional event Sets the ID to be the eventID value used to identify the switch Optional image Sets the ID to be the imageID value used to identify the switch Note If the event and image keywords are omitted the imageID value is used to ...

Страница 92: ...esultant configuration to be automatically written to NVRAM Optional page page Enters the web page of the initial configuration The default is Config config asp Optional source ip address Enters the source IP address Optional syntax check Checks the syntax when this parameter is entered Note Though visible in the command line help string the encrypt status url and inventory keywords are not suppor...

Страница 93: ...ate ip route Switch config cns conn exit Switch config hostname RemoteSwitch RemoteSwitch config cns config initial 10 1 1 1 no persist This example shows how to configure an initial configuration on a remote switch when the switch IP address is known The Configuration Engine IP address is 172 28 129 22 Switch config cns template connect template dhcp Switch config tmpl conn cli ip address dhcp Sw...

Страница 94: ... or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs ...

Страница 95: ...o the standby cluster command switches through the management VLAN and to the cluster member switches through a common VLAN Standby Cluster Command Switch Characteristics A standby cluster command switch must meet these requirements Has an IP address Has CDP version 2 enabled Is connected to the command switch and to other standby command switches through its management VLAN Is connected to all ot...

Страница 96: ...switch clustering technology so that you can configure and troubleshoot a group of different Catalyst desktop switch platforms through a single IP address In a switch cluster one switch must be the cluster command switch and up to 15 other switches can be cluster member switches The total number of switches in a cluster cannot exceed 16 switches The cluster command switch is the single point of ac...

Страница 97: ...IE 4000 15 2 2 EA or later Member or command switch IE 4010 15 2 4 EC or later Member or command switch IE 5000 15 2 2 EB or later Member or command switch Catalyst 3750 E or Catalyst 3560 E 12 2 35 SE2 or later Member or command switch Catalyst 3750 12 1 11 AX or later Member or command switch Catalyst 3560 12 1 19 EA1b or later Member or command switch Catalyst 3550 12 1 4 EA1 or later Member or...

Страница 98: ...tomatic discovery of the switch cluster cluster candidates connected switch clusters and neighboring edge devices Discovery Through CDP Hops page 94 Discovery Through Non CDP Capable and Noncluster Capable Devices page 95 Discovery Through Different VLANs page 96 Discovery Through Different Management VLANs page 97 Discovery Through Routed Ports page 97 Discovery of Newly Installed Switches page 9...

Страница 99: ...and switch is connected to a noncluster capable Cisco device it cannot discover a cluster enabled device connected beyond the noncluster capable Cisco device Figure 8 on page 96 shows that the cluster command switch discovers the switch that is connected to a third party hub However the cluster command switch does not discover the switch that is connected to a Catalyst 5000 switch Command device M...

Страница 100: ...n Figure 9 on page 97 has ports assigned to VLANs 9 16 and 62 and therefore discovers the switches in those VLANs It does not discover the switch in VLAN 50 It also does not discover the switch in VLAN 16 in the first column because the cluster command switch has no VLAN connectivity to it Catalyst 2900 XL Catalyst 2950 and Catalyst 3500 XL cluster member switches must be connected to the cluster ...

Страница 101: ...nd switches have ports assigned to VLANs 9 16 and 62 The management VLAN on the cluster command switch is VLAN 9 Each cluster command switch discovers the switches in the different management VLANs except these Switches 7 and 10 switches in management VLAN 4 because they are not connected through a common VLAN meaning VLANs 62 and 9 with the cluster command switch Switch 9 because automatic discov...

Страница 102: ...ned to VLAN 1 When the new switch joins a cluster its default VLAN changes to the VLAN of the immediately upstream neighbor The new switch also configures its access port to belong to the VLAN of the immediately upstream neighbor 101324 RP RP VLAN 62 VLAN 9 VLAN 62 VLAN 9 VLAN 4 VLAN 9 Command device management VLAN 62 Member device 7 101323 VLAN 62 VLAN trunk 4 62 VLAN 62 VLAN 16 VLAN 9 VLAN 16 V...

Страница 103: ... active cluster command switch to access the cluster You can assign an IP address to a cluster capable switch but it is not necessary A cluster member switch is managed and communicates with other cluster member switches through the command switch IP address If the cluster member switch leaves the cluster and it does not have its own IP address you must assign an IP address to manage it as a stand...

Страница 104: ...cluster member switch inherits the command switch first read only RO and read write RW community strings with esN appended to the community strings command switch readonly community string esN where N is the member switch number command switch readwrite community string esN where N is the member switch number If the cluster command switch has multiple read only or read write community strings only...

Страница 105: ...privilege level 1 If the command switch privilege level is 15 the cluster member switch is accessed at privilege level 15 Note The Catalyst 1900 and Catalyst 2820 CLI is available only on switches running Enterprise Edition Software For more information about the Catalyst 1900 and Catalyst 2820 switches refer to the installation and configuration guides for those switches Using SNMP to Manage Swit...

Страница 106: ...gs they can be used in addition to the access provided by the cluster command switch Figure 13 SNMP Management for a Cluster Additional References The following sections provide references related to switch administration Trap T r a p T r a p Command switch Trap 1 Trap 2 Trap 3 Member 1 Member 2 Member 3 33020 SNMP Manager ...

Страница 107: ...isco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of pag...

Страница 108: ...104 Configuring Switch Clusters Additional References ...

Страница 109: ...tive or not that is whether it has been set by a time source considered to be authoritative If it is not authoritative the time is available only for display purposes and is not redistributed For configuration information see Configuring Time and Date Manually page 111 Network Time Protocol NTP is designed to time synchronize a network of devices NTP runs over User Datagram Protocol UDP which runs...

Страница 110: ... on a device is a critical resource you should use the security features of NTP to avoid the accidental or malicious setting of an incorrect time Two mechanisms are available an access list based restriction scheme and an encrypted authentication mechanism Cisco s implementation of NTP does not support stratum 1 service it is not possible to connect to a radio or atomic clock We recommend that the...

Страница 111: ...buted database with which you can map hostnames to IP addresses When you configure DNS on your switch you can substitute the hostname for the IP address with all IP commands such as ping telnet connect and related Telnet support operations IP defines a hierarchical naming scheme that allows a device to be identified by its location or domain Domain names are pieced together with periods as the del...

Страница 112: ...switch updates the address table adding new dynamic addresses and aging out those that are not in use The aging interval is globally configured However the switch maintains an address table for each VLAN and STP can accelerate the aging interval on a per VLAN basis The switch sends packets between any combination of ports based on the destination address of the received packet Using the MAC addres...

Страница 113: ... for dynamic and secure MAC addresses Notifications are not generated for self addresses multicast addresses or other static addresses Static Addresses A static address has these characteristics Is manually entered in the address table and must be manually removed Can be a unicast or multicast address Does not age and is retained when the switch restarts You can add and remove static addresses and...

Страница 114: ...ation unicast MAC address and the VLAN from which it is received MAC Address Learning on a VLAN By default MAC address learning is enabled on all VLANs on the switch You can control MAC address learning on a VLAN to manage the available MAC address table space by controlling which VLANs and therefore which ports can learn MAC addresses Before you disable MAC address learning be sure that you are f...

Страница 115: ... ARP cache for rapid retrieval Then the IP datagram is encapsulated in a link layer frame and sent over the network Encapsulation of IP datagrams and ARP requests and replies on IEEE 802 networks other than Ethernet is specified by the Subnetwork Access Protocol SNAP By default standard Ethernet style ARP encapsulation represented by the arpa keyword is enabled on the IP interface ARP entries adde...

Страница 116: ...e is manually set zone Enters the name of the time zone to be displayed when standard time is in effect The default is UTC hours offset Enters the hours offset from UTC Optional minutes offset Enters the minutes offset from UTC 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 clock summer time zone recurring week day month hh mm week day...

Страница 117: ...one date month date year hh mm month date year hh mm offset or clock summer time zone date date month year hh mm date month year hh mm offset Configures summer time to start on the first date and end on the second date Summer time is disabled by default zone Specifies the name of the time zone for example PDT to be displayed when summer time is in effect Optional week Specifies the week of the mon...

Страница 118: ...r address2 server address6 Specifies the address of one or more name servers to use for name and address resolution You can specify up to six name servers Separate each server address with a space The first server specified is the primary server The switch sends DNS queries to the primary server first If that query fails the backup servers are queried 4 ip domain lookup Optional Enables DNS based ...

Страница 119: ...er the ending delimiter are discarded message Enters a login message up to 255 characters You cannot use the delimiting character in the message 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 mac address table aging time 0 10 1000000 vlan vlan id Sets the length of time that a dynamic entry remains in the MAC address table after the en...

Страница 120: ...raps mac notification change Enables the switch to send MAC address change notification traps to the NMS 4 mac address table notification change Enables the MAC address change notification feature 5 mac address table notification change interval value history size value Enters the trap interval time and the history table size Optional interval value Specifies the notification trap interval in seco...

Страница 121: ...ty string notification type Specifies the recipient of the trap message host addr Specifies the name or address of the NMS traps the default Sends SNMP traps to the host informs Sends SNMP informs to the host version Specifies the SNMP version to support Version 1 the default is not available with informs community string Specifies the string to send with the notification operation You can set thi...

Страница 122: ...mmend that you define this string by using the snmp server community command before using the snmp server host command notification type Uses the mac notification keyword 3 snmp server enable traps mac notification threshold Enables the switch to send MAC threshold notification traps to the NMS 4 mac address table notification threshold Enables the MAC address threshold notification feature 5 mac ...

Страница 123: ...ter multiple interface IDs For static unicast addresses you can enter only one interface at a time but you can enter the command multiple times with the same MAC address and VLAN ID 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 mac address table static mac addr vlan vlan id drop Enables unicast MAC address filtering and configures the...

Страница 124: ...0 26 April 2001 2 00 Command Purpose clear mac address table dynamic Removes all dynamic entries clear mac address table dynamic address mac address Removes a specific MAC address clear mac address table dynamic interface interface id Removes all addresses on the specified physical port or port channel clear mac address table dynamic vlan vlan id Removes all addresses on a specified VLAN show cloc...

Страница 125: ...is example shows how to specify 172 20 10 10 as the NMS enable the switch to send MAC address notification traps to the NMS enable the MAC address change notification feature set the interval time to 123 seconds set the history size to 100 entries and enable traps whenever a MAC address is added on the specified port Switch config snmp server host 172 20 10 10 traps private mac notification Switch...

Страница 126: ... Address to the MAC Address Table Example This example shows how to add the static address c2f3 220a 12f4 to the MAC address table When a packet is received in VLAN 4 with this MAC address as its destination address the packet is forwarded to the specified port Switch config mac address table static c2f3 220a 12f4 vlan 4 interface GigabitEthernet1 17 Configuring Unicast MAC Address Filtering Examp...

Страница 127: ...s MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Tech...

Страница 128: ...124 Performing Switch Administration Additional References ...

Страница 129: ...rks that include distributed device clocks of varying precision and stability PTP is designed specifically for industrial networked measurement and control systems and is optimal for use in distributed systems because it requires minimal bandwidth and little processing overhead For information about configuring PTP on Cisco Industrial Ethernet switches see Precision Time Protocol Software Configur...

Страница 130: ...126 Configuring PTP ...

Страница 131: ...data exchange and defines communication paths to meet speed requirements PROFINET communication is scalable on three levels Normal non real time communication uses TCP IP and enables bus cycle times of approximately 100 ms Real time communication enables cycle times of approximately 10 ms Isochronous real time communication enables cycle times of approximately 1 ms PROFINET I O is a modular commun...

Страница 132: ...nd diagnostic analysis The I O supervisor exchanges diagnostic status control and parameter information with the I O device An I O device is a distributed input output device such as a sensor an actuator or a motion controller Note If Profinet DCP cannot detect the switch PLC IO mac addresses temporarily disable the firewall virus scan from the Window PC that installed the Siemens STEP7 or TIA Por...

Страница 133: ...r the device TCP IP IP address subnet mask default gateway SVI Primary temperature alarm Enables or disables monitoring for the specified alarm Secondary temperature alarm Enables or disables monitoring for the specified alarm RPS failed alarm Enables or disables monitoring for the specified alarm Relay major alarm Enables or disables monitoring for the specified alarm Reset to factory defaults Us...

Страница 134: ...e 1 configure terminal Enters global configuration mode 2 profinet Enables PROFINET on the switch 3 profinet id line Optional Sets the PROFINET device identifier ID by using the Cisco IOS software The maximum length is 240 characters The only special characters allowed are the period and hyphen and they are allowed only in specific positions within the ID string It can have multiple labels within ...

Страница 135: ...19 Commands for Displaying the PROFINET Configuration Command Purpose show profinet sessions Displays the currently connected PROFINET sessions show profinet status Displays the status of the PROFINET subsystem show lldp neighbor interface x x detail Displays information about the adjacent interface Table 20 Commands for Troubleshooting the PROFINET Configuration Command Purpose debug profinet ala...

Страница 136: ... IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of pages o...

Страница 137: ...s for the collection of manufacturing automation applications control safety synchronization motion configuration and information CIP allows users to integrate these manufacturing applications with enterprise level Ethernet networks and the Internet How to Configure CIP Default Configuration By default CIP is not enabled Enabling CIP Command Purpose 1 configure terminal Enters global configuration...

Страница 138: ...isplaying the CIP Configuration Command Purpose show cip connection faults file miscellaneous object security session status Displays information about the CIP subsystem Table 22 Commands for Troubleshooting the CIP Configuration Command Purpose debug cip assembly connection manager errors event file io packet request response security session socket Enables debugging of the CIP subsystem ...

Страница 139: ...OS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of pages of ...

Страница 140: ...136 Configuring CIP Additional References ...

Страница 141: ...h to optimize support for specific features depending on how the switch is used in the network You can select a template to provide maximum system usage for some functions or use the default template to balance resources To allocate ternary content addressable memory TCAM resources for different usages the switch SDM templates prioritize system resources to optimize support for certain features Wh...

Страница 142: ... for IPv6 Dual IPv4 and IPv6 routing template Supports Layer 2 multicast routing including policy based routing QoS and ACLs for IPv4 and Layer 2 routing and ACLs for IPv6 Resource Default IPv4 Routing Dual Default Dual Routing Unicast MAC addresses 16 K 16 K 16 K 16 K IPv4 IGMP or IPv6 groups 1K IPv4 1K IPv4 1K IPv4 1K IPv6 1K IPv4 1K IPv6 Direct routes 16K IPv4 16K IPv4 4K IPv4 4K IPv6 4K IPv4 4...

Страница 143: ...nected IPv6 addresses 0 number of indirect IPv6 unicast routes 0 number of IPv4 policy based routing aces 0 125k number of IPv4 MAC qos aces 1 875k number of IPv4 MAC security aces 1 875k number of IPv6 policy based routing aces 0 number of IPv6 qos aces 0 number of IPv6 security aces 0 This is an example of output from the show sdm prefer dual ipv4 and ipv6 default command Command Purpose 1 confi...

Страница 144: ... switch to support this level of features for 8 routed interfaces and 1024 VLANs number of unicast mac addresses 16K number of IPv4 IGMP groups multicast routes 1K number of IPv4 unicast routes 6K number of directly connected IPv4 hosts 4K number of indirect IPv4 routes 2K number of IPv6 multicast groups 1K number of IPv6 unicast routes 7K number of directly connected IPv6 addresses 4K number of i...

Страница 145: ...ources in the switch to support this level of features for 8 routed interfaces and 1024 VLANs number of unicast mac addresses 16K number of IPv4 IGMP groups multicast routes 1K number of IPv4 unicast routes 5 25K number of directly connected IPv4 hosts 4K number of indirect IPv4 routes 1 25K number of IPv6 multicast groups 1K number of IPv6 unicast routes 5 25K number of directly connected IPv6 ad...

Страница 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...

Страница 147: ...ccess You can prevent unauthorized users from reconfiguring your switch and viewing configuration information Typically you want network administrators to have access to your switch while you restrict access to users who dial from outside the network through an asynchronous port connect from outside the network through a serial port or connect through a terminal or workstation from within the loca...

Страница 148: ... a specific privilege level After you specify the level and set a password give the password only to users who need to have access at this level Use the privilege level global configuration command to specify commands accessible at various levels If you enable password encryption it applies to all passwords including username passwords authentication key passwords the privileged command password a...

Страница 149: ...w ip commands are automatically set to privilege level 15 unless you set them individually to different levels To return to the default privilege for a given command use the no privilege mode level level command global configuration command Users can override the privilege level you set using the privilege level line configuration command by logging in to the line and enabling a different privileg...

Страница 150: ...rovides fine grained control over user capabilities for the duration of the user s session including but not limited to setting autocommands access control session duration or protocol support You can also enforce restrictions on what commands a user can execute with the TACACS authorization feature Accounting Collects and sends information used for billing auditing and reporting to the TACACS dae...

Страница 151: ...ethod for authenticating the user CONTINUE The user is prompted for additional authentication information After authentication the user undergoes an additional authorization phase if authorization has been enabled on the switch Users must first successfully complete TACACS authentication before proceeding to TACACS authorization 3 If TACACS authorization is required the TACACS daemon is again cont...

Страница 152: ...user s session The user is granted access to a requested service only if the information in the user profile allows it You can use the aaa authorization global configuration command with the tacacs keyword to set parameters that restrict a user s network access to privileged EXEC mode The aaa authorization exec tacacs local command sets these authorization parameters Use TACACS for privileged EXEC...

Страница 153: ...le host to a single utility such as Telnet or to the network through a protocol such as IEEE 802 1x For more information about this protocol see Configuring IEEE 802 1x Port Based Authentication page 189 Networks that require resource accounting You can use RADIUS accounting independently of RADIUS authentication or authorization The RADIUS accounting functions allow data to be sent at the start a...

Страница 154: ...assword The ACCEPT or REJECT response is bundled with additional data that is used for privileged EXEC or network authorization Users must first successfully complete RADIUS authentication before proceeding to RADIUS authorization if it is enabled The additional data included with the ACCEPT or REJECT packets includes these items Telnet SSH rlogin or privileged EXEC services Connection parameters ...

Страница 155: ...ese per session CoA requests Session reauthentication Session termination Session termination with port shutdown Session termination with port bounce Change of Authorization Requests Change of Authorization CoA requests as described in RFC 5176 are used in a push model to allow for session identification host reauthentication and session termination The model is comprised of one request CoA Reques...

Страница 156: ...AK or CoA NAK with the Invalid Attribute Value error code attribute For disconnect and CoA requests targeted to a particular session any one of these session identifiers can be used Calling Station ID IETF attribute 31 which should contain the MAC address Attribute Number Attribute Name 24 State 31 Calling Station ID 44 Acct Session ID 80 Message Authenticator 101 Error Cause Value Explanation 201...

Страница 157: ... based on the CoA Request and are discussed in individual CoA Commands CoA NAK Response Code A negative acknowledgement NAK indicates a failure to change the authorization state and can include attributes that indicate the reason for the failure Use show commands to verify a successful CoA CoA Request Commands CoA Session Reauthentication The AAA server typically generates a session reauthenticati...

Страница 158: ...blems on the network and you need to immediately block network access for the host When you want to restore network access on the port reenable it using a non RADIUS mechanism When a device with no supplicant such as a printer needs to acquire a new IP address for example after a VLAN change terminate the session on the host port with port bounce temporarily disable and then reenable the port CoA ...

Страница 159: ... numbers The combination of the IP address and the UDP port number creates a unique identifier allowing different ports to be individually defined as RADIUS hosts providing a specific AAA service This unique identifier enables RADIUS requests to be sent to multiple UDP ports on a server at the same IP address If two different host entries on the same RADIUS server are configured for the same servi...

Страница 160: ...d use them for a particular service The server group is used with a global server host list which lists the IP addresses of the selected server hosts Server groups also can include multiple host entries for the same server if each entry has a unique identifier the combination of the IP address and UDP port number allowing different ports to be individually defined as RADIUS hosts providing a speci...

Страница 161: ...9 and the supported option has vendor type 1 which is named cisco avpair The value is a string with this format protocol attribute sep value protocol is a value of the Cisco protocol attribute for a particular type of authorization Attribute and value are an appropriate attribute value AV pair defined in the Cisco TACACS specification and sep is for mandatory attributes and is for optional attribu...

Страница 162: ...kets which have a limited lifespan are stored in user credential caches The Kerberos server uses the tickets instead of usernames and passwords to authenticate users and network services Note A Kerberos server can be a switch that is configured as a network security server and that can authenticate users by using the Kerberos protocol The Kerberos credential scheme uses a process called single log...

Страница 163: ... of a Kerberos server and database program that is running on a network host Kerberized A term that describes applications and services that have been modified to support the Kerberos credential infrastructure Kerberos realm A domain consisting of users hosts and network services that are registered to a Kerberos server The Kerberos server is trusted to verify the identity of a user or network ser...

Страница 164: ...that includes the user identity to the switch 5 The switch attempts to decrypt the TGT by using the password that the user entered If the decryption is successful the user is authenticated to the switch If the decryption is not successful the user repeats Step 2 either by reentering the username and password noting if Caps Lock or Num Lock is on or off or by entering a different username and passw...

Страница 165: ...tion No accounting is available in this configuration Secure Shell To use this feature you must install the cryptographic encrypted software image on your switch You must obtain authorization to use this feature and to download the cryptographic software files from Cisco com For more information see the release notes for this release For SSH configuration examples see the SSH Configuration Example...

Страница 166: ...er or SSH client An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server and the reverse If you get CLI error messages after entering the crypto key generate rsa global configuration command an RSA key pair has not been generated Reconfigure the hostname and domain and then enter the crypto key generate rsa command For more information see Setting Up the Switch to Run SSH page 1...

Страница 167: ...ou configure a CA trustpoint you should ensure that the system clock is set If the clock is not set the certificate is rejected due to an incorrect date Default SSL Settings Certificate Authority Trustpoints Certificate authorities CAs manage certificate requests and issue certificates to participating network devices These services provide centralized security key and certificate management for t...

Страница 168: ...ient browser that supports 128 bit encryption such as Microsoft Internet Explorer Version 5 5 or later or Netscape Communicator Version 4 76 or later The SSL_RSA_WITH_DES_CBC_SHA CipherSuite provides less security than the other CipherSuites as it does not offer 128 bit encryption The more secure and more complex CipherSuites require slightly more processing time This list defines the CipherSuites...

Страница 169: ...n the Cisco IOS Security Configuration Guide Securing User Services Release 12 4 http www cisco com en US docs ios sec_user_services configuration guide sec_secure_copy_ps6350_TSD_Produ cts_Configuration_Guide_Chapter html How to Configure Switch Based Authentication Configuring Password Protection Setting or Changing a Static Enable Password Command Purpose 1 configure terminal Enters global conf...

Страница 170: ...is defined Optional encryption type Only type 5 a Cisco proprietary encryption algorithm is available If you specify an encryption type you must provide an encrypted password an encrypted password that you copy from another switch configuration Note If you specify an encryption type and then enter a clear text password you cannot reenter privileged EXEC mode You cannot recover a lost encrypted pas...

Страница 171: ...haracters The string cannot start with a number is case sensitive and allows spaces but ignores leading spaces By default no password is defined 6 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 username name privilege level password encryption type password Enters the username privilege level and password for each user name Specifies the...

Страница 172: ...or global configuration mode exec for EXEC mode interface for interface configuration mode or line for line configuration mode level The range is from 0 to 15 Level 1 is for normal user EXEC mode privileges Level 15 is the level of access permitted by the enable password command Specifies the command to which you want to restrict access 3 enable password level level password Specifies the enable p...

Страница 173: ...up system if the initial method fails The software uses the first method listed to authenticate to authorize or to keep accounts on users if that method does not respond the software selects the next method in the list This process continues until there is successful communication with a listed method or the method list is exhausted 3 privilege level level Changes the default privilege level for t...

Страница 174: ...ame or IP address of the host Optional port integer Specifies a server port number The default is port 49 The range is 1 to 65535 Optional timeout integer Specifies a time in seconds the switch waits for a response from the daemon before it times out and declares an error The default is 5 seconds The range is 1 to 1000 seconds Optional key string Specifies the encryption key for encrypting and dec...

Страница 175: ...thentication Before you can use this authentication method you must configure the TACACS server For more information see Identifying the TACACS Server Host and Setting the Authentication Key page 170 line Uses the line password for authentication Before you can use this authentication method you must define a line password Use the password password line configuration command local Uses the local u...

Страница 176: ...e key string to be shared by both the server and the switch Command Purpose 1 configure terminal Enters global configuration mode 2 aaa authorization network tacacs Configures the switch for user TACACS authorization for all network related service requests 3 aaa authorization exec tacacs Configures the switch for user TACACS authorization if the user has privileged EXEC access The exec keyword mi...

Страница 177: ...quest is resent to a server if that server is not responding or responding slowly The range is 1 to 1000 If no retransmit value is set with the radius server host command the setting of the radius server retransmit global configuration command is used Optional key string Specifies the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server Note ...

Страница 178: ... configuration command is used Optional key string specifies the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server Note The key is a text string that must match the encryption key used on the RADIUS server Always configure the key as the last item in the radius server host command Leading spaces are ignored but spaces within and at the end...

Страница 179: ...figuration command group radius Uses RADIUS authentication Before you can use this authentication method you must configure the RADIUS server For more information see RADIUS Server Host page 155 line Uses the line password for authentication Before you can use this authentication method you must define a line password Use the password password line configuration command local Uses the local userna...

Страница 180: ...requests 3 aaa accounting exec start stop radius Enables RADIUS accounting to send a start record accounting notice at the beginning of a privileged EXEC process and a stop record at the end 4 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 radius server key string Specifies the shared secret text string used between the switch and all RA...

Страница 181: ...configure terminal Enters global configuration mode 2 radius server host hostname ip address non standard Specifies the IP address or hostname of the remote RADIUS server host and identifies that it is using a vendor proprietary implementation of RADIUS 3 radius server key string Specifies the shared secret text string used between the switch and the vendor proprietary RADIUS server The switch and...

Страница 182: ...nfigures the switch to ignore a CoA request to temporarily disable the port hosting a session The purpose of temporarily disabling the port is to trigger a DHCP renegotiation from the host when a VLAN change occurs and there is no supplicant on the endpoint to detect the change 11 authentication command disable port ignore Optional Configures the switch to ignore a nonstandard command requesting t...

Страница 183: ... can contain embedded spaces and must be the last option specified in the username command 7 end Returns to privileged EXEC mode 8 show running config Verifies your entries 9 copy running config startup config Optional Saves your entries in the configuration file Command Purpose Task Purpose 1 Download the cryptographic software image from Cisco com Required For more information see the notes for ...

Страница 184: ...s The range is 0 to 120 seconds This parameter applies to the SSH negotiation phase After the connection is established the switch uses the default time out values of the CLI based sessions By default up to five simultaneous encrypted SSH connections for multiple CLI based sessions over the network are available session 0 to session 4 After the execution shell starts the CLI based session time out...

Страница 185: ...enerates an RSA key pair RSA key pairs are required before you can obtain a certificate for the switch RSA key pairs are generated automatically You can use this command to regenerate the keys if needed 5 crypto ca trustpoint name Specifies a local configuration name for the CA trustpoint and enter CA trustpoint configuration mode 6 enrollment url url Specifies the URL to which the switch should s...

Страница 186: ...does not attempt to authenticate the client 7 ip http secure trustpoint name Specifies the CA trustpoint to use to get an X 509v3 security certificate and to authenticate the client certificate connection Note Use of this command assumes you have already configured a CA trustpoint according to the previous procedure 8 ip http path path name Optional Sets a base HTTP path for HTML files The path sp...

Страница 187: ...ha des cbc sha Optional Specifies the CipherSuites encryption algorithms to be used for encryption over the HTTPS connection If you do not have a reason to specify a particular CipherSuite you should allow the server and client to negotiate a CipherSuite that they both support This is the default 4 end Returns to privileged EXEC mode 5 show ip http client secure status Displays the status of the H...

Страница 188: ...t enter to use level 14 commands Switch config privilege exec level 14 configure Switch config enable password level 14 SecretPswd14 Configuring the RADIUS Server Examples This example shows how to configure one RADIUS server to be used for authentication and another to be used for accounting Switch config radius server host 172 29 36 49 auth port 1612 key rad1 Switch config radius server host 172...

Страница 189: ...ACL in ASCII format to an interface for the duration of this connection cisco avpair ip outacl 2 deny ip 10 10 10 10 0 0 255 255 any Configuring a Vendor Proprietary RADIUS Host Example This example shows how to specify a vendor proprietary RADIUS host and to use a secret key of rad124 between the switch and the server Switch config radius server host 172 20 30 15 nonstandard Switch config radius ...

Страница 190: ... server a new self signed certificate is generated Verifying Secure HTTP Connection Example To verify the secure HTTP connection by using a Web browser enter https URL where the URL is the IP address or hostname of the server switch If you configure a port other than the default port you must also specify the port number after the URL For example https 209 165 129 1026 or https host domain com 102...

Страница 191: ...S User Security Configuration Guide Password protection commands Cisco IOS Security Command Reference Kerberos commands Cisco IOS Security Command Reference Secure Shell commands Cisco IOS Security Command Reference Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and downloa...

Страница 192: ...188 Configuring Switch Based Authentication Additional References ...

Страница 193: ... switch port before making available any switch or LAN services Until the client is authenticated IEEE 802 1x access control allows only Extensible Authentication Protocol over LAN EAPOL Cisco Discovery Protocol CDP and Spanning Tree Protocol STP traffic through the port to which the client is connected After authentication normal traffic passes through the port Device Roles Figure 18 802 1x Devic...

Страница 194: ...et header is stripped and the remaining EAP frame is re encapsulated in the RADIUS format The EAP frames are not modified during encapsulation and the authentication server must support EAP within the native frame format When the switch receives frames from the authentication server the server s frame header is removed leaving the EAP frame which is then encapsulated for Ethernet and sent to the c...

Страница 195: ...ected during reauthentication You manually reauthenticate the client by entering the dot1x re authenticate interface interface id privileged EXEC command If multidomain authentication MDA is enabled on a port this flow can be used with some exceptions that are applicable to voice authorization For more information on MDA see Multidomain Authentication page 197 281594 Client identity is invalid All...

Страница 196: ...onds with an EAP response identity frame However if during boot up the client does not receive an EAP request identity frame from the switch the client can initiate authentication by sending an EAPOL start frame which prompts the switch to request the client s identity Note If 802 1x authentication is not enabled or supported on the network access device any EAPOL frames from the client are droppe...

Страница 197: ...essful the port becomes authorized If authorization fails and a guest VLAN is specified the switch assigns the port to the guest VLAN If the switch detects an EAPOL packet while waiting for an Ethernet packet the switch stops the MAC authentication bypass process and stops 802 1x authentication Figure 21 Message Exchange During MAC Authentication Bypass 101228 Client Port Authorized Port Unauthori...

Страница 198: ...able ACL Redirect URL VLAN assignment Per user ACL Filter ID attribute Downloadable ACL Redirect URL VLAN assignment Per user ACL Filter Id attribute Downloadable ACL Redirect URL Per user ACL Filter Id attribute Downloadable ACL Redirect URL MAC authentication bypass VLAN assignment Per user ACL Filter ID attribute Downloadable ACL Redirect URL VLAN assignment Per user ACL Filter ID attribute Dow...

Страница 199: ...onnected host The authentication manager commands control generic authentication features such as host mode violation mode and the authentication timer Generic authentication commands include the authentication host mode authentication violation and authentication timer interface configuration commands 802 1x specific commands begin with the dot1x or authentication keyword For example the authenti...

Страница 200: ...n an EAPOL start frame is received The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server Each client attempting to access the network is uniquely identified by the switch by using the client MAC address If the client is successfully authenticated receives an Accept frame from the authentication server the port st...

Страница 201: ...Attribute Value AV pair attribute with a value of device traffic class voice Without this value the switch treats the voice device as a data device The guest VLAN and restricted VLAN features only apply to the data devices on an MDA enabled port The switch treats a voice device that fails authorization as a data device If more than one device attempts authorization on either the voice or the data ...

Страница 202: ...e clients they are discarded from the port but no violation errors occur If a hub or access point is connected to an 802 1x enabled port each connected client must be authenticated For non 802 1x devices you can use MAC authentication bypass or web authentication as the per host authentication fallback method to authenticate different hosts with different methods on a single port There is no limit...

Страница 203: ...ered in that mode It does not apply to ports in multiple host mode because in that mode only the first host requires authentication If you configure the authentication violation interface configuration command with the replace keyword the authentication process on a port in multidomain mode is A new MAC address is received on a port with an existing authenticated MAC address The authentication man...

Страница 204: ...ture to determine if the devices connected to the switch ports are 802 1x capable You use an alternate authentication such as MAC authentication bypass or web authentication for the devices that do not support 802 1x functionality This feature only works if the supplicant on the client supports a query with the NOTIFY EAP notification packet The client must respond within the 802 1x timeout value ...

Страница 205: ... When a voice device is authorized and the RADIUS server returns an authorized VLAN the voice VLAN on the port is configured to send and receive packets on the assigned voice VLAN Voice VLAN assignment behaves the same as data VLAN assignment on multidomain authentication MDA enabled ports For more information see Multidomain Authentication page 197 When configured on the switch and the RADIUS ser...

Страница 206: ... port Assign vendor specific tunnel attributes in the RADIUS server The RADIUS server must return these attributes to the switch 64 Tunnel Type VLAN 65 Tunnel Medium Type 802 81 Tunnel Private Group ID VLAN name VLAN ID or VLAN Group 83 Tunnel Preference Attribute 64 must contain the value VLAN type 13 Attribute 65 must contain the value 802 type 6 Attribute 81 specifies the VLAN name or VLAN ID a...

Страница 207: ...tch during the authentication process The VSAs used for per user ACLs are inacl n for the ingress direction and outacl n for the egress direction MAC ACLs are supported only in the ingress direction The switch supports VSAs only in the ingress direction It does not support port ACLs in the egress direction on Layer 2 ports For more information see Configuring Network Security with ACLs page 545 Us...

Страница 208: ...on modes open and closed If there is no static ACL on a port in closed authentication mode An auth default ACL is created The auth default ACL allows only DHCP traffic until policies are enforced When the first host authenticates the authorization policy is applied without IP address insertion When a second host is detected the policies for the first host are refreshed and policies for the first a...

Страница 209: ...ble ACLs on the Cisco Secure ACS with the ACL IP name number attribute The name is the ACL name The number is the version number for example 3f783768 If a downloadable ACL is configured for a client on the authentication server a default port ACL on the connected client switch port must also be configured If the default ACL is configured on the switch and the Cisco Secure ACS sends a host access p...

Страница 210: ...ce device However the switch no longer allows other devices access to the guest VLAN To prevent this situation use one of these command sequences Enter the authentication event no response action authorize vlan vlan id interface configuration command to allow access to the guest VLAN Enter the shutdown interface configuration command followed by the no shutdown interface configuration command to r...

Страница 211: ... a VLAN sent by the RADIUS server You can disable reauthentication If you do this the only way to restart the authentication process is for the port to receive a link down or EAP logoff event We recommend that you keep reauthentication enabled if a client might connect through a hub When a client disconnects from the hub the port might not receive the link down or EAP logoff event After a port mov...

Страница 212: ...matically reauthenticated For more information see Configuring Inaccessible Authentication Bypass page 227 Feature Interactions Inaccessible authentication bypass interacts with these features Guest VLAN Inaccessible authentication bypass is compatible with guest VLAN When a guest VLAN is enabled on 8021 x port the features interact as follows If at least one RADIUS server is available the switch ...

Страница 213: ...For more information about voice VLANs see Configuring Voice VLAN page 309 802 1x Authentication with Port Security In general Cisco does not recommend enabling port security when IEEE 802 1x is enabled Since IEEE 802 1x enforces a single MAC address per port or per VLAN when MDA is configured for IP telephony port security is redundant and in some cases may interfere with expected IEEE 802 1x ope...

Страница 214: ...at were authorized with MAC authentication bypass can be reauthenticated The reauthentication process is the same as that for clients that were authenticated with 802 1x During reauthentication the port remains in the previously assigned VLAN If reauthentication is successful the switch keeps the port in the same VLAN If reauthentication fails the switch assigns the port to the guest VLAN if one i...

Страница 215: ...ote The RADIUS server can send the VLAN information in any combination of VLAN IDs VLAN names or VLAN groups 802 1x User Distribution Configuration Guidelines Confirm that at least one VLAN is mapped to the VLAN group You can map more than one VLAN to a VLAN group You can modify the VLAN group by adding or deleting a VLAN When you clear an existing VLAN from the VLAN group name none of the authent...

Страница 216: ...authenticate a new host MAC authentication bypass and 802 1x can be the primary or secondary authentication methods and web authentication can be the fallback method if either or both of those authentication attempts fail For the configuration commands see Configuring Optional 802 1x Authentication Features page 224 Open1x Authentication Open1x authentication allows a device access to a port befor...

Страница 217: ...nnecting to the supplicant switch to the authenticator switch as shown in Figure 23 on page 213 Auto enablement automatically enables trunk configuration on the authenticator switch allowing user traffic from multiple VLANs coming from supplicant switches Configure the cisco av pair as device traffic class switch at the ACS You can configure this under the group or the user settings Figure 23 Auth...

Страница 218: ...user or a group to which the user belongs The Filter Id attribute for the user takes precedence over that for the group If a Filter Id attribute from the ACS specifies an ACL that is already configured it takes precedence over a user configured ACL If the RADIUS server sends more than one Filter Id attribute only the last attribute is applied If the Filter Id attribute is not defined on the switch...

Страница 219: ...nauthorized state Quiet period 60 seconds number of seconds that the switch remains in the quiet state following a failed authentication exchange with the client Retransmission time 30 seconds number of seconds that the switch should wait for a response to an EAP request identity frame from the client before resending the request Maximum retransmission number 2 times number of times that the switc...

Страница 220: ...ort mode is not changed Dynamic ports A port in dynamic mode can negotiate with its neighbor to become a trunk port If you try to enable 802 1x authentication on a dynamic port an error message appears and 802 1x authentication is not enabled If you try to change the mode of an 802 1x enabled port to dynamic an error message appears and the port mode is not changed Dynamic access ports If you try ...

