Page 1
Catalyst 2928 Switch Software Configuration Guide Cisco IOS Release 12.2(55)EZ November 2010 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-23389-01...
Page 2
Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks.
Monitoring Features Default Settings After Initial Switch Configuration Network Configuration Examples 1-11 Design Concepts for Using the Switch 1-11 Small to Medium-Sized Network Using Catalyst 2928 Switches 1-14 Campus Network Using Catalyst 2928 Switches 1-15 Where to Go Next 1-16...
Page 4
Checking and Saving the Running Configuration 3-14 Modifying the Startup Configuration 3-15 Default Boot Configuration 3-16 Automatically Downloading a Configuration File 3-16 Specifying the Filename to Read and Write the System Configuration 3-16 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 5
Standby Cluster Command Switch Characteristics Candidate Switch and Cluster Member Switch Characteristics Planning a Switch Cluster Automatic Discovery of Cluster Candidates and Members Discovery Through CDP Hops Discovery Through Non-CDP-Capable and Noncluster-Capable Devices Discovery Through Different VLANs Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 6
Configuring NTP Access Restrictions Configuring the Source IP Address for NTP Packets 7-10 Displaying the NTP Configuration 7-11 Configuring Time and Date Manually 7-11 Setting the System Clock 7-11 Displaying the Time and Date Configuration 7-12 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 7
Setting a Telnet Password for a Terminal Line Configuring Username and Password Pairs Configuring Multiple Privilege Levels Setting the Privilege Level for a Command Changing the Default Privilege Level for Lines Logging into and Exiting a Privilege Level Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 8
Configuring the SSH Server 8-36 Displaying the SSH Configuration and Status 8-36 Configuring the Switch for Secure Socket Layer HTTP 8-37 Understanding Secure HTTP Servers and Clients 8-37 Certificate Authority Trustpoints 8-37 CipherSuites 8-39 Catalyst 2928 Switch Software Configuration Guide viii OL-23389-01...
Page 9
Upgrading from a Previous Software Release 9-20 Configuring IEEE 802.1x Authentication 9-20 Configuring the Switch-to-RADIUS-Server Communication 9-22 Configuring the Host Mode 9-23 Configuring Periodic Re-Authentication 9-24 Manually Re-Authenticating a Client Connected to a Port 9-24 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 10
Configuring the Authentication Rule and Interfaces 10-10 Configuring AAA Authentication 10-11 Configuring Switch-to-RADIUS-Server Communication 10-11 Configuring the HTTP Server 10-13 Customizing the Authentication Proxy Web Pages 10-13 Specifying a Redirection URL for Successful Login 10-15 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 11
Configuring Interface Speed and Duplex Mode 12-17 Speed and Duplex Configuration Guidelines 12-17 Setting the Interface Speed and Duplex Parameters 12-18 Configuring IEEE 802.3x Flow Control 12-19 Configuring Auto-MDIX on an Interface 12-20 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 12
Configuring an Ethernet Interface as a Trunk Port 13-14 Interaction with Other Features 13-14 Configuring a Trunk Port 13-15 Defining the Allowed VLANs on a Trunk 13-16 Changing the Pruning-Eligible List 13-17 Configuring the Native VLAN for Untagged Traffic 13-17 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 13
Configuring a VTP Client 14-9 Disabling VTP (VTP Transparent Mode) 14-10 Enabling VTP Version 2 14-11 Enabling VTP Pruning 14-12 Adding a VTP Client Switch to a VTP Domain 14-12 Monitoring VTP 14-14 Catalyst 2928 Switch Software Configuration Guide xiii OL-23389-01...
Page 14
15-2 Configuring Voice VLAN 15-3 Default Voice VLAN Configuration 15-3 Voice VLAN Configuration Guidelines 15-3 Configuring a Port Connected to a Cisco 7960 IP Phone 15-4 Configuring Cisco IP Phone Voice Traffic 15-5 Displaying Voice VLAN 15-6 Configuring STP 16-1...
Page 15
Specifying the MST Region Configuration and Enabling MSTP 17-15 Configuring the Root Switch 17-17 Configuring a Secondary Root Switch 17-18 Configuring Port Priority 17-19 Configuring Path Cost 17-20 Configuring the Switch Priority 17-21 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 16
Configuring DHCP Features and IP Source Guard Features 19-1 C H A P T E R Understanding DHCP Snooping 19-1 DHCP Server 19-2 DHCP Relay Agent 19-2 DHCP Snooping 19-2 Option-82 Data Insertion 19-4 DHCP Snooping Binding Database 19-7 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 17
Configuring Dynamic ARP Inspection in DHCP Environments 20-7 Configuring ARP ACLs for Non-DHCP Environments 20-8 Limiting the Rate of Incoming ARP Packets 20-10 Performing Validation Checks 20-11 Configuring the Log Buffer 20-12 Catalyst 2928 Switch Software Configuration Guide xvii OL-23389-01...
Page 18
C H A P T E R Configuring Storm Control 22-1 Understanding Storm Control 22-1 Default Storm Control Configuration 22-3 Configuring Storm Control and Threshold Levels 22-3 Configuring Small-Frame Arrival Rate 22-5 Catalyst 2928 Switch Software Configuration Guide xviii OL-23389-01...
Page 20
Specifying VLANs to Filter 26-12 Displaying SPAN Status 26-13 Configuring RMON 27-1 C H A P T E R Understanding RMON 27-1 Configuring RMON 27-2 Default RMON Configuration 27-3 Configuring RMON Alarms and Events 27-3 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 21
Default SNMP Configuration 29-6 SNMP Configuration Guidelines 29-7 Disabling the SNMP Agent 29-7 Configuring Community Strings 29-8 Configuring SNMP Groups and Users 29-9 Configuring SNMP Notifications 29-11 Setting the Agent Contact and Location Information 29-15 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 22
C H A P T E R Understanding QoS 31-1 Basic QoS Model 31-3 Classification 31-3 Queueing Overview 31-4 Weighted Tail Drop 31-4 Queueing on Ingress Queues 31-4 Queueing on Egress Queues 31-5 Packet Modification 31-6 Catalyst 2928 Switch Software Configuration Guide xxii OL-23389-01...
Page 24
Running TDR and Displaying the Results 33-18 Using Debug Commands 33-18 Enabling Debugging on a Specific Feature 33-19 Enabling All-System Diagnostics 33-19 Redirecting Debug and Error Message Output 33-20 Using the show platform forward Command 33-20 Catalyst 2928 Switch Software Configuration Guide xxiv OL-23389-01...
Page 25
A P P E N D I X MIB List Using FTP to Access the MIB Files Working with the Cisco IOS File System, Configuration Files, and Software Images A P P E N D I X Working with the Flash File System...
Page 26
Working with Software Images B-19 Image Location on the Switch B-20 tar File Format of Images on a Server or Cisco.com B-20 Copying Image Files By Using TFTP B-21 Preparing to Download or Upload an Image File By Using TFTP...
Page 27
Unsupported Global Configuration Commands Spanning Tree Unsupported Global Configuration Command Unsupported Interface Configuration Command VLAN Unsupported Global Configuration Command Unsupported vlan-config Command Unsupported User EXEC Commands Unsupported Privileged EXEC Commands N D E X Catalyst 2928 Switch Software Configuration Guide xxvii OL-23389-01...
Page 29
This guide is for the networking professional managing the Catalyst 2928 switch, hereafter referred to as the switch. Before using this guide, you should have experience working with the Cisco IOS software and be familiar with the concepts and terminology of Ethernet and local area networking.
• Catalyst 2928 Switch Getting Started Guide • Catalyst 2928 Switch Hardware Installation Guide • Regulatory Compliance and Safety Information for the Catalyst 2928 Switch Cisco Small Form-Factor Pluggable Modules Installation Notes • Catalyst 2928 Switch Software Configuration Guide xxviii...
Page 31
Obtaining Documentation, Obtaining Support, and Security Guidelines For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed...
Some features described in this chapter are available only on the cryptographic (supports encryption) version of the software. You must obtain authorization to use this feature and to download the cryptographic version of the software from Cisco.com. For more information, see the release notes for this release.
Smart Install to allow a single point of management (director) in a network. You can use Smart Install to provide zero touch image and configuration upgrade of newly deployed switches and image and configuration downloads for any client switches. For more information, see the Cisco Smart Install Configuration Guide.
For more information about the device manager, see the switch online help. CLI—The Cisco IOS software supports desktop- and multilayer-switching features. You can access • the CLI either by connecting your management station directly to the switch console port or by using Telnet from a remote management station.
Network Time Protocol (NTP) for providing a consistent time stamp to all switches from an external • source Cisco IOS File System (IFS) for providing a single interface to all file systems that the switch uses • Configuration logging to log and to view changes to the switch configuration •...
VLAN Trunking Protocol (VTP) and VTP pruning for reducing network traffic by restricting • flooded traffic to links destined for stations receiving the traffic Voice VLAN for creating subnets for voice traffic from Cisco IP Phones • Catalyst 2928 Switch Software Configuration Guide...
– Port security for controlling access to IEEE 802.1x ports – Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless of the authorized – or unauthorized state of the port IP phone detection enhancement to detect and recognize a Cisco IP phone.
Ratios and buffers/thresholds are predefined and fixed – Power over Ethernet Features (WS-C2928-24LT-C only) Ability to provide power to connected Cisco pre-standard and IEEE 802.3af-compliant powered • devices from Power over Ethernet (PoE)-capable ports if the switch detects that there is no power on the circuit.
Chapter 1 Overview Default Settings After Initial Switch Configuration Support for Cisco intelligent power management. The powered device and the switch negotiate • through power-negotiation CDP messages for an agreed power-consumption level. The negotiation allows a high-power Cisco powered device to operate at its highest power mode.
Page 41
STP, PVST+ is enabled on VLAN 1. For more information, see Chapter 16, “Configuring STP.” MSTP is disabled. For more information, see Chapter 17, “Configuring MSTP.” • Optional spanning-tree features are disabled. For more information, see Chapter 18, “Configuring • Optional Spanning-Tree Features.” Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 42
Dynamic ARP inspection is disabled on all VLANs. For more information, see Chapter 21, • “Configuring Dynamic ARP Inspection.” No ACLs are configured. For more information, see Chapter 31, “Configuring Network Security • with ACLs.” Catalyst 2928 Switch Software Configuration Guide 1-10 OL-23389-01...
“Design Concepts for Using the Switch” section on page 1-11 • “Small to Medium-Sized Network Using Catalyst 2928 Switches” section on page 1-14 Design Concepts for Using the Switch IAs your network users compete for network bandwidth, it takes longer to send and receive data. When you configure your network, consider the bandwidth required by your network users and the relative priority of the network applications that they use.
Page 44
1-1)—For • high-speed access to network resources, you can use the Cisco Catalyst 2928 switches in the access layer to provide Gigabit Ethernet to the desktop. To prevent congestion, use QoS DSCP marking priorities on these switches. For high-speed IP forwarding at the distribution layer, connect the switches in the access layer to a Gigabit multilayer switch with routing capability, such as a Catalyst 3750 switch, or to a router.
Page 45
Using SFP modules provides flexibility in media and distance options through fiber-optic connections. Figure 1-2 Server Aggregation Campus core Catalyst 6500 switches Catalyst 3750 StackWise switch stacks Access-layer Catalyst switches Server racks Catalyst 2928 Switch Software Configuration Guide 1-13 OL-23389-01...
Small to Medium-Sized Network Using Catalyst 2928 Switches Figure 1-3 shows a configuration for a network of up to 500 employees. This network uses Catalyst 2928 switches with high-speed connections to two routers. This ensures connectivity to the Internet, WAN, and mission-critical network resources in case one of the routers fails.
This network uses Catalyst 2928 switches with connections to a core layer switch and a wireless services module. The switches connect workstations and wireless access points through the core layer to a third-party system that provides authentication, authorization, and accounting services.
Chapter 1 Overview Where to Go Next Figure 1-4 Catalyst 2928 Switches in a Network Access Control Deployment Third Party Device Portal Server + RADIUS Server + DHCP Server + Policy Server + Accounting + Billing Information Core Layer Switch...
C H A P T E R Using the Command-Line Interface This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your Catalyst 2928 switch. It contains these sections: Understanding Command Modes, page 2-1 •...
You need to enter only enough characters for the switch to recognize the command as unique. This example shows how to enter the show configuration privileged EXEC command in an abbreviated form: Switch# show conf Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
You can log and view changes to the switch configuration. You can use the Configuration Change Logging and Notification feature to track changes on a per-session and per-user basis. The logger tracks each configuration command that is applied, the user who entered the command, the time that the Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Beginning in line configuration mode, enter this command to configure the number of command lines the switch records for all sessions on a particular line: Switch(config-line)# history size number-of-lines The range is from 0 to 256. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Although enhanced editing mode is automatically enabled, you can disable it, re-enable it, or configure a specific line to have enhanced editing. These procedures are optional. To globally disable enhanced editing mode, enter this command in line configuration mode: Switch (config-line)# no editing Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Delete the word to the left of the cursor. Press Esc D. Delete from the cursor to the end of the word. Capitalize or lowercase words or Press Esc C. Capitalize at the cursor. capitalize a set of letters. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
The dollar sign ($) appears at the end of the line to show that the line has been scrolled to the right: Switch(config)# access-list 101 permit tcp 131.108.2.5 255.255.255.0 131.108.1$ Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management • station. The switch must have network connectivity with the Telnet or SSH client, and the switch must have an enable secret password configured. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 58
8-33. The switch supports up to five simultaneous secure SSH sessions. After you connect through the console port, through a Telnet session or through an SSH session, the user EXEC prompt appears on the management station. Catalyst 2928 Switch Software Configuration Guide 2-10 OL-23389-01...
This chapter describes how to create the initial switch configuration (for example, assigning the IP address and default gateway information) for the Catalyst 2928 switch by using a variety of automatic and manual methods. It also describes how to modify the switch startup configuration.
If you are an experienced user familiar with the switch configuration steps, manually configure the switch. Otherwise, use the setup program described previously. • Default Switch Information, page 3-3 Understanding DHCP-Based Autoconfiguration, page 3-3 • Manually Assigning IP Information, page 3-14 • Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
DHCP server. A relay device forwards broadcast traffic between two directly connected LANs. A router does not forward broadcast packets, but it forwards packets based on the destination IP address in the received packet. DHCP-based autoconfiguration replaces the BOOTP client functionality on your switch. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
You can use the DHCP image upgrade features to configure a DHCP server to download both a new image and a new configuration file to one or more switches in a network. This helps ensure that each new switch added to a network receives the same image and configuration. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
NVRAM unless you enter the write memory or copy running-configuration startup-configuration privileged EXEC command. Note that if the downloaded configuration is saved to the startup configuration, the feature is not triggered during subsequent system restarts. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Example Configuration, page 3-9 • If your DHCP server is a Cisco device, see the “Configuring DHCP” section of the “IP Addressing and Services” section of the Cisco IOS IP Configuration Guide, Release 12.2 for additional information about configuring DHCP.
If the relay device is a Cisco router, enable IP routing (ip routing global configuration command), and configure helper addresses by using the ip helper-address interface configuration command.
The switch receives its IP address, subnet mask, and the TFTP server address from the DHCP server. The switch sends a unicast message to the TFTP server to retrieve the network-confg or cisconet.cfg default configuration file. (If the network-confg file cannot be read, the switch reads the cisconet.cfg file.) Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 68
It reads the configuration file that corresponds to its hostname; for example, it reads switch1-confg • from the TFTP server. Switches B through D retrieve their configuration files and IP addresses in the same way. Catalyst 2928 Switch Software Configuration Guide 3-10 OL-23389-01...
Upload the tarfile for the new image to the switch. Step 10 exit Return to global configuration mode. Step 11 tftp-server flash:config.text Specify the Cisco IOS configuration file on the TFTP server. Step 12 tftp-server flash:imagename.tar Specify the image name on the TFTP server. Step 13 tftp-server flash:filename.txt...
Checking and Saving the Running Configuration You can check the configuration settings that you entered or changes that you made by entering this privileged EXEC command: Switch# show running-config Building configuration... Current configuration: 1363 bytes version 12.1 Catalyst 2928 Switch Software Configuration Guide 3-14 OL-23389-01...
EXEC command. For more information about alternative locations from which to copy the configuration file, see Appendix B, “Working with the Cisco IOS File System, Configuration Files, and Software Images.” Modifying the Startup Configuration Default Boot Configuration, page 3-16 •...
Specifying the Filename to Read and Write the System Configuration By default, the Cisco IOS software uses the file config.text to read and write a nonvolatile copy of the system configuration. However, you can specify a different filename, which will be loaded during the next boot-up cycle.
Filenames and directory names are case sensitive. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To disable manual booting, use the no boot manual global configuration command. Catalyst 2928 Switch Software Configuration Guide 3-17 OL-23389-01...
A variable that is set to a null string (for example, “ ”) is a variable with a value. Many environment variables are predefined and have default values. Catalyst 2928 Switch Software Configuration Guide 3-18...
Page 77
Cisco IOS configuration file can be stored as an environment variable. You can change the settings of the environment variables by accessing the boot loader or by using Cisco IOS commands. Under normal circumstances, it is not necessary to alter the setting of the environment variables.
This example shows how to reload the software on the switch on the current day at 7:30 p.m: Switch# reload at 19:30 Reload scheduled for 19:30:00 UTC Wed Jun 5 1996 (in 2 hours and 25 minutes) Proceed with reload? [confirm] Catalyst 2928 Switch Software Configuration Guide 3-20 OL-23389-01...
EXEC command. It displays reload information including the time the reload is scheduled to occur and the reason for the reload (if it was specified when the reload was scheduled). Catalyst 2928 Switch Software Configuration Guide 3-21 OL-23389-01...
Page 80
Chapter 3 Assigning the Switch IP Address and Default Gateway Scheduling a Reload of the Software Image Catalyst 2928 Switch Software Configuration Guide 3-22 OL-23389-01...
C H A P T E R Configuring Cisco IOS CNS Agents This chapter describes how to configure the Cisco IOS CNS agents on the Catalyst 2928 switch. Note For complete configuration information for the Cisco Configuration Engine, see this URL on Cisco.com http://www.cisco.com/en/US/products/sw/netmgtsw/ps4617/tsd_products_support_series_home.html...
URLs that reference the device-specific configuration information stored in a directory. The Cisco IOS agent can perform a syntax check on received configuration files and publish events to show the success or failure of the syntax check. The configuration agent can either apply configurations immediately or delay the application until receipt of a synchronization event from the configuration server.
Understanding Cisco Configuration Engine Software Event Service The Cisco Configuration Engine uses the Event Service for receipt and generation of configuration events. The event agent is on the switch and facilitates the communication between the switch and the event gateway on the Configuration Engine.
Therefore, the DeviceID, as originated on the switch, must match the DeviceID of the corresponding switch definition in the Configuration Engine. The origin of the DeviceID is defined by the Cisco IOS hostname of the switch. However, the DeviceID variable and its usage reside within the event gateway adjacent to the switch.
Understanding Cisco IOS Agents The CNS event agent feature allows the switch to publish and subscribe to events on the event bus and works with the Cisco IOS agent. The Cisco IOS agent feature supports the switch by providing these features: •...
NVRAM for use at the next reboot. Configuring Cisco IOS Agents The Cisco IOS agents embedded in the switch Cisco IOS software allow the switch to be connected and automatically configured as described in the “Enabling Automated CNS Configuration” section on page 4-6.
For more information about running the setup program and creating templates on the Configuration Note Engine, see the Cisco Configuration Engine Installation and Setup Guide, 1.5 for Linux at this URL: http://www.cisco.com/en/US/products/sw/netmgtsw/ps4617/products_installation_and_configuration_ guide_book09186a00803b59db.html Enabling the CNS Event Agent You must enable the CNS event agent on the switch before you enable the CNS configuration agent.
Switch(config)# cns event 10.180.1.27 keepalive 120 10 Enabling the Cisco IOS CNS Agent After enabling the CNS event agent, start the Cisco IOS CNS agent on the switch. You can enable the Cisco IOS agent with these commands: The cns config initial global configuration command enables the Cisco IOS agent and initiates an •...
Configuring Cisco IOS CNS Agents Configuring Cisco IOS Agents The cns config partial global configuration command enables the Cisco IOS agent and initiates a • partial configuration on the switch. You can then use the Configuration Engine to remotely send incremental configurations to the switch.
Page 90
ID, or enter an arbitrary text string for string string as the unique ID. Step 8 cns config initial {ip-address | hostname} Enable the Cisco IOS agent, and initiate an initial [port-number] [event] [no-persist] [page page] configuration. [source ip-address] [syntax-check] For {ip-address | hostname}, enter the IP address or •...
RemoteSwitch(config)# cns id Ethernet 0 ipaddress RemoteSwitch(config)# cns config initial 10.1.1.1 no-persist Enabling a Partial Configuration Beginning in privileged EXEC mode, follow these steps to enable the Cisco IOS agent and to initiate a partial configuration on the switch: Command...
Displaying CNS Configuration Command Purpose show cns config connections Displays the status of the CNS Cisco IOS agent connections. show cns config outstanding Displays information about incremental (partial) CNS configurations that have started but are not yet completed. show cns config stats Displays statistics about the Cisco IOS agent.
C H A P T E R Clustering Switches This chapter provides the concepts and procedures to create and manage Catalyst 2928 switch clusters. You can create and manage switch clusters by using the command-line interface (CLI) or SNMP. For complete procedures, see the online help.
It is running Cisco IOS Release 12.2(44)SE or later. It has an IP address. • It has Cisco Discovery Protocol (CDP) version 2 enabled (the default). • It is not a command or cluster member switch of another cluster. •...
Clustering Switches Understanding Switch Clusters Standby Cluster Command Switch Characteristics A standby cluster command switch must meet these requirements: It is running Cisco IOS 12.2(44)SE or later. • It has an IP address. • It has CDP version 2 enabled.
Java plug-in configurations. Automatic Discovery of Cluster Candidates and Members The cluster command switch uses Cisco Discovery Protocol (CDP) to discover cluster member switches, candidate switches, neighboring switch clusters, and edge devices across multiple VLANs and in star or cascaded topologies.
Device 15 Discovery Through Non-CDP-Capable and Noncluster-Capable Devices If a cluster command switch is connected to a non-CDP-capable third-party hub (such as a non-Cisco hub), it can discover cluster-enabled devices connected to that third-party hub. However, if the cluster command switch is connected to a noncluster-capable Cisco device, it cannot discover a cluster-enabled device connected beyond the noncluster-capable Cisco device.
VLAN. For information about discovery through management VLANs, see the “Discovery Through Different Management VLANs” section on page 5-7. For more information about VLANs, see Chapter 13, “Configuring VLANs.” Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Switches 7 and 10 (switches in management VLAN 4) because they are not connected through a • common VLAN (meaning VLANs 62 and 9) with the cluster command switch. Switch 9 because automatic discovery does not extend beyond a noncandidate device, which is • switch 7. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
VLANs 9 and 16. When new cluster-capable switches join the cluster: One cluster-capable switch and its access port are assigned to VLAN 9. • The other cluster-capable switch and its access port are assigned to management VLAN 16. • Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
These topics also provide more detail about standby cluster command switches: Virtual IP Addresses, page 5-10 • • Other Considerations for Cluster Standby Groups, page 5-10 • Automatic Recovery of Cluster Configuration, page 5-11 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Standby cluster command switches must be the same type of switches as the cluster command • switch. For example, if the cluster command switch is a Catalyst 2928 switch, the standby cluster command switches must also be Catalyst 2928 switches. Refer to the switch configuration guide of other cluster-capable switches for their requirements on standby cluster command switches.