Страница 221: ... has an IP address from the DHCP server receiving an EAP Success message on a critical port might not reinitiate the DHCP configuration process You can configure the inaccessible authentication bypass feature and the restricted VLAN on an 802 1x port If the switch tries to reauthenticate a critical port in a restricted VLAN and all the RADIUS servers are unavailable switch changes the port state t...

Страница 222: ...n is performed 3 The VLAN assignment is enabled as appropriate based on the RADIUS server configuration 4 The switch sends a start message to an accounting server 5 Reauthentication is performed as necessary 6 The switch sends an interim accounting update to the accounting server that is based on the result of reauthentication 7 The user disconnects from the port 8 The switch sends a stop message ...

Страница 223: ...s single host mode must be configured This setting is the default 6 radius server host ip address Optional Specifies the IP address of the RADIUS server 7 radius server key string Optional Specifies the authentication and encryption key used between the switch and the RADIUS daemon running on the RADIUS server 8 interface interface id Specifies the port connected to the client to enable for 802 1x...

Страница 224: ...ored but spaces within and at the end of the key are used If you use spaces in the key do not enclose the key in quotation marks unless the quotation marks are part of the key This key must match the encryption used on the RADIUS daemon If you want to use multiple RADIUS servers reenter this command 3 end Returns to privileged EXEC mode 4 show running config Verifies your entries 5 copy running co...

Страница 225: ...ividual VLANs Optional vlan list Specifies a list of VLANs to be reenabled If vlan list is not specified all VLANs are reenabled 5 shutdown no shutdown Optional Reenables an error disabled VLAN and clear all error disable indications 6 end Returns to privileged EXEC mode 7 show errdisable detect Verifies your entries 8 copy running config startup config Optional Saves your entries in the configura...

Страница 226: ...endor specific attributes VSAs 3 interface interface id Specifies the port to which multiple hosts are indirectly attached and enter interface configuration mode 4 authentication host mode multi auth multi domain multi host single host The keywords have these meanings multi auth Allows one client on the voice VLAN and multiple authenticated clients on the data VLAN Each host is individually authen...

Страница 227: ...f the reauthentication timer or to have the switch use a RADIUS provided session timeout enter the authentication timer reauthenticate command 4 authentication timer inactivity reauthenticate restart value Sets the number of seconds between reauthentication attempts inactivity Interval in seconds after which if there is no activity from the client then it is unauthorized reauthenticate Time in sec...

Страница 228: ...rface configuration mode 4 authentication timer inactivity seconds Optional Sets the number of seconds that the switch remains in the quiet state after a failed authentication exchange with the client The range is 1 to 65535 seconds the default is 60 5 authentication timer reauthenticate seconds Optional Sets the number of seconds that the switch waits for a response to an EAP request identity fra...

Страница 229: ...ets the order of authentication methods used on a port 11 authentication priority dot1x mab webauth Optional Adds an authentication method to the port priority list 12 dot1x default Resets the 802 1x parameters to the default values 13 end Returns to privileged EXEC mode 14 show authentication interface interface id Verifies your entries 15 copy running config startup config Optional Saves your en...

Страница 230: ...rivate VLAN host port 4 authentication port control auto Enables 802 1x authentication on the port 5 authentication event no response action authorize vlan vlan id Specifies an active VLAN as an 802 1x guest VLAN The range is 1 to 4096 You can configure any active VLAN except an internal VLAN routed port an RSPAN VLAN a primary private VLAN or a voice VLAN as an 802 1x guest VLAN 6 end Returns to ...

Страница 231: ...ure any active VLAN except an internal VLAN routed port an RSPAN VLAN a primary private VLAN or a voice VLAN as an 802 1x restricted VLAN 6 authentication event retry retry count Specifies a number of authentication attempts to allow before a port moves to the restricted VLAN The range is 1 to 3 and the default is 3 7 end Returns to privileged EXEC mode 8 show authentication interface interface id...

Страница 232: ...es are ignored but spaces within and at the end of the key are used If you use spaces in the key do not enclose the key in quotation marks unless the quotation marks are part of the key This key must match the encryption used on the RADIUS daemon You can also configure the authentication and encryption key by using the radius server key 0 string 7 string string global configuration command 5 dot1x...

Страница 233: ... vlan group all vlan group name Verifies the configuration 3 no vlan group vlan group name vlan list vlan list Clears the VLAN group configuration or elements of the VLAN group configuration Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Specifies the port to be configured and enters interface configuration mode 3 authentication event no response act...

Страница 234: ...figures the interface as a port access entity PAE authenticator 7 spanning tree portfast Enables Port Fast on an access port connected to a single workstation or server 8 end Returns to privileged EXEC mode 9 show running config interface interface id Verifies your configuration 10 copy running config startup config Optional Saves your entries in the configuration file Command Purpose 1 configure ...

Страница 235: ...tion 13 copy running config startup config Optional Saves your entries in the configuration file Command Purpose Command Purpose 1 configure terminal Enters global configuration mode 2 ip device tracking Configures the IP device tracking table 3 aaa new model Enables AAA 4 aaa authorization network default group radius Sets the authorization method to local To remove the authorization method use t...

Страница 236: ...ace interface id Enters interface configuration mode 4 ip access group acl id in Configures the default ACL on the port in the input direction Note The acl id is an access list name or number 5 exit Returns to global configuration mode 6 aaa new model Enables AAA 7 aaa authorization network default group radius Sets the authorization method to local To remove the authorization method use the no aa...

Страница 237: ...hentication host mode multi auth multi domain multi host single host Optional Sets the authorization manager mode on a port 6 authentication open Optional Enables or disables open access on a port 7 authentication order dot1x mab webauth Optional Sets the order of authentication methods used on a port 8 authentication periodic Optional Enables or disables reauthentication on a port 9 authenticatio...

Страница 238: ...ost Switch config if end Enabling MDA Example This example shows how to enable MDA and to allow both a host and a voice device on the port Switch config interface GigabitEthernet1 18 Switch config if authentication port control auto Switch config if authentication host mode multi domain Switch config if switchport voice vlan 101 Switch config if end Disabling the VLAN Upon Switch Violoation Exampl...

Страница 239: ...f seconds that the switch waits for a response to an EAP request identity frame from the client before resending the request and to enable VLAN 2 as an 802 1x guest VLAN when an 802 1x port is connected to a DHCP client Switch config if authentication timer inactivity 3 Switch config if authentication timer reauthenticate 15 Switch config if authentication event no response action authorize vlan 2...

Страница 240: ...o the groups and to verify the VLAN group configurations and mapping to the specified VLANs switch config vlan group eng dept vlan list 10 switch config show vlan group group name eng dept Group Name Vlans Mapped eng dept 10 switch show dot1x vlan group all Group Name Vlans Mapped eng dept 10 hr dept 20 This example shows how to add a VLAN to an existing VLAN group and to verify that the VLAN was ...

Страница 241: ...itch as a supplicant Switch configure terminal Switch config cisp enable Switch config dot1x credentials test Switch config username suppswitch Switch config password myswitch Switch config dot1x supplicant force multicast Switch config interface GigabitEthernet1 17 Switch config if switchport mode trunk Switch config if dot1x pae supplicant Switch config if dot1x credentials test Switch config if...

Страница 242: ...ol direction both Switch config au ten tic at ion fallback profile1 Switch config authentication host mode multi auth Switch config authentication open Switch config authentication order dot1x webauth Switch config authentication periodic Switch config authentication port control auto Additional References The following sections provide references related to switch administration ...

Страница 243: ...port for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs ...

Страница 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...

Страница 245: ...s are not detected by the web based authentication feature because they do not send ARP messages Hosts that are more than one hop away might experience traffic disruption if an STP topology change results in the host traffic arriving on a different port This occurs because the ARP and DHCP updates might not be sent after a Layer 2 STP topology change Web based authentication does not support VLAN ...

Страница 246: ...ntication Customizable Web Pages page 246 Web Based Authentication Interactions with Other Features page 247 Device Roles With web based authentication the devices in the network have these specific roles Client The device workstation that requests access to the LAN and the services and responds to requests from the switch The workstation must be running an HTML browser with Java Script enabled Au...

Страница 247: ...HTTP session The HTTP traffic is intercepted and authorization is initiated The switch sends the login page to the user The user enters a username and password and the switch sends the entries to the authentication server If the authentication succeeds the switch downloads and activates the user s access policy from the authentication server The login success page is sent to the user If the authen...

Страница 248: ...sion auth proxy banner http global configuration command The default banner Cisco Systems and Switch host name Authentication appear on the Login Page Cisco Systems appears on the authentication result pop up page as shown in Figure 25 on page 244 Figure 25 Authentication Successful Banner You can also customize the banner as shown in Figure 26 on page 245 Add a switch router or company name to th...

Страница 249: ... enable a banner only the username and password dialog boxes appear in the web authentication login screen and no banner appears when you log into the switch as shown in Figure 27 Figure 27 Login Screen with No Banner For more information see the Cisco IOS Security Command Reference and Configuring a Web Authentication Local Banner page 252 ...

Страница 250: ...e The CLI command to redirect users to a specific URL is not available when the configured login form is enabled The administrator should ensure that the redirection is configured in the web page If the CLI command redirecting users to a specific URL after authentication occurs is entered and then the command configuring web pages is entered the CLI command redirecting users to a specific URL does...

Страница 251: ...login feature is not available To remove the specification of a custom file use the no form of the command Because the custom login page is a public web form consider these guidelines for the page The login form must accept user entries for the username and password and must show them as uname and pwd The custom login page should follow best practices for a web form such as page timeout hidden pas...

Страница 252: ...n on the same Layer 3 interface as Gateway IP The host policies for both features are applied in software The GWIP policy overrides the web based authentication host policy ACLs If you configure a VLAN ACL or a Cisco IOS ACL on an interface the ACL is applied to the host traffic only after the web based authentication host policy is applied For Layer 2 web based authentication you must configure a...

Страница 253: ... same service for example authentication the second host entry that is configured functions as the failover backup to the first one The RADIUS host entries are chosen in the order that they were configured How to Configure Web Based Authentication Configuring the Authentication Rule and Interfaces Feature Default Settings AAA Disabled RADIUS server IP address UDP authentication port Key None speci...

Страница 254: ...e remote RADIUS server The test username username option enables automated testing of the RADIUS server connection The specified username does not need to be a valid user name 5 radius server key string Configures the authorization and encryption key used between the switch and the RADIUS daemon running on the RADIUS server To use multiple RADIUS servers reenter this command for each server Comman...

Страница 255: ...fies the number of unanswered sent messages to a RADIUS server before considering the server to be inactive The range of num tries is 1 to 100 Command Purpose Command Purpose 1 ip http server Enables the HTTP server The web based authentication feature uses the HTTP server to communicate with the hosts for user authentication 2 ip http secure server Enables HTTPS Command Purpose 1 ip admission pro...

Страница 256: ...o 2147483647 attempts The default is 5 2 end Returns to privileged EXEC mode 3 show ip admission configuration Displays the authentication proxy configuration 4 show ip admission cache Displays the list of authentication entries 5 copy running config startup config Optional Saves your entries in the configuration file Command Purpose 1 configure terminal Enters global configuration mode 2 ip admis...

Страница 257: ...5 Enabling AAA Example This example shows how to enable AAA Switch config aaa new model Switch config aaa authentication login default group radius Switch config aaa authorization auth proxy default group radius Configuring the RADIUS Server Parameters Example This example shows how to configure the RADIUS server parameters on a switch Switch config ip radius source interface Vlan80 Switch config ...

Страница 258: ...tication Proxy Session ratelimit is 100 Authentication Proxy Watch list is disabled Authentication Proxy Auditing is disabled Max Login attempts per user is 5 Configuring a Redirection URL Example This example shows how to configure a redirection URL for successful login Switch config ip admission proxy http success redirect www cisco com Verifying a Redirection URL Example This example shows how ...

Страница 259: ...thentication Session Example This example shows how to remove the web based authentication session for the client at the IP address 209 165 201 1 Switch clear ip auth proxy cache 209 165 201 1 Additional References The following sections provide references related to switch administration ...

Страница 260: ...g standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been mod...

Страница 261: ... Macro Name1 Description Global Configuration Macros cisco cg global Use this global configuration macro to configure the switch settings for the industrial Ethernet environment This macro is automatically applied when you use Express Setup to initially configure the switch Note You must first apply the cisco cg global macro for the interface configuration macros to work properly cisco cg password...

Страница 262: ...ess point This macro is optimized for utility deployments no cisco cg wireless Use the no form of this interface configuration macro to delete the macro from the switch cisco desktop Use this interface configuration macro for increased network security and reliability when connecting a desktop device such as a PC to a switch port This macro is optimized for utility deployments no cisco desktop Use...

Страница 263: ...o the remaining interfaces When you apply a macro to a switch or a switch interface the macro name is automatically added to the switch or interface You can display the applied commands and macro names by using the show running config user EXEC command Applying Smartports Macros cisco ie router Use this interface configuration macro when connecting the switch and a WAN router This macro is optimiz...

Страница 264: ...cro 6 default interface interface id Optional Clears all configuration from the specified interface 7 macro apply trace macro name parameter value parameter value parameter value Applies each individual command defined in the macro to the port by entering macro global apply macro name Specifies macro global trace macro name to apply and to debug a macro to find any syntax or configuration errors A...

Страница 265: ...rity aging time 2 switchport port security violation restrict switchport port security aging type inactivity spanning tree portfast spanning tree bpduguard enable no macro description macro description cisco ie desktop Switch Switch configure terminal Switch config interface GigabitEthernet1 20 Switch config if macro apply cisco ie desktop AVID 25 Additional References The following sections provi...

Страница 266: ...Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of pa...

Страница 267: ...he SXP Connections page 267 Configuring Cisco TrustSec Caching page 268 Cisco TrustSec SGT Exchange Protocol Feature Histories For a list of supported TrustSec features per platform and the minimum required IOS release see the Cisco TrustSec Platform Support Matrix at the following URL final URL posted with TS 4 0 http www cisco com en US solutions ns170 ns896 ns1051 trustsec_matrix html Otherwise...

Страница 268: ...ng password protection make sure to use the same password on both ends Note If a default SXP source IP address is not configured and you do not configure an SXP source address in the connection the Cisco TrustSec software derives the SXP source IP address from existing local IP addresses The SXP source address might be different for each TCP connection initiated from the switch To configure the SX...

Страница 269: ...config cts sxp connection peer peer ipv4 addr source src ipv4 addr password default none mode local peer speaker listener vrf vrf name Configures the SXP address connection The optional source keyword specifies the IPv4 address of the source device If no address is specified the connection will use the default source address if configured or the address of the port The password keyword specifies t...

Страница 270: ... 2 2 Changing the SXP Reconciliation Period After a peer terminates an SXP connection an internal hold down timer starts If the peer reconnects before the internal hold down timer expires the SXP reconciliation period timer starts While the SXP reconciliation period timer is active the Cisco TrustSec software retains the SGT mapping entries learned from the previous connection and removes invalid ...

Страница 271: ...dress to SGT binding occurs add delete change These changes are learned and propagated on the SXP connection The default is no cts sxp log binding changes To enable logging of binding changes perform the following task Verifying the SXP Connections To view the SXP connections perform this task Command Purpose 1 Router configure terminal Enters configuration mode 2 Router config cts sxp reconciliat...

Страница 272: ... outages you can enable caching of authentication authorization and policy information for Cisco TrustSec connections Caching allows Cisco TrustSec devices to use unexpired security information to restore links after an outage without requiring a full reauthentication of the Cisco TrustSec domain The Cisco TrustSec devices will cache security information in DRAM If non volatile NV storage is also ...

Страница 273: ...ode 2 Router config no cts cache enable Enables caching of authentication authorization and environment data information to DRAM The default is disabled The no form of this command deletes all cached information from DRAM and non volatile storage 3 Router config no cts cache nv storage bootdisk bootflash disk0 directory dir name When DRAM caching is enabled enables DRAM cache updates to be written...

Страница 274: ...270 Configuring SGT Exchange Protocol over TCP SXP and Layer 3 Transport Configuring Cisco TrustSec Caching ...

Страница 275: ...ack bridging as shown in Figure 29 on page 271 Because a VLAN is considered a separate logical network it contains its own bridge Management Information Base MIB information and can support its own implementation of spanning tree See Configuring STP page 315 Note Before you create VLANs you must decide whether to use VLAN Trunking Protocol VTP to maintain global VLAN configuration for your network...

Страница 276: ...rsions the switch must be in VTP transparent mode when you create VLAN IDs from 1006 to 4096 This release supports VTP version 3 VTP version 3 supports the entire VLAN range VLANs 1 to 4096 Extended range VLANs VLANs 1006 to 4096 are supported only in VTP version 3 You cannot convert from VTP version 3 to VTP version 2 if extended VLANs are configured in the domain Although the switch supports a t...

Страница 277: ...of a second switch Trunk ISL or IEEE 802 1Q A trunk port is a member of all VLANs by default including extended range VLANs but membership can be limited by configuring the allowed VLAN list You can also modify the pruning eligible list to block flooded traffic to VLANs on trunk ports that are included in the list For information about configuring trunk ports see Configuring an Ethernet Interface ...

Страница 278: ... always saved in the VLAN database vlan dat file If the VTP mode is transparent they are also saved in the switch running configuration file You can enter the copy running config startup config privileged EXEC command to save the configuration in the startup configuration file To display the VLAN configuration enter the show vlan privileged EXEC command When you save VLAN and VTP information inclu...

Страница 279: ...support Token Ring or FDDI media The switch does not forward FDDI FDDI Net TrCRF or TrBRF traffic but it does propagate the VLAN configuration through VTP The switch supports 128 spanning tree instances If a switch has more active VLANs than supported spanning tree instances spanning tree can be enabled on 128 VLANs and is disabled on the remaining VLANs If you have already used all available span...

Страница 280: ... 1002 to 1005 Caution When you delete a VLAN any ports assigned to that VLAN become inactive They remain associated with the VLAN and thus inactive until you assign them to a new VLAN Static Access Ports for a VLAN You can assign a static access port to a VLAN without having VTP globally propagate VLAN configuration information by disabling VTP VTP transparent mode If you are assigning a port on a...

Страница 281: ... 2 you can set the VTP mode to transparent in global configuration mode See Adding a VTP Client Switch to a VTP Domain page 303 You should save this configuration to the startup configuration so that the switch boots up in VTP transparent mode Otherwise you lose the extended range VLAN configuration if the switch resets If you create extended range VLANs in VTP version 3 you cannot convert to VTP ...

Страница 282: ...configuration command to disable trunking To enable trunking to a device that does not support DTP use the switchport mode trunk and switchport nonegotiate interface configuration commands to cause the interface to become a trunk but to not generate DTP frames IEEE 802 1Q Configuration Guidelines The IEEE 802 1Q trunks impose these restrictions on the trunking strategy for a network Table 35 Layer...

Страница 283: ...ning tree Default Layer 2 Ethernet Interface VLAN Settings Ethernet Interface as a Trunk Port Because trunk ports send and receive VTP advertisements to use VTP you must ensure that at least one trunk port is configured on the switch and that this trunk port is connected to the trunk port of a second switch Otherwise the switch cannot receive any VTP advertisements Note By default an interface is ...

Страница 284: ...rface continues to send and receive management traffic for example Cisco Discovery Protocol CDP Port Aggregation Protocol PAgP Link Aggregation Control Protocol LACP DTP and VTP in VLAN 1 If a trunk port with VLAN 1 disabled is converted to a nontrunk port it is added to the access VLAN If the access VLAN is set to 1 the port will be added to VLAN 1 regardless of the switchport trunk allowed setti...

Страница 285: ... 2 In this way Trunk 1 carries traffic for VLANs 8 through 10 and Trunk 2 carries traffic for VLANs 3 through 6 If the active trunk fails the trunk with the lower priority takes over and carries the traffic for all of the VLANs No duplication of traffic occurs over any trunk port Figure 30 Load Sharing by Using STP Port Priorities Load Sharing Using STP Path Cost You can configure parallel trunks ...

Страница 286: ...is not allowed on the port and the VMPS is in open mode the VMPS sends an access denied response If the VLAN is not allowed on the port and the VMPS is in secure mode the VMPS sends a port shutdown response If the port already has a VLAN assignment the VMPS provides one of these responses If the VLAN in the database matches the current VLAN on the port the VMPS sends a success response allowing ac...

Страница 287: ... addresses seen Default VMPS Client Settings VMPS Configuration Guidelines These guidelines and restrictions apply to dynamic access port VLAN membership You should configure the VMPS before you configure ports as dynamic access ports When you configure a port as a dynamic access port the spanning tree Port Fast feature is automatically enabled for that port The Port Fast mode accelerates the proc...

Страница 288: ... connecting to the network More than 20 active hosts reside on a dynamic access port To reenable a disabled dynamic access port enter the shutdown interface configuration command followed by the no shutdown interface configuration command How to Configure VLANs Creating or Modifying an Ethernet VLAN Command Purpose 1 configure terminal Enters global configuration mode 2 vlan vlan id Enters a VLAN ...

Страница 289: ...s the port to a VLAN Valid VLAN IDs are 1 to 4096 5 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 vtp mode transparent Configures the switch for VTP transparent mode and disables VTP Note This step is not required for VTP version 3 3 vlan vlan id Enters an extended range VLAN ID and enters VLAN configuration mode The range is 1006 to 40...

Страница 290: ...rface ID for the routed port that you shut down in Step 4 and enters interface configuration mode 10 no shutdown Reenables the routed port It will be assigned a new internal VLAN ID 11 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Specifies the port to be configured for trunking and enters interface configuration ...

Страница 291: ...C mode Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Selects the trunk port for which VLANs should be pruned and enters interface configuration mode 3 switchport trunk pruning vlan add except none remove vlan list vlan vlan Configures the list of VLANs allowed to be pruned from the trunk See VTP Pruning page 300 4 end Returns to privileged EXEC mode...

Страница 292: ...to configure the trunk ports that connect to the trunk ports configured on Switch A 14 show vlan When the trunk links come up VTP passes the VTP and VLAN information to Switch B Verifies that Switch B has learned the VLAN configuration 15 configure terminal Enters global configuration mode on Switch A 16 interface interface id_1 Defines the interface to set the STP port priority and enters interfa...

Страница 293: ...erminal Enters global configuration mode 10 interface interface id_1 Defines the interface on which to set the STP cost and enters interface configuration mode 11 spanning tree vlan 2 4 cost 30 Sets the spanning tree path cost to 30 for VLANs 2 through 4 12 end Returns to global configuration mode 13 Repeat Steps 9 through 12 on the other configured trunk interface on Switch A and set the spanning...

Страница 294: ...port that is connected to the end station and enters interface configuration mode 3 switchport mode access Sets the port to access mode 4 switchport access vlan dynamic Configures the port as eligible for dynamic VLAN membership The dynamic access port must be connected to an end station 5 end Returns to privileged EXEC mode Command Purpose copy running config startup config Saves your entries in ...

Страница 295: ...to the VLAN database Switch configure terminal Switch config vlan 20 Switch config vlan name test20 Switch config vlan end Primary VMPS Server 1 Catalyst 6500 series Secondary VMPS Server 2 Catalyst 6500 series Secondary VMPS Server 3 172 20 26 150 172 20 26 151 Catalyst 6500 series switch A 172 20 26 152 Switch C Ethernet segment Trunk link 172 20 26 153 172 20 26 154 172 20 26 155 172 20 26 156 ...

Страница 296: ...example shows how to configure a port as an IEEE 802 1Q trunk The example assumes that the neighbor interface is configured to support IEEE 802 1Q trunking Switch config interface GigabitEthernet1 18 Switch config if switchport mode dynamic desirable Switch config if end Removing a VLAN Example This example shows how to remove VLAN 2 from the allowed VLAN list on a port Switch config interface Gig...

Страница 297: ...his feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support...

Страница 298: ...294 Configuring VLANs Additional References ...

Страница 299: ...mode Information About Configuring VTP VTP A VLAN Trunking Protocol VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the addition deletion and renaming of VLANs on a network wide basis VTP minimizes misconfigurations and configuration inconsistencies that can cause several problems such as duplicate VLAN names incorrect VLAN type specifications and secu...

Страница 300: ...on a VTP server and VLAN information is not propagated over the network If the switch receives a VTP advertisement over a trunk link it inherits the management domain name and the VTP configuration revision number The switch then ignores advertisements with a different domain name or an earlier configuration revision number When you make a change to the VLAN configuration on a VTP server the chang...

Страница 301: ...s received over trunk links VTP server is the default mode Note In VTP server mode VLAN configurations are saved in NVRAM If the switch detects a failure while writing a configuration to NVRAM VTP mode automatically changes from server mode to client mode If this happens the switch cannot be returned to VTP server mode until the NVRAM is functioning VTP client A VTP client behaves like a VTP serve...

Страница 302: ...eserved multicast address Neighboring switches receive these advertisements and update their VTP and VLAN configurations as necessary VTP advertisements distribute this global domain information VTP domain name VTP configuration revision number Update identity and update timestamp MD5 digest VLAN configuration including maximum transmission unit MTU size for each VLAN Frame format VTP advertisemen...

Страница 303: ... Spanning Tree MST protocol database information A separate instance of the VTP protocol runs for each application that uses VTP VTP primary server and VTP secondary servers A VTP primary server updates the database information and sends updates that are honored by all devices in the system A VTP secondary server can only back up the updated VTP configurations received from the primary server to i...

Страница 304: ...low both kinds of neighbors to coexist on the same trunk A VTP version 3 device does not accept configuration information from a VTP version 2 or version 1 device Two VTP version 3 regions can only communicate in transparent mode over a VTP version 1 or version 2 region Devices that are only VTP version 1 capable cannot interoperate with VTP version 3 devices VTP version 2 and version 3 are disabl...

Страница 305: ...TP domain In VTP version 3 you must manually enable pruning on each switch in the domain See Enabling VTP Pruning page 305 VTP pruning takes effect several seconds after you enable it VTP pruning does not prune traffic from VLANs that are pruning ineligible VLAN 1 and VLANs 1002 to 1005 are always pruning ineligible traffic from these VLANs cannot be pruned Extended range VLANs VLAN IDs higher tha...

Страница 306: ...n both the startup configuration and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file the VLAN database is ignored cleared The VTP and VLAN configurations in the startup configuration file are used The VLAN database revision number remains unchanged in the VLAN database If the VTP mode or the domain name in the startup configuration do...

Страница 307: ...tion revision number of the other switches in the VTP domain Switches in a VTP domain always use the VLAN configuration of the switch with the highest VTP configuration revision number With VTP versions 1 and 2 adding a switch that has a revision number higher than the revision number in the VTP domain can erase all VLAN information from the VTP server and VTP domain With VTP version 3 the VLAN in...

Страница 308: ...icting servers If you do not enter force you are prompted for confirmation before the takeover 2 end Returns to privileged EXEC mode 3 show vtp status Verifies your entries in the VTP Operating Mode and the VTP Domain Name fields of the display 4 copy running config startup config Optional Saves the configuration in the startup configuration file Note Only VTP mode and domain name are saved in the...

Страница 309: ...vtp version 1 2 3 Enables the VTP version on the switch The default is VTP version 1 3 end Returns to privileged EXEC mode 4 show vtp status Verifies that the configured VTP version is enabled 5 copy running config startup config Optional Saves the configuration in the startup configuration file Command Purpose 1 configure terminal Enters global configuration mode 2 vtp pruning Enables pruning in ...

Страница 310: ...ame Enters the original domain name on the switch 8 end Returns to privileged EXEC mode 9 show vtp status Optional Verifies that the domain name is the same as in Step 1 and that the configuration revision number is 0 10 After resetting the configuration revision number add the switch to the VTP domain Command Purpose show vtp counters Displays counters about VTP messages that have been sent and r...

Страница 311: ...n password and how it appears Switch config vtp password mypassword hidden Generating the secret associated to the password Switch config end Switch show vtp password VTP password 89914640C8D90868B6A0D8103847A733 Configuring a VTP Version 3 Primary Server Example This example shows how to configure a switch as the primary server for the VLAN database the default when a hidden or secret password wa...

Страница 312: ...ied standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are suppo...

Страница 313: ... QoS uses classification and scheduling to send network traffic from the switch in a predictable manner Voice VLAN is referred to as an auxiliary VLAN in some switch documentation The Cisco 7960 IP Phone is a configurable device and you can configure it to forward traffic with an IEEE 802 1p priority You can configure the switch to trust or override the traffic priority assigned by a Cisco IP phon...

Страница 314: ... priority tagging to give voice traffic a higher priority and forward all voice traffic through the native access VLAN The Cisco IP phone can also send untagged voice traffic or use its own configuration to send voice traffic in the access VLAN In all configurations the voice traffic carries a Layer 3 IP precedence value the default is 5 Cisco IP Phone Data Traffic The switch can also process tagg...

Страница 315: ...all switch interfaces The Port Fast feature is automatically enabled when voice VLAN is configured When you disable voice VLAN the Port Fast feature is not automatically disabled If the Cisco IP phone and a device attached to the phone are in the same VLAN they must be in the same IP subnet These conditions indicate that they are in the same VLAN They both use IEEE 802 1p or untagged frames The Ci...

Страница 316: ... phone how to send data packets from the device attached to the access port on the Cisco IP phone The PC can generate packets with an assigned CoS value You can configure the phone to not change trust or to override not trust the priority of frames arriving on the phone port from connected devices How to Configure Voice VLAN Configuring the Priority of Incoming Data Frames Monitoring and Maintaini...

Страница 317: ...ple This example shows how to configure a port connected to a Cisco IP phone to not change the priority of frames received from the PC or the attached device Switch config interface GigabitEthernet1 17 Switch config if switchport priority extend trust Switch config if end Additional References for Configuring Voice VLAN The following sections provide references related to switch administration ...

Страница 318: ...cted port configuration Configuring Protected Ports Secure port configuration Configuring Port Security Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform un...

Страница 319: ... preventing loops in the network For a Layer 2 Ethernet network to function properly only one active path can exist between any two stations Multiple active paths among end stations cause loops in the network If a loop exists in the network end stations might receive duplicate messages Switches might also learn end station MAC addresses on multiple Layer 2 interfaces These conditions result in an ...

Страница 320: ...tch The port identifier port priority and MAC address associated with each Layer 2 interface When the switches in a network are powered up each functions as the root switch Each switch sends a configuration BPDU through all of its ports The BPDUs communicate and compute the spanning tree topology Each configuration BPDU contains this information The unique bridge ID of the switch that the sending ...

Страница 321: ...xtended system ID value equal to the VLAN ID Spanning tree uses the extended system ID the switch priority and the allocated spanning tree MAC address to make the bridge ID unique for each VLAN Support for the extended system ID affects how you manually configure the root switch the secondary root switch and the switch priority of a VLAN For example when you change the switch priority value you ch...

Страница 322: ... spanning tree is enabled by default and every interface in the switch VLAN or network goes through the blocking state and the transitory states of listening and learning Spanning tree stabilizes each interface at the forwarding or blocking state When the spanning tree algorithm places a Layer 2 interface in the forwarding state this process occurs 1 The interface is in the listening state while s...

Страница 323: ...warding Does not learn addresses Receives BPDUs Listening State The listening state is the first state a Layer 2 interface enters after the blocking state The interface enters this state when the spanning tree decides that the interface should participate in frame forwarding An interface in the listening state performs these functions Discards frames received on the interface Discards frames switc...

Страница 324: ...orwarding interfaces or link types Switch A might not be the ideal root switch By increasing the priority lowering the numerical value of the ideal switch so that it becomes the root switch you force a spanning tree recalculation to form a new topology with the ideal switch as the root Figure 37 Spanning Tree Topology When the spanning tree topology is calculated based on default parameters the pa...

Страница 325: ...sses between 0x0180C2000000 and 0x0180C200000F If spanning tree is enabled the CPU on the switch receives packets destined for 0x0180C2000000 and 0x0180C2000010 If spanning tree is disabled the switch forwards those packets as unknown multicast addresses Accelerated Aging to Retain Connectivity The default for aging dynamic addresses is 5 minutes the default setting of the mac address table aging ...

Страница 326: ...figuration The benefit of rapid PVST is that you can migrate a large PVST install base to rapid PVST without having to learn the complexities of the MSTP configuration and without having to reprovision your network In rapid PVST mode each VLAN runs its own spanning tree instance up to the maximum supported MSTP This spanning tree mode is based on the IEEE 802 1s standard You can map multiple VLANs...

Страница 327: ...bines the spanning tree instance of the IEEE 802 1Q VLAN of the trunk with the spanning tree instance of the non Cisco IEEE 802 1Q switch However all PVST or rapid PVST information is maintained by Cisco switches separated by a cloud of non Cisco IEEE 802 1Q switches The non Cisco IEEE 802 1Q cloud separating the Cisco switches is treated as a single trunk link between the switches PVST is automat...

Страница 328: ...antly lower value When you enter this command the software checks the switch priority of the root switches for each VLAN Because of the extended system ID support the switch sets its own priority for the specified VLAN to 24576 if this value will cause this switch to become the root for the specified VLAN If any root switch for the specified VLAN has a switch priority lower than 24576 the switch s...

Страница 329: ...iguration commands Secondary Root Switch When you configure a switch as the secondary root the switch priority is modified from the default value 32768 to 28672 The switch is then likely to become the root switch for the specified VLAN if the primary root switch fails This is assuming that the other network switches use the default switch priority of 32768 and therefore are unlikely to become the ...

Страница 330: ...orts Depending on the topology of the network this could create a loop in the new VLAN that will not be broken particularly if there are several adjacent switches that have all run out of spanning tree instances You can prevent this possibility by setting up allowed lists on the trunk ports of switches that have used up their allocation of spanning tree instances Setting up allowed lists is not ne...

Страница 331: ...ysical ports VLANs and port channels 4 spanning tree link type point to point Recommended for rapid PVST mode only Specifies that the link type for this port is point to point If you connect this port local port to a remote port through a point to point link and the local port becomes a designated port the switch negotiates with the remote port and rapidly changes the local port to the forwarding ...

Страница 332: ... Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 spanning tree vlan vlan id root secondary diameter net diameter hello time seconds Configures a switch to become the secondary root for the specified VLAN vlan id Specifies a single VLAN identified by VLAN ID number a range of VLANs separated by a hyphen or a series of VLANs separated by a comm...

Страница 333: ...d Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Specifies an interface to configure and enters interface configuration mode Valid interfaces include physical ports and port channel logical interfaces port channel port channel number 3 spanning tree cost cost Configures the cost for an interface 4 spanning tree vlan vl...

Страница 334: ...Rapid PVST mode Lowering this value can slow down convergence in certain scenarios We recommend that you maintain the default setting 8 end Returns to privileged EXEC mode Command Purpose Command Purpose show spanning tree active Displays spanning tree information on active interfaces only show spanning tree detail Displays a detailed summary of interface information show spanning tree interface i...

Страница 335: ...ptional Spanning Tree Features page 353 Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw cent...

Страница 336: ...332 Configuring STP Additional References ...

Страница 337: ...AN spanning tree plus rapid PVST MSTP MSTP which uses RSTP for rapid convergence enables VLANs to be grouped into a spanning tree instance with each instance having a spanning tree topology independent of other spanning tree instances This architecture provides multiple forwarding paths for data traffic enables load balancing and reduces the number of spanning tree instances required to support a ...

Страница 338: ...ween MST Regions page 3 Note The implementation of the IEEE 802 1s standard changes some of the terminology associated with MST implementations Operations Within an MST Region The IST connects all the MSTP switches in a region When the IST converges the root of the IST becomes the CIST regional root called the IST master before the implementation of the IEEE 802 1s standard as shown in Figure 1 on...

Страница 339: ...on for example hello time forward time max age and max hops are configured only on the CST instance but affect all MST instances Parameters related to the spanning tree topology for example switch priority port VLAN cost and port VLAN priority can be configured on both the CST instance and the MST instance MSTP switches use Version 3 RSTP BPDUs or IEEE 802 1D STP BPDUs to communicate with legacy I...

Страница 340: ... information in the RSTP portion of the BPDU remain the same throughout the region and the same values are propagated by the region designated ports at the boundary Boundary Ports In the Cisco prestandard implementation a boundary port connects an MST region to a single spanning tree region running RSTP to a single spanning tree region running PVST or rapid PVST or to another MST region with a dif...

Страница 341: ...STI ports now have a special master role The boundary port is not the root port of the CIST regional root The MSTI ports follow the state and role of the CIST port The standard provides less information and it might be difficult to understand why an MSTI port can be alternately blocking when it receives no BPDUs MRecords In this case although the boundary role no longer exists the show commands id...

Страница 342: ...esult switch A blocks or keeps blocking its port preventing the bridging loop Figure 41 Detecting Unidirectional Link Failure Interoperability with IEEE 802 1D STP A switch running MSTP supports a built in protocol migration mechanism that enables it to interoperate with legacy IEEE 802 1D switches If this switch receives a legacy IEEE 802 1D configuration BPDU a BPDU with the protocol version set...

Страница 343: ... switch is attached to the LAN is called the designated port Alternate port Offers an alternate path toward the root switch to that provided by the current root port Backup port Acts as a backup for the path provided by a designated port toward the leaves of the spanning tree A backup port can exist only when two ports are connected in a loopback by a point to point link or when a switch has two o...

Страница 344: ... of Switch B Switch A sends a proposal message a configuration BPDU with the proposal flag set to Switch B proposing itself as the designated switch After receiving the proposal message Switch B selects as its new root port the port from which the proposal message was received forces all nonedge ports to the blocking state and sends an agreement message a BPDU with the agreement flag set through i...

Страница 345: ...onfigured as an edge port it transitions to the blocking state when the RSTP forces it to synchronize with new root information In general when the RSTP forces a port to synchronize with root information and the port does not satisfy any of the above conditions its port state is set to blocking After ensuring that all of the ports are synchronized the switch sends an agreement message to the desig...

Страница 346: ...DU to propose itself as the designated switch on that LAN The port role in the proposal message is always set to the designated port The sending switch sets the agreement flag in the RSTP BPDU to accept the previous proposal The port role in the agreement message is always set to the root port 2 Block 9 Forward 1 Proposal 4 Agreement 6 Proposal Root port Designated port 8 Agreement 10 Agreement Ed...

Страница 347: ...ree topology changes Detection Unlike IEEE 802 1D in which any transition between the blocking and the forwarding state causes a topology change only transitions from the blocking to the forwarding state cause a topology change with RSTP only an increase in connectivity is considered a topology change State changes on an edge port do not cause a topology change When an RSTP switch detects a topolo...

Страница 348: ...n of the MST configuration is not supported However you can manually configure the MST configuration region name revision number and VLAN to instance mapping on each switch within the MST region by using the command line interface CLI or through the SNMP support For load balancing across redundant paths in the network to work all VLAN to instance mapping assignments must match otherwise all traffi...

Страница 349: ...ning tree instance If any root switch for the specified instance has a switch priority lower than 24576 the switch sets its own priority to 4096 less than the lowest switch priority 4096 is the value of the least significant bit of a 4 bit switch priority value as shown in Table 1 on page 4 If your network consists of switches that both do and do not support the extended system ID it is unlikely t...

Страница 350: ...hared connection If you have a half duplex link physically connected point to point to a single port on a remote switch running MSTP you can override the default setting of the link type and enable rapid transitions to the forwarding state Neighbor Type A topology could contain both prestandard and IEEE 802 1s standard compliant devices By default ports can automatically detect prestandard devices...

Страница 351: ...ed to or removed from the VLANs that were previously mapped To specify a VLAN range use a hyphen for example instance 1 vlan 1 63 maps VLANs 1 through 63 to MST instance 1 To specify a VLAN series use a comma for example instance 1 vlan 10 20 30 maps VLANs 10 20 and 30 to MST instance 1 4 name name Specifies the configuration name The name string has a maximum length of 32 characters and is case s...

Страница 352: ... 7 This keyword is available only for MST instance 0 Optional hello time seconds Specifies the interval in seconds between the generation of configuration messages by the root switch The range is 1 to 10 seconds the default is 2 seconds 3 spanning tree mst instance id root secondary diameter net diameter hello time seconds Configures a switch as the secondary root switch instance id Specifies a si...

Страница 353: ...essages mean that the switch is alive seconds The range is 1 to 10 the default is 2 4 spanning tree mst forward time seconds Configures the forward time for all MST instances The forward delay is the number of seconds a port waits before changing from its spanning tree learning and listening states to the forwarding state seconds The range is 4 to 30 the default is 15 5 spanning tree mst max age s...

Страница 354: ... to 4096 cost The range is 1 to 200000000 the default value is derived from the media speed of the interface 10 spanning tree link type point to point Specifies that the link type of a port is point to point 11 spanning tree mst pre standard Specifies that the port can send only prestandard BPDUs 12 end Returns to privileged EXEC mode Command Purpose Command Purpose show spanning tree mst configur...

Страница 355: ... display the pending configuration apply the changes and return to global configuration mode Switch config spanning tree mst configuration Switch config mst instance 1 vlan 10 20 Switch config mst name region1 Switch config mst revision 1 Switch config mst show pending Pending MST configuration Name region1 Revision 1 Instance Vlans Mapped 0 1 9 21 4096 1 10 20 Switch config mst exit Switch config...

Страница 356: ...ee instances Chapter 22 Supported Spanning Tree Instances Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco ...

Страница 357: ...rt to the forwarding state from a blocking state bypassing the listening and learning states You can use PortFast on interfaces connected to a single workstation or server as shown in Figure 44 on page 354 to allow those devices to immediately connect to the network rather than waiting for the spanning tree to converge Interfaces connected to a single workstation or server should not receive bridg...

Страница 358: ... PortFast feature When the port receives a BPDU it is put in the error disabled state The BPDU guard feature provides a secure response to invalid configurations because you must manually put the interface back in service Use the BPDU guard feature in a service provider network to prevent an access port from participating in the spanning tree Enabling BPDU Guard When you globally enable BPDU guard...

Страница 359: ...feature This command prevents the interface from sending or receiving BPDUs Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in spanning tree loops You can enable the BPDU filtering feature for the entire switch or for an interface Enabling BPDU Filtering When you globally enable BPDU filtering on Port Fast enabled interfaces it prevents i...

Страница 360: ... if you enter zero station learning frames are not generated so the spanning tree topology converges more slowly after a loss of connectivity Note UplinkFast is most useful in wiring closet switches at the access or edge of the network It is not appropriate for backbone devices This feature might not be useful for other types of applications UplinkFast provides fast convergence after a direct link...

Страница 361: ...nfiguration command Note When you enable UplinkFast it affects all VLANs on the switch You cannot configure UplinkFast on an individual VLAN You can configure the UplinkFast feature for rapid PVST or for the MSTP but the feature remains disabled inactive until you change the spanning tree mode to PVST When UplinkFast is enabled the switch priority of all VLANs is set to 49152 If you change the pat...

Страница 362: ... root port to expire and becomes the root switch according to normal spanning tree rules If the switch has alternate paths to the root switch it uses these alternate paths to send a root link query RLQ request The switch sends the RLQ request on all alternate paths and waits for an RLQ reply from other switches in the network If the switch discovers that it still has an alternate path to the root ...

Страница 363: ...Us that indicate it is the root switch However the other switches ignore these inferior BPDUs and the new switch learns that Switch B is the designated switch to Switch A the root switch Figure 50 Adding a Switch in a Shared Medium Topology Enabling BackboneFast You can enable BackboneFast to detect indirect link failures and to start the spanning tree reconfiguration sooner Note If you use Backbo...

Страница 364: ... that connect to switches in your customer s network If spanning tree calculations cause an interface in the customer network to be selected as the root port root guard then places the interface in the root inconsistent blocked state to prevent the customer s switch from becoming the root switch or being in the path to the root If a switch outside the SP network becomes the root switch the interfa...

Страница 365: ...does not send BPDUs on root or alternate ports You can enable this feature by using the spanning tree loopguard default global configuration command When the switch is operating in PVST or rapid PVST mode loop guard prevents alternate and root ports from becoming designated ports and spanning tree does not send BPDUs on root or alternate ports When the switch is operating in MST mode BPDUs are not...

Страница 366: ... enable both loop guard and root guard at the same time When you enable UplinkFast it affects all VLANs on the switch You cannot configure UplinkFast on an individual VLAN If you enable the voice VLAN feature the PortFast feature is automatically enabled When you disable voice VLAN the PortFast feature is not automatically disabled Table 45 Default Optional Spanning Tree Settings Feature Default S...

Страница 367: ...unk ports you must use the spanning tree portfast trunk interface configuration command The spanning tree portfast command will not work on trunk ports By default PortFast is disabled on all interfaces 11 spanning tree guard root Enables root guard on the interface By default root guard is disabled on all interfaces 12 end Returns to privileged EXEC mode Command Purpose Command Purpose show spanni...

Страница 368: ...PVST configuratio Configuring STP page 315 Multiple Spanning Tree Protocol configuration Configuring MSTP page 333 Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a ...

Страница 369: ...ng of six ports spread across four switches Ports E1 and E2 are configured as edge ports When all ports are operational as in the segment on the left a single port is blocked shown by the diagonal line When there is a failure in the network as shown in the diagram on the right the blocked port returns to the forwarding state to minimize network disruption Figure 52 REP Open Segments The segment sh...

Страница 370: ...ost any type of network based on REP segments REP also supports VLAN load balancing controlled by the primary edge port but occurring at any port in the segment In access ring topologies the neighboring switch might not support REP as shown in Figure 54 on page 366 In this case you can configure the non REP facing ports E1 and E2 as edge no neighbor ports These ports inherit all properties of edge...

Страница 371: ...rts become unblocked By default REP packets are sent to a BPDU class MAC address The packets can also be sent to the Cisco multicast address which is used only to send blocked port advertisement BPA messages when there is a failure in the segment The packets are dropped by devices not running REP Fast Convergence Because REP runs on a physical link basis and not a per VLAN basis only one hello mes...

Страница 372: ...nt id preferred interface configuration command Figure 55 Neighbor Offset Numbers in a Segment When the REP segment is complete all VLANs are blocked When you configure VLAN load balancing you must also configure triggers in one of two ways Manually trigger VLAN load balancing at any time by entering the rep preempt segment segment id privileged EXEC command on the switch that has the primary edge...

Страница 373: ...ole and all other ports become open ports When a failure occurs in a link all ports move to the failed state When the alternate port receives the failure notification it changes to the open state forwarding all VLANs A regular segment port converted to an edge port or an edge port converted to a regular segment port does not always result in a topology change If you convert an edge port into a reg...

Страница 374: ...faces You must configure all trunk ports in the segment with the same set of allowed VLANs or a misconfiguration occurs REP ports follow these rules There is no limit to the number of REP ports on a switch however only two ports on a switch can belong to the same REP segment If only one port on a switch is configured in a segment the port should be an edge port If two ports on a switch belong to t...

Страница 375: ...ticast address These messages are flooded to the whole network not just the REP segment You can control flooding of these messages by configuring an administrative VLAN for the whole domain Follow these guidelines when configuring the REP administrative VLAN If you do not configure an administrative VLAN the default is VLAN 1 There can be only one administrative VLAN on a switch and on a segment H...

Страница 376: ...Configures a port with no external REP neighbors as an edge port The port inherits all properties of edge ports and you can configure them the same as any edge port Note Although each segment can have only one primary edge port if you configure edge ports on two different switches and enter the primary keyword on both switches the configuration is allowed However REP selects only one of these port...

Страница 377: ...ou would never enter an offset value of 1 to identify an alternate port preferred Selects the regular segment port previously identified as the preferred alternate port for VLAN load balancing vlan vlan list Blocks one VLAN or a range of VLANs vlan all Blocks all VLANs Note Enter this command only on the REP primary edge port 7 rep preempt delay seconds Optional You must enter this command and con...

Страница 378: ...VLAN 100 and verify the configuration by entering the show interface rep detail command on one of the REP interfaces Switch configure terminal Switch conf rep admin vlan 100 Switch conf if end Switch show interface GigabitEthernet1 17 rep detail Command Purpose 1 rep preempt segment segment id Manually triggers VLAN load balancing on the segment You will need to confirm the command before it is ex...

Страница 379: ...iseconds without receiving a hello from a neighbor Switch configure terminal Switch conf interface GigabitEthernet1 17 Switch conf if rep segment 1 edge primary Switch conf if rep stcn segment 2 5 Switch conf if rep block port 0009001818D68700 vlan all Switch conf if rep preempt delay 60 Switch conf if rep lsl age timer 6000 Switch conf if end This example shows how to configure an interface as th...

Страница 380: ...le Cisco IOS basic commands Cisco IOS Configuration Fundamentals Command Reference Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access ...

Страница 381: ...rfaces is in the linkup state and forwarding traffic If the primary link shuts down the standby link starts forwarding traffic When the active link comes back up it goes into standby mode and does not forward traffic STP is disabled on FlexLinks interfaces In Figure 57 on page 378 ports 1 and 2 on switch A are connected to uplink switches B and C Because they are configured as FlexLinks only one o...

Страница 382: ... reduces the multicast traffic convergence time after a FlexLinks failure Learning the Other FlexLinks Port as the mrouter Port In a typical multicast network there is a querier for each VLAN A switch deployed at the edge of a network has one of its FlexLinks ports receiving queries FlexLinks ports are also always forwarding at any given time A port that receives queries is added as an mrouter por...

Страница 383: ...p port which became the forwarding port MAC Address Table Move Update The MAC address table move update feature allows the switch to provide rapid bidirectional convergence when a primary forwarding link goes down and the standby link begins forwarding traffic In Figure 59 on page 380 switch A is an access switch and ports 1 and 2 on switch A are connected to uplink switches B and D through a Flex...

Страница 384: ...16 backup links You can configure only one FlexLinks backup link for any active link and it must be a different interface from the active interface An interface can belong to only one FlexLinks pair An interface can be a backup link for only one active link An active link cannot belong to another FlexLinks pair Switch C Port 3 Port 1 Port 2 Port 4 Switch A Switch B Switch D Server PC 141223 Defaul...

Страница 385: ...ports Follow these guidelines to configure VLAN load balancing on the FlexLinks feature For FlexLinks VLAN load balancing you must choose the preferred VLANs on the backup interface You cannot configure a preemption mechanism and VLAN load balancing for the same FlexLinks pair Follow these guidelines to configure the MAC address table move update feature You can enable and configure this feature o...

Страница 386: ...exLinks interface pair You can configure the preemption as forced The active interface always preempts the backup bandwidth The interface with the higher bandwidth always acts as the active interface off No preemption happens from active to backup 5 switchport backup interface interface id preemption delay delay time Configures the time delay until a port preempts another port Note Setting a delay...

Страница 387: ...the lowest VLAN ID on the interface Configures a physical Layer 2 interface or port channel and specifies the VLAN ID on the interface which is used for sending the MAC address table move update When one link is forwarding traffic the other interface is in standby mode 4 end Returns to global configuration mode 5 mac address table move update transmit Enables the access switch to send MAC address ...

Страница 388: ...n Group Type Version Port List 1 228 1 5 1 igmp v2 Gi1 17 Gi1 18 Fa2 1 1 228 1 5 2 igmp v2 Gi1 17 Gi1 18 Fa2 1 When a host responds to the general query the switch forwards this report on all the mrouter ports In this example when a host sends a report for the group 228 1 5 1 it is forwarded only on GigabitEthernet1 17 because the backup port GigabitEthernet1 18 is blocked When the active link Gig...

Страница 389: ...AN 1 which is interested in two multicast groups Switch show ip igmp snooping groups Vlan Group Type Version Port List 1 228 1 5 1 igmp v2 Gi1 17 Gi1 18 Gi1 17 1 228 1 5 2 igmp v2 Gi1 17 Gi1 18 Gi1 17 Whenever a host responds to the general query the switch forwards this report on all the mrouter ports When you turn on this feature through the command line port and when a report is forwarded by th...

Страница 390: ...Configuring VLAN Load Balancing on FlexLinks Examples In the following example VLANs 1 to 50 60 and 100 to 120 are configured on the switch Switch config interface gigabitEthernet 1 2 Switch config if switchport backup interface gigabitEthernet 1 2 prefer vlan 60 100 120 When both interfaces are up GigabitEthernet1 17 forwards traffic for VLANs 60 and 100 to 120 and GigabitEthernet1 18 forwards tr...

Страница 391: ...erface 1 2 5 4096 Vlans Preferred on Backup Interface 3 4 Preemption Mode off Bandwidth 10000 Kbit Fa1 3 100000 Kbit Fa1 4 Mac Address Move Update Vlan auto Configuring MAC Address Table Move Update Example This example shows how to configure an access switch to send MAC address table move update messages Switch conf interface GigabitEthernet1 17 Switch conf if switchport backup interface GigabitE...

Страница 392: ...rence Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Ti...

Страница 393: ...HCP packets between clients and servers Relay agents forward requests and replies between clients and servers when they are not on the same physical subnet Relay agent forwarding is different from the normal Layer 2 forwarding in which IP datagrams are switched transparently between networks Relay agents receive DHCP messages and generate new DHCP messages to send on output interfaces DHCP Snoopin...

Страница 394: ...packets are received on an untrusted interface If DHCP snooping is enabled and packets are received on a trusted port the aggregation switch does not learn the DHCP snooping bindings for connected devices and cannot build a complete DHCP snooping binding database When an aggregation switch can be connected to an edge switch through an untrusted interface and you enter the ip dhcp snooping informat...

Страница 395: ...assign IP addresses and implement policies such as restricting the number of IP addresses that can be assigned to a single remote ID or circuit ID The DHCP server then repeats the option 82 field in the DHCP reply The DHCP server unicasts the reply to the switch if the request was relayed to the server by the switch The switch verifies that it originally inserted the option 82 data by inspecting t...

Страница 396: ...ng information option format remote id global configuration command and the ip dhcp snooping vlan information option format type circuit id string interface configuration command are entered The values for these fields in the packets change from the default values when you configure the remote ID and circuit ID suboptions Circuit ID suboption fields The circuit ID type is 1 The length values are v...

Страница 397: ...y is 72 bytes followed by a space and then the checksum value To keep the bindings when the switch reloads you must use the DHCP snooping database agent If the agent is disabled dynamic ARP inspection or IP source guard is enabled and the DHCP snooping binding database has dynamic bindings the switch loses its connectivity If the agent is disabled and only DHCP snooping is enabled the switch does ...

Страница 398: ... bindings to its DHCP snooping binding database The switch ignores an entry when one of these situations occurs The switch reads the entry and the calculated checksum value does not equal the stored checksum value The entry and the ones following it are ignored An entry has an expired lease time the switch might not remove a binding entry when the lease time expires The interface in the entry no l...

Страница 399: ...er configure a port as trusted by entering the ip dhcp snooping trust interface configuration command If a switch port is connected to a DHCP client configure a port as untrusted by entering the no ip dhcp snooping trust interface configuration command Do not enter the ip dhcp snooping information option allow untrusted command on an aggregation switch to which an untrusted device is connected If ...

Страница 400: ... a feature that enables DHCP to maintain the same IP address on an Ethernet switch port regardless of the attached device client identifier or client hardware address When Ethernet switches are deployed in the network they offer connectivity to the directly connected devices In some environments such as on a factory floor if a device fails the replacement device must be working immediately in the ...

Страница 401: ...Address Command Purpose 1 configure terminal Enters global configuration mode 2 service dhcp Enables the DHCP server and relay agent on your switch By default this feature is enabled 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 interface vlan vlan id Creates a switch virtual interface by entering a VLAN ID and enters interface config...

Страница 402: ... a range of VLAN IDs separated by entering the starting and ending VLAN IDs separated by a space 4 ip dhcp snooping information option Enables the switch to insert and to remove DHCP relay information option 82 field in forwarded DHCP request messages to the DHCP server This is the default setting 5 ip dhcp snooping information option format remote id string ASCII string hostname Optional Configur...

Страница 403: ...ting for trusted interfaces you might need to increase the rate limit if the port is a trunk port assigned to more than one VLAN with DHCP snooping 11 exit Returns to global configuration mode 12 ip dhcp snooping verify mac address Optional Configures the switch to verify that the source MAC address in a DHCP packet received on untrusted ports matches the client hardware address in the packet The ...

Страница 404: ...ng database The vlan id range is from 1 to 4904 The seconds range is from 1 to 4294967295 Enter this command for each entry that you add Note Use this command when you are testing or debugging the switch Command Purpose Command Purpose 1 configure terminal Enters global configuration mode 2 ip dhcp use subscriber id client id Configures the DHCP server to globally use the subscriber identifier as ...

Страница 405: ...onfiguration of a specific interface show ip dhcp pool Displays the DHCP address pools show ip dhcp binding Displays address bindings on the Cisco IOS DHCP server ip dhcp snooping database timeout seconds Specifies in seconds how long to wait for the database transfer process to finish before stopping ip dhcp snooping database write delay seconds Specifies in seconds the duration for which the tra...

Страница 406: ...Subnet size first next 0 0 Total addresses 254 Leased addresses 0 Excluded addresses 4 Pending event none 1 subnet is currently in the pool Current index IP address range Leased Excluded Total 10 1 1 1 10 1 1 1 10 1 1 254 0 4 254 1 reserved address is currently in the pool Address Client 10 1 1 7 Et1 0 Enabling DHCP Snooping Example This example shows how to enable DHCP snooping globally and on VL...

Страница 407: ...on Guide Cisco IOS DHCP Configuration Task List Configuring DHCP chapter of the Cisco IOS IP Configuration Guide Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a pl...

Страница 408: ...404 Configuring DHCP Additional References ...

Страница 409: ...ciated with the IP address of Host A All hosts within the broadcast domain receive the ARP request and Host A responds with its MAC address However because ARP allows a gratuitous reply from a host even if an ARP request was not received an ARP spoofing attack and the poisoning of ARP caches can occur After the attack all traffic from the device under attack flows through the attacker s computer a...

Страница 410: ...ops invalid ARP packets DAI determines the validity of an ARP packet based on valid IP to MAC address bindings stored in a trusted database the DHCP snooping binding database This database is built by DHCP snooping if DHCP snooping is enabled on the VLANs and on the switch If the ARP packet is received on a trusted interface the switch forwards the packet without any checks On untrusted interfaces...

Страница 411: ...te a given ARP packet on all switches in the VLAN Rate Limiting of ARP Packets The switch CPU performs DAI validation checks therefore the number of incoming ARP packets is rate limited to prevent a denial of service attack By default the rate for untrusted interfaces is 15 packets per second pps Trusted interfaces are not rate limited You can change this setting by using the ip arp inspection lim...

Страница 412: ...eives many packets on the same VLAN with the same ARP parameters the switch combines the packets as one entry in the log buffer and generates a single system message for the entry If the log buffer overflows it means that a log event does not fit into the log buffer and the display for the show ip arp inspection log privileged EXEC command is affected Dashes in the display appears in place of all ...

Страница 413: ...all the interfaces combined on the channel receive an aggregate 400 pps The rate of incoming ARP packets on EtherChannel ports is equal to the sum of the incoming rate of packets from all the channel members Configure the rate limit for EtherChannel ports only after examining the rate of incoming ARP packets on the channel port members The rate of incoming packets on a physical port is checked aga...

Страница 414: ...ange Enables DAI on a per VLAN basis By default DAI is disabled on all VLANs vlan range Specifies a single VLAN identified by VLAN ID number a range of VLANs separated by a hyphen or a series of VLANs separated by a comma The range is 1 to 4096 Specifies the same VLAN ID for both switches 4 interface interface id Specifies the interface connected to the other switch and enters interface configurat...

Страница 415: ...14 4 exit Returns to global configuration mode 5 ip arp inspection filter arp acl name vlan vlan range static Applies the ARP ACL to the VLAN By default no defined ARP ACLs are applied to any VLAN arp acl name Specifies the name of the ACL created in Step 2 vlan range Specifies the VLAN that the switches and hosts are in You can specify a single VLAN identified by VLAN ID number a range of VLANs s...

Страница 416: ...tion mode 2 interface interface id Specifies the interface to be rate limited and enters interface configuration mode 3 ip arp inspection limit rate pps burst interval seconds none Limits the rate of incoming ARP requests and responses on the interface The default rate is 15 pps on untrusted interfaces and unlimited on trusted interfaces The burst interval is 1 second rate pps Specifies an upper l...

Страница 417: ...AC address in the Ethernet header against the target MAC address in ARP body This check is performed for ARP responses When enabled packets with different MAC addresses are classified as invalid and are dropped ip Checks the ARP body for invalid and unexpected IP addresses Addresses include 0 0 0 0 255 255 255 255 and all IP multicast addresses Sender IP addresses are checked in all ARP requests a...

Страница 418: ...ting of 0 The logs and interval settings interact If the logs number X is greater than interval seconds Y X divided by Y X Y system messages are sent every second Otherwise one system message is sent every Y divided by X Y X seconds 3 ip arp inspection vlan vlan range logging acl match matchlog none dhcp bindings all none permit Controls the type of packets that are logged per VLAN By default all ...

Страница 419: ...onal References The following sections provide references related to switch administration Command Description clear ip arp inspection log Clears the DAI log buffer clear ip arp inspection statistics Clears the DAI statistics show arp access list acl name Displays detailed information about ARP ACLs show errdisable recovery Displays the error disabled recovery timer information show ip arp inspect...

Страница 420: ...locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support w...

Страница 421: ... IPSG when DHCP snooping is enabled on an untrusted interface After IPSG is enabled on an interface the switch blocks all IP traffic received on the interface except for DHCP packets allowed by DHCP snooping A port access control list ACL is applied to the interface The port ACL allows only IP traffic with a source IP address in the IP source binding table and denies all other traffic Note The por...

Страница 422: ...s equivalent to port security at Layer 3 IPSG for static hosts also supports dynamic hosts If a dynamic host receives a DHCP assigned IP address that is available in the IP DHCP snooping table the same entry is learned by the IP device tracking table When you enter the show ip device tracking all EXEC command the IP device tracking table displays the entries as ACTIVE Note Some IP hosts with multi...

Страница 423: ...ping uses option 82 data to identify the host port When configuring IP source guard on interfaces on which a private VLAN is configured port security is not supported IP source guard is not supported on EtherChannels You can enable this feature when 802 1x port based authentication is enabled If the number of ternary content addressable memory TCAM entries exceeds the maximum the CPU usage increas...

Страница 424: ...e tracking port security Enables IPSG for static hosts with MAC address filtering Note When you enable both IPSG and port security by using the ip verify source port security interface configuration command The DHCP server must support option 82 or the client is not assigned an IP address The MAC address in the DHCP packet is not learned as a secure address The MAC address of the DHCP client is le...

Страница 425: ... stop IPSG with static hosts on an interface Switch config if no ip verify source Switch config if no ip device tracking max 10 end Returns to privileged EXEC mode 11 show ip verify source interface interface id Verifies the configuration and displays IPSG permit ACLs for static hosts 12 show ip device track all active inactive count Verifies the configuration by displaying the IP to MAC binding f...

Страница 426: ... reached the maximum Switch configure terminal Enter configuration commands one per line End with CNTL Z Switch config ip device tracking Switch config interface gigabitethernet 0 3 Switch config if switchport mode access Switch config if switchport access vlan 1 Switch config if ip device tracking maximum 5 Switch config if switchport port security Switch config if switchport port security maximu...

Страница 427: ...0600 0000 9 GigabitEthernet1 17 ACTIVE 200 1 1 2 0001 0600 0000 9 GigabitEthernet1 17 ACTIVE 200 1 1 3 0001 0600 0000 9 GigabitEthernet1 17 ACTIVE 200 1 1 4 0001 0600 0000 9 GigabitEthernet1 17 ACTIVE 200 1 1 5 0001 0600 0000 9 GigabitEthernet1 17 ACTIVE This example displays all inactive IP or MAC binding entries for all interfaces The host was first learned on GigabitEthernet 0 1 and then moved ...

Страница 428: ...rds Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new o...

Страница 429: ... to snoop on the IGMP transmissions between the host and the router and to keep track of multicast groups and member ports When the switch receives an IGMP report from a host for a particular multicast group the switch adds the host port number to the forwarding table entry when it receives an IGMP Leave Group message from a host it removes the host port from the table entry It also periodically d...

Страница 430: ...ess or on proxy reports An IGMPv3 switch supports Basic IGMPv3 Snooping Support BISS which includes support for the snooping features on IGMPv1 and IGMPv2 switches and for IGMPv3 membership report messages BISS constrains the flooding of multicast traffic when your network includes IGMPv3 hosts It constrains traffic to approximately the same set of ports as the IGMP snooping feature on IGMPv2 or I...

Страница 431: ...ckets for the multicast group The information in the table tells the switching engine to send frames addressed to the 224 1 2 3 multicast IP address that are not IGMP packets to the router and to the host that has joined the group If another host for example Host 4 sends an unsolicited IGMP join message for the same group Figure 66 on page 428 the CPU receives that message and adds the port number...

Страница 432: ...ng table If the router receives no reports from a VLAN it removes the group for the VLAN from its IGMP cache Immediate Leave Immediate Leave is only supported on IGMP Version 2 hosts The switch uses IGMP snooping Immediate Leave to remove from the forwarding table an interface that sends a leave message without the switch sending group specific queries to the interface The VLAN interface is pruned...

Страница 433: ... enabled the default the switch sends the first IGMP report from all hosts for a group to all the multicast routers The switch does not send the remaining IGMP reports for the group to the multicast routers This feature prevents duplicate reports from being sent to the multicast devices If the multicast router query includes requests only for IGMPv1 and IGMPv2 reports the switch forwards only the ...

Страница 434: ...ng 1 general query If you set the count to 7 the flooding continues until 7 general queries are received Groups are relearned based on the general queries received during the TCN event Flood Mode for TCN When a topology change occurs the spanning tree root sends a special IGMP leave message also known as global leave with the group multicast address 0 0 0 0 However when you enable the ip igmp snoo...

Страница 435: ...ible host with an Ethernet connection Although MVR operates on the underlying mechanism of IGMP snooping the two features operate independently of each other One can be enabled or disabled without affecting the behavior of the other feature However if IGMP snooping and MVR are both enabled MVR reacts only to join and leave messages from multicast groups configured under MVR Join and leave messages...

Страница 436: ...ticast stream when it is received from the multicast VLAN Uplink ports that send and receive multicast data to and from the multicast VLAN are called MVR source ports Figure 67 Multicast VLAN Registration Example When a subscriber changes channels or turns off the television the set top box sends an IGMP leave message for the multicast stream The switch CPU sends a MAC based general query through ...

Страница 437: ... ports and forward them to the multicast VLAN of the source uplink port based on the MVR mode Default MVR Settings MVR Configuration Guidelines and Limitations Receiver ports can only be access ports they cannot be trunk ports Receiver ports on a switch can be in different VLANs but should not belong to the multicast VLAN The maximum number of multicast entries MVR group addresses that can be conf...

Страница 438: ... has no relationship with the function that directs the forwarding of IP multicast traffic The filtering feature operates in the same manner whether CGMP or MVR is used to forward the multicast traffic IGMP filtering is applicable only to the dynamic learning of IP multicast group addresses not static configuration With the IGMP throttling feature you can set the maximum number of IGMP groups that...

Страница 439: ...ied only to Layer 2 ports You can use this command on a logical EtherChannel interface but cannot use it on ports that belong to an EtherChannel port group When the maximum group limitation is set to the default no maximum entering the ip igmp max groups action deny replace command has no effect If you configure the throttling action and set the maximum group limitation after an interface has adde...

Страница 440: ...ntrol traffic pim dvmrp Snoops on IGMP queries and PIM DVMRP packets This is the default 3 ip igmp snooping vlan vlan id mrouter interface interface id Adds a multicast router port adds a static connection to a multicast router Optional Specifies the multicast router VLAN ID and the interface to the multicast router The VLAN ID range is 1 to 1001 and 1006 to 4096 The interface can be a physical in...

Страница 441: ...olicitation is disabled Note Enable the switch to send the global leave message whether or not it is the spanning tree root 4 interface interface id Specifies the interface to be configured and enter interface configuration mode 5 no ip igmp snooping tcn flood Disables the flooding of multicast traffic during a spanning tree TCN event By default multicast flooding is enabled on an interface 6 end ...

Страница 442: ...d EXEC mode Command Purpose Command Purpose 1 configure terminal Enters global configuration mode 2 no ip igmp snooping report suppression Disables IGMP report suppression 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 mvr Enables MVR on the switch 3 mvr group ip address count Configures an IP multicast address on the switch or use the...

Страница 443: ...ports All source ports on a switch belong to the single multicast VLAN receiver Configures a port as a receiver port if it is a subscriber port and should only receive multicast data It does not receive data unless it becomes a member of the multicast group either statically or by using IGMP leave and join messages Receiver ports cannot belong to the multicast VLAN The default configuration is as ...

Страница 444: ...e the range command multiple times to enter multiple addresses or ranges of addresses 5 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Specifies the physical interface and enter interface configuration mode The interface must be a Layer 2 port that does not belong to an EtherChannel port group 3 ip igmp filter prof...

Страница 445: ...nooping ip_address Displays characteristics of the multicast group with the specified group IP address user Displays only the user configured multicast entries show ip igmp snooping mrouter vlan vlan id Displays information on dynamically learned and manually configured multicast router interfaces Note When you enable IGMP snooping the switch automatically learns the interface to which a multicast...

Страница 446: ...nal Switch config ip igmp snooping vlan 105 static 224 2 4 12 interface gigabitethernet1 1 Switch config end show mvr interface interface id members vlan vlan id Displays all MVR interfaces and their MVR configurations When a specific interface is entered displays this information Type Receiver or Source Status One of these Active means the port is part of a VLAN Up Down means that the port is for...

Страница 447: ...ows how to set the IGMP snooping querier feature to version 2 Switch configure terminal Switch config no ip igmp snooping querier version 2 Switch config end Enabling MVR Examples This example shows how to enable MVR configure the group address set the query time to 1 second 10 tenths specify the MVR multicast VLAN as VLAN 22 and set the MVR mode as dynamic Switch config mvr Switch config mvr grou...

Страница 448: ...ig igmp profile range 229 9 9 0 Switch config igmp profile end Switch show ip igmp profile 4 IGMP Profile 4 permit range 229 9 9 0 229 9 9 0 Applying an IGMP Profile Example This example shows how to apply IGMP profile 4 to a port Switch config interface GigabitEthernet1 18 Switch config if ip igmp filter 4 Switch config if end Limiting IGMP Groups Example This example shows how to limit to 25 the...

Страница 449: ...MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Techni...

Страница 450: ...446 Configuring IGMP Snooping and MVR Additional References ...

Страница 451: ... packets per second and for small frames This feature is enabled globally The threshold for small frames is configured for each interface With each method the port blocks traffic when the rising threshold is reached The port remains blocked until the traffic rate drops below the falling threshold if one is specified and then resumes normal forwarding If the falling suppression level is not specifi...

Страница 452: ...ted threshold percentages are approximations Depending on the sizes of the packets making up the incoming traffic the actual enforced threshold might differ from the configured level by several percentage points Note Storm control is supported on physical interfaces You can also configure storm control on an EtherChannel When storm control is configured on an EtherChannel the storm control setting...

Страница 453: ... all ports If unknown unicast and multicast traffic is forwarded to a protected port there could be security issues To prevent unknown unicast or multicast traffic from being forwarded from one port to another you can block a port protected or nonprotected from flooding unknown unicast or multicast packets to other ports Note With multicast traffic the port blocking feature blocks only pure Layer ...

Страница 454: ...abase Management SDM template This number is the total of available MAC addresses including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces Security Violations It is a security violation when one of these situations occurs The maximum number of secure MAC addresses have been added to the address table and a station whose MAC address is not in the ...

Страница 455: ...t learned on the access VLAN If you connect a single PC to the Cisco IP phone no additional MAC addresses are required If you connect more than one PC to the Cisco IP phone you must configure enough secure addresses to allow one for each PC and one for the phone Table 47 Security Violation Mode Actions Violation Mode Traffic is Forwarded1 Sends SNMP Trap Sends syslog Message Displays Error Message...

Страница 456: ...he previous value the new value overwrites the previously configured value If the new value is less than the previous value and the number of configured secure addresses on the interface exceeds the new value the command is rejected The switch does not support port security aging of sticky secure MAC addresses Port Security Aging You can use port security aging to set the aging time for all secure...

Страница 457: ...s flooded with Address Resolution Protocol ARP or control packets high CPU utilization can cause the CPU to overload These issues can occur Routing protocol can flap because the protocol control packets are not received and neighboring adjacencies are dropped Spanning Tree Protocol STP reconverges because the STP bridge protocol data unit BPDU cannot be sent or received CLI is slow or unresponsive...

Страница 458: ...w Specifies the falling threshold level as a percentage up to two decimal places of the bandwidth This value must be less than or equal to the rising suppression value The port forwards traffic when traffic drops below this level If you do not configure a falling suppression level it is set to the rising suppression level The range is 0 00 to 100 00 If you set the threshold to the maximum value 10...

Страница 459: ...trap when a storm is detected 5 end Returns to privileged EXEC mode Command Purpose Command Purpose 1 configure terminal Enters global configuration mode 2 errdisable detect cause small frame Enables the small frame rate arrival feature on the switch 3 errdisable recovery interval interval Optional Specifies the time to recover from the specified error disabled state 4 errdisable recovery cause sm...

Страница 460: ...known multicast forwarding out of the port Note Only pure Layer 2 multicast traffic is blocked Multicast packets that contain IPv4 or IPv6 information in the header are not blocked 4 switchport block unicast Blocks unknown unicast forwarding out of the port 5 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Specifies...

Страница 461: ... including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces Optional vlan Sets a per VLAN maximum value Enter one of these options after you enter the vlan keyword vlan list On a trunk port sets a per VLAN maximum value on a range of VLANs separated by a hyphen or a series of VLANs separated by commas For nonspecified VLANs the per VLAN maximum val...

Страница 462: ...y violation mode per VLAN In this mode the VLAN is error disabled instead of the entire port when a violation occurs Note When a secure port is in the error disabled state you can bring it out of this state by entering the errdisable recovery cause psecure violation global configuration command You can manually reenable it by entering the shutdown and no shutdown interface configuration commands o...

Страница 463: ...added to the running configuration Note If you do not enable sticky learning before this command is entered an error message appears and you cannot enter a sticky secure MAC address Optional vlan Sets a per VLAN maximum value Enter one of these options after you enter the vlan keyword vlan id On a trunk port specifies the VLAN ID and the MAC address If you do not specify a VLAN ID the native VLAN ...

Страница 464: ...inactivity The secure addresses on this port age out only if there is no data traffic from the secure source addresses for the specified time period 4 end Returns to privileged EXEC mode Command Purpose Command Purpose 1 configure terminal Enters global configuration mode 2 psp arp dhcp igmp pps value Configures protocol storm protection for ARP IGMP or DHCP value Specifies the threshold value for...

Страница 465: ...ion settings show storm control interface id broadcast multicast unicast Displays storm control suppression levels set on all interfaces or the specified interface for the specified traffic type or for broadcast traffic if no traffic type is entered show port security interface interface id Displays port security settings for the switch or for the specified interface including the maximum allowed ...

Страница 466: ...Port Security Examples This example shows how to enable port security on a port and to set the maximum number of secure addresses to 50 The violation mode is the default no static secure MAC addresses are configured and sticky learning is enabled Switch config interface GigabitEthernet1 17 Switch config if switchport mode access Switch config if switchport port security Switch config if switchport...

Страница 467: ... for the secure addresses on a port Switch config interface GigabitEthernet1 17 Switch config if switchport port security aging time 120 This example shows how to set the aging time as 2 minutes for the inactivity aging type with aging enabled for the configured secure addresses on the interface Switch config if switchport port security aging time 2 Switch config if switchport port security aging ...

Страница 468: ...ing Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands o...

Страница 469: ...use Except for traffic that is required for the SPAN or RSPAN session destination ports do not receive or forward traffic Only traffic that enters or leaves source ports or traffic that enters or leaves source VLANs can be monitored by using SPAN traffic routed to a source VLAN cannot be monitored For example if incoming traffic is being monitored traffic that gets routed from another VLAN to the ...

Страница 470: ...ch RSPAN session is carried over a user specified RSPAN VLAN that is dedicated for that RSPAN session in all participating switches The RSPAN traffic from the source ports or VLANs is copied into the RSPAN VLAN and forwarded over trunk ports carrying the RSPAN VLAN to a destination session monitoring the RSPAN VLAN Each RSPAN source switch must have either ports or VLANs as RSPAN sources The desti...