The active cluster command switch sends a copy of the cluster configuration to the cluster standby group. Catalyst 2928 Switch Software Configuration Guide 5-11 OL-23389-01...
We recommend that you do not change the member-switch password after it joins a cluster. For more information about passwords, see the “Preventing Unauthorized Access to Your Switch” section on page 8-1. Catalyst 2928 Switch Software Configuration Guide 5-12 OL-23389-01...
Telnet session (through a console or Telnet connection) and to access the cluster member switch CLI. The command mode changes, and the Cisco IOS commands operate as usual. Enter the exit privileged EXEC command on the cluster member switch to return to the command-switch CLI.
The Telnet session accesses the member-switch CLI at the same privilege level as on the cluster command switch. The Cisco IOS commands then operate as usual. For instructions on configuring the switch for a Telnet session, see the “Disabling Password Recovery”...
Page 107
For more information about SNMP and community strings, see Chapter 29, “Configuring SNMP.” Figure 5-7 SNMP Management for a Cluster SNMP Manager Command switch Trap 1, Trap 2, Trap 3 Member 1 Member 2 Member 3 Catalyst 2928 Switch Software Configuration Guide 5-15 OL-23389-01...
Page 108
Chapter 5 Clustering Switches Using SNMP to Manage Switch Clusters Catalyst 2928 Switch Software Configuration Guide 5-16 OL-23389-01...
Table 6-1 Approximate Number of Feature Resources Allowed by Each Template Resource Default Unicast MAC addresses IPv4 IGMP groups IPv4 MAC QoS ACEs IPv4 MAC security ACEs Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
If you enter the show sdm prefer command before you enter the reload privileged EXEC command, the show sdm prefer command shows the template currently in use and the template that will become active after a reload. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Use the show sdm prefer privileged EXEC command with no parameters to display the active template. Use the show sdm prefer [default | qos] privileged EXEC command to display the resource numbers supported by the specified template. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
You can manage the system time and date on your switch using automatic configuration, such as the Network Time Protocol (NTP), or manual configuration methods. For complete syntax and usage information for the commands used in this section, see the Cisco IOS Note Configuration Fundamentals Command Reference, Release 12.2.
Cisco’s implementation of NTP does not support stratum 1 service; it is not possible to connect to a radio or atomic clock. We recommend that the time service for your network be derived from the public NTP servers available on the IP Internet.
Page 115
Switch F Workstations If the network is isolated from the Internet, Cisco’s implementation of NTP allows a device to act as if it is synchronized through NTP, when in fact it has learned the time by using other means. Other devices then synchronize to that device through NTP.
NTP that provide for accurate timekeeping) with other devices for security purposes: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 ntp authenticate Enable the NTP authentication feature, which is disabled by default. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
An NTP association can be a peer association (this switch can either synchronize to the other device or allow the other device to synchronize to it), or it can be a server association (meaning that only this switch synchronizes to the other device, and not the other way around). Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
However, in a LAN environment, NTP can be configured to use IP broadcast messages instead. This alternative reduces configuration complexity because each device can simply be configured to send or receive broadcast messages. However, the information flow is one-way only. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 119
Specify the interface to receive NTP broadcast packets, and enter interface configuration mode. Step 3 ntp broadcast client Enable the interface to receive NTP broadcast packets. By default, no interfaces receive NTP broadcast packets. Step 4 exit Return to global configuration mode. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
NTP control queries and allows the • switch to synchronize to the remote device. For access-list-number, enter a standard IP access list number from 1 to 99. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 121
99. However, the switch restricts access to allow only time requests from access list 42: Switch# configure terminal Switch(config)# ntp access-group peer 99 Switch(config)# ntp access-group serve-only 42 Switch(config)# access-list 99 permit 172.20.130.5 Switch(config)# access list 42 permit 172.20.130.6 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
• show ntp status • For detailed information about the fields in these displays, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. Configuring Time and Date Manually If no other source of time is available, you can manually configure the time and date after the system is restarted.
Atlantic Canada (AST) is UTC-3.5, where the 3 means 3 hours and .5 means 50 percent. In this case, the necessary command is clock timezone AST -3 30. To set the time to UTC, use the no clock timezone global configuration command. Catalyst 2928 Switch Software Configuration Guide 7-12 OL-23389-01...
This example shows how to specify that summer time starts on the first Sunday in April at 02:00 and ends on the last Sunday in October at 02:00: Switch(config)# clock summer-time PDT recurring 1 Sunday April 2:00 last Sunday October 2:00 Catalyst 2928 Switch Software Configuration Guide 7-13 OL-23389-01...
A greater-than symbol [>] is appended. The prompt is updated whenever the system name changes. For complete syntax and usage information for the commands used in this section, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2 and the Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2.
Domain names are pieced together with periods (.) as the delimiting characters. For example, Cisco Systems is a commercial organization that IP identifies by a com domain name, so its domain name is cisco.com. A specific device in this domain, for example, the File Transfer Protocol (FTP) system is identified as ftp.cisco.com.
Internet naming scheme (DNS). Step 5 Return to privileged EXEC mode. Step 6 show running-config Verify your entries. Step 7 copy running-config (Optional) Save your entries in the configuration file. startup-config Catalyst 2928 Switch Software Configuration Guide 7-16 OL-23389-01...
User Access Verification Password: Configuring a Login Banner You can configure a login banner to be displayed on all connected terminals. This banner appears after the MOTD banner and before the login prompt. Catalyst 2928 Switch Software Configuration Guide 7-18 OL-23389-01...
Dynamic addresses are source MAC addresses that the switch learns and then ages when they are not in use. You can change the aging time setting for all VLANs or for a specified VLAN. Catalyst 2928 Switch Software Configuration Guide 7-20...
MAC address activity for each hardware port for which the trap is enabled. MAC address notifications are generated for dynamic and secure MAC addresses; events are not generated for self addresses, multicast addresses, or other static addresses. Catalyst 2928 Switch Software Configuration Guide 7-21 OL-23389-01...
Page 134
Enable the MAC notification trap whenever a MAC address is added on this interface. Enable the MAC notification trap whenever a • MAC address is removed from this interface. Step 8 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 7-22 OL-23389-01...
You add a static address to the address table by specifying the destination MAC unicast address and the VLAN from which it is received. Packets received with this destination address are forwarded to the interface specified with the interface-id option. Catalyst 2928 Switch Software Configuration Guide 7-23 OL-23389-01...
% Only unicast addresses can be configured to be dropped % CPU destined address cannot be configured as drop address • Packets that are forwarded to the CPU are also not supported. Catalyst 2928 Switch Software Configuration Guide 7-24 OL-23389-01...
Page 137
When a packet is received in VLAN 4 with this MAC address as its source or destination, the packet is dropped: Switch(config)# mac ddress-table static c2f3.220a.12f4 vlan 4 drop Catalyst 2928 Switch Software Configuration Guide 7-25 OL-23389-01...
(represented by the arpa keyword) is enabled on the IP interface. ARP entries added manually to the table do not age and must be manually removed. For CLI procedures, see the Cisco IOS Release 12.2 documentation on Cisco.com. Catalyst 2928 Switch Software Configuration Guide...
C H A P T E R Configuring Switch-Based Authentication This chapter describes how to configure switch-based authentication on the Catalyst 2928 switch. It consists of these sections: Preventing Unauthorized Access to Your Switch, page 8-1 • Protecting Access to Privileged EXEC Commands, page 8-2 •...
Password protection restricts access to a network or network device. Privilege levels define what commands users can enter after they have logged into a network device. For complete syntax and usage information for the commands used in this section, see the Cisco IOS Note Security Command Reference, Release 12.2.
We recommend that you use the enable secret command because it uses an improved encryption algorithm. If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 142
By default, no password is defined. • (Optional) For encryption-type, only type 5, a Cisco proprietary encryption algorithm, is available. If you specify an encryption type, you must provide an encrypted password—an encrypted password that you...
Disable password recovery. This setting is saved in an area of the flash memory that is accessible by the boot loader and the Cisco IOS image, but it is not part of the file system and is not accessible by any user.
If you have defined privilege levels, you can also assign a specific privilege level (with associated rights and privileges) to each username and password pair. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Configuring Multiple Privilege Levels By default, the Cisco IOS software has two modes of password security: user EXEC and privileged EXEC. You can configure up to 16 hierarchical levels of commands for each mode. By configuring multiple passwords, you can allow different sets of users to have access to specified commands.
This example shows how to set the configure command to privilege level 14 and define SecretPswd14 as the password users must enter to use level 14 commands: Switch(config)# privilege exec level 14 configure Switch(config)# enable password level 14 SecretPswd14 Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Log in to a specified privilege level. For level, the range is 0 to 15. Step 2 disable level Exit to a specified privilege level. For level, the range is 0 to 15. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
(AAA) and can be enabled only through AAA commands. Note For complete syntax and usage information for the commands used in this section, see the Cisco IOS Security Command Reference, Release 12.2. These sections contain this configuration information: Understanding TACACS+, page 8-10 •...
Page 149
The TACACS+ protocol provides authentication between the switch and the TACACS+ daemon, and it ensures confidentiality because all protocol exchanges between the switch and the TACACS+ daemon are encrypted. You need a system running the TACACS+ daemon software to use TACACS+ on your switch. Catalyst 2928 Switch Software Configuration Guide 8-11 OL-23389-01...
This process continues until there is successful communication with a listed method or the method list is exhausted. Catalyst 2928 Switch Software Configuration Guide 8-12 OL-23389-01...
TACACS+ daemon. You must configure the same key on the TACACS+ daemon for encryption to be successful. Step 3 aaa new-model Enable AAA. Catalyst 2928 Switch Software Configuration Guide 8-13 OL-23389-01...
Beginning in privileged EXEC mode, follow these steps to configure login authentication: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 aaa new-model Enable AAA. Catalyst 2928 Switch Software Configuration Guide 8-14 OL-23389-01...
Page 153
{default | list-name} method1 [method2...] global configuration command. To either disable TACACS+ authentication for logins or to return to the default value, use the no login authentication {default | list-name} line configuration command. Catalyst 2928 Switch Software Configuration Guide 8-15 OL-23389-01...
Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. For more information about the ip http authentication command, see the Cisco IOS Security Command Reference, Release 12.2.
RADIUS is facilitated through AAA and can be enabled only through AAA commands. For complete syntax and usage information for the commands used in this section, see the Cisco IOS Note Security Command Reference, Release 12.2.
• Switch-to-switch or router-to-router situations. RADIUS does not provide two-way authentication. RADIUS can be used to authenticate from one device to a non-Cisco device if the non-Cisco device requires authentication. Networks using a variety of services. RADIUS generally binds a user to one service model.
RADIUS authorization, if it is enabled. The additional data included with the ACCEPT or REJECT packets includes these items: Telnet, SSH, rlogin, or privileged EXEC services • • Connection parameters, including the host or client IP address, access list, and user timeouts Catalyst 2928 Switch Software Configuration Guide 8-19 OL-23389-01...
Identifying the RADIUS Server Host Switch-to-RADIUS-server communication involves several components: • Hostname or IP address • Authentication destination port Accounting destination port • Key string • Timeout period • Retransmission value • Catalyst 2928 Switch Software Configuration Guide 8-20 OL-23389-01...
Page 159
“Configuring Settings for All RADIUS Servers” section on page 8-29. You can configure the switch to use AAA server groups to group existing server hosts for authentication. For more information, see the “Defining AAA Server Groups” section on page 8-25. Catalyst 2928 Switch Software Configuration Guide 8-21 OL-23389-01...