Страница 471: ... you associate a set of source ports or source VLANs with an RSPAN VLAN The output of this session is the stream of SPAN packets that are sent to the RSPAN VLAN To configure an RSPAN destination session on another device you associate the destination port with the RSPAN VLAN The destination session collects all RSPAN VLAN traffic and sends it out the RSPAN destination port An RSPAN source session ...

Страница 472: ... local SPAN and RSPAN in a single session That is an RSPAN source session cannot have a local destination port an RSPAN destination session cannot have a local source port and an RSPAN destination session and an RSPAN source session that are using the same RSPAN VLAN cannot run on the same switch Monitored Traffic Types for SPAN Sessions Receive Rx SPAN The goal of receive or ingress SPAN is to mo...

Страница 473: ...urce packet are sent to the SPAN destination port For example a bidirectional both Rx and Tx SPAN session is configured for the Rx monitor on port A and Tx monitor on port B If a packet enters the switch through port A and is switched to port B both incoming and outgoing packets are sent to the destination port Both packets are the same unless a Layer 3 rewrite occurs in which case the packets are...

Страница 474: ...se VLANs in the list are monitored on trunk ports or on voice VLAN access ports SPAN traffic coming from other port types is not affected by VLAN filtering that is all VLANs are allowed on other ports VLAN filtering affects only traffic forwarded to the destination SPAN port and does not affect the switching of normal traffic Destination Port Each local SPAN session or RSPAN destination session mu...

Страница 475: ...on replicate enabled can contain a mixture of untagged or IEEE 802 1Q tagged packets For RSPAN the original VLAN ID is lost because it is overwritten by the RSPAN VLAN identification Therefore all packets appear on the destination port as untagged RSPAN VLAN The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions It has these special characteristics All traffic in the RSP...

Страница 476: ...igured as a SPAN source port and still be a part of the EtherChannel In this case data from the physical port is monitored as it participates in the EtherChannel However if a physical port that belongs to an EtherChannel group is configured as a SPAN destination it is removed from the group After the port is removed from the SPAN session it rejoins the EtherChannel group Ports removed from an Ethe...

Страница 477: ...ies you should reserve a few VLANs across your network for use as RSPAN VLANs do not assign access ports to these VLANs You can apply an output ACL to RSPAN traffic to selectively filter or monitor specific packets Specify these ACLs on the RSPAN VLAN in the RSPAN source switches For RSPAN configuration you can distribute the source ports and the destination ports across multiple switches in your ...

Страница 478: ... Native form untagged packets Ingress forwarding destination port Disabled VLAN filtering On a trunk interface used as a source port all VLANs are monitored RSPAN VLANs None configured Command Purpose 1 configure terminal Enters global configuration mode 2 no monitor session session_number all local remote Removes any existing SPAN configuration for the session session_number The range is 1 to 68 ...

Страница 479: ...AN to monitor The range is 1 to 4096 excluding the RSPAN VLAN Note A single session can include multiple sources ports or VLANs defined in a series of commands but you cannot combine source ports and source VLANs in one session Optional Specify a series or range of interfaces Enter a space before and after the comma enter a space before and after the hyphen Optional Specify the direction of traffi...

Страница 480: ... it cannot be an EtherChannel and it cannot be a VLAN Optional Specifies a series or range of interfaces Enter a space before and after the comma enter a space before and after the hyphen Optional encapsulation replicate Specifies that the destination interface replicates the source interface encapsulation method If not selected the default is to send packets in native form untagged Note You can u...

Страница 481: ...capsulation method If not selected the default is to send packets in native form untagged ingress Enables forwarding of incoming traffic on the destination port and specifies the encapsulation type dot1q vlan vlan id Accepts incoming packets with IEEE 802 1Q encapsulation with the specified VLAN as the default VLAN untagged vlan vlan id or vlan vlan id Accepts incoming packets with untagged encaps...

Страница 482: ... port it cannot be an EtherChannel and it cannot be a VLAN Optional Specifies a series or range of interfaces Enter a space before and after the comma enter a space before and after the hyphen Optional encapsulation replicate Specifies that the destination interface replicates the source interface encapsulation method If not selected the default is to send packets in native form untagged 6 end Ret...

Страница 483: ...ecifies the source VLAN to monitor The range is 1 to 4096 excluding the RSPAN VLAN A single session can include multiple sources ports or VLANs defined in a series of commands but you cannot combine source ports and source VLANs in one session Optional Specifies a series or range of interfaces Enter a space before and after the comma enter a space before and after the hyphen Optional Specify the d...

Страница 484: ...es all remote SPAN sessions 6 monitor session session_number source remote vlan vlan id Specifies the RSPAN session and the source RSPAN VLAN session_number The range is 1 to 68 vlan id Specifies the source RSPAN VLAN to monitor 7 monitor session session_number destination interface interface id Specifies the RSPAN session and the destination interface session_number Enters the number defined in S...

Страница 485: ...pecifies the destination interface The destination interface must be a physical interface Though visible in the command line help string encapsulation replicate is not supported for RSPAN The original VLAN ID is overwritten by the RSPAN VLAN ID and all packets appear on the destination port as untagged Optional Specifies a series or range of interfaces Enter a space before and after the comma ente...

Страница 486: ...al sessions remote Removes all remote SPAN sessions 3 monitor session session_number source interface interface id Specifies the characteristics of the source port monitored port and SPAN session session_number The range is 1 to 68 interface id Specifies the source port to monitor The interface specified must already be configured as a trunk port 4 monitor session session_number filter vlan vlan i...

Страница 487: ...source vlan 10 Switch config end This example shows how to remove any existing configuration on SPAN session 2 configure SPAN session 2 to monitor received traffic on Gigabit Ethernet source port 1 and send it to destination Gigabit Ethernet port 2 with the same egress encapsulation type as the source port and to enable ingress forwarding with IEEE 802 1Q encapsulation and VLAN 6 as the default in...

Страница 488: ...nitor session 1 destination remote vlan 901 Switch config end This example shows how to configure VLAN 901 as the source remote VLAN in RSPAN session 2 to configure Gigabit Ethernet source port 2 as the destination interface and to enable forwarding of incoming traffic on the interface with VLAN 6 as the default receiving VLAN Switch config monitor session 2 source remote vlan 901 Switch config mo...

Страница 489: ...by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and sup...

Страница 490: ...486 Configuring SPAN and RSPAN Additional References ...

Страница 491: ...lue descriptions and are referred to as TLVs LLDP supported devices can use TLVs to receive and send information to their neighbors This protocol can advertise details such as configuration information device capabilities and device identity The switch supports these basic management TLVs These are mandatory LLDP TLVs Port description TLV System name TLV System description TLV System capabilities ...

Страница 492: ...s information and postal information Examples of civic location information are street address road name and postal community name information ELIN location information Provides the location information of a caller The location is determined by the emergency location identifier number ELIN which is a phone number that routes an emergency call to the local public safety answering point PSAP and whi...

Страница 493: ...nk down Slot and port that was disconnected MAC address IP address 802 1X username if applicable Device category is specified as a wired station State is specified as delete Serial number UDI Time in seconds since the switch detected the disassociation When the switch shuts down it sends an attachment notification with the state delete and the IP address before closing the NMSP connection to the M...

Страница 494: ... profile You cannot configure a network policy profile on a private VLAN port For wired location to function you must first enter the ip device tracking global configuration command LLDP MED TLVs By default the switch only sends LLDP packets until it receives LLDP MED packets from the end device It then sends LLDP packets with MED TLVs When the LLDP MED entry has been aged out it only sends LLDP p...

Страница 495: ...rface interface id Specifies the interface on which you are enabling LLDP and enter interface configuration mode 4 lldp transmit Enables the interface to send LLDP packets 5 lldp receive Enables the interface to receive LLDP packets 6 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 lldp holdtime seconds Optional Specifies the amount of ti...

Страница 496: ...ype voice signaling Specifies the voice signaling application type vlan Specifies the native VLAN for voice traffic vlan id Optional Specifies the VLAN for voice traffic The range is 1 to 4096 cos cvalue Optional Specifies the Layer 2 priority class of service CoS for the configured VLAN The range is 0 to 7 the default is 0 dscp dvalue Optional Specifies the differentiated services code point DSCP...

Страница 497: ...figuring the location information and enters interface configuration mode 5 location additional location information word civic location id id elin location id id Enters location information for an interface additional location information Specifies additional information for a location or place civic location id Specifies global civic location information for an interface elin location id Specifi...

Страница 498: ...ce show lldp entry entry name Displays information about a specific neighbor You can enter an asterisk to display all neighbors or you can enter the neighbor name show lldp interface interface id Displays information about interfaces with LLDP enabled You can limit the display to a specific interface show lldp neighbors interface id detail Displays information about neighbors including device type...

Страница 499: ...e terminal Switch config network policy profile 1 Switch config network policy voice vlan 100 cos 4 Switch config network policy exit Switch config interface GigabitEthernet1 17 Switch config if network policy profile 1 Switch config if lldp med tlv select network policy Configuring Voice Application Example This example shows how to configure the voice application type for the native VLAN with pr...

Страница 500: ... No new or modified standards are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modifie...

Страница 501: ...pically represented by a table in the NAT device Layer 2 NAT has two translation tables where private to public and public to private subnet translations can be defined Layer 2 NAT is a hardware based implementation that provides the same high level of bump on the wire wire speed performance This implementation also supports multiple VLANs through the NAT boundary for enhanced network segmentation...

Страница 502: ...498 Configuring Layer 2 NAT ...

Страница 503: ... device sends periodic messages to a multicast address advertising at least one address at which it can receive SNMP messages The advertisements also contain time to live or holdtime information which is the length of time a receiving device holds CDP information before discarding it Each device also listens to the messages sent by other devices to learn about neighboring devices On the switch CDP...

Страница 504: ...ctivity Feature Default Setting CDP global state Enabled CDP interface state Enabled CDP timer packet update frequency 60 seconds CDP holdtime before discarding 180 seconds CDP Version 2 advertisements Enabled Command Purpose 1 configure terminal Enters global configuration mode 2 cdp timer seconds Optional Sets the transmission frequency of CDP updates in seconds The range is 5 to 254 the default...

Страница 505: ...s frequency of transmissions and the holdtime for packets being sent show cdp entry entry name protocol version Displays information about a specific neighbor You can enter an asterisk to display all CDP neighbors or you can enter the name of the neighbor about which you want information You can also limit the display to information about the protocols enabled on the specified neighbor or informat...

Страница 506: ...ation Related Documents Standards MIBs RFCs Related Topic Document Title Cisco IOS basic commands Cisco IOS system management commands Cisco IOS Configuration Fundamentals Command Reference Switch cluster configuration Configuring Switch Clusters page 91 Standards Title No new or modified standards are supported by this feature and support for existing standards has not been modified by this featu...

Страница 507: ...nd alerts you Unidirectional links can cause a variety of problems including spanning tree topology loops Modes of Operation UDLD supports two modes of operation normal the default and aggressive In normal mode UDLD can detect unidirectional links due to misconnected ports on fiber optic connections In aggressive mode UDLD can also detect unidirectional links due to one way traffic on fiber optic ...

Страница 508: ...affic is flowing bidirectionally between the correct neighbors This check cannot be performed by autonegotiation because autonegotiation operates at Layer 1 Methods to Detect Unidirectional Links UDLD operates by using two methods Neighbor database maintenance UDLD learns about other UDLD capable neighbors by periodically sending a hello packet also called an advertisement or probe on every active...

Страница 509: ... mode and to set the configurable message timer on all fiber optic ports on the switch TX TX RX RX Switch A Switch B Switch B successfully receives traffic from Switch A on this port 98648 However Switch A does not receive traffic from Switch B on the same port If UDLD is in aggressive mode it detects the problem and disables the port If UDLD is in normal mode the logical link is considered undete...

Страница 510: ...n the advertisement phase and are detected to be bidirectional The range is from 1 to 90 seconds Note This command affects fiber optic ports only Use the udld interface configuration command to enable UDLD on other port types For more information see Enabling UDLD on an Interface page 506 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 ...

Страница 511: ...es the disabled ports 5 errdisable recovery cause udld Optional Enables the timer to automatically recover from the UDLD error disabled state 6 errdisable recovery interval interval Optional Specifies the time to recover from the UDLD error disabled state 7 interface interface id Enters interface configuration mode 8 no udld port Optional Disables the UDLD fiber optic port 9 udld port aggressive O...

Страница 512: ...OS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of pages of ...

Страница 513: ...abilities Restrictions for RMON 64 bit counters are not supported for RMON alarms Information About RMON RMON RMON is an Internet Engineering Task Force IETF standard monitoring specification that allows various network agents and console systems to exchange network monitoring data You can use the RMON feature with the Simple Network Management Protocol SNMP agent in the switch to monitor all the ...

Страница 514: ...an SNMP trap Event RMON group 9 Specifies the action to take when an event is triggered by an alarm The action can be to generate a log entry or an SNMP trap Because switches supported by this software release use hardware counters for RMON data processing the monitoring is more efficient and little processing power is required Note 64 bit counters are not supported for RMON alarms RMON is disable...

Страница 515: ...rd to test the change between samples of a MIB variable value Specifies a number at which the alarm is triggered and one for when the alarm is reset The range for the rising threshold and falling threshold values is 2147483648 to 2147483647 Optional event number Specifies the event number to trigger when the rising or falling threshold exceeds its limit Optional owner string Specifies the owner of...

Страница 516: ...on history group of statistics The range is 1 to 65535 The default is 50 buckets Optional interval seconds Specifies the number of seconds in each polling cycle The range is 1 to 3600 The default is 1800 seconds Optional owner ownername Enters the name of the owner of the RMON group of statistics 4 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration...

Страница 517: ... can be triggered again Creating an RMON Event Number Example The following example creates RMON event number 1 Switch config rmon event 1 log trap eventtrap description High ifOutErrors owner jjones The event is defined as High ifOutErrors and generates a log entry when the event is triggered by the alarm The user jjones owns the row that is created in the event table by this command This example...

Страница 518: ...ure MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cis...

Страница 519: ... that generated them has finished You can set the severity level of the messages to control the type of messages displayed on the consoles and each of the destinations You can time stamp log messages or set the syslog source address to enhance real time debugging and management You can access logged system messages by using the switch command line interface CLI or by saving them to a properly conf...

Страница 520: ...tion To disable logging to the console use the no logging console global configuration command To disable logging to a terminal other than the console use the no logging monitor global configuration command To disable logging to syslog servers use the no logging trap global configuration command Table 49 on page 517 describes the level keywords It also lists the corresponding UNIX syslog definitio...

Страница 521: ... from the network If this is the case with your system use the UNIX man syslogd command to decide what options must be added to or removed from the syslog command line to enable logging of remote syslog messages Log in as root and perform these steps 1 Add a line such as the following to the file etc syslog conf local7 debug usr adm logs cisco log The local7 keyword specifies the logging facility ...

Страница 522: ... supported by the software For more information about these facilities consult the operator s manual for your UNIX operating system Table 50 UNIX System Facilities Facility Type Keyword Description auth Authorization system cron Cron facility daemon System daemon kern Kernel local0 7 Locally defined messages lpr Line printer system mail Mail system news USENET news sys9 14 System use syslog System...

Страница 523: ...in the middle of command output Setting the Message Display Destination Device If message logging is enabled you can send messages to specific locations in addition to the console Beginning in privileged EXEC mode use one or more of the following commands to specify the locations that receive messages Feature Default Setting System message logging to the console Enabled Console severity Debugging ...

Страница 524: ...ver To build a list of syslog servers that receive logging messages enter this command more than once 4 logging file flash filename max file size min file size severity level number type Stores log messages in a file in flash memory filename Enters the log message filename Optional max file size Specifies the maximum logging file size The range is 4096 to 2147483647 The default is 4096 bytes Optio...

Страница 525: ...an change the setting of the single vty line being used for your current connection For example to change the setting for vty line 2 enter line vty 2 When you enter this command the mode changes to line configuration 3 logging synchronous level severity level all limit number of buffers Enables synchronous logging of messages Optional level severity level Specifies the message severity level Messa...

Страница 526: ...me stamps on log messages showing the time since the system was rebooted The second command enables time stamps on log messages Depending on the options selected the time stamp can include the date time in milliseconds relative to the local time zone and the time zone name 3 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 service sequence...

Страница 527: ... records the session the user and the command that was entered to change the configuration You can configure the size of the configuration log from 1 to 1000 entries the default is 100 Configuring the UNIX System Logging Facility When sending system log messages to an external device you can cause the switch to identify its messages as originating from any of the UNIX syslog facilities Command Pur...

Страница 528: ...isplay Examples This example shows part of a logging display with the service timestamps log datetime global configuration command enabled Mar 1 18 46 11 SYS 5 CONFIG_I Configured from console by vty2 10 34 195 36 This example shows part of a logging display with the service timestamps log uptime global configuration command enabled 00 00 46 LINK 3 UPDOWN Interface Port channel1 changed state to u...

Страница 529: ... an example of output for the configuration log Switch show archive log config all idx sess user line Logged command 38 11 unknown user vty3 no aaa authorization config commands 39 12 unknown user vty3 no aaa authorization network default group radius 40 12 unknown user vty3 no aaa accounting dot1x default start stop group radius 41 13 unknown user vty3 no aaa accounting system default 42 14 temi ...

Страница 530: ...by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description ...

Страница 531: ...onfigure the SNMP engine ID using the snmp server engineID global configuration with the remote option The remote agent s SNMP engine ID and user password are used to compute the authentication and privacy digests If you do not configure the remote engine ID first the configuration command fails Restrictions for SNMP When configuring SNMP informs you need to configure the SNMP engine ID for the re...

Страница 532: ...strative Framework of SNMPv2C while retaining the bulk retrieval and improved error handling of SNMPv2Classic It has these features SNMPv2 Version 2 of the Simple Network Management Protocol a Draft Internet Standard defined in RFCs 1902 through 1907 SNMPv2C The community string based Administrative Framework for SNMPv2 an Experimental Internet Protocol defined in RFC 1901 SNMPv3 Version 3 of the ...

Страница 533: ...y string match for authentication SNMPv2C noAuthNoPriv Community string No Uses a community string match for authentication SNMPv3 noAuthNoPriv Username No Uses a username match for authentication SNMPv3 authNoPriv Message Digest 5 MD5 or Secure Hash Algorithm SHA No Provides authentication based on the HMAC MD5 or HMAC SHA algorithms SNMPv3 authPriv MD5 or SHA Data Encryption Standard DES or Adva...

Страница 534: ... does not allow write access Read write RW Gives read and write access to authorized management stations to all objects in the MIB but does not allow access to the community strings When a cluster is created the command switch manages the exchange of messages among member switches and the SNMP application Using SNMP to Access MIB Variables An example of an NMS is the CiscoWorks network management ...

Страница 535: ...eived or the request times out Traps are sent only once but an inform might be resent or retried several times The retries increase traffic and contribute to a higher overhead on the network Therefore traps and informs require a trade off between reliability and resources If it is important that the SNMP manager receive every notification use inform requests If traffic on the network or memory in ...

Страница 536: ...nd configure a trap manager to receive them To enable the sending of SNMP inform notifications use the snmp server enable traps global configuration command combined with the snmp server host host addr informs global configuration command Table 54 Switch Notification Types Notification Type Keyword Description bridge Generates STP bridge MIB traps config Generates a trap for SNMP configuration cha...

Страница 537: ...urity snmp server enable traps port security trap rate rate rtr Generates a trap for the SNMP Response Time Reporter RTR snmp Generates a trap for SNMP type notifications for authentication cold start warm start link up or link down storm control Generates a trap for SNMP storm control You can also set a maximum trap rate per minute The range is from 0 to 1000 the default is 0 no limit is imposed ...

Страница 538: ... not enter a value for the community string Feature Default Setting SNMP agent Disabled1 1 This is the default when the switch starts and the startup configuration does not have any snmp server global configuration commands SNMP trap receiver None configured SNMP traps None enabled except the trap for TCP connections tty SNMP version If no version keyword is present the default is Version 1 SNMPv3...

Страница 539: ...nt stations to retrieve MIB objects or specifies read write rw if you want authorized management stations to retrieve and modify MIB objects By default the community string permits read only access to all objects Optional access list number Specifies an IP standard access list numbered from 1 to 99 and 1300 to 1999 3 access list access list number deny permit source source wildcard Optional If you...

Страница 540: ...string with the name of the copy of SNMP You need not specify the entire 24 character engine ID if it has trailing zeros Specify only the portion of the engine ID up to the point where only zeros remain in the value For example to configure an engine ID of 123400000000000000000000 you can enter this snmp server engineID local 1234 If you select remote specify the ip address of the device that cont...

Страница 541: ...NoPriv security level This is the default if no keyword is specified priv Enables Data Encryption Standard DES packet encryption also called privacy Note The priv keyword is available only when the cryptographic software image is installed Optional read readview Specifies a string not to exceed 64 characters that is the name of the view in which you can only view the contents of the agent Optional...

Страница 542: ...o exceed 64 characters If you enter v3 and the switch is running the cryptographic software image you can also configure a private priv encryption algorithm and password string priv password not to exceed 64 characters priv Specifies the User based Security Model USM des Specifies the use of the 56 bit DES algorithm 3des Specifies the use of the 168 bit DES algorithm aes Specifies the use of the D...

Страница 543: ...ion 3 is specified enter the SNMPv3 username Note The symbol is used for delimiting the context information Avoid using the symbol as part of the SNMP community string when configuring this command Optional notification type Specifies a notification type Use the keywords listed in Table 54 on page 532 If no type is specified all notifications are sent 6 snmp server enable traps notification types ...

Страница 544: ... notification type to CPU process utilization interrupt Sets the notification type to CPU interrupt utilization rising percentage Specifies the percentage 1 to 100 of CPU resources that when exceeded for the configured interval sends a CPU threshold notification interval seconds Specifies the duration of the CPU threshold violation in seconds 5 to 86400 that when met sends a CPU threshold notifica...

Страница 545: ...dress of the TFTP servers that can access the switch Optional source wildcard Enters the wildcard bits in dotted decimal notation to be applied to the source Place ones in the bit positions that you want to ignore Recall that the access list is always terminated by an implicit deny statement for everything 4 end Returns to privileged EXEC mode Command Purpose show snmp Displays SNMP statistics sho...

Страница 546: ...sco com using the community string public Switch config snmp server community comaccess ro 4 Switch config snmp server enable traps snmp authentication Switch config snmp server host cisco com version 2c public Configure SNMP Traps Examples This example shows how to send entity MIB traps to the host cisco com The community string is restricted The first line enables the switch to send entity MIB t...

Страница 547: ...P Example This example shows how to assign the string comaccess to SNMP to allow read only access and to specify that IP access list 4 can use the community string to gain access to the switch SNMP agent Switch config snmp server community comaccess ro 4 Additional References The following sections provide references related to switch administration ...

Страница 548: ...o locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support...

Страница 549: ...twork If you do not configure ACLs all packets passing through the switch could be allowed onto all parts of the network You can use ACLs to control which hosts can access different parts of a network or to decide which types of traffic are forwarded or blocked at router interfaces For example you can allow e mail traffic to be forwarded but not Telnet traffic ACLs can be configured to block inbou...

Страница 550: ... network or to part of a network Figure 74 on page 546 is an example of using port ACLs to control access to a network when all workstations are in the same VLAN ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network but prevent Host B from accessing the same network Port ACLs can only be applied to Layer 2 interfaces in the inbound direction Figure 74 Using ACL...

Страница 551: ...acket A is a TCP packet from host 10 2 2 2 port 65000 going to host 10 1 1 1 on the SMTP port If this packet is fragmented the first fragment matches the first ACE a permit as if it were a complete packet because all Layer 4 information is present The remaining fragments also match the first ACE even though they do not contain the SMTP port information because the first ACE only checks Layer 3 inf...

Страница 552: ...ontrol The switch always rewrites the order of standard access lists so that entries with host matches and entries with matches having a don t care mask of 0 0 0 0 are moved to the top of the list above any entries with non zero don t care masks Therefore in show command output and in the configuration file the ACEs do not necessarily appear in the order in which they were entered After creating a...

Страница 553: ... list number whether the packet was permitted or denied the source IP address of the packet and the number of packets from that source permitted or denied in the prior 5 minute interval Numbered Extended ACL Although standard ACLs use only source addresses for matching you can use extended ACL source and destination addresses for matching operations and optional protocol type information for finer...

Страница 554: ...d After creating a numbered extended ACL you can apply it to terminal lines see Applying an IPv4 ACL to a Terminal Line page 560 to interfaces see Applying an IPv4 ACL to an Interface page 560 or to VLANs see Monitoring and Maintaining Network Security with ACLs page 562 Resequencing ACEs in an ACL Sequence numbers for the entries in an access list are automatically generated when you create a new...

Страница 555: ...n use the time range to define when the permit or deny statements in the ACL are in effect for example during a specified time period or on specified days of the week These are some of the many possible benefits of using time ranges You have more control over permitting or denying a user access to resources such as an application identified by an IP address mask pair and a port number You can cont...

Страница 556: ...enied by an access group These access group denied packets are not dropped in hardware but are bridged to the switch CPU so that it can generate the ICMP unreachable message Port ACLs are an exception They do not generate ICMP unreachable messages ICMP unreachable messages can be disabled on router ACLs with the no ip unreachables interface command For inbound ACLs after receiving a packet the swi...

Страница 557: ...XEC command to obtain some basic hardware ACL statistics for switched and routed packets Troubleshooting ACLs If this ACL manager message appears where chars is the access list name the switch then has insufficient resources to create a hardware representation of the ACL ACLMGR 2 NOVMR Cannot generate hardware representation of access list chars The resources include hardware memory and label spac...

Страница 558: ...fault the end of the ACL contains an implicit deny statement for all packets that it did not find a match for before reaching the end With standard access lists if you omit the mask from an associated IP host address ACL specification 0 0 0 0 is assumed to be the mask Command Purpose 1 configure terminal Enters global configuration mode 2 access list access list number deny permit source source wi...

Страница 559: ...555 Configuring Network Security with ACLs How to Configure Network Security with ACLs Creating a Numbered Extended ACL ...

Страница 560: ...see steps 2b through 2e source The number of the network or host from which the packet is sent source wildcard Applies wildcard bits to the source destination The network or host number to which the packet is sent destination wildcard Applies wildcard bits to the destination source source wildcard destination and destination wildcard can be specified as The 32 bit quantity in dotted decimal format...

Страница 561: ...rotocol The parameters are the same as those described in Step 2a with these exceptions Optional operator and port compare source if positioned after source source wildcard or destination if positioned after destination destination wildcard port Possible operators include eq equal gt greater than lt less than neq not equal and range inclusive range Operators require a port number range requires tw...

Страница 562: ...ed by the ICMP message code type a number from 0 to 255 icmp message Filters ICMP packets by the ICMP message type name or the ICMP message type and code name To see a list of ICMP message type names and code names use the or see the Configuring IP Services section of the Cisco IOS IP Configuration Guide Release 12 2 Step 2e access list access list number deny permit igmp source source wildcard de...

Страница 563: ...rce wildcard host source any destination destination wildcard host destination any precedence precedence tos tos established log time range time range name In access list configuration mode specifies one or more conditions denied or permitted to decide if the packet is forwarded or dropped host source A source and source wildcard of source 0 0 0 0 any A source and source wildcard of 0 0 0 0 255 25...

Страница 564: ...gure different hours for weekdays and weekends See the example configurations 4 end Returns to privileged EXEC mode Command Purpose 1 configure terminal Enters global configuration mode 2 line console vty line number Identifies a specific line to configure and enters in line configuration mode console Specifies the console terminal line The console port is DCE vty Specifies a virtual terminal for ...

Страница 565: ...n also enter these options type mask Specifies an arbitrary EtherType number of a packet with Ethernet II or SNAP encapsulation in decimal hexadecimal or octal with optional mask of don t care bits applied to the EtherType before testing for a match lsap lsap mask Specifies an LSAP number of a packet with IEEE 802 2 encapsulation in decimal hexadecimal or octal with optional mask of don t care bit...

Страница 566: ... Extended IP access list 102 10 deny tcp 171 69 198 0 0 0 0 255 172 20 52 0 0 0 0 255 eq telnet 20 permit tcp any any Command Purpose show access lists number name Displays the contents of one or all current IP and MAC address access lists or a specific access list numbered or named show ip access lists number name Displays the contents of all current IP access lists or a specific IP access list n...

Страница 567: ...ig access list 188 deny tcp any any time range new_year_day_2006 Switch config access list 188 permit tcp any any time range workhours Switch config end Switch show access lists Extended IP access list 188 10 deny tcp any any time range new_year_day_2006 inactive 20 permit tcp any any time range workhours inactive Using Named ACLs Example This example uses named ACLs to permit and deny the same tr...

Страница 568: ...ist chars The flag related operators are not available To avoid this issue Move the fourth ACE before the first ACE by using ip access list resequence global configuration command permit tcp source source wildcard destination destination wildcard permit tcp source source wildcard destination destination wildcard range 5 60 permit tcp source source wildcard destination destination wildcard range 15...

Страница 569: ... 95 The ACL is applied to traffic coming out of routed Port 1 from the specified source address Switch config access list 6 permit 172 20 128 64 0 0 0 31 Switch config end Switch show access lists Standard IP access list 6 permit 172 20 128 64 wildcard bits 0 0 0 31 Switch config interface GigabitEthernet1 17 Switch config if ip access group 6 out This example uses an extended ACL to filter traffi...

Страница 570: ...u have a network connected to the Internet and you want any host on the network to be able to form TCP connections to any host on the Internet However you do not want IP hosts to be able to form TCP connections to hosts on your network except to the mail SMTP port of a dedicated mail host SMTP uses TCP port 25 on one end of the connection and a random port number on the other end The same port num...

Страница 571: ...hours of 8 00 a m and 6 00 p m 18 00 The example allows UDP traffic only on Saturday and Sunday from noon to 8 00 p m 20 00 Switch config time range no http Switch config periodic weekdays 8 00 to 18 00 Switch config time range udp yes Switch config periodic weekend 12 00 to 20 00 Switch config ip access list extended strict Switch config ext nacl deny tcp any any eq www time range no http Switch ...

Страница 572: ...end Switch show logging Syslog logging enabled 0 messages dropped 0 flushes 0 overruns Console logging level debugging 37 messages logged Monitor logging level debugging 0 messages logged Buffer logging level debugging 37 messages logged File logging disabled Trap logging level debugging 39 message lines logged Log Buffer 4096 bytes 00 00 48 NTP authentication delay calculation problems output tru...

Страница 573: ...command is only valid when applied to a physical Layer 2 interface You cannot use the command on EtherChannel port channels After receiving a packet the switch checks it against the inbound ACL If the ACL permits it the switch continues to process the packet If the ACL rejects the packet the switch discards it When you apply an undefined ACL to an interface the switch acts as if the ACL has not be...

Страница 574: ...rds are supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by th...

Страница 575: ... ios 12_2 qos command reference fqos_r html Understanding QoS page 571 QoS Treatment for Performance Monitoring Protocols page 590 Configuring QoS page 600 Displaying QoS Information page 645 Configuration Examples for Policy Maps page 646 Understanding QoS Typically networks operate on a best effort delivery basis which means that all traffic has equal priority and an equal chance of being delive...

Страница 576: ...nd traffic limiting features class based weighted fair queuing CBWFQ class based traffic shaping port shaping and class based priority queuing You can provide guaranteed bandwidth to a particular class of traffic while still servicing other traffic queues For more information see Congestion Management and Scheduling page 593 Queuing on the switch is enhanced with the weighted tail drop WTD algorit...

Страница 577: ...ority queue limit or shape average commands for output policy maps Note A packet can match only one traffic class within a traffic policy If a packet matches more than one traffic class in the traffic policy the first traffic class defined in the policy is used To configure more than one match criterion for packets you can associate multiple traffic classes with a single traffic policy 3 Attach th...

Страница 578: ...4 classes plus class default You can configure a maximum of 64 classes in an input policy Output Policy Maps Output policy map classification criteria include matching a CoS a DSCP an IP precedence or a QoS group value Output policy maps can have any of these actions Queuing queue limit Scheduling bandwidth priority and shape average Output policy maps do not support matching of access groups You ...

Страница 579: ...e in the packet or by the VLAN ID Figure 78 on page 576 has examples of classification information carried in a Layer 2 or a Layer 3 IP packet header using six bits from the deprecated IP type of service ToS field to carry the classification information On ports configured as Layer 2 IEEE 802 1Q trunks all traffic is in 802 1Q frames except for traffic in the native VLAN Layer 2 802 1Q frame heade...

Страница 580: ...tch against a specific traffic flow to further classify it If you have more than one type of traffic that you want to classify you can create another class map and use a different name When you enter the class map command with a class map name the switch enters the class map configuration mode In this mode you define the match criterion for the traffic by using the match class map configuration co...

Страница 581: ...a non IP classification match cos or match access group for a MAC ACL in the same policy map or class map When an input policy map with only Layer 2 classification is attached to a routed port or a switch port containing a routed switch virtual interface SVI the service policy acts only on switching eligible traffic and not on routing eligible traffic On an 802 1Q tunnel port you can use only an i...

Страница 582: ...ne end of the network to the other Entering Class Selector CS service values of 1 to 7 corresponding to IP precedence bits in the ToS field of the packet Using Expedited Forwarding EF to specify a low latency path This corresponds to a DSCP value of 46 EF services use priority queuing to preempt lower priority traffic classes This display shows the available classification options Switch config cm...

Страница 583: ...r S VLAN by default The set cos policy map class configuration commands always apply to the outer most VLAN tag after processing is complete that is the S VLAN ID For example in 802 1Q tunnels entering a set cos command changes only the CoS value of the outer tag of the encapsulated packet When you configure a policy by entering the match dscp class map configuration command and you enter the set ...

Страница 584: ... Note Only one access group is supported per class for an input policy map Classification Based on QoS Groups A QoS group is an internal label used by the switch to identify packets as a members of a specific class The label is not part of the packet header and is restricted to the switch that sets the label QoS groups provide a way to tag a packet for subsequent QoS action without explicitly mark...

Страница 585: ...d in the input policy map for the same service class This allows the input marking and policing functions to be decoupled from the egress classification function if necessary because only the QoS group must be used for egress classification To communicate an ACL classification to an output policy you assign a QoS number to specify packets at ingress This example identifies specific packets as part...

Страница 586: ... VLANs We also recommend that you restrict VLAN membership on the trunk ports to which the per port per VLAN is applied by using the switchport trunk allowed vlan interface configuration command Overlapping VLAN membership between trunk ports that have per port per VLAN policies with Layer 3 classification could also result in unexpected QoS behavior In this example the class maps in the child lev...

Страница 587: ...Table maps are used only in input policy maps Table maps can be used to Correlate specific CoS DSCP or IP precedence values to specific CoS DSCP or IP precedence values Mark down a CoS DSCP or IP precedence value Assign defaults for unmapped values A table map includes one of these default actions default default value applies a specific default value 0 to 63 for all unmapped values default copy m...

Страница 588: ...ss Packets that exceed the permitted average rate or burst rate are out of profile or nonconforming These packets are dropped or modified marked for further processing depending on the policer configuration Policing is used primarily on receiving interfaces You can attach a policy map with a policer only in an input service policy The only policing allowed in an output policy map is in priority cl...

Страница 589: ... input interface configuration command Policing is done only on received traffic so you can only attach a policer to an input service policy You can use the conform action and exceed action policy map class configuration commands or the conform action and exceed action policy map class police configuration commands to specify the action to be taken when the packet conforms to or exceeds the specif...

Страница 590: ... color policer For 2 rate 3 color policing you can then optionally set actions to perform on packets that conform to the specified CIR and PIR conform action packets that conform to the PIR but not the CIR exceed action and packets that exceed the PIR value violate action Note If the conform action is set to drop the exceed and violate actions are automatically set to drop If the exceed action is ...

Страница 591: ...te policer as parameters in the policer aggregate global configuration command but you must enter the actions in a particular order See the configuration guideline in Configuring Input Policy Maps with Aggregate Policing page 617 After you configure the aggregate policer you create a policy map and an associated class map associate the policy map with the aggregate policer and apply the service po...

Страница 592: ...g if switchport mode trunk Switch config if service policy input customer 1 ingress Switch config pmap c exit Unconditional Priority Policing Priority policing applies only to output policy maps You can use the priority policy map class configuration command in an output policy map to designate a low latency path or class based priority queuing for a specific traffic class With strict priority que...

Страница 593: ...tions can use the marking information to judge the relative and absolute importance of the packet The marking function can use information from the policing function or directly from the classification function You can specify and mark traffic by using the set commands in a policy map for all supported QoS markings CoS IP DSCP IP precedence and QoS groups A set command unconditionally marks the pa...

Страница 594: ...ge 590 QoS Treatment for IP SLA and TWAMP Probes page 590 QoS Marking for CPU Generated Traffic page 591 QoS Queuing for CPU Generated Traffic page 592 Configuration Guidelines page 592 Two Way Active Measurement Protocol For information about the Two Way Active Measurement Protocol TWAMP see Understanding TWAMP page 41 14 and Configuring TWAMP page 41 15 QoS Treatment for IP SLA and TWAMP Probes ...

Страница 595: ...e dscp table map table map name precedence table map table map name cpu traffic qos dscp dscp_value cos table map table map name dscp table map table map name precedence table map table map name cpu traffic qos precedence precedence_value cos table map table map name dscp table map table map name precedence table map table map name cpu traffic qos qos group value You can mark CoS IP DSCP IP preced...

Страница 596: ...os global configuration command with table mapping you can configure multiple marking and queuing policies to work together or independently You can queue native VLAN traffic based on the CoS markings configured using the cpu traffic qos global configuration command The cpu traffic qos command specifies the traffic to which it applies all CPU traffic only CPU IP traffic or only CPU non IP traffic ...

Страница 597: ...e classified and queued by an output policy map based on the marked CoS value The CoS value of non IP packets is mapped by using the CoS value in the packet and the configured table map Packets can be classified and queued by an output policy map based on the marked CoS value If the cpu traffic qos cos global configuration command is configured with a map from value of DSCP or precedence and CoS T...