Page 160
This example shows how to configure one RADIUS server to be used for authentication and another to be used for accounting: Switch(config)# radius-server host 172.29.36.49 auth-port 1612 key rad1 Switch(config)# radius-server host 172.20.36.50 acct-port 1618 key rad2 Catalyst 2928 Switch Software Configuration Guide 8-22 OL-23389-01...
Beginning in privileged EXEC mode, follow these steps to configure login authentication. This procedure is required. Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 aaa new-model Enable AAA. Catalyst 2928 Switch Software Configuration Guide 8-23 OL-23389-01...
Page 162
For list-name, specify the list created with the aaa authentication • login command. Step 6 Return to privileged EXEC mode. Step 7 show running-config Verify your entries. Step 8 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 8-24 OL-23389-01...
Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. For more information about the ip http authentication command, see the Cisco IOS Security Command Reference, Release 12.2.
Page 164
Repeat this step for each RADIUS server in the AAA server group. Each server in the group must be previously defined in Step 2. Step 6 Return to privileged EXEC mode. Step 7 show running-config Verify your entries. Catalyst 2928 Switch Software Configuration Guide 8-26 OL-23389-01...
EXEC access and network services: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 aaa authorization network radius Configure the switch for user RADIUS authorization for all network-related service requests. Catalyst 2928 Switch Software Configuration Guide 8-27 OL-23389-01...
(AV) pairs and is stored on the security server. This data can then be analyzed for network management, client billing, or auditing. Beginning in privileged EXEC mode, follow these steps to enable RADIUS accounting for each Cisco IOS privilege level and for network services:...
1, which is named cisco-avpair. The value is a string with this format: protocol : attribute sep value * Protocol is a value of the Cisco protocol attribute for a particular type of authorization. Attribute and value are an appropriate attribute-value (AV) pair defined in the Cisco TACACS+ specification, and sep is = for mandatory attributes and is * for optional attributes.
Page 168
(Optional) Save your entries in the configuration file. For a complete list of RADIUS attributes or more information about vendor-specific attribute 26, see the “RADIUS Attributes” appendix in the Cisco IOS Security Configuration Guide, Release 12.2. Catalyst 2928 Switch Software Configuration Guide...
Although an IETF draft standard for RADIUS specifies a method for communicating vendor-proprietary information between the switch and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. Cisco IOS software supports a subset of vendor-proprietary RADIUS attributes.
To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip http authentication aaa global configuration command. Configuring AAA authentication does not secure the switch for HTTP access by using AAA methods. Catalyst 2928 Switch Software Configuration Guide 8-32 OL-23389-01...
You can use an SSH client to connect to a switch running the SSH server. The SSH server works with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client also works with the SSH server supported in this release and with non-Cisco SSH servers.
IP domain name by using the ip domain-name global configuration command. When configuring the local authentication and authorization authentication method, make sure that • AAA is disabled on the console. Catalyst 2928 Switch Software Configuration Guide 8-34 OL-23389-01...
Setting Up the Switch to Run SSH Follow these steps to set up your switch to run SSH: Download the cryptographic software image from Cisco.com. This step is required. For more information, see the release notes for this release. Configure a hostname and IP domain name for the switch. Follow this procedure only if you are configuring the switch as an SSH server.
Commands for Displaying the SSH Server Configuration and Status Command Purpose show ip ssh Shows the version and configuration information for the SSH server. show ssh Shows the status of the SSH server. Catalyst 2928 Switch Software Configuration Guide 8-36 OL-23389-01...
(pages) back to the HTTP secure server, which, in turn, responds to the original request. The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response back to the application.
Page 176
X.509v3 certificate from the client. Authenticating the client provides more security than server authentication by itself. For additional information on Certificate Authorities, see the “Configuring Certification Authority Interoperability” chapter in the Cisco IOS Security Configuration Guide, Release 12.2. Catalyst 2928 Switch Software Configuration Guide 8-38...
Configuring the Secure HTTP Server, page 8-41 • Configuring the Secure HTTP Client, page 8-42 • Default SSL Configuration The standard HTTP server is enabled. SSL is enabled. No CA trustpoints are configured. No self-signed certificates are generated. Catalyst 2928 Switch Software Configuration Guide 8-39 OL-23389-01...
RSA key pair. Step 13 Return to privileged EXEC mode. Step 14 show crypto ca trustpoints Verify the configuration. Step 15 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 8-40 OL-23389-01...
Step 10 ip http max-connections value (Optional) Set the maximum number of concurrent connections that are allowed to the HTTP server. The range is 1 to 16; the default value is 5. Catalyst 2928 Switch Software Configuration Guide 8-41 OL-23389-01...
Using this command assumes that you have already configured a CA trustpoint by using the previous procedure. The command is optional if client authentication is not needed or if a primary trustpoint has been configured. Catalyst 2928 Switch Software Configuration Guide 8-42 OL-23389-01...
Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and • Adelman (RSA) key pair. When using SCP, you cannot enter the password into the copy command. You must enter the password Note when prompted. Catalyst 2928 Switch Software Configuration Guide 8-43 OL-23389-01...
A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System (IFS) to and from a switch by using the copy command. An authorized administrator can also do this from a workstation.
Page 183
C H A P T E R Configuring IEEE 802.1x Port-Based Authentication This chapter describes how to configure IEEE 802.1x port-based authentication on the Catalyst 2928 switch. IEEE 802.1x authentication prevents unauthorized devices (clients) from gaining access to the network.
Authentication Protocol (EAP) extensions is the only supported authentication server. It is available in Cisco Secure Access Control Server Version 3.0 or later. RADIUS operates in a client/server model in which secure authentication information is exchanged between the RADIUS server and one or more RADIUS clients.
VLAN that provides limited services if a guest VLAN is configured. Figure 9-2 shows the authentication process. Note Inaccessible authentication bypass, referenced at the bottom of the flow chart, is not supported on the switch. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 186
After IEEE 802.1x authentication using a RADIUS server is configured, the switch uses timers based on the Session-Timeout RADIUS attribute (Attribute[27]) and the Termination-Action RADIUS attribute (Attribute [29]). The Session-Timeout RADIUS attribute (Attribute[27]) specifies the time after which re-authentication occurs. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
The specific exchange of EAP frames depends on the authentication method being used. Figure 9-3 shows a message exchange initiated by the client when the client uses the One-Time-Password (OTP) authentication method with a RADIUS server. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Page 188
MAC authentication bypass. Figure 9-4 Message Exchange During MAC Authentication Bypass Authentication server Client (RADIUS) Switch EAPOL Request/Identity EAPOL Request/Identity EAPOL Request/Identity Ethernet packet RADIUS Access/Request RADIUS Access/Accept Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
The switch detects the client by sending an EAPOL frame when the port link state changes to the up state. If a client leaves or is replaced with another client, the switch changes the port link state to down, and the port returns to the unauthorized state. Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
AV pairs are automatically sent by a switch that is configured for IEEE 802.1x accounting. Three types of RADIUS accounting packets are sent by a switch: START–sent when a new user session starts • INTERIM–sent during an existing session for updates • STOP–sent when a session terminates • Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
You can view the AV pairs that are being sent by the switch by entering the debug radius accounting privileged EXEC command. For more information about this command, see the Cisco IOS Debug Command Reference, Release 12.2 at this URL: http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_reference_book09186a...
Page 192
(type 6). Attribute [81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1x-authenticated user. For examples of tunnel attributes, see the “Configuring the Switch to Use Vendor-Specific RADIUS Attributes” section on page 8-29. Catalyst 2928 Switch Software Configuration Guide 9-10 OL-23389-01...
VLAN if one is specified. For more information, see the“Using IEEE 802.1x Authentication with MAC Authentication Bypass” section on page 9-14. For more information, see the “Configuring a Guest VLAN” section on page 9-28. Catalyst 2928 Switch Software Configuration Guide 9-11 OL-23389-01...
Other port security features such as dynamic ARP Inspection, DHCP snooping, and IP source guard can be configured independently on a restricted VLAN. For more information, see the “Configuring a Restricted VLAN” section on page 9-29. Catalyst 2928 Switch Software Configuration Guide 9-12 OL-23389-01...
If you enable IEEE 802.1x authentication on an access port on which a voice VLAN is configured and Note to which a Cisco IP Phone is connected, the Cisco IP phone loses connectivity to the switch for up to 30 seconds.
During re-authentication, the port remains in the previously assigned VLAN. If re-authentication is successful, the switch keeps the port in the same VLAN. If re-authentication fails, the switch assigns the port to the guest VLAN, if one is configured. Catalyst 2928 Switch Software Configuration Guide 9-14 OL-23389-01...
RADIUS server replies with either an EAP failure or an empty response without an EAP packet. When the port moves into the restricted VLAN, the failed attempt counter resets. Catalyst 2928 Switch Software Configuration Guide 9-15 OL-23389-01...
(0000.0000.0203) on Interface Fa4/0/4 AuditSessionID 160000050000000B288508E5 The session ID is used by the NAD, the AAA server, and other report-analyzing applications to identify the client. The ID appears automatically. No configuration is required. Catalyst 2928 Switch Software Configuration Guide 9-16 OL-23389-01...
MAC authentication bypass Disabled. Beginning with Cisco IOS Release 12.2(55)SE, you can filter out verbose system messages generated by the authentication manager. The filtered content typically relates to authentication success. You can also filter verbose messages for 802.1x authentication and MAB authentication. There is a separate...
Before globally enabling IEEE 802.1x authentication on a switch by entering the dot1x • system-auth-control global configuration command, remove the EtherChannel configuration from the interfaces on which IEEE 802.1x authentication and EtherChannel are configured. Catalyst 2928 Switch Software Configuration Guide 9-19 OL-23389-01...
If the port is in the authorized state, the port remains in this state until re-authorization occurs. • Cisco IOS Release 12.2(55)SE and later supports filtering of verbose MAB system messages. See the “Default IEEE 802.1x Authentication Configuration” section on page 9-17.
Page 203
IEEE 802.1x authentication, and enter interface configuration mode. Step 9 switchport mode access (Optional) Set the port to access mode only if you configured the RADIUS server in Step 6 and Step 7. Catalyst 2928 Switch Software Configuration Guide 9-21 OL-23389-01...
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To delete the specified RADIUS server, use the no radius-server host {hostname | ip-address} global configuration command. Catalyst 2928 Switch Software Configuration Guide 9-22 OL-23389-01...
To disable multiple hosts on the port, use the no dot1x host-mode multi-host interface configuration command. This example shows how to enable IEEE 802.1x authentication and to allow multiple hosts: Switch(config)# interface gigabitethernet/0/1 Switch(config-if)# dot1x port-control auto Switch(config-if)# dot1x host-mode multi-host Switch(config-if)# end Catalyst 2928 Switch Software Configuration Guide 9-23 OL-23389-01...
“Configuring Periodic Re-Authentication” section on page 9-24. This example shows how to manually re-authenticate the client connected to a port: Switch# dot1x re-authenticate interface gigabitethernet0/1 Catalyst 2928 Switch Software Configuration Guide 9-24 OL-23389-01...
Set the number of seconds that the switch waits for a response to an EAP-request/identity frame from the client before resending the request. The range is 5 to 65535 seconds; the default is 5. Catalyst 2928 Switch Software Configuration Guide 9-25 OL-23389-01...
To return to the default retransmission number, use the no dot1x max-req interface configuration command. This example shows how to set 5 as the number of times that the switch sends an EAP-request/identity request before restarting the authentication process: Switch(config-if)# dot1x max-req 5 Catalyst 2928 Switch Software Configuration Guide 9-26 OL-23389-01...