Страница 598: ...her traffic classes with bandwidth or shape average depending on requirements These sections contain additional information about scheduling Traffic Shaping page 594 Class Based Weighted Fair Queuing page 595 Priority Queuing page 596 Traffic Shaping Traffic shaping is a traffic control mechanism similar to traffic policing While traffic policing is used in input policy maps traffic shaping occurs...

Страница 599: ...50000000 Switch config pmap c exit The second policy level the child level is used to control a specific traffic stream or class as in this example Switch config policy map child Switch config pmap class class1 Switch config pmap c priority Switch config pmap c exit Note The total of the minimum bandwidth guarantees CIR for each queue of the child policy cannot exceed the total port shape rate Thi...

Страница 600: ...ot eligible for any excess bandwidth and as a result receives no bandwidth Priority Queuing You can use the priority policy map class configuration command to ensure that a particular class of traffic is given preferential treatment With strict priority queuing the priority queue is constantly serviced All packets in the queue are scheduled and sent until the queue is empty Priority queuing allows...

Страница 601: ...her traffic queues are configured to use 50 and 20 percent of the bandwidth that is left as in the previous example Switch config policy map policy1 Switch config pmap class out class1 Switch config pmap c priority Switch config pmap c police 200000000 Switch config pmap c exit Switch config pmap class out class2 Switch config pmap c bandwidth percent 50 Switch config pmap c exit Switch config pma...

Страница 602: ...group in the same queue Setting a queue limit establishes a drop threshold for the associated traffic when congestion occurs Note You cannot configure queue size by using the queue limit policy map class command without first configuring a scheduling action bandwidth shape average or priority The only exception to this is when you configure queue limit for the class default of an output policy map...

Страница 603: ...r of packets is from 16 to 544 in multiples of 16 where each packet is a fixed unit of 256 bytes Note For optimal performance we strongly recommend that you configure the queue limit to 272 or less Queue bandwidth and queue size queue limit are configured separately and are not interdependent You should consider the type of traffic being sent when you configure bandwidth and queue limit A large bu...

Страница 604: ...se factors The types of applications used and the traffic patterns on your network Traffic characteristics and needs of your network Is the traffic bursty Do you need to reserve bandwidth for voice and video streams Bandwidth requirements and speed of the network Location of congestion points in the network These sections describe how to classify police and mark incoming traffic and schedule and q...

Страница 605: ...han 256 you receive an error message and the configuration fails A profile is a combination of commit rate peak rate commit burst and peak burst You can attach one profile to multiple instances but if one of these characteristics differs the policer is considered to have a new profile You can specify 256 unique VLAN classification criteria within a per port per VLAN policy map across all ports on ...

Страница 606: ...kets See the configuration sections for specific QoS features for more configuration guidelines related to each feature Using ACLs to Classify Traffic You can classify IP traffic by using IP standard or IP extended ACLs You can classify IP and non IP traffic by using Layer 2 MAC ACLs Follow these guidelines when configuring QoS ACLs You cannot match IP fragments against configured IP extended ACLs...

Страница 607: ...ndard ACL repeating the command as many times as necessary For access list number enter the access list number The range is 1 to 99 and 1300 to 1999 Always use the permit keyword for ACLs used as match criteria in QoS policies QoS policies do not match ACLs that use the deny keyword For source enter the network or host from which the packet is being sent You can use the any keyword as an abbreviat...

Страница 608: ...ing the packet The destination wildcard applies wildcard bits to the destination You can specify source destination and wildcards as The 32 bit quantity in dotted decimal format The keyword any for 0 0 0 0 255 255 255 255 any host The keyword host for a single host 0 0 0 0 Other keywords are optional and have these meanings precedence Enter to match packets with a precedence level specified as a n...

Страница 609: ...fig ext macl exit Command Purpose 1 configure terminal Enter global configuration mode 2 mac access list extended name Create a Layer 2 MAC ACL by specifying the name of the list and enter extended MAC ACL configuration mode 3 permit host src MAC addr mask any host dst MAC addr dst MAC addr mask type mask Always use the permit keyword for ACLs used as match criteria in QoS policies For src MAC add...

Страница 610: ...cy in input hierarchical policy maps for per port per VLAN QoS on trunk ports A policy is considered a parent policy map when it has one or more of its classes associated with a child policy map Each class within a parent policy map is called a parent class You can configure only the match vlan command in parent classes You cannot configure the match vlan command in classes within the child policy...

Страница 611: ... Matching access groups is supported only in input policy maps For cos cos list enter a list of up to four CoS values in a single line to match against incoming packets Separate each value with a space You can enter multiple cos list lines to match more than four CoS values The range is 0 to 7 For ip dscp dscp list enter a list of up to eight IPv4 DSCP values to match against incoming packets Sepa...

Страница 612: ...ow to create a parent class map called parent class which matches incoming traffic with VLAN IDs in the range from 30 to 40 Switch config class map match any parent class Switch config cmap match vlan 30 40 Switch config cmap exit Configuring Table Maps You can configure table maps to manage a large number of traffic flows with a single command You use table maps to correlate specific DSCP IP prec...

Страница 613: ...put policy maps You can attach a service policy only to a physical port You can attach only one input policy map and one output policy map per port Command Purpose 1 configure terminal Enter global configuration mode 2 table map table map name Create a table map by entering a table map name and entering table map configuration mode 3 map from from value to to value Enter the mapping values to be i...

Страница 614: ...s After you have attached a single level policy map to an interface by using the service policy input interface configuration command you can modify the policy without detaching it from the interface You can add or delete classification criteria add or delete classes add or delete actions or change the parameters of the configured actions policers rates mapping marking and so on This also applies ...

Страница 615: ...er reserved for internal use When CPU protection is enabled the default you can configure 45 ingress policers per port If you disable CPU protection by entering the no policer cpu uni all global configuration command and reloading the switch you can configure a maximum of 63 policers per port 62 on every 4th port for user defined classes and one for class default You can enter the show policer cpu...

Страница 616: ...ame precedence table table map name or conform action ip dscp dscp_value cos table table map name dscp table table map name precedence table table map name or conform action ip precedence precedence_value cos table table map name dscp table table map name precedence table table map name or conform action qos group value or transmit Optional Enter the action to be taken on packets that conform to t...

Страница 617: ...table map default behavior is copy See Configuring Table Maps page 608 For qos group value identify a QoS group to be used at egress to identify specific packets The range is from 0 to 99 Note You can enter a single exceed action as part of the command string following the police command Or you can press Enter after the police command to enter policy map class police configuration mode where you c...

Страница 618: ...he class of traffic By default no policer is defined For rate bps specify average traffic rate in bits per second bps The range is 8000 to 1000000000 For cir cir bps specify a committed information rate at which the bc token bucket is updated in bits per second b s The range is 8000 to 1000000000 For burst bytes optional specify the normal burst size in bytes The range is 8000 to 1000000 Optional ...

Страница 619: ...tional For action specify one of these actions to perform on the packets drop Drop the packet Note If the conform action is set to drop the exceed and violate actions are automatically set to drop If the exceed action is set to drop the violate action is automatically set to drop set cos transmit cos value Enter a new CoS value to be assigned to the packet and send the packet The range is from 0 t...

Страница 620: ...p c police cir 5000000 pir 8000000 Switch config pmap c police conform action transmit Switch config pmap c police exceed action set dscp transmit 24 Switch config pmap c police violate action drop Switch config pmap c police end This example shows how to create a traffic classification with a CoS value of 4 create a policy map and attach it to an ingress port The average traffic rate is limited t...

Страница 621: ...using table maps The policy map sets a committed information rate of 23000 bps and a conform burst size of 10000 bytes The policy map includes the default conform action transmit and the exceed action to mark the Layer 2 CoS value based on the table map and to mark IP DSCP to af41 Switch config policy map in policy Switch config pmap class in class 1 Switch config pmap c police cir 23000 bc 10000 ...

Страница 622: ...f the associated class map represents an IP classification the map from type of action that references the table map must be either dscp or precedence If the associated class map represents a non IP classification the map from type of action that references the table map must be cos Table maps are not supported for violate action for aggregate policing unless a table map is configured for exceed a...

Страница 623: ...00 bytes Optional For conform action specify the action to take on packets that conform to the CIR The default is to send the packet Optional For exceed action specify the action to take on packets that exceed the CIR The default is to drop the packet See the command reference for this release or Configuring Input Policy Maps with Individual Policing page 611 for definitions of the available keywo...

Страница 624: ...rst bytes optional specify the normal burst size in bytes The range is 8000 to 1000000 Optional For bc conform burst specify the conformed burst used by the first token bucket for policing The range is 8000 to 1000000 bytes Optional For pir pir bps specify the peak information rate at which the second token bucket for policing is updated The range is 8000 to 1000000000 bits per second If you do no...

Страница 625: ...onfig if service policy input testexample Switch config if exit This example shows how to create a 2 rate 3 color aggregate policer and attach it to multiple classes within a policy map The policy map is attached to an ingress port Switch config policer aggregate example cir 10900000 pir 80000000 conform action transmit exceed action drop violate action drop Switch config class map testclass1 Swit...

Страница 626: ...arks traffic Command Purpose 1 configure terminal Enter global configuration mode 2 policy map policy map name Create a policy map by entering the policy map name and enter policy map configuration mode 3 class class map name class default Enter a class map name or class default to match all unclassified packets and enter policy map class configuration mode If you enter a class map name you must h...

Страница 627: ...p where the parent level defines the VLAN based classification and the child level defines the QoS policy to be applied to the corresponding VLAN or VLANs You can configure multiple service classes at the parent level to match different combinations of VLANs and you can apply independent QoS policies to each parent service class using any child policy map A policy is considered a parent policy map...

Страница 628: ...icy is attached Not following this rule could result in improper QoS behavior for traffic ingressing the switch on these VLANs We also recommend that you restrict VLAN membership on the trunk ports to which the per port per VLAN is applied by using the switchport trunk allowed vlan interface configuration command Overlapping VLAN membership between trunk ports that have per port per VLAN policies ...

Страница 629: ... is supported For access group acl index or name specify the number or name of an ACL Matching access groups is supported only in input policy maps For cos cos list enter a list of up to four CoS values in a single line to match against incoming packets Separate each value with a space You can enter multiple cos list lines to match more than four CoS values The range is 0 to 7 For ip dscp dscp lis...

Страница 630: ...VLANs separated by a hyphen to be used in a parent policy map for per port per VLAN QoS on a trunk port The VLAN ID range is 1 to 4094 You can also enter the match vlan command multiple times to match multiple VLANs 4 end Return to privileged EXEC mode 5 show class map Verify your entries 6 copy running config startup config Optional Save your entries in the configuration file Command Purpose 1 co...

Страница 631: ...e and enter policy map configuration mode 3 class parent class map name Enter the parent class map name and enter policy map class configuration mode 4 service policy child policy map name Associate the child policy map with the parent policy map 5 end Return to privileged EXEC mode 6 show policy map parent policy map name class class map name Verify your entries 7 copy running config startup conf...

Страница 632: ...ass customer1 vlan Switch config pmap c service policy child policy 1 Switch config pmap c exit Switch config pmap class customer2 vlan Switch config pmap c service policy child policy 2 Switch config pmap c exit Switch config interface fastethernet0 1 Switch config if switchport mode trunk Switch config if switchport trunk allowed vlan 100 105 110 120 Switch config if service policy input uni par...

Страница 633: ...n you create the policy map even if you are not ready to use all three at that time You cannot add a class to a policy map after it has been attached to an interface When at least one output policy map is attached to a active port other active ports without output policy maps attached might incorrectly schedule and incorrectly order traffic that uses the same classes as the attached output policy ...

Страница 634: ...the classes the same proportion as the CIR rates If you configure the CIR rate of a class to be 0 that class is not eligible for any excess bandwidth and will receive no bandwidth Beginning in privileged EXEC mode follow these steps to use CBWFQ to control bandwidth allocated to a traffic class by specifying a minimum bandwidth as a bit rate or a percentage Command Purpose 1 configure terminal Ent...

Страница 635: ... used for the committed information rate CIR for the class Follow these guidelines when configuring class based shaping Configuring a queue for traffic shaping sets the maximum bandwidth or peak information rate PIR of the queue Configuring traffic shaping automatically also sets the minimum bandwidth guarantee or CIR of the queue to the same value as the PIR You cannot configure CBWFQ bandwidth o...

Страница 636: ...mode 3 class class map name class default Enter a child class map name or class default to match all unclassified packets and enter policy map class configuration mode 4 shape average target bps Specify the average class based shaping rate For target bps specify the average bit rate in bits per second The range is from 64000 to 1000000000 5 exit Return to policy map configuration mode 6 exit Retur...

Страница 637: ...queues can possibly delay packets in other queues and create unnecessary congestion You can configure strict priority queuing priority without police or you can configure an unconditional priority policer priority with police Follow these guidelines when configuring priority queuing You can associate the priority command with a single unique class for all attached output policies on the switch Whe...

Страница 638: ... out class1 Switch config pmap c priority Command Purpose 1 configure terminal Enter global configuration mode 2 class map class map name Create classes for three egress queues Enter match conditions classification for each class 3 policy map policy map name Create a policy map by entering the policy map name and enter policy map configuration mode 4 class class map name Enter the name of the prio...

Страница 639: ...000000000 bps even though the range that appears in the CLI help is 8000 to 1000000000 You cannot attach an output service policy with an out of range rate You cannot configure priority with policing for a traffic class when bandwidth remaining percent is configured for another class in the same output policy map You can configure 1 rate 2 color policers for output policies with priority You canno...

Страница 640: ...priority in an output policy map only the default conform action of transmit is supported Although visible in the command line help string the other police conform actions are not supported in output policy maps 8 exceed action drop Optional Enter the action to be taken for packets that do not conform to the CIR If no action is entered the default action is to drop the packet Note You can enter a ...

Страница 641: ...il drop WTD adjusts the queue size buffer size associated with a traffic class You configure WTD by using the queue limit policy map class configuration command Follow these guidelines when configuring WTD Configuring WTD with the queue limit command is supported only when you first configure a scheduling action such as bandwidth shape average or priority The exception to this is when you are conf...

Страница 642: ...but different threshold values would create a new unique queue limit configuration Beginning in privileged EXEC mode follow these steps to use WTD to adjust the queue size for a traffic class Command Purpose 1 configure terminal Enter global configuration mode 2 policy map policy map name Create a policy map by entering the policy map name and enter policy map configuration mode 3 class class map ...

Страница 643: ...specify an IP precedence value The range is from 0 to 7 Optional For qos group value enter a QoS group value The range is from 0 to 99 For number of packets set the minimum threshold for WTD The range is from 16 to 544 in multiples of 16 where each packet is a fixed unit of 256 bytes Note For optimal performance we strongly recommend that you configure the queue limit to 272 or less The value is s...

Страница 644: ... map table map name dscp table map table map name prec table map table map name Mark traffic by setting a new CoS value or by specifying a table map For cos value enter a new CoS value The range is from 0 to 7 You can also mark CoS based on the CoS DSCP or IP precedence value You can optionally use a table map to configure CoS If you do not enter table map table map name the table map default beha...

Страница 645: ...verride 4 critical 5 internet 6 network 7 You can also configure a table map to mark precedence based on the CoS DSCP or IP precedence value You can optionally enter the table name If you do not enter table map table map map name the table map default behavior is copy See Table Maps page 583 When you complete this step go to Step 7 on page 641 6 cpu traffic qos qos group qos group value Mark traff...

Страница 646: ...map class class default Switch config pmap c bandwidth percent 30 Switch config pmap c exit Interface Switch config interface fastethernet0 1 Switch config if service policy output output policy Switch config pmap c exit Example 2 This example shows how to mark the CoS of CPU generated IP traffic including IP SLA and TWAMP based on the DSCP value in the packet and to configure egress queuing based...

Страница 647: ...ig cpu traffic qos cos dscp table map dscp to cos Switch config cpu traffic qos cos cos Class Switch config class map match any video Switch config cmap match cos 3 Switch config cmap exit Switch config class map match any voice Switch config cmap match cos 5 Switch config cmap exit Switch config class map match any network internetwork control Switch config cmap match cos 6 7 Switch config cmap e...

Страница 648: ...generated IP packets the CoS value resets to 0 All CPU generated non IP traffic with the CoS values of 5 6 and 7 retain the existing markings For all other CPU generated non IP packets the CoS value resets to 0 All CPU generated traffic goes through a single class called cpu traffic The user voice classes user voice and user video are reserved for user traffic As a result CPU traffic and user traf...

Страница 649: ...ercent 40 Switch config pmap c exit Switch config pmap class cpu traffic Switch config pmap c bandwidth percent 10 Switch config pmap c exit Switch config pmap class class default Switch config pmap c bandwidth percent 30 Switch config pmap c exit Interface Switch config interface fastethernet0 1 Switch config if service policy output output policy Switch config pmap c exit Displaying QoS Informat...

Страница 650: ...CoS values of the incoming frames on the port These statistics do not provide any information about the MQC input policy map configured on the interface For output policy maps you can use the show policy map interface interface id command to display per class classification statistics that show the total number of packets that match the specified class This count includes the total number of packe...

Страница 651: ...s Each class configuration must be based on the classification marking done in the input policy map This example configures classes for input service policies and defines three classes of service gold silver and bronze Because a match all classification the default can have only single classification criterion the match any classification is used so that you can add classification criteria in the ...

Страница 652: ... pmap class silver out Switch config pmap c shape average 200000 Switch config pmap c exit Switch config pmap class bronze out Switch config pmap c bandwidth percent 10 Switch config pmap c exit This example attaches the input and output service policies to the Gigabit Ethernet ports and activates them Switch config interface range GigabitEthernet1 17 18 Switch config if range service policy input...

Страница 653: ...config cmap exit This example modifies classes for an output service policy adding classification criteria to the silver out class to also match dscp cs5 This adds dscp cs5 to the silver out class on all configured and attached output service policies The dscp cs5 flow now receives the same queuing and scheduling treatment as the silver out class Switch config terminal Switch config class map matc...

Страница 654: ... the output policy map The defined classes must be the same as other output policy maps The number of defined classes in each output policy map must be same You must assign an action to each class that is there can be no empty class Each class configuration must be based on the classification marking done in the input policy map These steps shut down all ports carrying the output policy in this ca...

Страница 655: ...s from all Ethernet ports Delete the class Reattach the output policies to the Ethernet ports Take the Ethernet ports out of the shutdown state These steps shut down all active and applicable Ethernet ports Switch config interface range GigabitEthernet1 17 18 Switch config if range shutdown Switch config if range exit These steps detach all output policies from the affected Ethernet ports Switch c...

Страница 656: ...ervice policy Note Problems can occur if you do not follow the previous sequence When a policy map is attached to an interface all traffic that does not explicitly match the configured class maps within the policy map should go through the default queue class class default However in some cases traffic that does not explicitly match the output policy map classes could go through more than one queu...

Страница 657: ...dcast domain and keeps local traffic local However network devices in different VLANs cannot communicate with one another without a Layer 3 device to route traffic between the VLANs referred to as inter VLAN routing You configure one or more routers to route traffic to the appropriate destination VLAN Figure 83 on page 653 shows a basic routing topology Switch A is in VLAN 10 and Switch B is in VL...

Страница 658: ...atic routes including user configured routes and the default route and any directly connected routes and default routes for the management interface The switch can have an IP address assigned to each SVI Before enabling routing enter the sdm prefer lanbase routing global configuration command and reload the switch Procedures for configuring routing To support VLAN interfaces create and configure V...

Страница 659: ...move a static route The switch retains static routes until you remove them When an interface goes down all static routes through that interface are removed from the IP routing table When the software can no longer find a valid next hop for the address specified as the forwarding router s address in a static route the static route is also removed from the IP routing table Monitoring and Maintaining...

Страница 660: ...re supported by this feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this fe...

Страница 661: ... this URL http www cisco com en US products ps6553 products_ios_technology_home html For information about IPv6 and other features in this chapter See the Cisco IOS IPv6 Configuration Library at this URL http www cisco com en US docs ios xml ios ipv6 configuration 15 1mt ipv6 15 1mt book html This section describes IPv6 implementation on the switch These sections are included IPv6 Addresses page 6...

Страница 662: ... page 660 SNMP and Syslog Over IPv6 page 661 HTTP over IPv6 page 661 Support on the switch includes expanded address capability header format simplification improved support of extensions and options and hardware parsing of the extension header The switch supports hop by hop extension header packets which are routed or bridged in software 128 Bit Wide Unicast Addresses The switch supports aggregat...

Страница 663: ...ICMPv6 redirect for routes with mask lengths less than 64 bits ICMP redirect is not supported for host routes or for summarized routes with mask lengths greater than 64 bits Neighbor discovery throttling ensures that the switch CPU is not unnecessarily burdened while it is in the process of obtaining the next hop forwarding information to route an IPv6 packet The switch drops any additional IPv6 p...

Страница 664: ... usage to both IPv4 and IPv6 protocols Figure 84 shows a router forwarding both IPv4 and IPv6 traffic through the same interface based on the IP packet and destination addresses Figure 84 Dual IPv4 and IPv6 Support on an Interface Use the dual IPv4 and IPv6 switch database management SDM template to enable dual stack environments supporting both IPv4 and IPv6 The dual IPv4 and IPv6 templates allow...

Страница 665: ...nsport mechanism called SR_IPV6_TRANSPORT Sends SNMP notifications over IPv6 transport Supports SNMP named access lists for IPv6 transport Supports SNMP proxy forwarding using IPv6 transport Verifies SNMP Manager feature works with IPv6 transport For information on SNMP over IPv6 including configuration procedures see the Managing Cisco IOS Applications over IPv6 chapter in the Cisco IOS IPv6 Conf...

Страница 666: ... address on an interface automatically configures a link local address and activates IPv6 for the interface The configured interface automatically joins these required multicast groups for that link solicited node multicast group FF02 0 0 0 0 1 ff00 104 for each unicast address assigned to the interface this address is used in the neighbor discovery process all nodes link local multicast group FF0...

Страница 667: ...identifier EUI in the low order 64 bits of the IPv6 address Specifies only the network prefix the last 64 bits are automatically computed from the switch MAC address This enables IPv6 processing on the interface Specifies a link local address on the interface to be used instead of the link local address that is automatically configured when IPv6 is enabled on the interface This command enables IPv...

Страница 668: ...dded to the bucket The range is from 0 to 2147483647 milliseconds bucketsize Optional The maximum number of tokens stored in the bucket The range is from 1 to 200 3 end Returns to privileged EXEC mode Command Purpose show ipv6 interface interface id Displays IPv6 interface status and configuration show ipv6 mtu Displays IPv6 MTU per destination cache show ipv6 neighbors Displays IPv6 neighbor cach...

Страница 669: ...gh for the router on an interface Switch configure terminal Switch config interface gigabitethernet1 0 1 Switch config if ipv6 nd router preference high Switch config if end Configuring an IPv6 ICMP Error Message Interval This example shows how to configure an IPv6 ICMP error message interval of 50 milliseconds and a bucket size of 20 tokens Switch config ipv6 icmp error interval 50 20 Displaying ...

Страница 670: ...Static U Per user Static route L FF00 8 0 0 via Null0 receive This is an example of the output from the show ipv6 traffic privileged EXEC command Switch show ipv6 traffic IPv6 statistics Rcvd 1 total 1 local destination 0 source routed 0 truncated 0 format errors 0 hop count exceeded 0 bad header 0 unknown option 0 bad source 0 unknown protocol 0 not a router 0 fragments 0 total reassembled 0 reas...

Страница 671: ...oup reduce 0 router solicit 9944 router advert 0 redirects 84 neighbor solicit 84 neighbor advert UDP statistics Rcvd 0 input 0 checksum errors 0 length errors 0 no port 0 dropped Sent 26749 output TCP statistics Rcvd 0 input 0 checksum errors Sent 0 output 0 retransmitted Additional References The following sections provide references related to switch administration ...

Страница 672: ... feature and support for existing standards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support fo...

Страница 673: ...n access or trunk mode or a routed port Figure 85 on page 671 shows a network configured with link state tracking To enable link state tracking create a link state group and specify the interfaces that are assigned to the link state group In a link state group these interfaces are bundled together The downstream interfaces are bound to the upstream interfaces Interfaces connected to servers are re...

Страница 674: ... router fails the cables are disconnected or the link is lost These are the interactions between the downstream and upstream interfaces when link state tracking is enabled If any of the upstream interfaces are in the link up state the downstream interfaces can change to or remain in the link up state If all of the upstream interfaces become unavailable link state tracking automatically puts the do...

Страница 675: ...or any group 141680 Network Layer 3 link Server 1 Server 2 Server 3 Server 4 Distribution switch 1 Distribution switch 2 Switch A Switch B Port 1 Port 5 Port 4 Port 3 Port 2 Port 2 Port 3 Port 4 Port 8 Port 7 Port 6 Port 5 Port 1 Port 6 Port 7 Port 8 Link state group 2 Link state group 1 Link state group 1 Link state group 2 Link state group 2 Link state group 1 Link state group 1 Primary link Sec...

Страница 676: ...Group 1 Status Enabled Down Upstream Interfaces Fa1 7 Dwn Fa1 8 Dwn Downstream Interfaces Fa1 3 Dis Fa1 4 Dis Fa1 5 Dis Fa1 6 Dis Link State Group 2 Status Enabled Down Upstream Interfaces Fa1 6 Dwn Fa1 7 Dwn Fa1 8 Dwn Downstream Interfaces Fa1 2 Dis Fa1 3 Dis Fa1 4 Dis Fa1 5 Dis Command Purpose 1 configure terminal Enters global configuration mode 2 link state track number Creates a link state gr...

Страница 677: ...witch config interface range GigabitEthernet1 17 2 Switch config if link state group 1 upstream Switch config if interface GigabitEthernet1 17 Switch config if link state group 1 downstream Switch config if interface GigabitEthernet1 17 Switch config if link state group 1 downstream Switch config if interface GigabitEthernet1 18 Switch config if link state group 1 downstream Switch config if end A...

Страница 678: ... locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support ...

Страница 679: ...page 730 This chapter includes the following sections Information About Cisco s Implementation of IP Multicast Routing page 675 Prerequisites page 685 Guidelines and Limitations page 686 Default Settings page 688 Configuring IP Multicast Routing page 688 Configuring Advanced PIM Features page 710 Configuring Optional IGMP Features page 712 Configuring Optional Multicast Routing Features page 721 V...

Страница 680: ...on on the location or number of members in a multicast group A host can be a member of more than one multicast group at a time How active a multicast group is and what members it has can vary from group to group and from time to time A multicast group can be active for a long time or it can be very short lived Membership in a group can constantly change A group that has members can have no activit...

Страница 681: ... Sparse Mode Protocol Specification draft ietf idmr igmp v2 06 txt Internet Group Management Protocol Version 2 draft ietf pim v2 dm 03 txt PIM Version 2 Dense Mode This section includes the following topics PIM Versions page 677 PIM Modes page 678 PIM Stub Routing page 678 IGMP Helper page 679 Auto RP page 679 Bootstrap Router page 680 Multicast Forwarding and Reverse Path Check page 680 PIM Vers...

Страница 682: ...ers It also registers sources through register messages received from the source s first hop router designated router DR to complete the shared tree path from the source to the receiver When using a shared tree sources must send their traffic to the RP so that the traffic reaches all receivers Prune messages are sent up the distribution tree to prune multicast group traffic This action permits bra...

Страница 683: ...he need to manually configure the RP information in every router and multilayer switch in the network For Auto RP to work you configure a Cisco router or multilayer switch as the mapping agent It uses IP multicast to learn which routers or switches in the network are possible candidate RPs to receive candidate RP announcements Candidate RPs periodically send multicast RP announce messages to a par...

Страница 684: ...essage in their local RP cache The routers and switches select the same RP for a given group because they all use a common RP hashing algorithm Multicast Forwarding and Reverse Path Check With unicast routing routers and multilayer switches forward traffic through the network along a single path from the source to the destination host whose IP address appears in the destination address field of th...

Страница 685: ...lticast The Source Specific Multicast SSM feature is an extension of IP multicast in which datagram traffic is forwarded to receivers from only those multicast sources that the receivers have explicitly joined For multicast groups configured for SSM only SSM distribution trees no shared trees are created SSM Components Overview SSM is a datagram delivery model that best supports one to many applic...

Страница 686: ...of the IP multicast group address range Cisco IOS software allows SSM configuration for the IP multicast address range of 224 0 0 0 through 239 255 255 255 When an SSM range is defined existing IP multicast receiver applications do not receive any traffic when they try to use an address in the SSM range unless the application is modified to use an explicit S G channel subscription SSM Operations A...

Страница 687: ...erships for the well known sources associated with this group When the router receives an IGMPv1 or IGMPv2 membership report for a group the router uses SSM mapping to determine one or more source IP addresses for the group SSM mapping then translates the membership report as an IGMPv3 report and continues as if it had received an IGMPv3 report The router then sends PIM joins and continues to be j...

Страница 688: ... Thus the server side switchover mechanism ensures that only one of the servers is actively sending video traffic for the TV channel To look up one or more source addresses for a group that includes G1 G2 G3 and G4 you must configure these DNS records on the DNS server G4 G3 G2 G1 multicast domain timeout IN A source address 1 IN A source address 2 IN A source address n Refer to your DNS server do...

Страница 689: ...y 5 When data arrives natively unencapsulated at the RP it sends a register stop message to Router A 6 By default reception of the first data packet prompts Router C to send a join message toward the source 7 When Router C receives data on S G it sends a prune message for the source up the shared tree 8 The RP deletes the link to Router C from the outgoing interface of S G The RP triggers a prune ...

Страница 690: ...es in the domain use the PIMv2 hash function to select multiple RPs Dense mode groups in a mixed PIMv1 and PIMv2 region need no special configuration they automatically interoperate Sparse mode groups in a mixed PIMv1 and PIMv2 region are possible because the Auto RP feature in PIMv1 interoperates with the PIMv2 RP feature Although all PIMv2 devices can also use PIMv1 we recommend that the RPs be ...

Страница 691: ...ls sharing the same group they do not benefit from these existing mechanisms Instead both receivers receive all S G channel traffic and filter out the unwanted traffic on input Because SSM can re use the group addresses in the SSM range for many independent applications this situation can lead to decreased traffic filtering in a switched network For this reason it is important to use random IP add...

Страница 692: ... with these reports Default Settings Configuring IP Multicast Routing This section includes the following topics Configuring Basic Multicast Routing page 689 required Configuring PIM Stub Routing page 691 optional Configuring Source Specific Multicast page 692 Configuring SSM Mapping page 693 Configuring a Rendezvous Point page 697 required if the interface is in sparse dense mode and you want to ...

Страница 693: ...going interface might not be able to sustain line rate for multicast traffic because of the extra unnecessary replication In populating the multicast routing table dense mode interfaces are always added to the table Sparse mode interfaces are added to the table only when periodic join messages are received from downstream devices or when there is a directly connected member on the interface When f...

Страница 694: ...ser network interfaces UNIs and enhanced network interfaces ENIs are disabled and network node interfaces NNIs are enabled 5 ip pim version 1 2 Configure the PIM version on the interface By default Version 2 is enabled and is the recommended setting An interface in PIMv2 mode automatically downgrades to PIMv1 mode if that interface has a PIMv1 neighbor The interface returns to Version 2 mode after...

Страница 695: ...ing to assist the PIM stub router behavior DETAILED STEPS To disable PIM stub routing on an interface use the no ip pim passive interface configuration command EXAMPLE In this example IP multicast routing is enabled Switch A PIM uplink port 25 is configured as a routed uplink port with spare dense mode enabled PIM stub routing is enabled on the VLAN 100 interfaces and on Gigabit Ethernet port 20 i...

Страница 696: ...stub configuration and status show ip pim interface displays the PIM stub that is enabled on each interface show ip igmp detail displays the interested clients that have joined the specific multicast source group show ip igmp mroute verifies that the multicast stream forwards from the source to the interested clients Configuring Source Specific Multicast This section describes how to configure sou...

Страница 697: ...SM Mapping page 696 optional Configuring Static SSM Mapping BEFORE YOU BEGIN See Information About Source Specific Multicast Mapping page 683 and SSM Mapping Configuration Guidelines page 688 Before you configure SSM mapping enable IP multicast routing enable PIM sparse mode and configure SSM For information on enabling IP multicast routing and PIM sparse mode see Configuring Basic Multicast Routi...

Страница 698: ...lobal configuration mode 2 ip igmp ssm map enable Enable SSM mapping for groups in the configured SSM range Note By default this command enables DNS based SSM mapping 3 no ip igmp ssm map query dns Optional Disable DNS based SSM mapping Note Disable DNS based SSM mapping if you only want to rely on static SSM mapping By default the ip igmp ssm map global configuration command enables DNS based SSM...

Страница 699: ... enable Switch config ip name server 10 0 0 0 Switch config end Command Purpose 1 configure terminal Enter global configuration mode 2 ip igmp ssm map enable Enable SSM mapping for groups in a configured SSM range 3 ip igmp ssm map query dns Optional Enable DNS based SSM mapping By default the ip igmp ssm map command enables DNS based SSM mapping Only the no form of this command is saved to the ru...

Страница 700: ...ically forwarded groups on Ethernet interface 0 interface ethernet 0 ip igmp static group 239 1 2 1 source ssm map Command Purpose 1 configure terminal Enter global configuration mode 2 interface type number Select an interface on which to statically forward traffic for a multicast group using SSM mapping and enter interface configuration mode Note Static forwarding of traffic with SSM mapping wor...

Страница 701: ...through register messages received from the source s first hop router designated router and forwarded to the RP Receivers of multicast packets use RPs to join a multicast group by using explicit join messages RPs are not members of the multicast group rather they serve as a meeting place for multicast sources and group members You can configure a single RP for multiple groups defined by an access ...

Страница 702: ...dard access list number from 1 to 99 If no access list is configured the RP is used for all groups Optional The override keyword means that if there is a conflict between the RP configured with this command and one learned by Auto RP or BSR the RP configured with this command prevails 3 access list access list number deny permit source source wildcard Create a standard access list repeating the co...

Страница 703: ...faces are configured in sparse mode Auto RP can still be used if all devices are configured with a manual RP address for the Auto RP groups These sections describe how to configure Auto RP Setting up Auto RP in a New Internetwork page 699 optional Adding Auto RP to an Existing Sparse Mode Cloud page 699 optional Preventing Join Messages to False RPs page 701 optional Filtering Incoming RP Announce...

Страница 704: ...P address Valid interfaces include physical ports port channels and VLANs For scope ttl specify the time to live value in hops Enter a hop count that is high enough so that the RP announce messages reach all mapping agents in the network There is no default setting The range is 1 to 255 For group list access list number enter an IP standard access list number from 1 to 99 If no access list is conf...

Страница 705: ...igured RP to support the two well known groups 224 0 1 39 and 224 0 1 40 Auto RP uses these two well known groups to collect and distribute RP mapping information When this is the case and the ip pim accept rp auto rp command is configured another ip pim accept rp command accepting the RP must be configured as follows Switch config ip pim accept rp 172 10 20 1 1 Switch config access list 1 permit ...

Страница 706: ...n all mapping agents to avoid inconsistencies in Auto RP operations An improperly configured ip pim rp announce filter command may result in RP announcements being ignored In addition the ip pim rp announce filter command should only be configured on the mapping agent if not the command will fail because non mapping agents do not listen to group 224 0 1 39 and do not know how to distribute the nec...

Страница 707: ...o conflicts occur in the Group to RP mapping information 3 access list access list number deny permit source source wildcard Create a standard access list repeating the command as many times as necessary For access list number enter the access list number specified in Step 2 The deny keyword denies access if the conditions are matched The permit keyword permits access if the conditions are matched...

Страница 708: ...nnouncements from 172 16 5 1 or 172 16 2 1 if the announcements are for any groups in the 239 0 0 0 through 239 255 255 255 range This range is the administratively scoped address range Configuring PIMv2 BSR These sections describe how to set up BSR in your PIMv2 network Defining the PIM Domain Border page 704 optional Defining the IP Multicast Boundary page 705 optional Configuring Candidate BSRs...

Страница 709: ...obal configuration mode 2 interface interface id Specify the interface to be configured and enter interface configuration mode 3 no shutdown Enable the port if necessary By default UNIs and ENIs are disabled and NNIs are enabled 4 ip pim bsr border Define a PIM bootstrap message boundary for the PIM domain Enter this command on each interface that connects to other bordering PIM domains This comma...

Страница 710: ...de 2 access list access list number deny source source wildcard Create a standard access list repeating the command as many times as necessary For access list number the range is 1 to 99 The deny keyword denies access if the conditions are matched For source enter multicast addresses 224 0 1 39 and 224 0 1 40 which carry Auto RP information Optional For source wildcard enter the wildcard bits in d...

Страница 711: ...v2 routers and multilayer switches and with routers from other vendors any device can be used as an RP In a network of Cisco PIMv1 routers Cisco PIMv2 routers and routers from other vendors configure only Cisco PIMv2 routers and multilayer switches as RPs This procedure is optional Command Purpose 1 configure terminal Enter global configuration mode 2 ip pim bsr candidate interface id hash mask le...

Страница 712: ...nterface whose associated IP address is advertised as a candidate RP address Valid interfaces include physical ports port channels and VLANs Optional For group list access list number enter an IP standard access list number from 1 to 99 If no group list is specified the switch is a candidate RP for all groups 3 access list access list number deny permit source source wildcard Create a standard acc...

Страница 713: ... to the longest match lookup in the RP mapping database Follow this procedure to verify the consistency of group to RP mappings This procedure is optional BEFORE YOU BEGIN Review the Auto RP and BSR Configuration Guidelines page 686 DETAILED STEPS Monitoring the RP Mapping Information To monitor the RP mapping information use these commands in privileged EXEC mode show ip pim bsr displays informat...

Страница 714: ...out PIM Shared Tree and Source Tree page 684 This change occurs because the ip pim spt threshold global configuration command controls that timing The shortest path tree requires more memory than the shared tree but reduces delay You might want to postpone its use Instead of allowing the leaf router to immediately move to the shortest path tree you can specify that the traffic must first reach a t...

Страница 715: ...will apply Optional For source wildcard enter the wildcard bits in dotted decimal notation to be applied to the source Place ones in the bit positions that you want to ignore Recall that the access list is always terminated by an implicit deny statement for everything 3 ip pim spt threshold kbps infinity group list access list number Specify the threshold that must be reached before moving to shor...

Страница 716: ...tion About PIM page 677 DETAILED STEPS To return to the default setting use the no ip pim query interval seconds interface configuration command EXAMPLE The following example shows how to set the PIM hello interval to 45 seconds interface FastEthernet0 1 ip pim query interval 45 Configuring Optional IGMP Features This section includes the following topics Default IGMP Configuration page 713 Config...

Страница 717: ... multicast group pinging that group causes all these devices to respond The devices respond to IGMP echo request packets addressed to a group of which they are members Another example is the multicast trace route tools provided in the software This procedure is optional BEFORE YOU BEGIN Caution Performing this procedure might impact the CPU performance because the CPU will receive all data traffic...

Страница 718: ...nterface to restrict the multicast groups that hosts on the subnet serviced by the interface can join This procedure is optional BEFORE YOU BEGIN Review the Information About IGMP page 676 Command Purpose 1 configure terminal Enter global configuration mode 2 interface interface id Specify the interface to be configured and enter interface configuration mode 3 no shutdown Enable the port if necess...

Страница 719: ...ss list number Specify the multicast groups that hosts on the subnet serviced by an interface can join By default all groups are allowed on an interface For access list number specify an IP standard access list number The range is 1 to 99 5 exit Return to global configuration mode 6 access list access list number deny permit source source wildcard Create a standard access list For access list numb...

Страница 720: ...hosts are members of a multicast group the software stops forwarding multicast packets to the local network from remote origins for that group and sends a prune message upstream toward the source The switch elects a PIM designated router DR for the LAN subnet The DR is the router or multilayer switch with the highest IP address for IGMPv2 For IGMPv1 the DR is elected according to the multicast rou...

Страница 721: ... response time Use the ip igmp query max response time command to change the maximum query response time value from the default 10 seconds to a specified length of time if required DETAILED STEPS To return to the default setting use the no ip igmp query interval interface configuration command EXAMPLE The following example shows how to configure the switch to wait 240 seconds from the time it rece...

Страница 722: ... BEGIN We recommend that you do not modify the IGMP query interval and IGMP querier timeout values However if you configure the appropriate commands to change the query interval and querier timeout default values the following conditions apply If you use the ip igmp query interval command to configure the query interval the timeout value is automatically adjusted to two times the query interval th...

Страница 723: ...s is overridden by the specified value interface GigabitEthernet0 1 ip igmp querier timeout 250 Changing the Maximum Query Response Time for IGMPv2 If you are using IGMPv2 you can change the maximum query response time advertised in IGMP queries The maximum query response time enables the switch to quickly detect that there are no more directly connected group members on a LAN Decreasing the value...

Страница 724: ...e switch does not accept the packets itself but only forwards them This method enables fast switching The outgoing interface appears in the IGMP cache but the switch itself is not a member as evidenced by lack of an L local flag in the multicast route entry This procedure is optional BEFORE YOU BEGIN If you configure the ip igmp join group command for the same group address as the ip igmp static g...

Страница 725: ...audio video and so forth are required on your workstation The MBONE Session Directory Version 2 sdr tool provides this information This freeware application can be downloaded from several sites on the World Wide Web one of which is http www video ja net mice index html SDR is a multicast application that listens to a well known multicast group address and port for Session Announcement Protocol SAP...

Страница 726: ...ack 0 ip address 10 0 0 51 255 255 255 0 ip pim sparse dense mode ip sap listen Limiting How Long an SAP Cache Entry Exists You can limit how long an SAP entry remains active so that if a source stops advertising SAP information old advertisements are not needlessly kept This procedure is optional BEFORE YOU BEGIN Setting the cache timeout to a value less than 30 minutes is not recommended Command...

Страница 727: ...multicast domains however TTL thresholds are not supported by the switch You should use multicast boundaries instead of TTL thresholds to limit the forwarding of multicast traffic outside of a domain or a subdomain Figure 91 on page 724 shows that Company XYZ has an administratively scoped boundary set for the multicast address range 239 0 0 0 8 on all routed interfaces at the perimeter of its net...

Страница 728: ...irection The boundary allows the same multicast group address to be reused in different administrative domains The IANA has designated the multicast address range 239 0 0 0 to 239 255 255 255 as the administratively scoped addresses This range of addresses can then be reused in domains administered by different organizations The addresses would be considered local not globally unique This procedur...

Страница 729: ...the command as many times as necessary For access list number the range is 1 to 99 The deny keyword denies access if the conditions are matched The permit keyword permits access if the conditions are matched For source enter the number of the network or host from which the packet is being sent Optional For source wildcard enter the wildcard bits in dotted decimal notation to be applied to the sour...

Страница 730: ...Note This release does not support per route statistics You can display information to learn resource utilization and solve network problems You can also display information about node reachability and discover the routing path your device s packets are taking through the network Command Purpose clear ip igmp group group name group address interface Delete entries from the IGMP cache clear ip mrou...

Страница 731: ...how ip igmp interface type number Display multicast related information about an interface show ip mcache group source Display the contents of the IP fast switching cache show ip mpacket source address name group address name detail Display the contents of the circular cache header buffer show ip mroute group name group address source summary count active kbps Display the contents of the IP multic...

Страница 732: ...st routing ip pim ssm default interface GigabitEthernet3 1 0 ip address 172 21 200 203 255 255 255 0 description backbone interface ip pim sparse mode interface GigabitEthernet3 2 0 ip address 131 108 1 2 255 255 255 0 ip pim sparse mode description ethernet connected to hosts ip igmp version 3 The following example shows how to enable static SSM mapping In this example the router is configured to...

Страница 733: ...st 20 deny 239 0 0 0 0 0 255 255 Switch config access list 20 permit 224 0 0 0 15 255 255 255 The following example configures the interface to be the PIM domain border interface ethernet 1 ip pim bsr border This example shows a portion of an IP multicast boundary configuration that denies Auto RP information Switch config access list 1 deny 224 0 1 39 Switch config access list 1 deny 224 0 1 40 S...

Страница 734: ...hange the default value 60 seconds the default timeout period of two times the query interval or 120 seconds is overridden by the specified value interface GigabitEthernet0 1 ip igmp querier timeout 250 The following example configures a maximum response time of 8 seconds ip igmp query max response time 8 The following example shows how to configure group address 239 100 100 101 on Ethernet interf...

Страница 735: ...ut MSDP MSDP allows multicast sources for a group to be known to all rendezvous points RPs in different domains Each PIM SM domain uses its own RPs and does not depend on RPs in other domains An RP runs MSDP over the Transmission Control Protocol TCP to discover multicast sources in other domains An RP in a PIM SM domain has an MSDP peering relationship with MSDP enabled devices in another domain ...

Страница 736: ...he originating RP of the SA message Such a peer is called an RPF peer reverse path forwarding peer The MSDP device forwards the message to all MSDP peers other than the RPF peer For information on how to configure an MSDP peer when BGP and MBGP are not supported see Configuring a Default MSDP Peer page 734 Figure 92 MSDP Running Between RP Peers If the MSDP peer receives the same SA message from a...

Страница 737: ...d Limitations MSDP is not fully supported in this software release because of a lack of support for Multicast Border Gateway Protocol MBGP which works closely with MSDP However it is possible to create default peers that MSDP can operate with if MBGP is not running Default Settings MSDP is not enabled and no default MSDP peer exists Configuring MSDP This section includes the following topics Confi...

Страница 738: ...d Router C but accepts SA messages only from Router A or only from Router C If Router A is first in the configuration file it is used if it is running If Router A is not running only then does Switch B accept SA messages from Router C This is the default behavior without a prefix list If you specify a prefix list the peer is a default peer only for the prefixes in the list You can have multiple ac...

Страница 739: ...tive peer accepts all SA messages If that peer fails the next configured default peer accepts all SA messages This syntax is typically used at a stub site 3 ip prefix list name description string seq number permit deny network length Optional Create a prefix list using the name specified in Step 2 Optional For description string enter a description of up to 80 characters to describe this prefix li...

Страница 740: ...g ip msdp default peer 10 1 1 1 prefix list site a Router config ip prefix list site b permit 10 0 0 0 1 Caching Source Active State By default the switch does not cache source group pairs from received SA messages When the switch forwards the MSDP SA information it does not store it in memory Therefore if a member joins a group soon after a SA message is received by the local RP that member needs...

Страница 741: ...ting the command as many times as necessary For access list number the range is 100 to 199 Enter the same number created in Step 2 The deny keyword denies access if the conditions are matched The permit keyword permits access if the conditions are matched For protocol enter ip as the protocol name For source enter the number of the network or host from which the packet is being sent For source wil...

Страница 742: ...t messages to the MSDP peer at 171 69 1 1 Switch config ip msdp sa request 171 69 1 1 Controlling Source Information that Your Switch Originates You can control the multicast source information that originates with your switch Sources you advertise based on your sources Receivers of source information based on knowing the requestor For more information see Redistributing Sources page 738 and Filte...

Страница 743: ...r list access list name enter the name or number of an IP standard or extended access list The range is 1 to 99 for standard access lists and 100 to 199 for extended lists The access list controls which local sources are advertised and to which groups they send Optional For asn aspath access list number enter the IP standard or extended access list number in the range 1 to 199 This access list num...

Страница 744: ...ary or Create an IP extended access list repeating the command as many times as necessary For access list number the range is 1 to 99 for standard access lists and 100 to 199 for extended lists Enter the same number created in Step 2 The deny keyword denies access if the conditions are matched The permit keyword permits access if the conditions are matched For protocol enter ip as the protocol nam...

Страница 745: ...p msdp filter sa request ip address name or ip msdp filter sa request ip address name list access list number Filter all SA request messages from the specified MSDP peer or Filter SA request messages from the specified MSDP peer for groups that pass the standard access list The access list describes a multicast group address The range for the access list number is 1 to 99 3 access list access list...

Страница 746: ...se methods are described in the next sections Using a Filter By creating a filter you can perform one of these actions Filter all source group pairs Specify an IP extended access list to pass only certain source group pairs Filter based on match criteria in a route map Follow this procedure to apply a filter This procedure is optional BEFORE YOU BEGIN For best practice information related to confi...

Страница 747: ...ildcard destination destination wildcard Optional Create an IP extended access list repeating the command as many times as necessary For access list number enter the number specified in Step 2 The deny keyword denies access if the conditions are matched The permit keyword permits access if the conditions are matched For protocol enter ip as the protocol name For source enter the number of the netw...

Страница 748: ...is optional DETAILED STEPS To return to the default setting use the no ip msdp ttl threshold ip address name global configuration command EXAMPLE The following example shows how to configure a TTL threshold of 8 hops Switch config ip msdp ttl threshold 192 168 1 5 8 Controlling Source Information that Your Switch Receives By default the switch receives all SA messages that its MSDP RPF peers send ...

Страница 749: ...t to pass certain source group pairs Filter based on match criteria in a route map Follow this procedure to apply a filter This procedure is optional BEFORE YOU BEGIN For best practice information related to configuring MSDP SA message filters see the Multicast Source Discovery Protocol SA Filter Recommendations tech note ...

Страница 750: ...e wildcard destination destination wildcard Optional Create an IP extended access list repeating the command as many times as necessary For access list number enter the number specified in Step 2 The deny keyword denies access if the conditions are matched The permit keyword permits access if the conditions are matched For protocol enter ip as the protocol name For source enter the number of the n...

Страница 751: ... domain You can configure multiple mesh groups with different names in a single switch This procedure is optional DETAILED STEPS To remove an MSDP peer from a mesh group use the no ip msdp mesh group name ip address name global configuration command EXAMPLE The following example shows how to configure the MSDP peer at address 192 168 1 3 to be a member of the mesh group named internal Switch confi...

Страница 752: ...bal configuration command It is better to configure the border router in the sparse mode domain to proxy register sources in the dense mode domain to the RP of the sparse mode domain and have the sparse mode domain use standard MSDP procedures to advertise these sources If you use the ip msdp border sa address command you must constrain the sources advertised by using the ip msdp redistribute comm...

Страница 753: ...tch is not an RP it would not have an RP address to use in an SA message Therefore this command provides the RP address by specifying the address of the interface This procedure is optional BEFORE YOU BEGIN If both the ip msdp border sa address and the ip msdp originator id global configuration commands are configured the address derived from the ip msdp originator id command specifies the address...

Страница 754: ... SA messages Switch config ip msdp originator id ethernet1 Table 0 11 Command Purpose 1 configure terminal Enter global configuration mode 2 ip msdp originator id interface id Configures the RP address in SA messages to be the address of the originating device interface For interface id specify the interface on the local switch 3 end Return to privileged EXEC mode 4 show running config Verify your...

Страница 755: ...00 Switch config access list 100 permit ip 171 69 0 0 0 0 255 255 224 2 0 0 0 0 255 255 Table 45 58 Command Purpose debug ip msdp peer address name detail routes Debugs an MSDP activity debug ip msdp resets Debugs MSDP peer reset reasons show ip msdp count autonomous system number Displays the number of sources and groups originated in SA messages from each autonomous system The ip msdp cache sa s...

Страница 756: ...isco com list 100 Switch config access list 100 permit ip 171 69 0 0 0 0 255 255 224 20 0 0 0 255 255 The following example shows how to configure a TTL threshold of 8 hops Switch config ip msdp ttl threshold 192 168 1 5 8 This example shows how to filter all SA messages from the peer named switch cisco com Switch config ip msdp peer switch cisco com connect source gigabitethernet0 1 Switch config...

Страница 757: ...mically configuring Layer 2 interfaces so that multicast traffic is forwarded to only those interfaces associated with IP multicast devices In IPv6 MLD snooping performs a similar function With MLD snooping IPv6 multicast data is selectively forwarded to a list of ports that want to receive the data instead of being flooded to all ports in a VLAN This list is constructed by snooping IPv6 multicast...

Страница 758: ...2 messages MLD messages that do not have valid link local IPv6 source addresses are ignored by MLD routers and switches MLD Queries The switch sends out MLD queries constructs an IPv6 multicast address database and generates MLD group specific and MLD group and source specific queries in response to MLD Done messages The switch also supports report suppression report proxying Immediate Leave funct...

Страница 759: ...led on the switch Received IPv6 multicast router control packets are always flooded to the ingress VLAN whether or not MLD snooping is enabled on the switch After the discovery of the first IPv6 multicast router port unknown IPv6 multicast data is forwarded only to the discovered router ports before that time all IPv6 multicast data is flooded to the ingress VLAN MLD Reports The processing of MLDv...

Страница 760: ...d port is the last member of the multicast address the multicast address is also deleted and the switch sends the address leave information to all detected multicast routers Topology Change Notification Processing When topology change notification TCN solicitation is enabled by using the ipv6 mld snooping tcn query solicit global configuration command MLDv1 snooping sets the VLAN to flood all IPv6...

Страница 761: ...is MLD snooping is enabled only on VLAN interfaces in the default state enabled Table 46 60 Feature Default Setting MLD snooping Global Disabled MLD snooping per VLAN Enabled MLD snooping must be globally enabled for VLAN MLD snooping to take place IPv6 Multicast addresses None configured IPv6 Multicast router ports None configured MLD snooping Immediate Leave Disabled MLD snooping robustness vari...

Страница 762: ... it is not necessary to enable IPv6 MLD snooping on the VLAN on the Catalyst 6500 switch To disable MLD snooping on a VLAN interface use the no ipv6 mld snooping vlan vlan id global configuration command for the specified VLAN number EXAMPLE This example shows how to enable MLD snooping on a VLAN Table 46 12 Command Purpose 1 configure terminal Enter global configuration mode 2 ipv6 mld snooping G...

Страница 763: ... use the command line interface CLI to add a multicast router port to a VLAN To add a multicast router port add a static connection to a multicast router use the ipv6 mld snooping vlan mrouter global configuration command on the switch BEFORE YOU BEGIN Static connections to multicast routers are supported only on switch ports Table 46 14 Command Purpose 1 configure terminal Enter global configurat...

Страница 764: ...VLAN use the no ipv6 mld snooping vlan vlan id immediate leave global configuration command Table 46 15 Command Purpose 1 configure terminal Enter global configuration mode 2 ipv6 mld snooping vlan vlan id mrouter interface interface id Specify the multicast router VLAN ID and specify the interface to the multicast router The VLAN ID range is 1 to 1001 and 1006 to 4094 The interface can be a physi...

Страница 765: ...ve Switch config exit Configuring MLD Snooping Queries When Immediate Leave is not enabled and a port receives an MLD Done message the switch generates MASQs on the port and sends them to the IPv6 multicast address for which the Done message was sent You can optionally configure the number of MASQs that are sent and the length of time the switch waits for a response before deleting the port from t...

Страница 766: ...d last listener query count count Optional Set the last listener query count on a VLAN basis This value overrides the value configured globally The range is 1 to 7 the default is 0 When set to 0 the global count value is used Queries are sent 1 second apart 6 ipv6 mld snooping last listener query interval interval Optional Set the maximum response time that the switch waits after sending out a MAS...

Страница 767: ...oping listener message suppression global configuration command EXAMPLE This example shows how to disable MLD message suppression Switch configure terminal Switch config no ipv6 mld snooping listener message suppression Switch config end Verifying Configuration You can display MLD snooping information for dynamically learned and statically configured router ports and VLAN interfaces You can also d...

Страница 768: ...witch automatically learns the interface to which a multicast router is connected These are dynamically learned interfaces Optional Enter vlan vlan id to display information for a single VLAN The VLAN ID range is 1 to 1001 and 1006 to 4094 show ipv6 mld snooping querier vlan vlan id Display information about the IPv6 address and incoming port for the most recently received MLD query messages in th...

Страница 769: ...nooping robustness variable 3 Switch config exit This example shows how to set the MLD snooping last listener query count for a VLAN to 3 Switch configure terminal Switch config ipv6 mld snooping vlan 200 last listener query count 3 Switch config exit This example shows how to set the MLD snooping last listener query interval maximum response time to 2000 2 seconds Switch configure terminal Switch...

Страница 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...

Страница 771: ... availability of any single router It enables a set of router interfaces to work together to present the appearance of a single virtual router or default gateway to the hosts on a LAN When HSRP is configured on a network or segment it provides a virtual Media Access Control MAC address and an IP address that is shared among a group of configured routers HSRP allows two or more HSRP configured rout...

Страница 772: ... standby router and also configure another interface on switch 2 as an active router with another interface on switch 1 as its standby router Figure 47 94 shows a segment of a network configured for HSRP Each router is configured with the MAC address and IP network address of the virtual router Instead of configuring hosts on the network with the IP address of Router A you configure them with the ...

Страница 773: ...nt packet format than HSRPv1 A HSRPv2 packet uses the type length value TLV format and has a 6 byte identifier field with the MAC address of the physical router that sent the packet If an interface running HSRPv1 gets an HSRPv2 packet the type field is ignored Multiple HSRP The switch supports Multiple HSRP MHSRP an extension of HSRP that allows load sharing between two or more HSRP groups You can...

Страница 774: ... MHSRP page 775 Configuring HSRP Authentication and Timers page 776 Enabling HSRP Support for ICMP Redirect Messages page 777 Configuring HSRP Groups and Clustering page 777 Troubleshooting HSRP page 777 Default HSRP Configuration Table 47 62 shows the default HSRP configuration 121235 Active router for group 1 Standby router for group 2 Client 1 Router A Router B 10 0 0 1 10 0 0 2 Active router f...

Страница 775: ...port channel in Layer 3 mode a port channel logical interface created by using the interface port channel port channel number global configuration command and binding the Ethernet interface into the channel group For more information see the Configuring Layer 3 EtherChannels section All Layer 3 interfaces must have assigned IP addresses Configure only one instance of an FHRP The switches support H...

Страница 776: ...p 1 configure terminal Enter global configuration mode Step 2 interface interface id Enter interface configuration mode and enter the Layer 3 interface on which you want to enable HSRP Step 3 standby version 1 2 Optional Configure the HSRP version on the interface 1 Select HSRPv1 2 Select HSRPv2 If you do not enter this command or do not specify a keyword the interface runs the default HSRP versio...

Страница 777: ...keyword priority preempt or both The priority of the device can change dynamically if an interface is configured with the standby track command and another interface on the router goes down The standby track interface configuration command ties the router hot standby priority to the availability of its interfaces and is useful for tracking interfaces that are not configured for HSRP When a tracked...

Страница 778: ...igure the router to preempt which means that when the local router has a higher priority than the active router it assumes control as the active router Optional group number The group number to which the command applies Optional priority Enter to set or change the group priority The range is 1 to 255 the default is 100 Optional delay Set to cause the local router to postpone taking over the active...

Страница 779: ... interface configuration command on each HSRP interface so that if a router fails and comes back up the preemption occurs and restores load balancing Router A is configured as the active router for group 1 and Router B is configured as the active router for group 2 The HSRP interface for Router A has an IP address of 10 0 0 1 with a group 1 standby priority of 110 the default is 100 The HSRP inter...

Страница 780: ...tication string Use the no standby group number timers hellotime holdtime interface configuration command to restore timers to their default values This example shows how to configure word as the authentication string required to allow Hot Standby routers in group 1 to interoperate Command Purpose Step 1 configure terminal Enter global configuration mode Step 2 interface interface id Enter interfa...

Страница 781: ...be lost ICMP redirect messages are automatically enabled on interfaces configured with HSRP This feature filters outgoing ICMP redirect messages through HSRP in which the next hop IP address might be changed to an HSRP virtual IP address Configuring HSRP Groups and Clustering When a device is participating in an HSRP standby routing and clustering is enabled you can use the same standby group for ...

Страница 782: ...is local Standby virtual mac address is 0000 0c07 ac01 Name is bbb VLAN1 Group 100 Local state is Active priority 105 may preempt Hellotime 3 holdtime 10 Next hello sent in 00 00 02 262 Hot standby IP address is 172 20 138 51 configured Active router is local Standby router is unknown expired Standby virtual mac address is 0000 0c07 ac64 Name is test Configuring VRRP The Virtual Router Redundancy ...

Страница 783: ...The switch supports either HSRP or VRRP but not both The switch cannot join a stack that has both HSRP and VRRP configured The VRRP implementation on the switch does not support the MIB specified in RFC 2787 The VRRP implementation on the switch supports only text based authentication You cannot enable VRRP for IPv4 and IPv6 groups simultaneously ...

Страница 784: ... 780 Cisco Industrial Ethernet 4000 Series Switch Software Configuration Guide Chapter Configuring HSRP and VRRP Configuring VRRP ...

Страница 785: ... only which can be routed ports switch virtual interfaces SVIs or Layer 3 EtherChannels IPv6 router ACLs apply only to routed IPv6 packets IPv6 port ACLs on inbound traffic on Layer 2 interfaces only The switch applies IPv6 port ACLs to all IPv6 packets entering the interface You can apply both IPv4 and IPv6 ACLs to an interface As with IPv4 ACLs IPv6 port ACLs take precedence over router ACLs Whe...

Страница 786: ... Not Supported The switch does not support VLAN ACLs VLAN maps for IPv6 traffic The switch does not apply MAC based ACLs on IPv6 frames You cannot apply IPv6 port ACLs to Layer 2 EtherChannels The switch does not support output port ACLs Cisco IOS IPv6 ACLs Functions Not Supported The switch does not support matching on these keywords flowlabel routing header and undetermined transport The switch ...

Страница 787: ... hardware memory is full for any additional configured ACLs the switch forwards the packets to the CPU and the software applies the ACLs Default Settings Configuring IPv6 ACLs This section includes the following topics Creating IPv6 ACLs page 783 Applying an IPv6 ACL to an Interface page 787 BEFORE YOU BEGIN Review the Guidelines and Limitations page 782 for this feature Select one of the dual IPv...

Страница 788: ...tocol number For additional specific parameters for ICMP TCP and UDP see Steps 3b through 3d source ipv6 prefix prefix length or destination ipv6 prefix prefix length Source or destination IPv6 network or class of networks for which to set deny or permit conditions specified in hexadecimal and using 16 bit values between colons Enter any as an abbreviation for the IPv6 prefix 0 host source ipv6 ad...

Страница 789: ...range name Specify the time range that applies to the deny or permit statement Step 3b deny permit tcp source ipv6 prefix prefix length any host source ipv6 address operator port number destination ipv6 prefix prefix length any host destination ipv6 address operator port number ack dscp value established fin log log input neq port protocol psh range port protocol rst routing sequence value syn tim...

Страница 790: ...User Datagram Protocol The UDP parameters are the same as those described for TCP except that the operator port port number or name must be a UDP port number or name and the established parameter is not valid for UDP Step 3d deny permit icmp source ipv6 prefix prefix length any host source ipv6 address operator port number destination ipv6 prefix prefix length any host destination ipv6 address ope...

Страница 791: ...interface for port ACLs or Layer 3 interface for router ACLs on which to apply an access list and enter interface configuration mode 3 no switchport If applying a router ACL change the interface from Layer 2 mode the default to Layer 3 mode 4 ipv6 address ipv6 address Configure an IPv6 address on a Layer 3 interface for router ACLs Note This command is not required on Layer 2 interfaces or if the ...

Страница 792: ...icit deny all condition is at the end of each IPv6 access list Applies the access list CISCO to outbound traffic on a Layer 3 interface Switch config ipv6 access list CISCO Switch config ipv6 acl deny tcp any any gt 5000 Switch config ipv6 acl deny 0 lt 5000 0 log Switch config ipv6 acl permit icmp any any Switch config ipv6 acl permit any any Switch config ipv6 acl exit Switch config interface gi...

Страница 793: ...nts page 796 Information About Embedded Event Manager EEM monitors key system events and then acts on them through a set policy This policy is a programmed script that you can use to customize a script to invoke an action based on a given set of events occurring The script generates actions such as generating custom syslog or Simple Network Management Protocol SNMP traps invoking CLI commands forc...

Страница 794: ...he EEM polices where an action can be implemented EEM allows these event detectors Application specific event detector Allows any EEM policy to publish an event IOS CLI event detector Generates policies based on the commands entered through the CLI Generic Online Diagnostics GOLD event detector Publishes an event when a GOLD failure event is detected on a specified card and subcard Counter event d...

Страница 795: ...ifier OID value at the beginning the period and the actual OID value when the event is published matches a specified value SNMP notification event detector Intercepts SNMP trap and inform messages received by the switch The event is generated when an incoming message matches a specified value or crosses a defined threshold Syslog event detector Allows for screening syslog messages for a regular ex...

Страница 796: ...t Manager Environment Variables EEM uses environment variables in EEM policies These variables are defined in an EEM policy tool command language TCL script by running a CLI command and the event manager environment command User defined variables Defined by the user for a user defined policy Cisco defined variables Defined by Cisco for a specific sample policy Cisco built in variables available in...

Страница 797: ...e sent from the Cisco IOS device to the SNMP server Other relevant snmp server commands must also be configured for details see the action snmp trap command page Guidelines and Limitations The EEM feature is supported with both Lanbase and IP Services license starting with the 15 2 4 EC release for the IE 4010 and with the15 2 5 E release for IE 4000 and IE 5000 Prior to the 15 2 5 E release IP Se...

Страница 798: ...e 1 configure terminal Enter global configuration mode 2 event manager applet applet name Register the applet with EEM and enter applet configuration mode 3 event snmp oid oid value get type exact next entry op gt ge eq ne lt le entry val entry val exit comb or and exit op gt ge eq ne lt le exit val exit val exit time exit time val poll interval poll int val Specify the event criteria that causes ...

Страница 799: ...on about EEM including EEM registered policies and EEM history data see Cisco IOS Embedded Event Manager Command Reference Configuration Example This example shows the output for EEM when one of the fields specified by an SNMP object ID crosses a defined threshold Command Purpose 1 configure terminal Enter global configuration mode 1 show event manager environment all variable name Optional The sh...

Страница 800: ...w ver 3 _syslog_pattern UPDOWN Ethernet1 0 4 _config_cmd1 interface Ethernet1 0 5 _config_cmd2 no shut This example shows a CRON timer environment variable which is assigned by the software to be set to every second minute every hour of every day Switch config event manager environment_cron_entry 0 59 2 0 23 1 0 6 This example shows the sample EEM policy named tm_cli_cmd tcl registered as a system...

Страница 801: ...798 Configuring IP Addressing page 799 Enabling IPv4 Unicast Routing page 816 Configuring RIP page 817 Configuring OSPF page 823 Configuring EIGRP page 838 Configuring BGP page 846 Configuring ISO CLNS Routing page 871 Configuring BFD page 883 Configuring Multi VRF CE page 894 Configuring Protocol Independent Features page 906 Verifying Configuration page 924 Related Documents page 924 Information...

Страница 802: ...inations By dynamically calculating routes by using a routing protocol Dynamic routing protocols are used by routers to dynamically calculate the best route for forwarding traffic Routing protocols supported by the switch are Routing Information Protocol RIP Border Gateway Protocol BGP Open Shortest Path First OSPF protocol Enhanced IGRP EIGRP System to Intermediate System IS IS and Bidirectional ...

Страница 803: ...Pv4 routing use the sdm prefer default global configuration command to set the Switch Database Management sdm feature to balance resources For more information on the SDM templates see the sdm prefer command in the command reference listed in the Related Documents page 924 Steps for Configuring Routing Configuring IPv4 routing consists of several main procedures Configure Layer 3 interfaces Enable...

Страница 804: ...sulation Standard Ethernet style ARP Timeout 14400 seconds 4 hours IP broadcast address 255 255 255 255 all ones IP classless routing Enabled IP default gateway Disabled IP directed broadcast Disabled all IP directed broadcasts are dropped IP domain Domain list No domain names defined Domain lookup Enabled Domain name Enabled IP forward protocol If a helper address is defined or User Datagram Prot...

Страница 805: ...ses For example if network 131 108 0 0 is subnetted as 255 255 255 0 subnet zero would be written as 131 108 0 0 which is the same as the network address Command Purpose 1 configure terminal Enter global configuration mode 2 interface interface id Enter interface configuration mode and specify the Layer 3 interface to configure 3 no shutdown Enable the interface if necessary User network interface...

Страница 806: ...n page 802 classless routing is enabled When the host sends a packet to 120 20 4 1 instead of discarding the packet the router forwards it to the best supernet route If you disable classless routing and a router receives packets destined for a subnet of a network with no network default route the router discards the packet Figure 98 IP Classless Routing In Figure 99 on page 803 the router in netwo...

Страница 807: ...dling of IP by using address resolution A device using IP can have both a local address or MAC address which uniquely defines the device on its local segment or LAN and a network address which identifies the network to which the device belongs To communicate with a device on Ethernet the software must learn the MAC address of the device The process of learning the MAC address from an IP address is...

Страница 808: ...l RARP which functions the same as ARP does except that the RARP packets request an IP address instead of a local MAC address Using RARP requires a RARP server on the same network segment as the router interface Use the ip rarp server address interface configuration command to identify the server For more information on RARP see IP Addressing ARP Configuration Guide Cisco IOS Release 15M T You can...

Страница 809: ...ype Globally associate an IP address with a MAC hardware address in the ARP cache and specify encapsulation type as one of these arpa ARP encapsulation for Ethernet interfaces snap Subnetwork Address Protocol encapsulation for Token Ring and FDDI interfaces sap HP s ARP type 3 arp ip address hardware address type alias Optional Specify that the switch respond to ARP requests as if it were the owne...

Страница 810: ...cify the Layer 3 interface to configure 3 no shutdown Enable the interface if necessary By default UNIs and ENIs are disabled and NNIs are enabled 4 arp arpa snap Specify the ARP encapsulation method arpa Address Resolution Protocol snap Subnetwork Address Protocol 5 end Return to privileged EXEC mode 6 show interfaces interface id Verify ARP encapsulation configuration on all interfaces or the sp...

Страница 811: ...ch forwards it to the intended host Proxy ARP treats all networks as if they are local and performs ARP requests for every IP address Proxy ARP is enabled by default To enable it after it has been disabled see Enabling Proxy ARP page 806 Proxy ARP works as long as other routers support it Default Gateway Another method for locating routes is to define a default router or default gateway All nonloc...

Страница 812: ... time after which a device is assumed to be down if no further packets are received Each device discovered becomes a candidate for the default router and a new highest priority router is selected when a higher priority router is discovered when the current default router is declared down or when a TCP connection is about to time out because of excessive retransmissions The only required task for I...

Страница 813: ...UNIs and ENIs are disabled and NNIs are enabled 4 ip irdp Enable IRDP processing on the interface 5 ip irdp multicast Optional Send IRDP advertisements to the multicast address 224 0 0 1 instead of IP broadcasts 6 ip irdp holdtime seconds Optional Set the IRDP period for which advertisements are valid The default is three times the maxadvertinterval value It must be greater than maxadvertinterval ...

Страница 814: ...rk segments thus propagating broadcast storms The best solution to the broadcast storm problem is to use a single broadcast address scheme on a network In most modern IP implementations you can set the address to be used as the broadcast address The switch supports several addressing schemes for forwarding broadcast messages Enabling Directed Broadcast to Physical Broadcast Translation page 810 Fo...

Страница 815: ...terface id Enter interface configuration mode and specify the interface to configure 3 no shutdown Enable the interface if necessary By default UNIs and ENIs are disabled and NNIs are enabled 4 ip directed broadcast access list number Enable directed broadcast to physical broadcast translation on the interface You can include an access list to control which broadcasts are forwarded When an access ...

Страница 816: ...rvices Command Reference for the list of ports that are forwarded by default if you do not specify any UDP ports DETAILED STEPS Use the no ip helper address interface configuration command to disable the forwarding of broadcast packets to specific addresses Use the no ip forward protocol global configuration command to remove a protocol or port EXAMPLE The following example defines a helper addres...

Страница 817: ... bridging is not configured on an interface the interface can receive broadcasts but it never forwards the broadcasts it receives and the router never uses that interface to send broadcasts received on a different interface Packets that are forwarded to a single network address using the IP helper address mechanism can be flooded Only one copy of the packet is sent on each network segment To be co...

Страница 818: ...d protocol spanning tree global configuration command to disable the flooding of IP broadcasts EXAMPLE The following example permits IP broadcasts to be flooded through the internetwork in a controlled fashion Switch configure terminal Enter configuration commands one per line End with CNTL Z Switch config ip forward protocol spanning tree Switch config end Speeding up STP Based UDP Flooding In th...

Страница 819: ...using the clear privileged EXEC commands You can display specific statistics such as the contents of IP routing tables caches and databases the reachability of nodes and the routing path that packets are taking through the network Command Purpose 1 configure terminal Enter global configuration mode 2 ip forward protocol turbo flood Use the spanning tree database to speed up flooding of UDP datagra...

Страница 820: ...iases Display IP addresses mapped to TCP ports aliases show ip arp Display the IP ARP cache show ip interface interface id Display the IP status of interfaces show ip irdp Display IRDP values show ip masks address Display the masks used for network addresses and the number of subnets using each mask show ip redirects Display the address of a default gateway show ip route address mask protocol Disp...

Страница 821: ...ts to rate the value of different routes The hop count is the number of routers that can be traversed in a route A directly connected network has a hop count of zero a network with a hop count of 16 is unreachable This small range 0 to 15 makes RIP unsuitable for large networks If the router has a default network path RIP advertises a route that links the router to the pseudonetwork 0 0 0 0 The 0 ...

Страница 822: ...re Default Setting Auto summary Enabled Default information originate Disabled Default metric Built in automatic metric translations IP RIP authentication key chain No authentication Authentication mode clear text IP RIP receive version According to the version router configuration command IP RIP send version According to the version router configuration command IP RIP triggered According to the v...

Страница 823: ...onds holddown The time before a route is removed from the routing table The default is 180 seconds flush The amount of time for which routing updates are postponed The default is 240 seconds 8 version 1 2 Optional Configure the switch to receive and send only RIP Version 1 or RIP Version 2 packets By default the switch receives Version 1 and 2 but sends only Version 1 You can also use the interfac...

Страница 824: ...fig router rip Switch config router network 10 108 0 0 Router config router passive interface Ethernet 1 Router config router neighbor 10 108 20 4 Router config router end Configuring RIP Authentication RIP Version 1 does not support authentication If you are sending and receiving RIP Version 2 packets you can enable RIP authentication on an interface The key chain specifies the set of keys that c...

Страница 825: ...outing loops Split horizon blocks information about routes from being advertised by a router on any interface from which that information originated This feature can optimize communication among multiple routers when links are broken BEFORE YOU BEGIN In general Cisco does not recommend disabling split horizon unless you are certain that your application requires disabling it to properly advertise ...

Страница 826: ...is enabled neither autosummary nor interface IP summary addresses are advertised BEFORE YOU BEGIN If the interface is in Layer 2 mode the default you must enter a no switchport interface configuration command before entering the ip address interface configuration command Command Purpose 1 configure terminal Enter global configuration mode 2 interface interface id Enter interface configuration mode...

Страница 827: ...iving packets This section briefly describes how to configure OSPF For a complete description of the OSPF commands see the OSPF documents listed in the Related Documents page 924 Note OSPF classifies different media into broadcast nonbroadcast multiaccess NBMA or point to point networks Broadcast and nonbroadcast networks can also be configured as point to multipoint networks The switch supports a...

Страница 828: ...t so stubby areas NSSAs per RFC 1587 are supported OSPF typically requires coordination among many internal routers area border routers ABRs connected to multiple areas and autonomous system boundary routers ASBRs The minimum configuration would use all default parameter values no authentication and interfaces assigned to areas If you customize your environment you must ensure coordinated configur...

Страница 829: ...nd the external route type default is Type 2 Default metric Built in automatic metric translation as appropriate for each routing protocol Distance OSPF dist1 all routes within an area 110 dist2 all routes from one area to another 110 and dist3 routes from other routing domains 110 OSPF database filter Disabled All outgoing link state advertisements LSAs are flooded to the interface IP OSPF name l...

Страница 830: ...ase 15S Configuring Basic OSPF Parameters Enabling OSPF requires that you create an OSPF routing process specify the range of IP addresses to be associated with the routing process and assign area IDs to be associated with that range BEFORE YOU BEGIN Complete the OSPF network strategy and planning for your network For example you must decide whether multiple areas are required Timers LSA group pac...