Accounting message %s for session %s failed to receive Accounting Response. When the stop message is not sent successfully, this message appears: 00:09:55: %RADIUS-4-RADIUS_DEAD: RADIUS server 172.20.246.201:1645,1646 is not responding. Catalyst 2928 Switch Software Configuration Guide 9-27 OL-23389-01...
Enter global configuration mode. Step 2 interface interface-id Specify the port to be configured, and enter interface configuration mode. For the supported port types, see the “IEEE 802.1x Authentication Configuration Guidelines” section on page 9-19. Catalyst 2928 Switch Software Configuration Guide 9-28 OL-23389-01...
For the supported port types, see the “IEEE 802.1x Authentication Configuration Guidelines” section. Step 3 switchport mode access Set the port to access mode. Step 4 dot1x port-control auto Enable IEEE 802.1x authentication on the port. Catalyst 2928 Switch Software Configuration Guide 9-29 OL-23389-01...
Page 212
To return to the default value, use the no dot1x auth-fail max-attempts interface configuration command. This example shows how to set 2 as the number of authentication attempts allowed before the port moves to the restricted VLAN: Switch(config-if)# dot1x auth-fail max-attempts 2 Catalyst 2928 Switch Software Configuration Guide 9-30 OL-23389-01...
To configure the port as an IEEE 802.1x port access entity (PAE) authenticator, which enables IEEE 802.1x on the port but does not allow clients connected to the port to be authorized, use the dot1x pae authenticator interface configuration command. Catalyst 2928 Switch Software Configuration Guide 9-31 OL-23389-01...
For detailed information about the fields in these displays, see the command reference for this release. Beginning with Cisco IOS Release 12.2(55)SE, you can use the no dot1x logging verbose global configuration command to filter verbose 802.1x authentication messages. See the “Default IEEE 802.1x...
ARP based trigger—ARP redirect ACL allows web-based authentication to detect hosts with a static • IP address or a dynamic IP address. Dynamic ARP inspection • DHCP snooping—Web-based authentication is notified when the switch creates a DHCP-binding • entry for the host. Catalyst 2928 Switch Software Configuration Guide 10-2 OL-23389-01...
If the terminate action is RADIUS, the feature sends a nonresponsive host (NRH) request to the server. The terminate action is included in the response from the server. • If the terminate action is default, the session is dismantled, and the applied policy is removed. Catalyst 2928 Switch Software Configuration Guide 10-3 OL-23389-01...
You create a banner by using the ip admission auth-proxy-banner http global configuration command. The default banner Cisco Systems and Switch host-name Authentication appear on the Login Page. Cisco Systems appears on the authentication result pop-up page, as shown in Figure 10-2.
Page 219
Figure 10-4. Figure 10-4 Login Screen With No Banner For more information, see the Cisco IOS Security Command Reference and the “Configuring a Web Authentication Local Banner” section on page 10-16. Catalyst 2928 Switch Software Configuration Guide 10-5 OL-23389-01...
You must include an HTML redirect command in the success page to access a specific URL. • The URL string must be a valid URL (for example, http://www.cisco.com). An incomplete URL • might cause page not found or similar errors on a web browser.
You can then limit the number or group of clients that can access the network through the port. For more information about enabling port security, see the “Configuring Port Security” section on page 22-8. Catalyst 2928 Switch Software Configuration Guide 10-7 OL-23389-01...
ACLs If you configure a VLAN ACL or a Cisco IOS ACL on an interface, the ACL is applied to the host traffic only after the web-based authentication host policy is applied. For Layer 2 web-based authentication, you must configure a port ACL (PACL) as the default access policy for ingress traffic from hosts connected to the port.
You must configure the default ACL on the interface before configuring web-based authentication. • Configure a port ACL for a Layer 2 interface or a Cisco IOS ACL for a Layer 3 interface. You cannot authenticate hosts on Layer 2 interfaces with static ARP cache assignment. These hosts •...
This example shows how to enable web-based authentication on Fast Ethernet port 5/1: Switch(config)# ip admission name webauth1 proxy http Switch(config)# interface fastethernet 5/1 Switch(config-if)# ip admission webauth1 Switch(config-if)# exit Switch(config)# ip device tracking Catalyst 2928 Switch Software Configuration Guide 10-10 OL-23389-01...
Switch(config)# aaa authorization auth-proxy default group tacacs+ Configuring Switch-to-RADIUS-Server Communication RADIUS security servers identification: Host name • Host IP address • Host name and specific UDP port numbers • IP address and specific UDP port numbers • Catalyst 2928 Switch Software Configuration Guide 10-11 OL-23389-01...
Page 226
For more information, see Cisco IOS Security Configuration Guide, Release 12.2 and the Cisco IOS Security Command Reference, Release 12.2: http://www.cisco.com/en/US/docs/ios/12_2/security/command/reference/fsecur_r.html...
The device: is flash memory. Step 2 ip admission proxy http success page file Specify the location of the custom HTML file to use in device:success-filename place of the default login success page. Catalyst 2928 Switch Software Configuration Guide 10-13 OL-23389-01...
Page 228
Authentication global absolute time is 0 minutes Authentication global init state time is 2 minutes Authentication Proxy Session ratelimit is 100 Authentication Proxy Watch-list is disabled Authentication Proxy Auditing is disabled Max Login attempts per user is 5 Catalyst 2928 Switch Software Configuration Guide 10-14 OL-23389-01...
To remove the specification of a redirection URL, use the no form of the command. • This example shows how to configure a redirection URL for successful login: Switch(config)# ip admission proxy http success redirect www.cisco.com This example shows how to verify the redirection URL for successful login: Switch# show ip admission configuration...
(Optional) Create a custom banner by entering C banner-text C, where C is a delimiting character or a file-path indicates a file (for example, a logo or text file) that appears in the banner. Catalyst 2928 Switch Software Configuration Guide 10-16 OL-23389-01...
This example shows how to view only the global web-based authentication status: Switch# show authentication sessions This example shows how to view the web-based authentication settings for gigabit interface 3/27: Switch# show authentication sessions interface gigabitethernet 3/27 Catalyst 2928 Switch Software Configuration Guide 10-17 OL-23389-01...
Port number • The Catalyst 2928 switch works with a third-party system that includes a DHCP server, portal server, policy server, RADIUS server, and billing system. Together, the switch and the third-party system implement the binding of the six parameters through a combination of web authentication, DHCP authentication, and IP source guard.
Chapter 11 Configuring Portal-Based Authentication Configuring Portal-Based Authentication Figure 11-1 Catalyst 2928 Switches in a Network Access Control Deployment Third Party Device Portal Server + RADIUS Server + DHCP Server + Policy Server + Accounting + Billing Information Core Layer...
Switch(config)# ip portal-auth secondary-host 192.168.0.252 l4port 8080 Switch(config)# ip portal-auth permit route 192.168.0.0 255.255.0.0 Switch(config)# ip portal-auth Switch(config)# end For additional portal-based authentication show commands, see the “Monitoring Portal-Based Authentication” section on page 11-6. Catalyst 2928 Switch Software Configuration Guide 11-3 OL-23389-01...
Specify the VLAN interface for RADIUS server communication. Step 4 radius-server attribute 8 Include the user IP address in the access request sent to the RADIUS include-in-access-req server. Catalyst 2928 Switch Software Configuration Guide 11-4 OL-23389-01...
Page 237
This example shows how to configure communication between the switch and the RADIUS server. This configuration identifies the RADIUS server by its IP address 192.168.0.252, uses port 1645 as the authorization port and port 1646 as the accounting port, and sets the encryption key to cisco: Switch(config)# ip http server...
Display portal-based authentication user information in brief or detailed format. [detailed] show platform ip portal-auth user Display portal-based authentication user information for the specified interface in interface interface-id [detailed] either brief or detailed format. Catalyst 2928 Switch Software Configuration Guide 11-6 OL-23389-01...
C H A P T E R Configuring Interface Characteristics This chapter defines the types of interfaces on the Catalyst 2928 switch and describes how to configure them. The chapter consists of these sections: Understanding Interface Types, page 12-1 •...
VLAN assigned to the port. If an access port receives a tagged packet (IEEE 802.1Q tagged), the packet is dropped, and the source address is not learned. Catalyst 2928 Switch Software Configuration Guide 12-2...
Catalyst 6500 series switch; the Catalyst 2928 switch cannot be a VMPS server. You can also configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone. For more information about voice VLAN ports, see Chapter 15, “Configuring Voice VLAN.”...
CDP messages for an agreed power-consumption level. The negotiation allows a high-power Cisco powered device, which consumes more than 7 W, to operate at its highest power mode. The powered device first boots up in low-power mode, consumes less than 7 W, and negotiates to obtain enough power to operate in high-power mode.
A Cisco pre-standard powered device does not provide its power requirement when the switch • detects it, so a Catalyst 2928 switch allocates 15.4 W as the initial allocation for power budgeting. The initial power allocation is the maximum amount of power that a powered device requires. The switch initially allocates this amount of power when it detects and powers the powered device.
When PoE is enabled, the switch senses the real-time power consumption of the powered device and monitors the power consumption of the connected powered device; this is called power monitoring or power sensing. The switch also uses the power policing feature to police the power usage. Catalyst 2928 Switch Software Configuration Guide 12-6 OL-23389-01...
Page 245
Configuring Interface Characteristics Understanding Interface Types Power monitoring is backward-compatible with Cisco intelligent power management and CDP-based power consumption. It works with these features to ensure that the PoE port can supply power to the powered device. For more information about these PoE features, see the “Powered-Device Detection and...
Page 246
If it still has power available, the switch then grants power to the PoE ports in auto mode in ascending order of the port numbers. For configuration information, see the “Configuring Power Policing” section on page 12-24. Catalyst 2928 Switch Software Configuration Guide 12-8 OL-23389-01...
10/100/1000 Mb/s Ethernet ports or small form-factor pluggable (SFP) module Gigabit Ethernet interfaces. • Module number—The module or slot number on the switch (always 0 on the Catalyst 2928 switch). Port number—The interface number on the switch. The port numbers always begin at 1, starting with •...
You can use the interface range global configuration command to configure multiple interfaces with the same configuration parameters. When you enter the interface-range configuration mode, all command parameters that you enter are attributed to all interfaces within that range until you exit this mode. Catalyst 2928 Switch Software Configuration Guide 12-10 OL-23389-01...
Page 249
The show running-config privileged EXEC command displays the configured VLAN interfaces. VLAN interfaces not displayed by the show running-config command cannot be used with the interface range command. Catalyst 2928 Switch Software Configuration Guide 12-11 OL-23389-01...
Use the no define interface-range macro_name global configuration command to delete a macro. When using the define interface-range global configuration command, note these guidelines: • Valid entries for interface-range: vlan vlan-ID, where the VLAN ID is 1 to 4094 – Catalyst 2928 Switch Software Configuration Guide 12-12 OL-23389-01...
Page 251
This example shows how to delete the interface-range macro enet_list and to verify that it was deleted. Switch# configure terminal Switch(config)# no define interface-range enet_list Switch(config)# end Switch# show run | include define Switch# Catalyst 2928 Switch Software Configuration Guide 12-13 OL-23389-01...
“Default Storm Control Configuration” section storm control on page 22-3. Protected port Disabled. See the “Configuring Protected Ports” section on page 22-6. Port security Disabled. See the “Default Port Security Configuration” section on page 22-11. Catalyst 2928 Switch Software Configuration Guide 12-14 OL-23389-01...
Disabled on SFP module ports; enabled on all other ports. Setting the Type of a Dual-Purpose Uplink Port Some Catalyst 2928 switches support dual-purpose uplink ports. For more information, see the “Setting the Type of a Dual-Purpose Uplink Port” section on page 12-15.
Page 254
SFP module interface. In all other situations, the switch selects the active link based on which type first links up. The Catalyst 2928 switch operates with 100BASE-x (where -x is -BX, -FX-FE, -LX) SFP modules as follows: When the 100BASE -x SFP module is inserted into the module slot and there is no link on the RJ-45 •...
When STP is enabled and a port is reconfigured, the switch can take up to 30 seconds to check for • loops. The port LED is amber while STP reconfigures. Changing the interface speed and duplex mode configuration might shut down and re-enable the Caution interface during the reconfiguration. Catalyst 2928 Switch Software Configuration Guide 12-17 OL-23389-01...
Switch(config-if)# speed 10 Switch(config-if)# duplex half This example shows how to set the interface speed to 100 Mb/s on a 10/100/1000 Mb/s port: Switch# configure terminal Switch(config)# interface gigabitethernet0/2 Switch(config-if)# speed 100 Catalyst 2928 Switch Software Configuration Guide 12-18 OL-23389-01...
Upon receipt of a pause frame, the sending device stops sending any data packets, which prevents any loss of data packets during the congestion period. Catalyst 2928 ports can receive, but not send, pause frames. Note You use the flowcontrol interface configuration command to set the interface’s ability to receive pause frames to on, off, or desired.
(Optional) Save your entries in the configuration file. To disable auto-MDIX, use the no mdix auto interface configuration command. This example shows how to enable auto-MDIX on a port: Switch# configure terminal Switch(config)# interface gigabitethernet0/1 Catalyst 2928 Switch Software Configuration Guide 12-20 OL-23389-01...
The switch repowers the port only if the powered device is a Class 1, Class 2, or a Cisco-only powered device. Beginning in privileged EXEC mode, follow these steps to configure a power management mode on a...
(CDP) to determine the actual power consumption of the devices, and the switch adjusts the power budget accordingly. The CDP protocol works with Cisco powered devices and does not apply to IEEE third-party powered devices. For these devices, when the switch grants a power request, the switch adjusts the power budget according to the powered-device IEEE classification.
Page 261
Display the power consumption status. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no power inline consumption default global configuration command. Catalyst 2928 Switch Software Configuration Guide 12-23 OL-23389-01...
PoE port: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 interface interface-id Specify the physical port to be configured, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 12-24 OL-23389-01...
Adding a Description for an Interface You can add a description about an interface to help you remember its function. The description appears in the output of these privileged EXEC commands: show configuration show running-config show interfaces. Catalyst 2928 Switch Software Configuration Guide 12-25 OL-23389-01...
SNMP, or Telnet. If Gigabit Ethernet interfaces are configured to accept frames greater than the 10/100 interfaces, jumbo Note frames received on a Gigabit Ethernet interface and sent on a 10/100 interface are dropped. Catalyst 2928 Switch Software Configuration Guide 12-26 OL-23389-01...
(You can display the full list of show commands by using the show ? command at the privileged EXEC prompt.) These commands are fully described in the Cisco IOS Interface Command Reference, Release 12.2. Table 12-4...
Use the no shutdown interface configuration command to restart the interface. To verify that an interface is disabled, enter the show interfaces privileged EXEC command. A disabled interface is shown as administratively down in the display. Catalyst 2928 Switch Software Configuration Guide 12-29 OL-23389-01...
Page 268
Chapter 12 Configuring Interface Characteristics Monitoring and Maintaining the Interfaces Catalyst 2928 Switch Software Configuration Guide 12-30 OL-23389-01...
This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 2928 switch. It includes information about VLAN membership modes, VLAN configuration modes, VLAN trunks, and dynamic VLAN assignment from a VLAN Membership Policy Server (VMPS).
VLAN Configuration Guidelines” section on page 13-5 for more information about the number of spanning-tree instances and the number of VLANs. The switch supports only IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports. Catalyst 2928 Switch Software Configuration Guide 13-2 OL-23389-01...
Dynamic-Access Ports on VMPS Clients” section on page 13-24. Voice VLAN A voice VLAN port is an access port attached to a Cisco VTP is not required; it has no affect on a IP Phone, configured to use one VLAN for voice traffic voice VLAN.
Note This section does not provide configuration details for most of these parameters. For complete information on the commands and parameters that control VLAN configuration, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 13-4 OL-23389-01...
If the switch is a VTP server, you must define a VTP domain or VTP will not function. The switch does not support Token Ring or FDDI media. The switch does not forward FDDI, • FDDI-Net, TrCRF, or TrBRF traffic, but it does propagate the VLAN configuration through VTP. Catalyst 2928 Switch Software Configuration Guide 13-5 OL-23389-01...
If the VLAN database configuration is used at startup and the startup configuration file contains Caution extended-range VLAN configuration, this information is lost when the system boots up. Default Ethernet VLAN Configuration Table 13-2 shows the default configuration for Ethernet VLANs. Catalyst 2928 Switch Software Configuration Guide 13-6 OL-23389-01...
VLAN database. See the “Configuring Extended-Range VLANs” section on page 13-10. For the list of default parameters that are assigned when you add a VLAN, see the “Configuring Normal-Range VLANs” section on page 13-4. Catalyst 2928 Switch Software Configuration Guide 13-7 OL-23389-01...
Token Ring VLANs 1002 to 1005. Caution When you delete a VLAN, any ports assigned to that VLAN become inactive. They remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN. Catalyst 2928 Switch Software Configuration Guide 13-8 OL-23389-01...
This example shows how to configure a port as an access port in VLAN 2: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitethernet0/1 Catalyst 2928 Switch Software Configuration Guide 13-9 OL-23389-01...
STP is enabled by default on extended-range VLANs, but you can disable it by using the no • spanning-tree vlan vlan-id global configuration command. When the maximum number of spanning-tree instances are on the switch, spanning tree is disabled on any newly created VLANs. Catalyst 2928 Switch Software Configuration Guide 13-10 OL-23389-01...
To delete an extended-range VLAN, use the no vlan vlan-id global configuration command. The procedure for assigning static-access ports to an extended-range VLAN is the same as for normal-range VLANs. See the “Assigning Static-Access Ports to a VLAN” section on page 13-9. Catalyst 2928 Switch Software Configuration Guide 13-11 OL-23389-01...
A trunk is a point-to-point link between one or more Ethernet switch interfaces and another networking device such as a router or a switch. Ethernet trunks carry the traffic of multiple VLANs over a single link, and you can extend the VLANs across an entire network. The Catalyst 2928 switch supports IEEE 802.1Q encapsulation.
VLAN allowed on the trunks. Non-Cisco devices might support one spanning-tree instance for all VLANs. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch combines the spanning-tree instance of the VLAN of the trunk with the spanning-tree instance of the non-Cisco IEEE 802.1Q switch.
STP port priority for each VLAN. – STP Port Fast setting. – trunk status: if one port in a port group ceases to be a trunk, all ports cease to be trunks. Catalyst 2928 Switch Software Configuration Guide 13-14 OL-23389-01...
This example shows how to configure a port as an IEEE 802.1Q trunk. The example assumes that the neighbor interface is configured to support IEEE 802.1Q trunking. Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# interface gigabitethernet0/2 Catalyst 2928 Switch Software Configuration Guide 13-15 OL-23389-01...
VLANs from the allowed list. VLAN 1 is the default VLAN on all trunk ports in all Cisco switches, and it has previously been a Note requirement that VLAN 1 always be enabled on every trunk link. You can use the VLAN 1 minimization feature to disable VLAN 1 on any individual VLAN trunk link so that no user traffic (including spanning-tree advertisements) is sent or received on VLAN 1.
A trunk port configured with IEEE 802.1Q tagging can receive both tagged and untagged traffic. By default, the switch forwards untagged traffic in the native VLAN configured for the port. The native VLAN is VLAN 1 by default. Catalyst 2928 Switch Software Configuration Guide 13-17 OL-23389-01...
VLAN is forwarding traffic for that VLAN. The trunk port with the lower priority (higher values) for the same VLAN remains in a blocking state for that VLAN. One trunk port sends or receives all traffic for the VLAN. Catalyst 2928 Switch Software Configuration Guide 13-18 OL-23389-01...
Page 287
Repeat Steps 7 through 10 on Switch A for a second port in the switch. Step 13 Repeat Steps 7 through 10 on Switch B to configure the trunk ports that connect to the trunk ports configured on Switch A. Catalyst 2928 Switch Software Configuration Guide 13-19 OL-23389-01...
Multiple hosts (MAC addresses) can be active on a dynamic-access port if they are all in the same VLAN; however, the VMPS shuts down a dynamic-access port if more than 20 hosts are active on the port. Catalyst 2928 Switch Software Configuration Guide 13-22 OL-23389-01...
• The VTP management domain of the VMPS client and the VMPS server must be the same. • The VLAN configured on the VMPS server should not be a voice VLAN. • Catalyst 2928 Switch Software Configuration Guide 13-23 OL-23389-01...
Enter global configuration mode. Step 2 interface interface-id Specify the switch port that is connected to the end station, and enter interface configuration mode. Step 3 switchport mode access Set the port to access mode. Catalyst 2928 Switch Software Configuration Guide 13-24 OL-23389-01...
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no vmps reconfirm global configuration command. Catalyst 2928 Switch Software Configuration Guide 13-25 OL-23389-01...
This is an example of output for the show vmps privileged EXEC command: Switch# show vmps VQP Client Status: -------------------- VMPS VQP Version: Reconfirm Interval: 60 min Server Retry Count: 3 VMPS domain server: 172.20.128.86 (primary, current) 172.20.128.87 Reconfirmation status --------------------- VMPS Action: other Catalyst 2928 Switch Software Configuration Guide 13-26 OL-23389-01...
The Catalyst 6500 series Switch C and Switch J are secondary VMPS servers. • End stations are connected to the clients, Switch B and Switch I. • The database configuration file is stored on the TFTP server with the IP address 172.20.22.7. Catalyst 2928 Switch Software Configuration Guide 13-27 OL-23389-01...
Page 296
172.20.26.154 Switch E 172.20.26.155 Switch F 172.20.26.156 Switch G 172.20.26.157 Switch H Client switch I Dynamic-access port 172.20.26.158 station 2 Trunk port 172.20.26.159 Catalyst 6500 series Secondary VMPS Switch J Server 3 Catalyst 2928 Switch Software Configuration Guide 13-28 OL-23389-01...
Configuring VTP This chapter describes how to use the VLAN Trunking Protocol (VTP) and the VLAN database for managing VLANs with the Catalyst 2928 switch. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release.
For domain name and password configuration guidelines, see the “VTP Configuration Guidelines” section on page 14-7. Catalyst 2928 Switch Software Configuration Guide 14-2 OL-23389-01...
Otherwise, the switch cannot receive any VTP advertisements. For more information on trunk ports, see “Configuring VLAN Trunks” section on page 13-12. VTP advertisements distribute this global domain information: VTP domain name • VTP configuration revision number • Update identity and update timestamp • Catalyst 2928 Switch Software Configuration Guide 14-3 OL-23389-01...
Only VLANs included in the pruning-eligible list can be pruned. By default, VLANs 2 through 1001 are pruning eligible switch trunk ports. If the VLANs are configured as pruning-ineligible, the flooding continues. VTP pruning is supported with VTP Version 1 and Version 2. Catalyst 2928 Switch Software Configuration Guide 14-4 OL-23389-01...
Page 301
Enabling VTP pruning on a VTP server enables pruning for the entire management domain. Making VLANs pruning-eligible or pruning-ineligible affects pruning eligibility for those VLANs on that trunk only (not on all switches in the VTP domain). Catalyst 2928 Switch Software Configuration Guide 14-5 OL-23389-01...
VTP advertisements until you configure it with the correct password. After the configuration, the switch accepts the next VTP advertisement that uses the same password and domain name in the advertisement. Catalyst 2928 Switch Software Configuration Guide 14-7 OL-23389-01...