Страница 831: ...ration commands are all optional BEFORE YOU BEGIN If you modify these parameters be sure all routers in the network have compatible values Command Purpose 1 configure terminal Enter global configuration mode 2 router ospf process id Enable OSPF routing and enter router configuration mode The process ID is an internally used identification parameter that is locally assigned and can be any positive ...

Страница 832: ...Optional Set the number of seconds between hello packets sent on an OSPF interface The value must be the same for all nodes on a network The range is 1 to 65535 seconds The default is 10 seconds 9 ip ospf dead interval seconds Optional Set the number of seconds after the last device hello packet was seen before its neighbors declare the OSPF router to be down The value must be the same for all nod...

Страница 833: ...r point to multipoint regardless of the default media type Configuring OSPF for Nonbroadcast Networks Because many routers might be attached to an OSPF network a designated router is selected for the network If broadcast capability is not configured in the network the designated router selection requires special configuration parameters You need to configure these parameters only for devices that ...

Страница 834: ...ure an interface as point to multipoint when the media does not support broadcast you should use the neighbor command to identify neighbors BEFORE YOU BEGIN Complete the OSPF network strategy and planning for your network Command Purpose 1 configure terminal Enter global configuration mode 2 router ospf process id Configure an OSPF routing process and enter router configuration mode 3 neighbor ip ...

Страница 835: ...to point Specify an OSPF point to point network 5 exit Return to global configuration mode 6 router ospf process id Optional for point to multipoint required for point to multipoint nonbroadcast Configure an OSPF routing process and enter router configuration mode 7 neighbor ip address cost number Optional for point to multipoint required for point to multipoint nonbroadcast Specify a configured O...

Страница 836: ...d not so stubby areas NSSAs Stub areas are areas into which information on external routes is not sent Instead the area border router ABR generates a default external route into the stub area for destinations outside the autonomous system AS An NSSA does not flood all LSAs from the core into the area but can import AS external routes within the area by redistribution Route summarization is the con...

Страница 837: ... summary Optional Define an area as a stub area The no summary keyword prevents an ABR from sending summary link advertisements into the stub area 6 area area id nssa no redistribution default information originate no summary Optional Defines an area as a not so stubby area Every router within the same area must agree that the area is NSSA Select one of these keywords no redistribution Select when...

Страница 838: ...it by router ID or neighbor ID Default Metrics OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface The metric is calculated as ref bw divided by bandwidth where ref is 10 by default and bandwidth bw is specified by the bandwidth interface configuration command For multiple links with high bandwidth you can specify a larger number to differentiate the cost o...

Страница 839: ...kup Optional Configure DNS name lookup The default is disabled 7 ip auto cost reference bandwidth ref bw Optional Specify an address range for which a single route will be advertised Use this command only with area border routers 8 distance ospf inter area dist1 inter area dist2 external dist3 Optional Change the OSPF distance values The default distance for each type of route is 110 The range is ...

Страница 840: ...umes the risks associated with changing the default timer values DETAILED STEPS To return to the default value use the no timers pacing lsa group router configuration command EXAMPLE The following example configures OSPF group packet pacing updates between LSA groups to occur in 60 second intervals for OSPF routing process 1 Switch config router ospf 1 Switch config router timers pacing lsa group ...

Страница 841: ... 5 show ip interface Verify your entries 6 copy running config startup config Optional Save your entries in the configuration file Command Purpose show ip ospf process id Display general information about OSPF routing processes show ip ospf process id database router link state id show ip ospf process id database router self originate show ip ospf process id database router adv router ip address s...

Страница 842: ...iency reliability is provided only when necessary For example on a multiaccess network that has multicast capabilities it is not necessary to send hellos reliably to all neighbors individually Therefore EIGRP sends a single multicast hello with an indication in the packet informing the receivers that the packet need not be acknowledged Other types of packets such as updates require acknowledgment ...

Страница 843: ...tance Internal distance 90 External distance 170 EIGRP log neighbor changes Disabled No adjacency changes logged IP authentication key chain No authentication provided IP authentication mode No authentication provided IP bandwidth percent 50 percent IP hello interval For low speed nonbroadcast multiaccess NBMA networks 60 seconds all other networks 5 seconds IP hold time For low speed NBMA network...

Страница 844: ...3 switch continues to forward packets from the neighboring router during the interval between the primary Route Processor RP in a router failing and the backup RP taking over or while the primary RP is manually reloaded for a nondisruptive software upgrade This feature cannot be disabled For more information on this feature see the Configuring Nonstop Forwarding chapter in the High Availability Co...

Страница 845: ...orks 4 eigrp log neighbor changes Optional Enable logging of EIGRP neighbor changes to monitor routing system stability 5 metric weights tos k1 k2 k3 k4 k5 Optional Adjust the EIGRP metric Although the defaults have been carefully set to provide excellent operation in most networks you can adjust them Caution Setting metrics is complex and is not recommended without guidance from an experienced ne...

Страница 846: ...of bandwidth that can be used by EIGRP on an interface The default is 50 percent 5 ip summary address eigrp autonomous system number address mask Optional Configure a summary aggregate address for a specified interface not usually necessary if auto summary is enabled 6 ip hello interval eigrp autonomous system number seconds Optional Change the hello time interval for an EIGRP routing process The ...

Страница 847: ...d in Step 4 8 key number In key chain configuration mode identify the key number 9 key string text In key chain key configuration mode identify the key string 10 accept lifetime start time infinite end time duration seconds Optional Specify the time period during which the key can be received The start time and end time syntax can be either hh mm ss Month date year or hh mm ss date Month year The ...

Страница 848: ...tch responds to all queries for summaries connected routes and routing updates Note EIGRP stub routing only advertises connected or summary routes from the routing tables to other switches in the network The switch uses EIGRP stub routing at the access layer to eliminate the need for other types of routing advertisements If you try to configure multi VRF CE and EIGRP stub routing at the same time ...

Страница 849: ...e 2 router eigrp 1 Configure a remote or distribution router to run an EIGRP process and enter router configuration mode 3 network network number Associate networks with an EIGRP routing process 4 eigrp stub receive only connected static summary Configure a remote router as an EIGRP stub router The keywords have these meanings Enter receive only to set the router as a receive only neighbor Enter c...

Страница 850: ... that networks within the AS can be reached by defining internal BGP peering among routers within the AS and by redistributing BGP routing information to IGPs that run within the AS such as IGRP and OSPF Routers that run a BGP routing process are often referred to as BGP speakers BGP uses the Transmission Control Protocol TCP as its transport protocol specifically port 179 Two BGP speakers that ha...

Страница 851: ...mation about the list of AS paths with other BGP systems This information can be used to determine AS connectivity to prune routing loops and to enforce AS level policy decisions A router or switch running Cisco IOS does not select or use an IBGP route unless it has a route available to the next hop router and it has received synchronization from an IGP unless IGP synchronization is disabled When ...

Страница 852: ... network None specified no backdoor route advertised BGP route dampening Disabled by default When enabled Half life is 15 minutes Re use is 750 10 second increments Suppress is 2000 10 second increments Max suppress time is 4 times half life 60 minutes BGP router ID The IP address of a loopback interface if one is configured or the highest IP address configured for a physical interface on the rout...

Страница 853: ...one used Maximum number of prefixes received No limit Neighbor Next hop router as next hop for BGP neighbor Disabled Password Disabled Peer group None defined no members assigned Prefix list None specified Remote AS add entry to neighbor BGP table No peers defined Private AS number removal Disabled Route maps None applied to a peer Send community attributes None sent to neighbors Shutdown or soft ...

Страница 854: ...m the AS path by using the neighbor remove private as router configuration command Then when an update is passed to an external neighbor if the AS path includes private AS numbers these numbers are dropped If your AS must pass traffic through it from another AS to a third AS it is important to be consistent about the routes it advertises If BGP advertises a route before all routers in the network ...

Страница 855: ...ress belongs to the specified AS For EBGP neighbors are usually directly connected and the IP address is the address of the interface at the other end of the connection For IBGP the IP address can be the address of any of the router interfaces 6 neighbor ip address peer group name remove private as Optional Remove private AS numbers from the AS path in outbound routing updates 7 no synchronization...

Страница 856: ...hbor 175 220 212 1 remote as 200 Switch config router neighbor 192 208 10 1 remote as 300 Router D Switch config router bgp 300 Switch config router neighbor 192 208 10 2 remote as 200 To verify that BGP peers are running use the show ip bgp neighbors privileged EXEC command This is the output of this command on Router A Switch show ip bgp neighbors BGP neighbor is 129 213 1 1 remote AS 200 extern...

Страница 857: ...ard reset and soft reset The switch supports a soft reset without any prior configuration when both BGP peers support the soft route refresh capability which is advertised in the OPEN message sent when the peers establish a TCP session A soft reset allows the dynamic exchange of route refresh requests and routing information between BGP routers and the subsequent re advertisement of the respective...

Страница 858: ...IP address of the next hop that is going to be used to reach a destination For EBGP this is usually the IP address of the neighbor specified by the neighbor remote as router configuration command You can disable next hop processing by using route maps or the neighbor next hop self router configuration command 2 Prefer the path with the largest weight a Cisco proprietary parameter The weight attrib...

Страница 859: ...d You can configure the MED by using route maps or by using the default metric router configuration command When an update is sent to an IBGP peer the MED is included 8 Prefer the external EBGP path over the internal IBGP path 9 Prefer the route that can be reached through the closest IGP neighbor the lowest IGP metric This means that the router will prefer the shortest internal path within the AS...

Страница 860: ... switch to consider a missing MED as having a value of infinity making the path without a MED value the least desirable path 8 bgp always compare med Optional Configure the switch to compare MEDs for paths from neighbors in different autonomous systems By default MED comparison is only done among paths in the same AS 9 bgp bestpath med confed Optional Configure the switch to consider the MED in ch...

Страница 861: ...OU BEGIN Enable BGP routing as described in the Enabling BGP Routing page 850 DETAILED STEPS Use the no route map map tag command to delete the route map Use the no set ip next hop ip address command to re enable next hop processing EXAMPLE In the following example the inbound route map named rmap sets the next hop Switch config route map rmap permit 10 Switch config route map set ip next hop 10 2...

Страница 862: ... from the neighbor EXAMPLE The following router configuration mode example applies list 39 to incoming advertisements from neighbor172 16 4 1 List 39 permits the advertisement of network 10 109 0 0 Switch config router bgp 109 Switch config router network 10 108 0 0 Switch config router neighbor 172 16 4 1 distribute list 39 in Configuring BGP Filtering By Access Lists Another method of filtering ...

Страница 863: ...efixes An implicit deny is assumed if a given prefix does not match any entries in a prefix list When multiple entries of a prefix list match a given prefix the sequence number of a prefix list entry identifies the entry with the lowest sequence number By default sequence numbers are generated automatically and incremented in units of five If you disable the automatic generation of sequence number...

Страница 864: ...ength that is less than or equal to 24 bits Switch config ip prefix list YELLOW permit 10 0 0 0 8 le 24 In the following example a prefix list is configured to deny routes from the 10 0 0 0 8 network that have a mask length that is greater than or equal to 25 bits Switch config ip prefix list PINK deny 10 0 0 0 8 ge 25 Command Purpose 1 configure terminal Enter global configuration mode 2 ip prefi...

Страница 865: ...his route to EBGP peers no advertise Do not advertise this route to any peer internal or external local as Do not advertise this route to peers outside the local autonomous system Based on the community you can control which routing information to accept prefer or distribute to other neighbors A BGP speaker can set append or modify the community of a route when learning advertising or redistributi...

Страница 866: ... community list number permit deny community number Create a community list and assign it a number The community list number is an integer from 1 to 99 that identifies one or more permit or deny groups of communities The community number is the number configured by a set community route map configuration command 3 router bgp autonomous system Enter BGP router configuration mode 4 neighbor ip addre...

Страница 867: ...bors as peer group members You configure the peer group by using the neighbor router configuration commands By default peer group members inherit all the configuration options of the peer group including the remote as if configured version update source out route map out filter list out dist list minimum advertisement interval and next hop self All peer group members also inherit changes made to t...

Страница 868: ...peer group name ebgp multihop Optional Allow BGP sessions even when the neighbor is not on a directly connected segment The multihop session is not established if the only route to the multihop peer s address is the default route 0 0 0 0 11 neighbor ip address peer group name local as number Optional Specify an AS number to use as the local AS The range is 1 to 65535 12 neighbor ip address peer gr...

Страница 869: ...added to the BGP table when there is at least one more specific entry in the BGP table 18 neighbor ip address peer group name timers keepalive holdtime Optional Set timers for the neighbor or peer group The keepalive interval is the time within which keepalive messages are sent to peers The range is 1 to 4294967295 seconds the default is 60 The holdtime is the interval after which a peer is declar...

Страница 870: ... 1 configure terminal Enter global configuration mode 2 router bgp autonomous system Enter BGP router configuration mode 3 aggregate address address mask Create an aggregate entry in the BGP routing table The aggregate route is advertised as coming from the AS and the atomic aggregate attribute is set to indicate that information might be missing 4 aggregate address address mask as set Optional Ge...

Страница 871: ...page 850 DETAILED STEPS EXAMPLE In the following example the routing domain is divided into autonomous systems 50001 50002 50003 50004 50005 and 50006 and is identified by the confederation identifier 50007 Neighbor 10 2 3 4 is a peer inside of the routing domain confederation Neighbor 10 4 5 6 is a peer outside of the routing domain confederation To external peers and routing domains the confeder...

Страница 872: ...meshed Usually a cluster of clients have a single route reflector and the cluster is identified by the route reflector router ID To increase redundancy and to avoid a single point of failure a cluster might have more than one route reflector In this case all route reflectors in the cluster must be configured with the same 4 byte cluster ID so that a route reflector can recognize updates from route...

Страница 873: ...configuration command with values EXAMPLE In the following example BGP dampening is applied to prefixes filtered through the route map named BLUE Switch config ip prefix list RED permit 10 0 0 0 8 Switch config Switch config route map BLUE Switch config route map match ip address ip prefix list RED Switch config route map exit Command Purpose 1 configure terminal Enter global configuration mode 2 ...

Страница 874: ...peer groups to which the prefix has been advertised Also display prefix attributes such as the next hop and the local prefix show ip bgp cidr only Display all BGP routes that contain subnet and supernet network masks show ip bgp community community number exact Display routes that belong to the specified communities show ip bgp community list community list number exact match Display routes that a...

Страница 875: ... routing process per Layer 3 switch or router by using the multiarea IS IS configuration syntax You then configure the parameters for each instance of the IS IS routing process Small IS IS networks are built as a single area that includes all the routers in the network As the network grows larger it is usually reorganized into a backbone area made up of the connected set of all Level 2 routers fro...

Страница 876: ...rrences 5 seconds Initial LSP generation delay 50 ms Hold time between the first and second LSP generation 5000 ms LSP maximum lifetime without a refresh 1200 seconds 20 minutes before the LSP packet is deleted LSP refresh interval Send LSP refreshes every 900 seconds 15 minutes Maximum LSP packet size 1497 bytes NSF1 Awareness 1 NSF Nonstop Forwarding Enabled2 Allows Layer 3 switches to continue ...

Страница 877: ...outing process You then enable IS IS routing on the interface and specify the area for each instance of the routing process BEFORE YOU BEGIN You should know your network design and how you want traffic to flow through it before configuring IS IS Define areas prepare an addressing plan for the devices including defining the NETs and determine the interfaces that will run integrated IS IS To facilit...

Страница 878: ... specify a name for a NET and for an address 5 is type level 1 level 1 2 level 2 only Optional You can configure the router to act as a Level 1 station router a Level 2 area router for multi area routing or both the default level 1 act as a station router only level 1 2 act as both a station router and an area router level 2 act as an area router only 6 exit Return to global configuration mode 7 i...

Страница 879: ...0001 0000 0000 000c 00 Switch config router exit Switch config interface gigabitethernet0 1 Switch config if ip router isis Switch config if clns router isis Switch config interface gigabitethernet0 2 Switch config if ip router isis Switch config if clns router isis Switch config router exit Configuring IS IS Global Parameters These are some optional IS IS global parameters that you can configure ...

Страница 880: ...re the switch to generate a log message when an IS IS adjacency changes state up or down If a link in the network has a maximum transmission unit MTU size of less than 1500 bytes you can lower the LSP MTU so that routing will still occur The partition avoidance router configuration command prevents an area from becoming partitioned when full connectivity is lost among a Level1 2 border router adja...

Страница 881: ... level 9 set overload bit on startup seconds wait for bgp Optional Set an overload bit a hippity bit to allow other routers to ignore the router in their shortest path first SPF calculations if the router is having problems Optional on startup sets the overload bit only on startup If on startup is not specified the overload bit is set immediately and remains set until you enter the no set overload...

Страница 882: ...erval prc max wait prc initial wait prc second wait Optional Sets IS IS partial route computation PRC throttling timers prc max wait the maximum interval in seconds between two consecutive PRC calculations The range is 1 to 120 the default is 5 prc initial wait the initial PRC calculation delay in milliseconds after a topology change The range is 1 to 10 000 the default is 2000 prc second wait the...

Страница 883: ...some interface level parameters you can configure The default metric on the interface which is used as a value for the IS IS metric and assigned when there is no quality of service QoS routing performed The hello interval length of time between hello packets sent on the interface or the default hello packet multiplier used on the interface to determine the hold time sent in IS IS hello packets The...

Страница 884: ... on a multiaccess network which in turn reduces the amount of routing protocol traffic and the size of the topology database The interface circuit type which is the type of adjacency desired for neighbors on the specified interface Password authentication for the interface BEFORE YOU BEGIN Enable IS IS routing as described in the Enabling IS IS Routing page 873 ...

Страница 885: ...e is 1 second seconds the range is from 1 to 65535 The default is 10 seconds 6 isis hello multiplier multiplier level 1 level 2 Optional Specify the number of IS IS hello packets a neighbor must miss before the router should declare the adjacency as down The range is from 3 to 1000 The default is 3 Using a smaller hello multiplier causes fast convergence but can result in more routing instability ...

Страница 886: ... 1 2 level 2 only Optional Configure the type of adjacency desired for neighbors on the specified interface specify the interface circuit type level 1 a Level 1 adjacency is established if there is at least one area address common to both this node and its neighbors level 1 2 a Level 1 and 2 adjacency is established if the neighbor is also configured as both Level 1 and Level 2 and there is at lea...

Страница 887: ... CLNS neighbor information from the adjacency database clear clns route Remove dynamically derived CLNS routing information show clns Display information about the CLNS network show clns cache Display the entries in the CLNS routing cache show clns es neighbors Display ES neighbor entries including the associated areas show clns filter expr Display filter expressions show clns filter set Display f...

Страница 888: ...D version 0 and version 1 BFD neighbors automatically negotiate the version and the protocol always runs at the higher version The default version is version 1 By default BFD neighbors exchange both control packets and echo packets for detecting forwarding failures The switch sends echo packets at the configured BFD interval rate from 50 to 999 ms and control packets at the BFD slow timer rate fro...

Страница 889: ...hronous BFD echo mode is enabled when a BFD session is configured Default BFD Configuration Guidelines The switch supports a maximum of 28 BFD sessions at one time To run BFD on a switch Configure basic BFD interval parameters on each interface over which you want to run BFD sessions Enable routing on the switch You can configure BFD without enabling routing but BFD sessions do not become active u...

Страница 890: ...ry User network interfaces UNIs and enhanced network interfaces ENIs are disabled by default network node interfaces NNIs are enabled by default 4 no switchport Remove the interface from Layer 2 configuration mode 5 ip address ip address subnet mask Configure the IP address and IP subnet mask 6 bfd interval milliseconds min_rx milliseconds multiplier value Set BFD parameters for echo packets on th...

Страница 891: ...DETAILED STEPS To disable OSPF BFD on all interfaces enter the no bfd all interfaces router configuration command To disable it on an interface enter the no ip osfp bfd or the ip ospf bfd disable interface configuration command on the interface If you want to run OSPF BFD on only one or a few interfaces you can enter the ip ospf bfd interface configuration command on those interfaces instead of en...

Страница 892: ...abitethernet0 1 Switch config if ip ospf bfd Configuring BFD for IS IS When you start BFD sessions for IS IS IS IS must be running on all devices participating in BFD You can enable BFD support for IS IS by enabling it globally on all IS IS interfaces or by enabling it on one or more interfaces Configuring BFD for IS IS Globally BEFORE YOU BEGIN Configure BFD parameters on the interface as describ...

Страница 893: ...all interfaces Switch config router exit Configuring BFD for IS IS on an Interface BEFORE YOU BEGIN Configure BFD parameters on the interface as described in the Configuring BFD Session Parameters on an Interface page 886 Configure IS IS as described in the Configuring IS IS Dynamic Routing page 871 Command Purpose 1 configure terminal Enter global configuration mode 2 router is is area tag Specif...

Страница 894: ... BEGIN Configure BFD parameters on the interface as described in the Configuring BFD Session Parameters on an Interface page 886 Configure BGP as described in the Configuring BGP page 846 Command Purpose 1 configure terminal Enter global configuration mode 2 router is is area tag Specify an IS IS process and enter router configuration mode 3 exit Return to global configuration mode 4 interface int...

Страница 895: ... interface as described in the Configuring BFD Session Parameters on an Interface page 886 Configure EIGRP as described in the Configuring EIGRP page 838 Command Purpose 1 configure terminal Enter global configuration mode 2 router bgp as tag Specify a BGP autonomous system and enter router configuration mode 3 neighbor ip address fall over bfd Enable BFD support for fallover on the BFD neighbor 4...

Страница 896: ...devices have HSRP enabled and CEF enabled the default Command Purpose 1 configure terminal Enter global configuration mode 2 router eigrp as number Specify an EIGRP autonomous system number and enter router configuration mode 3 log adjacency changes detail Configure the switch to send a system logging message when an EIGRP neighbor goes up or down 4 bfd all interfaces interface interface id Enable...

Страница 897: ...it sends no echo packets and but only sends back echo packets received from a neighbor When echo mode is disabled control packets are used to detect forwarding failures You can configure slow timers to reduce the frequency of BFD control packets BEFORE YOU BEGIN Configure BFD parameters on the interface as described in the Configuring BFD Session Parameters on an Interface page 886 Command Purpose...

Страница 898: ... does not use Multiprotocol Label Switching MPLS to support VPNs For information about MPLS VRF refer to the MPLS Layer 3 VPNs Configuration Guide Cisco IOS Release 15M T Information About Multi VRF CE page 895 Default Multi VRF CE Configuration page 896 Multi VRF CE Configuration Guidelines page 896 Configuring VRFs page 897 Configuring VRF Aware Services page 898 Configuring a VPN Routing Sessio...

Страница 899: ...F After learning local VPN routes from CEs a PE router exchanges VPN routing information with other PE routers by using internal BGP IBPG Provider routers or core routers are any routers in the service provider network that do not attach to CE devices With multi VRF CE multiple customers can share one CE and only one physical link is used between the CE and the PE The shared CE maintains separate ...

Страница 900: ...s PE it uses the input policy label to look up the correct VPN routing table If a route is found it forwards the packet within the VPN To configure VRF you create a VRF table and specify the Layer 3 interface associated with the VRF Then configure the routing protocols in the VPN and between the CE and the PE BGP is the preferred routing protocol used to distribute VPN routing information across t...

Страница 901: ...tween the CE and the PE However we recommend using external BGP EBGP for these reasons BGP does not require multiple algorithms to communicate with multiple CEs BGP is designed for passing routing information between systems run by different administrations BGP makes it easy to pass attributes of the routes to the CE Multi VRF CE does not affect the packet switching rate If no VRFs are configured ...

Страница 902: ... global configuration mode 2 ip routing Enable IP routing 3 ip vrf vrf name Name the VRF and enter VRF configuration mode 4 rd route distinguisher Create a VRF table by specifying a route distinguisher Enter either an AS number and an arbitrary number xxx y or an IP address and arbitrary number A B C D y 5 route target export import both route target ext community Create a list of import export or...

Страница 903: ...f a configured VRF is working you can use the ping vrf command When attempting to ping from a provider edge PE router to a customer edge CE router or from a PE router to PE router the standard ping command will not usually work The ping vrf command allows you to ping the IP addresses of LAN interfaces on CE routers If you are on a PE router be sure to indicate the specific VRF VPN name as shown in...

Страница 904: ...fig snmp server engineID remote 172 16 20 3 vrf trap vrf 80000009030000B064EFE100 Command Purpose 1 ping vrf vrf name ip host Tests a connection in the context of a specific VPN connection Command Purpose 1 configure terminal Enter global configuration mode 2 snmp server trap authentication vrf Enable VRF instance context authentication notifications 3 snmp server engineID remote host vrf vpn inst...

Страница 905: ...ch config if standby 1 ip User Interface for Syslog Follow the steps in this procedure to configure VRF aware services for Syslog BEFORE YOU BEGIN Configure a VRF as described in the Configuring VRFs page 897 Command Purpose 1 configure terminal Enter global configuration mode 2 interface interface id Enter interface configuration mode and specify the Layer 3 interface to configure 3 no switchport...

Страница 906: ...red 13 red 13 0 msec 10 1 13 15 red 13 red 13 1 msec 2 10 1 8 13 red 13 red 13 0 msec 10 1 7 13 red 13 red 13 0 msec 10 1 8 13 red 13 red 13 0 msec 3 10 1 2 11 red 13 blue 10 1 msec 0 msec 0 msec 4 Command Purpose 1 configure terminal Enter global configuration mode 2 logging on Enable or temporarily disable logging of storage router event message 3 logging host ip address vrf vrf name Specify the...

Страница 907: ...rf vpn1 Switch config vrf rd 200 1 Switch config vrf route target both 200 1 Switch config vrf interface ethernet 0 Switch config if ip vrf forwarding vpn1 Switch config if end User Interface for VRF Aware RADIUS To configure VRF aware RADIUS you must first enable AAA on a RADIUS server The switch supports the ip vrf forwarding vrf name server group configuration and the ip radius source interface...

Страница 908: ...Switch config exit Configuring BGP PE to CE Routing Sessions BEFORE YOU BEGIN Complete the BGP network strategy and planning for your network Configure OSPF as described in the Configuring OSPF page 823 Configure a VRF as described in the Configuring VRFs page 897 Command Purpose 1 configure terminal Enter global configuration mode 2 router ospf process id vrf vrf name Enable OSPF routing specify ...

Страница 909: ...ng Multi VRF CE Status You can use the following privileged EXEC commands to display information about multi VRF CE configuration and status Command Purpose 1 configure terminal Enter global configuration mode 2 router bgp autonomous system number Configure the BGP routing process with the AS number passed to other BGP routers and enter router configuration mode 3 network network number mask netwo...

Страница 910: ...Forwarding Information Base FIB lookup table to perform destination based switching of IP packets The two main components in CEF are the distributed FIB and the distributed adjacency tables The FIB is similar to a routing table or information base and maintains a mirror image of the forwarding information in the IP routing table When routing or topology changes occur in the network the IP routing ...

Страница 911: ...arding and IP routing enabled on the switch If you enable Cisco Express Forwarding and then create an access list that uses the log keyword the packets that match the access list are not Cisco Express Forwarding switched They are process switched Logging disables Cisco Express Forwarding DETAILED STEPS EXAMPLE Switch config ip cef Switch config interface ethernet 0 Switch config if ip route cache ...

Страница 912: ...iguring Static Unicast Routes Static unicast routes are user defined routes that cause packets moving between a source and a destination to take a specified path Static routes can be important if the router cannot build a route to a particular destination and are useful for specifying a gateway of last resort to which all unroutable packets are sent The switch retains static routes until you remov...

Страница 913: ...router s address in a static route the static route is also removed from the IP routing table DETAILED STEPS Use the no ip route prefix mask address interface global configuration command to remove a static route EXAMPLE The following example shows how to choose an administrative distance of 110 In this case packets for network 10 0 0 0 will be routed to a router at 172 31 3 4 if dynamic informati...

Страница 914: ...ation is not being passed to the system candidates for the default route are specified with the ip default network global configuration command If this network appears in the routing table from any source it is flagged as a possible choice for the default route If the router has no interface on the default network but does have a path to it the network is considered as a possible candidate and the...

Страница 915: ...e A route map with no set route map configuration commands is sent to the CPU which causes high CPU utilization You can also identify route map statements as permit or deny If the statement is marked as a deny the packets meeting the match criteria are sent back through the normal forwarding channels destination based routing If the statement is marked as permit set clauses are applied to packets ...

Страница 916: ...ccess list number access list name access list number access list name Match a standard access list by specifying the name or number It can be an integer from 1 to 199 6 match metric metric value Match the specified route metric The metric value can be an EIGRP metric with a specified value from 0 to 4294967295 7 match ip next hop access list number access list name access list number access list ...

Страница 917: ...edistributed routes for EIGRP only bandwidth Metric value or IGRP bandwidth of the route in kilobits per second in the range 0 to 4294967295 delay Route delay in tens of microseconds in the range 0 to 4294967295 reliability Likelihood of successful packet transmission expressed as a number between 0 and 255 where 255 means 100 percent reliability and 0 means no reliability loading Effective bandwi...

Страница 918: ...domain into another and control route distribution Note that the keywords in this procedure are the same as defined in the previous procedure The metrics of one routing protocol do not necessarily translate into the metrics of another In these situations an artificial metric is assigned to the redistributed route Uncontrolled exchanging of routing information between different routing protocols ca...

Страница 919: ...low or deny paths based on Identity of a particular end system Application Protocol Command Purpose 1 configure terminal Enter global configuration mode 2 router bgp rip ospf eigrp Enter router configuration mode 3 redistribute protocol process id level 1 level 1 2 level 2 metric metric value metric type type value match internal external type value tag tag value route map map tag weight weight su...

Страница 920: ...he end of the list of match statements If match clauses are satisfied you can use a set clause to specify the IP addresses identifying the next hop router in the path For details about PBR commands and keywords see IP Routing Protocol Independent Configuration Guide Cisco IOS Release 15M T PBR Configuration Guidelines Before configuring PBR you should be aware of this information Multicast traffic...

Страница 921: ...the match criteria and the resulting action if all of the match clauses are met Then you must enable PBR for that route map on an interface All packets arriving on the specified interface matching the match clauses are subject to PBR PBR can be fast switched or implemented at speeds that do not slow down the switch Fast switched PBR supports most match and set commands PBR must be enabled before y...

Страница 922: ... a packet destined for a local address If you do not specify a match command the route map applies to all packets 4 set ip next hop ip address ip address Specify the action to take on the packets that match the criteria Set next hop to which to route the packet the next hop must be adjacent 5 exit Return to global configuration mode 6 interface interface id Enter interface configuration mode and s...

Страница 923: ... a local network from dynamically learning about routes you can use the passive interface router configuration command to keep routing update messages from being sent through a router interface When you use this command in the OSPF protocol the interface address you specify as passive appears as a stub network in the OSPF domain OSPF routing information is neither sent nor received through the spe...

Страница 924: ...es from being advertised in routing updates and to prevent other routers from learning one or more routes When used in OSPF this feature applies to only external routes and you cannot specify an interface name You can also use a distribute list router configuration command to avoid processing certain routes listed in incoming updates This feature does not apply to OSPF BEFORE YOU BEGIN Configure a...

Страница 925: ...tworthiness of a routing information source such as a router or group of routers In a large network some routing protocols can be more reliable than others By specifying administrative distance values you enable the router to intelligently discriminate between sources of routing information The router always picks the route whose routing protocol has the lowest administrative distance Because each...

Страница 926: ...er eigrp 109 Switch config router distance 22 10 0 0 0 0 0 0 255 Switch config router distance 33 10 11 0 0 0 0 0 255 Switch config router distance 44 10 11 12 0 0 0 0 255 Switch config router end Managing Authentication Keys Key management is a method of controlling authentication keys used by routing protocols Not all protocols can use key management Authentication keys are available for EIGRP a...

Страница 927: ...d Command Purpose 1 configure terminal Enter global configuration mode 2 key chain name of chain Identify a key chain and enter key chain configuration mode 3 key number Identify the key number The range is 0 to 2147483647 4 key string text Identify the key string The string can contain from 1 to 80 uppercase and lowercase alphanumeric characters but the first character cannot be a number 5 accept...

Страница 928: ...Router config keychain key key string key2 Router config keychain key accept lifetime 14 30 00 Jan 25 1996 duration 7200 Router config keychain key send lifetime 15 00 00 Jan 25 1996 duration 3600 Verifying Configuration You can remove all contents of a particular cache table or database You can also display specific statistics Related Documents Cisco IOS Master Command List All Releases IP Addres...

Страница 929: ...mmand Reference ISO CLNS Configuration Guide Cisco IOS Release 15M T Cisco IOS IP Routing ISIS Command Reference IP Routing ISIS Configuration Guide Cisco IOS Release 15M T High Availability Configuration Guide Cisco IOS Release 15S IP Routing BFD Configuration Guide Cisco IOS Release 15M T Cisco IOS IP Routing Protocol Independent Command Reference IP Routing Protocol Independent Configuration Gu...

Страница 930: ...926 Configuring IP Unicast Routing Related Documents ...

Страница 931: ...iguration page 953 Configuration Example page 953 Related Documents page 956 Information About IPv6 IPv4 users can move to IPv6 and receive services such as end to end security quality of service QoS and globally unique addresses The IPv6 address space reduces the need for private addresses and Network Address Translation NAT processing by border routers at network edges This section describes IPv...

Страница 932: ... simplification improved support of extensions and options and hardware parsing of the extension header The switch supports hop by hop extension header packets which are routed or bridged in software The switch provides IPv6 routing capability over 802 1Q trunk ports for static routes Routing Information Protocol RIP for IPv6 and Open Shortest Path First OSPF Version 3 Protocol It supports up to 1...

Страница 933: ...ce or destination addresses to other links DNS for IPv6 IPv6 supports Domain Name System DNS record types in the DNS name to address and address to name lookup processes The DNS AAAA resource record types support IPv6 addresses and are equivalent to an A address record in IPv4 The switch supports DNS resolution for IPv4 and IPv6 Path MTU Discovery for IPv6 Unicast The switch supports advertising t...

Страница 934: ...s NDP can either select the same router every time or cycle through the router list By using DRP you can configure an IPv6 host to prefer one router over another provided both are reachable or probably reachable IPv6 Stateless Autoconfiguration and Duplicate Address Detection The switch uses stateless autoconfiguration to manage link subnet and site addressing changes such as management of host an...

Страница 935: ... with only one path to an outside network or to provide security for certain types of traffic in a larger network RIP for IPv6 Routing Information Protocol RIP for IPv6 is a distance vector protocol that uses hop count as a routing metric It includes support for IPv6 addresses and prefixes and the all RIP routers multicast group address FF02 9 as the destination address for RIP update messages OSP...

Страница 936: ... The HTTP client sends requests to both IPv4 and IPv6 HTTP servers which respond to requests from both IPv4 and IPv6 HTTP clients URLs with literal IPv6 addresses must be specified in hexadecimal using 16 bit values between colons The accept socket call chooses an IPv4 or IPv6 address family The accept socket is either an IPv4 or IPv6 socket The listening socket waits for both IPv4 and IPv6 signal...

Страница 937: ...ugh a route with masks greater than 64 bits Load balancing using equal cost and unequal cost routes is not supported for IPv6 host routes or for IPv6 routes with a mask greater than 64 bits The switch cannot forward SNAP encapsulated IPv6 packets There is a similar limitation for IPv4 SNAP encapsulated packets but the packets are dropped at the switch The switch routes IPv6 to IPv4 and IPv4 to IPv...

Страница 938: ...al address and activates IPv6 for the interface The configured interface automatically joins these required multicast groups for that link solicited node multicast group FF02 0 0 0 0 1 ff00 104 for each unicast address assigned to the interface the address for the neighbor discovery process all nodes link local multicast group FF02 1 all routers link local multicast group FF02 2 For more informati...

Страница 939: ... enter the ipv6 address and ipv6 prefix variables with the address specified in hexadecimal using 16 bit values between colons The prefix length variable preceded by a slash is a decimal value that shows how many of the high order contiguous bits of the address comprise the prefix the network portion of the address ...

Страница 940: ...rface interface id Enter interface configuration mode and specify the Layer 3 interface to configure The interface can be a physical interface a switch virtual interface SVI or a Layer 3 EtherChannel 7 no switchport Remove the interface from Layer 2 configuration mode if it is a physical interface 8 ipv6 address ipv6 prefix prefix length eui 64 or ipv6 address ipv6 address link local or ipv6 enabl...

Страница 941: ... c18 1 20B 46FF FE2F D940 subnet is 2001 0DB8 c18 1 64 EUI Joined group address es FF02 1 FF02 2 FF02 1 FF2F D940 MTU is 1500 bytes ICMP error messages limited to one every 100 milliseconds ICMP redirects are enabled ND DAD is enabled number of DAD attempts 1 ND reachable time is 30000 milliseconds ND advertised reachable time is 0 milliseconds ND advertised retransmit interval is 0 milliseconds N...

Страница 942: ...t an SDM template that supports IPv4 and IPv6 If not already configured use the sdm prefer dual ipv4 and ipv6 default routing vlan global configuration command to configure a template that supports IPv6 When you select a new template you must reload the switch by using the reload privileged EXEC command so that the template takes effect Command Purpose 1 configure terminal Enter global configurati...

Страница 943: ...nfiguration mode 6 ip routing Enable IPv4 routing on the switch 7 ipv6 unicast routing Enable forwarding of IPv6 data packets on the switch 8 interface interface id Enter interface configuration mode and specify the Layer 3 interface to configure 9 no switchport Remove the interface from Layer 2 configuration mode if it is a physical interface 10 ip address ip address mask secondary Specify a prim...

Страница 944: ... Release 15 2M T Default DHCPv6 Address Assignment Configuration page 940 DHCPv6 Address Assignment Configuration Guidelines page 940 Enabling the DHCPv6 Server Function page 940 Enabling the DHCPv6 Client Function page 943 Default DHCPv6 Address Assignment Configuration By default no Dynamic Host Configuration Protocol for IPv6 DHCPv6 features are configured on the switch DHCPv6 Address Assignmen...