When a switch is in VTP server mode, you can change the VLAN configuration and have it propagated throughout the network. Note If extended-range VLANs are configured on the switch, you cannot change VTP mode to server. You receive an error message, and the configuration is not allowed. Catalyst 2928 Switch Software Configuration Guide 14-8 OL-23389-01...
(vlan.dat). If the switch is then powered off, it resets the VTP configuration to the default. To keep the VTP configuration with VTP client mode after the switch restarts, you must first configure the VTP domain name before the VTP mode. Catalyst 2928 Switch Software Configuration Guide 14-9 OL-23389-01...
In the VTP V2 Mode field of the display, verify that VTP Version 2 is enabled. To disable VTP Version 2, use the no vtp version global configuration command. Catalyst 2928 Switch Software Configuration Guide 14-11 OL-23389-01...
If you add a switch that has a revision number higher than the revision number in the VTP domain, it can erase all VLAN information from the VTP server and VTP domain. Catalyst 2928 Switch Software Configuration Guide 14-12...
Page 309
You can use the vtp mode transparent global configuration command or the vtp transparent VLAN Note database configuration command to disable VTP on the switch, and then change its VLAN information without affecting the other switches in the VTP domain. Catalyst 2928 Switch Software Configuration Guide 14-13 OL-23389-01...
EXEC commands for monitoring VTP activity. Table 14-3 VTP Monitoring Commands Command Purpose show vtp status Display the VTP switch configuration information. show vtp counters Display counters about VTP messages that have been sent and received. Catalyst 2928 Switch Software Configuration Guide 14-14 OL-23389-01...
The voice VLAN feature enables access ports to carry IP voice traffic from an IP phone. When the switch is connected to a Cisco 7960 IP Phone, the phone sends voice traffic with Layer 3 IP precedence and Layer 2 class of service (CoS) values, which are both set to 5 by default. Because the sound quality of an IP phone call can deteriorate if the data is unevenly sent, the switch supports quality of service (QoS) based on IEEE 802.1p CoS.
Cisco IP Phone Voice Traffic You can configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and another VLAN for data traffic from a device attached to the phone. You can configure access ports on...
For more information, see Chapter 31, “Configuring QoS.” You must enable CDP on the switch port connected to the Cisco IP Phone to send the configuration • to the phone. (CDP is globally enabled by default on all switch interfaces.) •...
Configuring Voice VLAN Configuring Voice VLAN If the Cisco IP Phone and a device attached to the phone are in the same VLAN, they must be in the • same IP subnet. These conditions indicate that they are in the same VLAN: –...
Configuring Cisco IP Phone Voice Traffic You can configure a port connected to the Cisco IP Phone to send CDP packets to the phone to configure the way in which the phone sends voice traffic. The phone can carry voice traffic in IEEE 802.1Q frames for a specified voice VLAN with a Layer 2 CoS value.
To return the port to its default setting, use the no switchport voice vlan interface configuration command. Displaying Voice VLAN To display voice VLAN configuration for an interface, use the show interfaces interface-id switchport privileged EXEC command. Catalyst 2928 Switch Software Configuration Guide 15-6 OL-23389-01...
This chapter describes how to configure the Spanning Tree Protocol (STP) on port-based VLANs on the Catalyst 2928 switch. The switch can use either the per-VLAN spanning-tree plus (PVST+) protocol based on the IEEE 802.1D standard and Cisco proprietary extensions, or the rapid per-VLAN spanning-tree plus (rapid-PVST+) protocol based on the IEEE 802.1w standard.
The stable, active spanning-tree topology of a switched network is controlled by these elements: The unique bridge ID (switch priority and MAC address) associated with each VLAN on each • switch. The spanning-tree path cost to the root switch. • Catalyst 2928 Switch Software Configuration Guide 16-2 OL-23389-01...
VLAN. Each VLAN on the switch has a unique 8-byte bridge ID. The 2 most-significant bytes are used for the switch priority, and the remaining 6 bytes are derived from the switch MAC address. Catalyst 2928 Switch Software Configuration Guide 16-3...
From initialization to blocking • From blocking to listening or to disabled • From listening to learning or to disabled • From learning to forwarding or to disabled • From forwarding to disabled • Catalyst 2928 Switch Software Configuration Guide 16-4 OL-23389-01...
An interface in the blocking state performs these functions: Discards frames received on the interface • Discards frames switched from another interface for forwarding • Does not learn addresses • • Receives BPDUs Catalyst 2928 Switch Software Configuration Guide 16-5 OL-23389-01...
A disabled interface performs these functions: • Discards frames received on the interface Discards frames switched from another interface for forwarding • Does not learn addresses • Does not receive BPDUs • Catalyst 2928 Switch Software Configuration Guide 16-6 OL-23389-01...
If one link is high-speed and the other is low-speed, the low-speed link is always disabled. If the speeds are the same, the port priority and port ID are added together, and spanning tree disables the link with the lowest value. Catalyst 2928 Switch Software Configuration Guide 16-7 OL-23389-01...
A spanning-tree reconfiguration on one VLAN can cause the dynamic addresses learned on that VLAN to be subject to accelerated aging. Dynamic addresses on other VLANs can be unaffected and remain subject to the aging interval entered for the switch. Catalyst 2928 Switch Software Configuration Guide 16-8 OL-23389-01...
Spanning-Tree Modes and Protocols The switch supports these spanning-tree modes and protocols: PVST+—This spanning-tree mode is based on the IEEE 802.1D standard and Cisco proprietary • extensions. It is the default spanning-tree mode used on all Ethernet port-based VLANs. The PVST+ runs on each VLAN on the switch up to the maximum supported, ensuring that each has a loop-free path through the network.
VLAN allowed on the trunks. When you connect a Cisco switch to a non-Cisco device through an IEEE 802.1Q trunk, the Cisco switch uses PVST+ to provide spanning-tree interoperability. If rapid PVST+ is enabled, the switch uses it instead of PVST+.
“Optional Spanning-Tree Configuration Guidelines” section on page 18-10. Caution Loop guard works only on point-to-point links. We recommend that each end of the link has a directly connected device that is running STP. Catalyst 2928 Switch Software Configuration Guide 16-12 OL-23389-01...
(Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree mode global configuration command. To return the port to its default setting, use the no spanning-tree link-type interface configuration command. Catalyst 2928 Switch Software Configuration Guide 16-13 OL-23389-01...
ID support will become the root switch. The extended system ID increases the switch priority value every time the VLAN number is greater than the priority of the connected switches running older software. Catalyst 2928 Switch Software Configuration Guide 16-14 OL-23389-01...
Page 331
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id root global configuration command. Catalyst 2928 Switch Software Configuration Guide 16-15 OL-23389-01...
(higher numerical values) that you want selected last. If all interfaces have the same priority value, spanning tree puts the interface with the lowest interface number in the forwarding state and blocks the other interfaces. Catalyst 2928 Switch Software Configuration Guide 16-16 OL-23389-01...
Page 333
To return to the default setting, use the no spanning-tree [vlan vlan-id] port-priority interface configuration command. For information on how to configure load sharing on trunk ports by using spanning-tree port priorities, see the “Configuring Trunk Ports for Load Sharing” section on page 13-18. Catalyst 2928 Switch Software Configuration Guide 16-17 OL-23389-01...
The show spanning-tree interface interface-id privileged EXEC command displays information only for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC command to confirm the configuration. Catalyst 2928 Switch Software Configuration Guide 16-18 OL-23389-01...
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id priority global configuration command. Catalyst 2928 Switch Software Configuration Guide 16-19 OL-23389-01...
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id hello-time global configuration command. Catalyst 2928 Switch Software Configuration Guide 16-20 OL-23389-01...
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return to the default setting, use the no spanning-tree vlan vlan-id max-age global configuration command. Catalyst 2928 Switch Software Configuration Guide 16-21 OL-23389-01...
You can clear spanning-tree counters by using the clear spanning-tree [interface interface-id] privileged EXEC command. For information about other keywords for the show spanning-tree privileged EXEC command, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 16-22 OL-23389-01...
C H A P T E R Configuring MSTP This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the Catalyst 2928 switch. The multiple spanning-tree (MST) implementation in Cisco IOS Release 12.2(44)SE is based on the Note IEEE 802.1s standard.
M-records, which are encapsulated within MSTP BPDUs. Because the MSTP BPDU carries information for all instances, the number of BPDUs that need to be processed to support multiple spanning-tree instances is significantly reduced. Catalyst 2928 Switch Software Configuration Guide 17-2 OL-23389-01...
The IST connects all the MSTP switches in the region and appears as a subtree in the CIST that encompasses the entire switched domain. The root of the subtree is the CIST regional root. The MST region appears as a virtual switch to adjacent STP switches and MST regions. Catalyst 2928 Switch Software Configuration Guide 17-3 OL-23389-01...
Page 342
VLAN cost, and port VLAN priority) can be configured on both the CST instance and the MST instance. MSTP switches use Version 3 RSTP BPDUs or IEEE 802.1D STP BPDUs to communicate with legacy IEEE 802.1D switches. MSTP switches use MSTP BPDUs to communicate with MSTP switches. Catalyst 2928 Switch Software Configuration Guide 17-4 OL-23389-01...
Understanding MSTP IEEE 802.1s Terminology Some MST naming conventions used in Cisco’s prestandard implementation have been changed to identify some internal or regional parameters. These parameters are significant only within an MST region, as opposed to external parameters that are relevant to the whole network. Because the CIST is the only spanning-tree instance that spans the whole network, only the CIST parameters require the external rather than the internal or regional qualifiers.
The primary change from the Cisco prestandard implementation is that a designated port is not defined as boundary, unless it is running in an STP-compatible mode.
Detecting Unidirectional Link Failure This feature is not yet present in the IEEE MST standard, but it is included in this Cisco IOS release. The software checks the consistency of the port role and state in the received BPDUs to detect unidirectional link failures that could cause bridging loops.
Rapid Convergence, page 17-9 • Synchronization of Port Roles, page 17-11 • Bridge Protocol Data Unit Format and Processing, page 17-12 • For configuration information, see the “Configuring MSTP Features” section on page 17-13. Catalyst 2928 Switch Software Configuration Guide 17-8 OL-23389-01...
Disabled Disabled Discarding To be consistent with Cisco STP implementations, this guide defines the port state as blocking instead of discarding. Designated ports start in the listening state. Rapid Convergence The RSTP provides for rapid recovery of connectivity following the failure of a switch, a switch port, or a LAN.
Page 348
Proposal and Agreement Handshaking for Rapid Convergence Switch A Switch B Proposal Designated Root switch Agreement Designated Switch C switch Root Proposal Designated Root switch Agreement DP = designated port RP = root port F = forwarding Catalyst 2928 Switch Software Configuration Guide 17-10 OL-23389-01...
RSTP sets the port to the blocking state but does not send the agreement message. The designated port continues sending BPDUs with the proposal flag set until the forward-delay timer expires, at which time the port transitions to the forwarding state. Catalyst 2928 Switch Software Configuration Guide 17-12 OL-23389-01...
• For two or more switches to be in the same MST region, they must have the same VLAN-to-instance map, the same configuration revision number, and the same name. Catalyst 2928 Switch Software Configuration Guide 17-14 OL-23389-01...
Beginning in privileged EXEC mode, follow these steps to specify the MST region configuration and enable MSTP. This procedure is required. Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 spanning-tree mst configuration Enter MST configuration mode. Catalyst 2928 Switch Software Configuration Guide 17-15 OL-23389-01...
Page 354
1, display the pending configuration, apply the changes, and return to global configuration mode: Switch(config)# spanning-tree mst configuration Switch(config-mst)# instance 1 vlan 10-20 Switch(config-mst)# name region1 Switch(config-mst)# revision 1 Switch(config-mst)# show pending Pending MST configuration Name [region1] Revision Catalyst 2928 Switch Software Configuration Guide 17-16 OL-23389-01...
After configuring the switch as the root switch, we recommend that you avoid manually configuring the Note hello time, forward-delay time, and maximum-age time through the spanning-tree mst hello-time, spanning-tree mst forward-time, and the spanning-tree mst max-age global configuration commands. Catalyst 2928 Switch Software Configuration Guide 17-17 OL-23389-01...
You can execute this command on more than one switch to configure multiple backup root switches. Use the same network diameter and hello-time values that you used when you configured the primary root switch with the spanning-tree mst instance-id root primary global configuration command. Catalyst 2928 Switch Software Configuration Guide 17-18 OL-23389-01...
Enter global configuration mode. Step 2 interface interface-id Specify an interface to configure, and enter interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces. The port-channel range is 1 to 6. Catalyst 2928 Switch Software Configuration Guide 17-19 OL-23389-01...
Enter global configuration mode. Step 2 interface interface-id Specify an interface to configure, and enter interface configuration mode. Valid interfaces include physical ports and port-channel logical interfaces. The port-channel range is 1 to 6. Catalyst 2928 Switch Software Configuration Guide 17-20 OL-23389-01...
Exercise care when using this command. For most situations, we recommend that you use the Note spanning-tree mst instance-id root primary and the spanning-tree mst instance-id root secondary global configuration commands to modify the switch priority. Catalyst 2928 Switch Software Configuration Guide 17-21 OL-23389-01...
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no spanning-tree mst hello-time global configuration command. Catalyst 2928 Switch Software Configuration Guide 17-22 OL-23389-01...
Verify your entries. Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file. To return the switch to its default setting, use the no spanning-tree mst max-age global configuration command. Catalyst 2928 Switch Software Configuration Guide 17-23 OL-23389-01...
Verify your entries. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. To return the port to its default setting, use the no spanning-tree link-type interface configuration command. Catalyst 2928 Switch Software Configuration Guide 17-24 OL-23389-01...
To restart the protocol migration process (force the renegotiation with neighboring switches) on the switch, use the clear spanning-tree detected-protocols privileged EXEC command. To restart the protocol migration process on a specific interface, use the clear spanning-tree detected-protocols interface interface-id privileged EXEC command. Catalyst 2928 Switch Software Configuration Guide 17-25 OL-23389-01...
Displays MST information for the specified instance. show spanning-tree mst interface interface-id Displays MST information for the specified interface. For information about other keywords for the show spanning-tree privileged EXEC command, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 17-26 OL-23389-01...
C H A P T E R Configuring Optional Spanning-Tree Features This chapter describes how to configure optional spanning-tree features on the Catalyst 2928 switch. You can configure all of these features when your switch is running the per-VLAN spanning-tree plus (PVST+).
To prevent the port from shutting down, you can use the errdisable detect cause bpduguard shutdown vlan global configuration command to shut down just the offending VLAN on the port where the violation occurred. Catalyst 2928 Switch Software Configuration Guide 18-2 OL-23389-01...
Switches in hierarchical networks can be grouped into backbone switches, distribution switches, and access switches. Figure 18-2 shows a complex network where distribution switches and access switches each have at least one redundant link that spanning tree blocks to prevent loops. Catalyst 2928 Switch Software Configuration Guide 18-3 OL-23389-01...
Page 368
Switch B over link L1 and to Switch C over link L2. The Layer 2 interface on Switch C that is connected directly to Switch B is in a blocking state. Catalyst 2928 Switch Software Configuration Guide 18-4...
(an indirect link) has failed (that is, the designated switch has lost its connection to the root switch). Under spanning-tree rules, the switch ignores inferior BPDUs for the configured maximum aging time specified by the spanning-tree vlan vlan-id max-age global configuration command. Catalyst 2928 Switch Software Configuration Guide 18-5 OL-23389-01...
Page 370
Switch B to Switch A. The root-switch election takes approximately 30 seconds, twice the Forward Delay time if the default Forward Delay time of 15 seconds is set. Figure 18-6 shows how BackboneFast reconfigures the topology to account for the failure of link L1. Catalyst 2928 Switch Software Configuration Guide 18-6 OL-23389-01...
If the switch detects a misconfiguration on the other device, EtherChannel guard places the switch interfaces in the error-disabled state, and displays an error message. You can enable this feature by using the spanning-tree etherchannel guard misconfig global configuration command. Catalyst 2928 Switch Software Configuration Guide 18-7 OL-23389-01...
Desired root switch Enable the root-guard feature on these interfaces to prevent switches in the customer network from becoming the root switch or being in the path to the root. Catalyst 2928 Switch Software Configuration Guide 18-8 OL-23389-01...
By default, Port Fast is disabled on all interfaces. Step 4 Return to privileged EXEC mode. Step 5 show spanning-tree interface interface-id Verify your entries. portfast Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 18-10 OL-23389-01...
Enable the Port Fast feature. Step 5 Return to privileged EXEC mode. Step 6 show running-config Verify your entries. Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 18-11 OL-23389-01...
To disable BPDU filtering, use the no spanning-tree portfast bpdufilter default global configuration command. You can override the setting of the no spanning-tree portfast bpdufilter default global configuration command by using the spanning-tree bpdufilter enable interface configuration command. Catalyst 2928 Switch Software Configuration Guide 18-12 OL-23389-01...
If you use BackboneFast, you must enable it on all switches in the network. BackboneFast is not Note supported on Token Ring VLANs. This feature is supported for use with third-party switches. Catalyst 2928 Switch Software Configuration Guide 18-13 OL-23389-01...
EXEC command to verify the EtherChannel configuration. After the configuration is corrected, enter the shutdown and no shutdown interface configuration commands on the port-channel interfaces that were misconfigured. Catalyst 2928 Switch Software Configuration Guide 18-14 OL-23389-01...
Beginning in privileged EXEC mode, follow these steps to enable loop guard. This procedure is optional. Command Purpose Step 1 show spanning-tree active Verify which interfaces are alternate or root ports. show spanning-tree mst Step 2 configure terminal Enter global configuration mode. Catalyst 2928 Switch Software Configuration Guide 18-15 OL-23389-01...
You can clear spanning-tree counters by using the clear spanning-tree [interface interface-id] privileged EXEC command. For information about other keywords for the show spanning-tree privileged EXEC command, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 18-16 OL-23389-01...
Configuring DHCP Features and IP Source Guard Features This chapter describes how to configure DHCP snooping and option-82 data insertion, and the DHCP server port-based address allocation features on the Catalyst 2928 switch. It also describes how to configure the IP source guard feature. Note To use the IP source guard feature, the switch must be running the LAN Base image.
For information about the DHCP client, see the “Configuring DHCP” section of the “IP Addressing and Services” section of the Cisco IOS IP Configuration Guide, Release 12.2 from the Cisco.com page under Documentation > Cisco IOS Software > 12.2 Mainline > Configuration Guides.
Page 383
The port on the edge switch that connects to the aggregation switch must be configured as a trusted interface. Catalyst 2928 Switch Software Configuration Guide 19-3 OL-23389-01...
If the IP address of the relay agent is configured, the switch adds this IP address in the DHCP packet. • The switch forwards the DHCP request that includes the option-82 field to the DHCP server. • Catalyst 2928 Switch Software Configuration Guide 19-4 OL-23389-01...
Page 385
The switch uses the packet formats when you globally enable DHCP snooping and enter the ip dhcp snooping information option global configuration command. Catalyst 2928 Switch Software Configuration Guide 19-5 OL-23389-01...
Page 386
The length values are variable, depending on the length of the string that you configure. – Remote-ID suboption fields • – The remote-ID type is 1. – The length values are variable, depending on the length of the string that you configure. Catalyst 2928 Switch Software Configuration Guide 19-6 OL-23389-01...
If the file is not updated in a specified time (set by the write-delay and abort-timeout values), the update stops. Catalyst 2928 Switch Software Configuration Guide 19-7...
DHCP snooping MAC address verification Enabled DHCP snooping binding database agent Enabled in Cisco IOS software, requires configuration. This feature is operational only when a destination is configured. 1. The switch responds to DHCP requests only if it is configured as a DHCP server.
To disable the DHCP server and relay agent, use the no service dhcp global configuration command. See the “Configuring DHCP” section of the “IP Addressing and Services” section of the Cisco IOS IP Configuration Guide, Release 12.2 from the Cisco.com page under Documentation > Cisco IOS Software >...
Step 11 Return to privileged EXEC mode. Step 12 show running-config Verify your entries. Step 13 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 19-11 OL-23389-01...
The vlan-id range is from 1 to 4904. The seconds range is from interface-id expiry seconds 1 to 4294967295. Enter this command for each entry that you add. Note Use this command when you are testing or debugging the switch. Catalyst 2928 Switch Software Configuration Guide 19-12 OL-23389-01...
DHCP snooping. A port access control list (ACL) is applied to the interface. The port ACL allows only IP traffic with a source IP address in the IP source binding table and denies all other traffic. Catalyst 2928 Switch Software Configuration Guide 19-13 OL-23389-01...
IP or non-IP packet matches a valid IP source binding, the switch forwards the packet. The switch drops all other types of packets except DHCP packets. The switch uses port security to filter source MAC addresses. The interface can shut down when a port-security violation occurs. Catalyst 2928 Switch Software Configuration Guide 19-14 OL-23389-01...
Enabling IP Source Guard Begin in privileged EXEC mode. Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 interface interface-id Specify the interface to be configured, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 19-16 OL-23389-01...
(Optional) Activate port security for this port. Step 9 switchport port-security maximum value (Optional) Establish a maximum of MAC addresses for this port. Step 10 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 19-18 OL-23389-01...
Page 399
Switch(config)# interface gigabitethernet 0/3 Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan 1 Switch(config-if)# ip device tracking maximum 5 Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security maximum 5 Switch(config-if)# ip verify source tracking port-security Switch(config-if)# end Catalyst 2928 Switch Software Configuration Guide 19-19 OL-23389-01...
Page 400
GigabitEthernet 0/1 are marked as inactive. Switch# show ip device tracking all inactive IP Device Tracking = Enabled IP Device Tracking Probe Count = 3 IP Device Tracking Probe Interval = 30 --------------------------------------------------------------------- Catalyst 2928 Switch Software Configuration Guide 19-20 OL-23389-01...
DHCP would offer the same IP address to the replacement device. Control, monitoring, and other software expect a stable IP address associated with each device. If a device is replaced, the address assignment should remain stable even though the DHCP client has changed. Catalyst 2928 Switch Software Configuration Guide 19-21 OL-23389-01...
In all cases, by connecting the Ethernet cable to the same port, the same IP address is allocated through DHCP to the attached device. The DHCP server port-based address allocation feature is only supported on a Cisco IOS DHCP server and not a third-party server.
DHCP address pool. Step 4 address ip-address client-id string [ascii] Reserve an IP address for a DHCP client identified by the interface name. string—can be an ASCII value or a hexadecimal value. Catalyst 2928 Switch Software Configuration Guide 19-23 OL-23389-01...
Page 404
1 subnet is currently in the pool: Current index IP address range Leased/Excluded/Total 10.1.1.1 10.1.1.1 - 10.1.1.254 / 4 / 254 1 reserved address is currently in the pool Address Client 10.1.1.7 Et1/0 Catalyst 2928 Switch Software Configuration Guide 19-24 OL-23389-01...
Displaying DHCP Server Port-Based Address Allocation For more information about configuring the DHCP server port-based address allocation feature, go to Cisco.com, and enter Cisco IOS IP Addressing Services in the Search field to access the Cisco IOS software documentation. You can also access the documentation: http://www.cisco.com/en/US/docs/ios/ipaddr/command/reference/iad_book.html...
Page 406
Chapter 19 Configuring DHCP Features and IP Source Guard Features Displaying DHCP Server Port-Based Address Allocation Catalyst 2928 Switch Software Configuration Guide 19-26 OL-23389-01