Страница 945: ...x Optional Specify a link address IPv6 prefix When an address on the incoming interface or a link address in the packet matches the specified IPv6 prefix the server uses the configuration information pool This address must be in hexadecimal using 16 bit values between colons 5 vendor specific vendor id Optional Enter vendor specific configuration mode and enter a vendor specific identification num...

Страница 946: ...h config dhcpv6 end This example shows how to configure a pool called 350 with vendor specific options 10 ipv6 dhcp server poolname automatic rapid commit preference value allow hint Enable the DHCPv6 server function on an interface poolname Optional User defined name for the IPv6 DHCP pool The pool name can be a symbolic string such as Engineering or an integer such as 0 automatic Optional Enable...

Страница 947: ...tch config interface gigabitethernet0 1 Switch config if ipv6 address dhcp rapid commit Configuring IPv6 ICMP Rate Limiting ICMP rate limiting is enabled by default with a default interval between error messages of 100 milliseconds and a bucket size maximum number of tokens to be stored in a bucket of 10 BEFORE YOU BEGIN Complete the Configuring IPv6 Addressing and Enabling IPv6 Routing page 934 C...

Страница 948: ...al configuration command You can verify the IPv6 state by entering the show ipv6 cef privileged EXEC command For more information about configuring CEF see the Implementing IPv6 Addressing and Basic Connectivity chapter in the IPv6 Implementation Guide Cisco IOS Release 15 2M T Configuring Static Routing for IPv6 BEFORE YOU BEGIN Before configuring a static IPv6 route you must Enable routing by us...

Страница 949: ...ess of the directly connected next hop The address must be specified in hexadecimal using 16 bit values between colons interface id Specify direct static routes from point to point and broadcast interfaces On point to point interfaces you do not need to specify the IPv6 address of the next hop On broadcast interfaces you should always specify the IPv6 address of the next hop or ensure that the spe...

Страница 950: ... IPv6 packets by using the ipv6 unicast routing global configuration command Enable IPv6 on any Layer 3 interfaces on which IPv6 RIP is to be enabled 3 end Return to privileged EXEC mode 4 show ipv6 static ipv6 address ipv6 prefix prefix length interface interface id recursive detail or show ipv6 route static updated Verify your entries by displaying the IPv6 routing table interface interface id O...

Страница 951: ...IP can support The range is from 1 to 64 and the default is 4 routes 4 exit Return to global configuration mode 5 interface interface id Enter interface configuration mode and specify the Layer 3 interface to configure 6 ipv6 rip name enable Enable the specified IPv6 RIP routing process on the interface 7 ipv6 rip name default information only originate Optional Originate the IPv6 default route 0 ...

Страница 952: ...rs and features Be careful when changing the defaults for IPv6 commands Doing so might adversely affect OSPF for the IPv6 network BEFORE YOU BEGIN Before you enable IPv6 OSPF on an interface you must Enable routing by using the ip routing global configuration command Enable the forwarding of IPv6 packets by using the ipv6 unicast routing global configuration command Enable IPv6 on Layer 3 interfac...

Страница 953: ...twork portion of the address A slash mark must precede the decimal value advertise Optional Set the address range status to advertise and to generate a Type 3 summary link state advertisement LSA not advertise Optional Set the address range status to DoNotAdvertise The Type 3 summary LSA is suppressed and component networks remain hidden from other networks cost cost Optional Metric or cost for th...

Страница 954: ... use EIGRPv6 to specify your EIGRP IPv4 interfaces and to select a subset of those as passive interfaces Use the passive interface default command to make all interfaces passive and then use the no passive interface command on selected interfaces to make them active EIGRP IPv6 does not need to be configured on a passive interface For more configuration procedures see the Implementing EIGRP for IPv...

Страница 955: ...BGP routing session unless you enter this command before configuring the neighbor remote as command 4 bgp router id ip address Optional Configure a fixed 32 bit router ID as the identifier of the local router running BGP By default the router ID is the IPv4 address of a router loopback interface On a router enabled only for IPv6 no IPv4 address you must manually configure the BGP router ID Note Co...

Страница 956: ...952 Configuring IPv6 Unicast Routing Configuring IPv6 network 2010 AB8 2 48 network 2010 AB8 3 48 exit address family ...

Страница 957: ...ers Display local IPv6 routers show ipv6 static Display IPv6 static routes show ipv6 traffic Display IPv6 traffic statistics Command Purpose show ipv6 eigrp as number interface Display information about interfaces configured for EIGRP IPv6 show ipv6 eigrp as number neighbor Display the neighbors discovered by EIGRP IPv6 show ipv6 eigrp as number traffic Display the number of EIGRP IPv6 packets sen...

Страница 958: ...ow ipv6 cef 0 nexthop 3FFE C000 0 7 777 Vlan7 3FFE C000 0 1 64 attached to Vlan1 3FFE C000 0 1 20B 46FF FE2F D940 128 receive 3FFE C000 0 7 64 attached to Vlan7 3FFE C000 0 7 777 128 attached to Vlan7 3FFE C000 0 7 20B 46FF FE2F D97F 128 receive 3FFE C000 111 1 64 attached to GigabitEthernet0 11 3FFE C000 111 1 20B 46FF FE2F D945 128 receive 3FFE C000 168 1 64 attached to GigabitEthernet0 43 3FFE ...

Страница 959: ...routes Code installed in RIB 0 via nexthop 3FFE C000 0 7 777 distance 1 This is an example of the output from the show ipv6 route privileged EXEC command Switch show ipv6 route IPv6 Routing Table 21 entries Codes C Connected L Local S Static R RIP B BGP U Per user Static route I1 ISIS L1 I2 ISIS L2 IA ISIS interarea IS ISIS summary O OSPF intra OI OSPF inter OE1 OSPF ext 1 OE2 OSPF ext 2 ON1 OSPF ...

Страница 960: ...ho request 0 echo reply 0 group query 0 group report 0 group reduce 1 router solicit 0 router advert 0 redirects 0 neighbor solicit 0 neighbor advert Sent 10112 output 0 rate limited unreach 0 routing 0 admin 0 neighbor 0 address 0 port parameter 0 error 0 header 0 option 0 hopcount expired 0 reassembly timeout 0 too big 0 echo request 0 echo reply 0 group query 0 group report 0 group reduce 0 rou...

Страница 961: ...otocols are used by routers to dynamically calculate the best route for forwarding traffic Routing protocols supported by the switch are Routing Information Protocol RIP Border Gateway Protocol BGP Open Shortest Path First OSPF protocol Enhanced IGRP EIGRP System to Intermediate System IS IS and Bidirectional Forwarding Detection BFD IPv6 Unicast Routing IPv4 users can move to IPv6 and receive ser...

Страница 962: ...th a higher priority becomes active The enhanced object tracking feature separates the tracking mechanism from HSRP and creates a separate standalone tracking process that can be used by processes other than HSRP This allows tracking other objects in addition to the interface line protocol state A client process such as HSRP or Gateway Local Balancing Protocol GLBP can register an interest in trac...

Страница 963: ... performance Cisco IOS IP SLAs can perform network assessments verify quality of service QoS ease the deployment of new services and assist with network troubleshooting Cisco IOS IP SLAs Cisco IOS IP SLAs sends data across the network to measure performance between multiple network locations or across multiple network paths It simulates network data and IP services and collects network performance...

Страница 964: ...sources for example shows the network availability of an NFS server used to store business critical data from a remote site Troubleshooting of network operation by providing consistent reliable measurement that immediately identifies problems and saves troubleshooting time Multiprotocol Label Switching MPLS performance monitoring and network verification if the switch supports MPLS Cisco IOS IP SL...

Страница 965: ...n be a source for a destination IP SLAs Responder Figure 106 on page 961 shows where the Cisco IOS IP SLAs responder fits in the IP network The responder listens on a specific port for control protocol messages sent by an IP SLAs operation Upon receipt of the control message it enables the specified UDP or TCP port for the specified duration During this time the responder accepts the requests and ...

Страница 966: ...device is the ability to track one way delay jitter and directional packet loss Because much network behavior is asynchronous it is critical to have these statistics However to capture one way delay measurements you must configure both the source router and target router with Network Time Protocol NTP so that the source and target are synchronized to the same clock source One way jitter measuremen...

Страница 967: ... carry packet sending and receiving sequence information and sending and receiving time stamps from the source and the operational target Based on these UDP jitter operations measure this data Per direction jitter source to destination and destination to source Per direction packet loss Per direction delay one way delay Round trip delay average round trip time Because the paths for the sending and...

Страница 968: ... multiple operation scheduling and proactive threshold monitoring It does not support VoIP service levels using the gatekeeper registration delay operations measurements Configuring the IP SLAs Responder Before You Begin For the IP SLAs responder to function you must also configure a source device such as a Catalyst 3750 or Catalyst 3560 switch running the IP services image that has full IP SLAs s...

Страница 969: ...tname Specifies the source IP address or hostname When a source IP address or hostname is not specified IP SLAs chooses the IP address nearest to the destination Optional source port port number Specifies the source port number in the range from 1 to 65535 When a port number is not specified IP SLAs chooses an available port Optional control Enables or disables sending of IP SLAs control messages ...

Страница 970: ...hh mm ss to show that the operation should start after the entered time has elapsed Optional ageout seconds Enters the number of seconds to keep the operation in memory when it is not actively collecting information The range is 0 to 2073600 seconds the default is 0 seconds never ages out Optional recurring Sets the operation to automatically run every day 7 end Returns to privileged EXEC mode Com...

Страница 971: ...e has elapsed Optional ageout seconds Enters the number of seconds to keep the operation in memory when it is not actively collecting information The range is 0 to 2073600 seconds the default is 0 seconds never ages out Optional recurring Sets the operation to automatically run every day 7 end Returns to privileged EXEC mode Command Purpose Command Purpose show ip sla application Displays global i...

Страница 972: ...andomly Scheduled FALSE Life seconds 3600 Entry Ageout seconds never Recurring Starting Everyday FALSE Status of entry SNMP RowStatus notInService Threshold milliseconds 5000 Distribution Statistics Number of statistic hours kept 2 Number of statistic distribution buckets kept 1 Statistic distribution interval milliseconds 20 History Statistics show ip sla mpls lsp monitor collection statistics co...

Страница 973: ...hcp Type of Operation to Perform dns Type of Operation to Perform echo Type of Operation to Perform ftp Type of Operation to Perform http Type of Operation to Perform jitter Type of Operation to Perform pathEcho Type of Operation to Perform pathJitter Type of Operation to Perform tcpConnect Type of Operation to Perform udpEcho IP SLAs low memory water mark 21741224 Configuring a Responder UDP Jitt...

Страница 974: ...rf Name Control Packets enabled Schedule Operation frequency seconds 30 Next Scheduled Start Time Pending trigger Group Scheduled FALSE Randomly Scheduled FALSE Life seconds 3600 Entry Ageout seconds never Recurring Starting Everyday FALSE Status of entry SNMP RowStatus notInService Threshold milliseconds 5000 Distribution Statistics Number of statistic hours kept 2 Number of statistic distributio...

Страница 975: ...odified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Desc...

Страница 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...

Страница 977: ...tion command The show dying gasp packets command displays the detailed information about the created packets The SNMP server for the SNMP Dying Gasp message is specified through the snmp server host configuration command The syslog server sending the syslog Dying Gasp message is specified through the logging host hostname or ipaddress transport udp command The Ethernet OAM Dying Gasp packets are c...

Страница 978: ...974 Dying Gasp ...

Страница 979: ...ludes these sections Understanding Enhanced Object Tracking page 975 Configuring Enhanced Object Tracking Features page 975 Monitoring Enhanced Object Tracking page 985 Understanding Enhanced Object Tracking Each tracked object has a unique number that is specified in the tracking command line interface CLI Client processes use this number to track a specific object The tracking process periodical...

Страница 980: ...ne protocol Optional Create a tracking list to track the line protocol state of an interface and enter tracking configuration mode The object number identifies the tracked object and can be from 1 to 500 The interface interface id is the interface being tracked 3 delay up seconds down seconds up seconds down seconds Optional Specify a period of time in seconds to delay communicating state changes ...

Страница 981: ...acking two interfaces using the AND operator up means that both interfaces are up and down means that either interface is down Beginning in privileged EXEC mode follow these steps to configure a tracked list of objects with a Boolean expression Use the no track track number global configuration command to delete the tracked list Command Purpose 1 configure terminal Enter global configuration mode ...

Страница 982: ...in order to satisfy the threshold weight Switch config track 4 list threshold weight Switch config track object 1 weight 15 Switch config track object 2 weight 20 Switch config track object 3 weight 30 Command Purpose 1 configure terminal Enter global configuration mode 2 track track number list threshold weight Configure a tracked list object and enter tracking configuration mode The track number...

Страница 983: ...sure the state of the list Switch config track 4 list threshold percentage Switch config track object 1 Switch config track object 2 Switch config track object 3 Switch config track threshold percentage up 51 down 10 Switch config track exit Command Purpose 1 configure terminal Enter global configuration mode 2 track track number list threshold percentage Configure a tracked list object and enter ...

Страница 984: ...4 and the default down threshold is 255 Enter list to track objects grouped in a list Configure the list as described on the previous pages For boolean see Configuring a Tracked List with a Boolean Expression page 977 For threshold weight see Configuring a Tracked List with a Weight Threshold page 978 For threshold percentage see Configuring a Tracked List with a Percentage Threshold page 979 Note...

Страница 985: ...rmation see the Cisco IOS IP SLAs Command Reference Guide Release 12 4T at this URL http www cisco com en US docs ios ipsla configuration guide 12_4t sla_12_4t_book html Object tracking of IP SLAs operations allows clients to track the output from IP SLAs objects and use this information to trigger an action Every IP SLAs operation maintains an SNMP operation return code value such as OK or OverTh...

Страница 986: ... global configuration mode 2 track object number rtr operation number state Enter tracking configuration mode to track the state of an IP SLAs operation The object number range is from 1 to 500 The operation number range is from 1 to 2147483647 3 delay up seconds down seconds up seconds down seconds Optional Specify a period of time in seconds to delay communicating state changes of a tracked obje...

Страница 987: ...e state of the agent 3 Configure a default static default route using a secondary interface This route is used only if the primary route is removed Configuring a Primary Interface Beginning in privileged EXEC mode follow these steps to configure a primary interface for static routing Beginning in privileged EXEC mode follow these steps to configure a primary interface for DHCP Command Purpose 1 co...

Страница 988: ...de 8 ip sla schedule operation number life forever seconds start time time pending now after time ageout seconds recurring Configure the scheduling parameters for a single IP SLAs operation 9 track object number rtr operation number state reachability Track the state of a Cisco IOS IP SLAs operation and enter tracking configuration mode 10 end Return to privileged EXEC mode 11 show track object nu...

Страница 989: ...onfigured track object is up 10 end Return to privileged EXEC mode 11 show ip route track table Display information about the IP route track table 12 copy running config startup config Optional Save your entries in the configuration file Command Purpose show ip route track table Display information about the IP route track table show track object number Display information about the all tracking l...

Страница 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...

Страница 991: ... TCP The switch functions as the server The switch encapsulates a request or response message in a MODBUS TCP application data unit ADU A client sends a message to a TCP port on the switch The default port number is 502 MODBUS and Security page 987 Multiple Request Messages page 988 MODBUS and Security If a firewall or other security services are enabled the switch TCP port might be blocked and th...

Страница 992: ...atistics enter the clear scada modbus tcp server statistics privileged EXEC command After you enable MODBUS TCP on the switch this warning appears WARNING Starting Modbus TCP server is a security risk Please understand the security issues involved before proceeding further Do you still want to start the server yes no Command Purpose 1 configure terminal Enters global configuration mode 2 scada mod...

Страница 993: ...igure an ACL to permit traffic from specific clients or configure QoS to rate limit traffic Displaying MODBUS TCP Information Command Purpose show scada modbus tcp server Displays the server information and statistics show scada modbus tcp server connections Displays the client information and statistics ...

Страница 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...

Страница 995: ...edge PE to PE device or customer edge to customer edge CE to CE device Ethernet CFM as specified by 802 1ag is the standard for Layer 2 ping Layer 2 traceroute and end to end connectivity check of the Ethernet network For complete command and configuration information for Ethernet CFM see the Configuring Ethernet OAM CFM and E LMI chapter of the System Management guide at this URL http www cisco c...

Страница 996: ...992 Ethernet CFM ...

Страница 997: ... not interrupt switch operation unless you need to reload the Cisco IOS software However if you remove the compact flash card you do not have access to the flash file system and any attempt to access it generates an error message Use the show flash privileged EXEC command to display the compact flash file settings For more information about the command go to this URL http www cisco com en US docs ...

Страница 998: ...e the show platform sdflash privileged EXEC command This example shows an unsupported SD flash memory card Switch show platform sdflash SD Flash Manufacturer SMART MODULAR ID 27h Non IT Size 485MB Serial number B01000A5 Revision 2 0 Manufacturing date 12 2009 This example shows a supported SD flash memory card Switch show platform sdflash SD Flash Manufacturer SMART MODULAR ID 27h Size 972MB Seria...

Страница 999: ...ory in the file system in bytes Free b Amount of free memory in the file system in bytes Type Type of file system flash The file system is for a flash memory device nvram The file system is for a NVRAM device opaque The file system is a locally generated pseudo file system for example the system or a download interface such as brimux unknown The file system is an unknown type Flags Permission for ...

Страница 1000: ...isplay information about files on a file system use one of the privileged EXEC commands in Table 67 on page 996 Changing Directories and Displaying the Working Directory Beginning in privileged EXEC mode follow these steps to change directories and display the working directory Creating and Removing Directories Beginning in privileged EXEC mode follow these steps to create and remove a directory T...

Страница 1001: ...the copy running config startup config command saves the currently running configuration file to the NVRAM section of flash memory to be used as the configuration during system initialization You can also copy from special file systems xmodem ymodem as the source for the file from a network machine that uses the Xmodem or Ymodem protocol Network file system URLs include ftp rcp and tftp and have t...

Страница 1002: ... the cd command For file url you specify the path directory and the name of the file to be deleted When you attempt to delete any files the system prompts you to confirm the deletion Caution When files are deleted their contents cannot be recovered This example shows how to delete the file myconfig from the default flash memory device Switch delete myconfig Creating Displaying and Extracting tar F...

Страница 1003: ...location directory tar filename tar For the RCP the syntax is rcp username location directory tar filename tar For the TFTP the syntax is tftp location directory tar filename tar The tar filename tar is the tar file to display You can also limit the display of the files by specifying an optional list of files or directories after the tar file then only those files appear If none are specified all ...

Страница 1004: ...ts of any readable file including a file on a remote file system use the more ascii binary ebcdic file url privileged EXEC command This example shows how to display the contents of a configuration file on a TFTP server Switch more tftp serverA hampton savedconfig Saved configuration on server version 11 3 service timestamps log datetime localtime service linenumber service udp small servers servic...

Страница 1005: ...cp tftp system running config privileged EXEC command loads the configuration files on the switch as if you were entering the commands at the command line The switch does not erase the existing running configuration before adding the commands If a command in the copied configuration file replaces a command in the existing configuration file the existing command is erased For example if the copied ...

Страница 1006: ...rvices file contains this line tftp 69 udp You must restart the inetd daemon after modifying the etc inetd conf and etc services files To restart the daemon either stop the inetd process and restart it or enter a fastboot command on the SunOS 4 x or a reboot command on Solaris 2 x or SunOS 5 x For more information on the TFTP daemon see the documentation for your workstation Ensure that the switch...

Страница 1007: ...To upload a configuration file from a switch to a TFTP server for storage follow these steps 1 Verify that the TFTP server is properly configured by referring to the Preparing to Download or Upload a Configuration File By Using TFTP page 1002 2 Log into the switch through the console port or a Telnet session 3 Upload the switch configuration to the TFTP server Specify the IP address or hostname of...

Страница 1008: ...e username For more information see the documentation for your FTP server Preparing to Download or Upload a Configuration File By Using FTP Before you begin downloading or uploading a configuration file by using FTP do these tasks Ensure that the switch has a route to the FTP server The switch and the FTP server must be in the same subnetwork if you do not have a router to route traffic between su...

Страница 1009: ...onfiguration file rtr2 confg host2 confg Configure using host2 confg from 172 16 101 101 confirm Connected to 172 16 101 101 Loading 1112 byte file host2 confg OK OK Switch SYS 5 CONFIG_NV Non volatile store configured from host2 config by ftp from 172 16 101 101 Uploading a Configuration File By Using FTP Beginning in privileged EXEC mode follow these steps to upload a configuration file by using...

Страница 1010: ...es the server from or to which you will be copying files must support RCP The RCP copy commands rely on the rsh server or daemon on the remote system To copy files by using RCP you do not need to create a server for file distribution as you do with TFTP You only need to have access to a server that supports the remote shell rsh Most UNIX systems support rsh Because you are copying a file from one ...

Страница 1011: ...te to the RCP server The switch and the server must be in the same subnetwork if you do not have a router to route traffic between subnets Check connectivity to the RCP server by using the ping command If you are accessing the switch through the console or a Telnet session and you do not have a valid username make sure that the current RCP username is the one that you want to use for the RCP downl...

Страница 1012: ...55 255 172 16 101 101 Name of configuration file rtr2 confg host2 confg Configure using host2 confg from 172 16 101 101 confirm Connected to 172 16 101 101 Loading 1112 byte file host2 confg OK OK Switch SYS 5 CONFIG_NV Non volatile store configured from host2 config by rcp from 172 16 101 101 Uploading a Configuration File By Using RCP Beginning in privileged EXEC mode follow these steps to uploa...

Страница 1013: ... reboot the switch with no startup configuration the switch enters the setup program so that you can reconfigure the switch with all new settings Clearing the Startup Configuration File To clear the contents of your startup configuration use the erase nvram or the erase startup config privileged EXEC command Caution You cannot restore the startup configuration file after it has been deleted Comman...

Страница 1014: ...ed You can specify how many versions of the running configuration are kept in the archive After the maximum number of files are saved the oldest file is automatically deleted when the next most recent file is saved The show archive privileged EXEC command displays information for all the configuration files saved in the configuration archive The Cisco IOS configuration archive in which the configu...

Страница 1015: ...ion commands Certain configuration commands such as those pertaining to physical components of a networking device for example physical interfaces cannot be added or removed from the running configuration A configuration replacement operation cannot remove the interface interface id command line from the running configuration if that interface is physically present on the device The interface inte...

Страница 1016: ...ation and filename prefix for the files in the configuration archive 5 time period minutes Optional Sets the time increment for automatically saving an archive file of the running configuration in the configuration archive minutes Specifies how often in minutes to automatically save an archive file of the running configuration in the configuration archive 6 end Returns to privileged EXEC mode 7 sh...

Страница 1017: ...ration file target url URL accessible by the file system of the saved configuration file that is to replace the running configuration such as the configuration file created in Step 2 by using the archive config privileged EXEC command list Displays a list of the command entries applied by the software parser during each pass of the configuration replacement operation The total number of passes als...

Страница 1018: ...f specifying complete paths with each tar file tar File Format of Images on a Server or Cisco com Software images located on a server or downloaded from Cisco com are provided in a tar file format which contains these files An info file which serves as a table of contents for the tar file One or more subdirectories containing other images and files such as Cisco IOS images and web management files...

Страница 1019: ...r a fastboot command on the SunOS 4 x or a reboot command on Solaris 2 x or SunOS 5 x For more information on the TFTP daemon see the documentation for your workstation Ensure that the switch has a route to the TFTP server The switch and the TFTP server must be in the same subnetwork if you do not have a router to route traffic between subnets Check connectivity to the TFTP server by using the pin...

Страница 1020: ...the image to the appropriate TFTP directory on the workstation Make sure that the TFTP server is properly configured see the Preparing to Download or Upload an Image File By Using TFTP page 1015 2 Log into the switch through the console port or a Telnet session 3 archive download sw overwrite reload tftp location directory image name tar Downloads the image file from the TFTP server to the switch ...

Страница 1021: ...e archive upload sw privileged EXEC command builds an image file on the server by uploading these files in order info the Cisco IOS image and the web management files After these files are uploaded the upload algorithm creates the tar file format Caution For the download and upload algorithms to operate properly do not rename image names Copying Image Files By Using FTP You can download a switch i...

Страница 1022: ... username and ip ftp password commands to specify a username and password for all copies Include the username in the archive download sw or archive upload sw privileged EXEC command if you want to specify a username only for that operation If the server has a directory structure the image file is written to or copied from the directory associated with the username on the server For example if the ...

Страница 1023: ...ng image To keep the current image go to Step 7 Command Purpose 1 Verify that the FTP server is properly configured by referring to the Preparing to Download or Upload a Configuration File By Using FTP page 1004 2 Log into the switch through the console port or a Telnet session 3 configure terminal Enters global configuration mode This step is required only if you override the default remote usern...

Страница 1024: ...te reload ftp username password location directory i mage name tar Downloads the image file from the FTP server to the switch and overwrite the current image The overwrite option overwrites the software image in flash memory with the downloaded image The reload option reloads the system after downloading the image unless the configuration has been changed and not been saved For username password s...

Страница 1025: ...d the upload algorithm creates the tar file format Caution For the download and upload algorithms to operate properly do not rename image names Copying Image Files By Using RCP You can download a switch image from an RCP server or upload the image from the switch to an RCP server Command Purpose 1 Verify that the FTP server is properly configured by referring to the Preparing to Download or Upload...

Страница 1026: ...rivileged EXEC command if a username is specified The username set by the ip rcmd remote username username global configuration command if the command is entered The remote username associated with the current TTY terminal process For example if the user is connected to the router through Telnet and was authenticated through the username command the switch software sends the Telnet username as the...

Страница 1027: ... com Switch1 For more information see the documentation for your RCP server Downloading an Image File By Using RCP You can download a new image file and replace or keep the current image Beginning in privileged EXEC mode follow Steps 1 through 6 to download a new image from an RCP server and overwrite the existing image To keep the current image go to Step 6 Command Purpose 1 Verify that the RCP s...

Страница 1028: ...ation directory image nam e tar Downloads the image file from the RCP server to the switch and overwrite the current image The overwrite option overwrites the software image in flash memory with the downloaded image The reload option reloads the system after downloading the image unless the configuration has been changed and not been saved For username specify the username For the RCP copy request...

Страница 1029: ... uploading these files in order info the Cisco IOS image and the web management files After these files are uploaded the upload algorithm creates the tar file format Caution For the download and upload algorithms to operate properly do not rename image names Command Purpose 1 Verify that the RCP server is properly configured by referring to the Preparing to Download or Upload a Configuration File ...

Страница 1030: ...1026 Working with the Cisco IOS File System Configuration Files and Software Images Working with Software Images ...

Страница 1031: ... from the failed link to the remaining links in the channel without intervention This chapter also describes how to configure link state tracking EtherChannels An EtherChannel consists of individual Ethernet links bundled into a single logical link as shown in Figure 108 on page 1027 Figure 108 Typical EtherChannel Configuration The EtherChannel provides full duplex bandwidth up 2 Gb s Gigabit Eth...

Страница 1032: ...ne link in an EtherChannel are blocked from returning on any other link of the EtherChannel Port Channel Interfaces When you create an EtherChannel a port channel logical interface is involved With Layer 2 ports use the channel group interface configuration command to dynamically create the port channel logical interface You also can use the interface port channel port channel number global config...

Страница 1033: ...tches and on those switches licensed by vendors to support PAgP PAgP facilitates the automatic creation of EtherChannels by exchanging PAgP packets between Ethernet ports By using PAgP the switch learns the identity of partners capable of supporting PAgP and the capabilities of each port It then dynamically groups similarly configured ports into a single logical link channel or aggregate port Simi...

Страница 1034: ...is an aggregate port learner if it learns addresses by aggregate logical ports The learn method must be configured the same at both ends of the link When a device and its partner are both aggregate port learners they learn the address on the logical port channel The device sends packets to the source by using any of the ports in the EtherChannel With aggregate port learning it is not important on ...

Страница 1035: ... in sync If the active switch fails or resets the standby switch takes over as the active switch If the VSL goes down one core switch knows the status of the other and does not change state PAgP Interaction with Other Features The Dynamic Trunking Protocol DTP and the Cisco Discovery Protocol CDP send and receive packets over the physical ports in the EtherChannel Trunk ports send and receive PAgP...

Страница 1036: ...om aggregating Determining which ports are active and which are hot standby is a two step procedure First the system with a numerically lower system priority and system id is placed in charge of the decision Next that system decides which ports are active and which are hot standby based on its values for port priority and port number The port priority and port number values for the other system ar...

Страница 1037: ...r destination addresses or both source and destination addresses The selected mode applies to all EtherChannels configured on the switch You configure the load balancing and forwarding method by using the port channel load balance global configuration command With source MAC address forwarding when packets are forwarded to an EtherChannel they are distributed across the ports in the channel based ...

Страница 1038: ...articular switch In this method packets sent from the IP address A to IP address B from IP address A to IP address C and from IP address C to IP address B could all use different ports in the channel Different load balancing methods have different advantages and the choice of a particular load balancing method should be based on the position of the switch in the network and the kind of traffic tha...

Страница 1039: ...nation based forwarding enabled EtherChannel Switch with source based forwarding enabled Feature Default Setting Channel groups None assigned Port channel logical interface None defined PAgP mode No default PAgP learn method Aggregate port learning on all ports PAgP priority 128 on all ports LACP mode No default LACP learn method Aggregate port learning on all ports LACP port priority 32768 on all...

Страница 1040: ...eroperate Do not configure a Switched Port Analyzer SPAN destination port as part of an EtherChannel Do not configure a secure port as part of an EtherChannel or the reverse Do not configure a private VLAN port as part of an EtherChannel Do not configure a port that is an active or a not yet active member of an EtherChannel as an IEEE 802 1x port If you try to enable IEEE 802 1x on an EtherChannel...

Страница 1041: ...with the channel group interface configuration command This command automatically creates the port channel logical interface This required task explains how to configure a Layer 2 Ethernet port to a Layer 2 EtherChannel Command Purpose 1 configure terminal Enters global configuration mode 2 interface interface id Specifies a physical port and enter interface configuration mode Valid interfaces inc...

Страница 1042: ...her ports by sending PAgP packets on Forces the port to channel without PAgP or LACP In the on mode an EtherChannel exists only when a port group in the on mode is connected to another port group in the on mode non silent Optional If your switch is connected to a partner that is PAgP capable configure the switch port for nonsilent operation when the port is in the auto or desirable mode If you do ...

Страница 1043: ...ribution methods dst ip Specifies the destination host IP address dst mac Specifies the destination host MAC address of the incoming packet src dst ip Specifies the source and destination host IP address src dst mac Specifies the source and destination host MAC address src ip Specifies the source host IP address src mac Specifies the source MAC address of the incoming packet 3 end Returns to privi...

Страница 1044: ... both ends of the link 4 pagp port priority priority Assigns a priority so that the selected port is chosen for packet transmission For priority the range is 0 to 255 The default is 128 The higher the priority the more likely that the port will be used for PAgP transmission 5 end Returns to privileged EXEC mode Command Purpose Command Purpose 1 configure terminal Enters global configuration mode 2...

Страница 1045: ...1 17 2 Switch config if range switchport mode access Switch config if range switchport access vlan 10 Switch config if range channel group 5 mode active Switch config if range end Additional References The following sections provide references related to switch administration Command Purpose show etherchannel channel group number detail port port channel protocol summary detail load balance port p...

Страница 1046: ...sco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modified by this feature Description Link The Cisco Technical Support website contains thousands of page...

Страница 1047: ...e If a remote device does not autonegotiate configure the duplex settings on the two ports to match The speed parameter can adjust itself even if the connected port does not autonegotiate SFP Module Security and Identification Cisco small form factor pluggable SFP modules have a serial EEPROM that contains the module serial number the vendor name and ID a unique security code and cyclic redundancy...

Страница 1048: ... and lets them time out The switch can only identify the path from the source device to the destination device It cannot identify the path that a packet takes from source host to the source device or from the destination device to the destination host Layer 2 Traceroute Usage Guidelines Cisco Discovery Protocol CDP must be enabled on all the devices in the network For Layer 2 traceroute to functio...

Страница 1049: ...eturn messages Traceroute starts by sending a User Datagram Protocol UDP datagram to the destination host with the TTL field set to 1 If a router finds a TTL value of 1 or 0 it drops the datagram and sends an Internet Control Message Protocol ICMP time to live exceeded message to the sender Traceroute finds the address of the first hop by examining the source address field of the ICMP time to live...

Страница 1050: ... existing sequence number so the file with the largest sequence number describes the most recent failure Version numbers are used instead of a timestamp because the switches do not include a real time clock You cannot change the name of the file that the system will use when it creates the file However after the file is created you can use the rename privileged EXEC command to rename it but the co...

Страница 1051: ...es 8 PID Runtime ms Invoked uSecs 5Sec 1Min 5Min TTY Process 140 8820183 4942081 1784 0 63 0 37 0 30 0 HRPC qos request 100 3427318 16150534 212 0 47 0 14 0 11 0 HRPC pm counters 192 3093252 14081112 219 0 31 0 14 0 11 0 Spanning Tree 143 8 37 216 0 15 0 01 0 00 0 Exec output truncated This example shows normal CPU utilization The output shows that utilization for the last 5 seconds is 8 0 which h...

Страница 1052: ... file by using the tar tvf image_filename tar UNIX command switch tar tvf image_filename tar Locate the bin file and extract it by using the tar xvf image_filename tar image_filename bin UNIX command switch tar xvf image_filename tar image_filename binx x image_name bin 3970586 bytes 7756 tape blocks Verify that the bin file was extracted by using the ls l image_filename bin UNIX command switch ls...

Страница 1053: ...in make sure that You have physical access to the switch At least one switch port is enabled and is not connected to a device To delete the switch password and set a new one follow these steps 1 Press the Express Setup button until the SETUP LED blinks green and the LED of an available switch downlink port blinks green If no switch downlink port is available for your PC or laptop connection discon...

Страница 1054: ...d Catalyst 1900 switch connected to the command switch through a secured port can lose connectivity if the port is disabled because of a security violation Executing Ping If you attempt to ping a host in a different IP subnetwork you must define a static route to the network or have IP routing configured to route between those subnets IP routing is disabled by default on all switches If you need t...

Страница 1055: ...msec 8 msec 0 msec 3 171 9 16 6 4 msec 0 msec 0 msec 4 171 9 4 5 0 msec 4 msec 0 msec 5 171 9 121 34 0 msec 4 msec 4 msec 6 171 9 15 9 120 msec 132 msec 128 msec 7 171 9 15 10 132 msec 128 msec 128 msec Switch The display shows the hop count the IP address of the router and the round trip time in milliseconds for each of the three probes that are sent Table 73 on page 1052 lists the characters tha...

Страница 1056: ...ter this command to enable the debugging for Switched Port Analyzer SPAN Switch debug span session The switch continues to generate output until you enter the no form of the command If you enable a debug command and no output appears consider these possibilities The switch might not be properly configured to generate the type of traffic you want to monitor Use the show running config command to ch...

Страница 1057: ...g format is compatible with 4 3 Berkeley Standard Distribution BSD UNIX and its derivatives Note Be aware that the debugging destination you use affects system overhead Logging messages to the console produces very high overhead whereas logging messages to a virtual terminal produces less overhead Logging messages to a syslog server produces even less and logging to an internal buffer produces the...

Страница 1058: ...umber 5 Src Real Vlan Id 5 Mapped Vlan Id 5 Ingress Lookup Key Used Index Hit A Data InptACL 40_0D020202_0D010101 00_40000014_000A0000 01FFA 03000000 L2Local 80_00050002_00020002 00_00000000_00000000 00C71 0000002B Station Descriptor 02340000 DestIndex 0239 RewriteIndex F005 Egress Asic 2 switch 1 Output Packets Packet 1 Lookup Key Used Index Hit A Data OutptACL 50_0D020202_0D010101 00_40000014_00...

Страница 1059: ...0014_000A0000 01FFA 03000000 L3Local 00_00000000_00000000 90_00001400_0D020202 010F0 01880290 L3Scndr 12_0D020202_0D010101 00_40000014_000A0000 034E0 000C001D_00000000 Lookup Used Secondary Station Descriptor 02260000 DestIndex 0226 RewriteIndex 0000 This is an example of the output when the packet coming in on port 1 in VLAN 5 has a destination MAC address set to the router MAC address in VLAN 5 ...

Страница 1060: ...tandards has not been modified by this feature MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software use the Cisco MIB Locator found at the following URL and choose a platform under the Cisco Access Products menu http cisco com public sw center netmgmt cmtk mibs shtml RFCs Title No new or modified RFCs are supported by this feature and support for existing RFCs has not been modifi...

Страница 1061: ... SDHC cards Attempting to operate the switch with a non supported card causes the following message to be displayed WARNING Non IT SD flash detected Use of this card during normal operation can impact and severely degrade performance of the system Please use supported SD flash cards only If the write protect switch on the SD card is in the lock position the switch can read data on the card and boo...

Страница 1062: ...m an SD card The SD card takes precedence over internal flash memory If an SD card is installed in the switch the switch attempts to boot in the following order 1 From the IOS image that is specified in the SD card system boot path 2 From the first IOS image in the SD card 3 From the IOS image that is specified in the internal flash memory system boot path 4 From the first IOS image in the interna...

Страница 1063: ...is warning message is displayed only once If the system boots from the internal flash memory and you then insert an SD card and run the boot command the following behavior applies If the system boot path or configuration file path points to the internal flash memory the system boot path or configuration file path is saved to the internal flash memory If the system boot path or configuration file p...

Страница 1064: ...rsalk9 mz 150 2 EA1 bin Switch sync flash sdflash skip config text vlan dat Sync only IOS image directory from internal flash memory to SD card Switch sync sdflash flash skip config text vlan dat Sync only IOS image directory from SD card to internal flash memory Switch sync flash sdflash skip ios image Sync only IOS configuration files from internal flash memory to SD card Switch sync sdflash fla...

Страница 1065: ...g alarm facility sd card sysm Switch config alarm facility sd card syslog Switch config alarm facility sd card relay major Clearing an SD Card Alarm To clear the last SD card alarm warning state enter the following command Switch clear facility alarm ...

Страница 1066: ...1062 Using an SD Card SD Card Alarms ...

Отзывы: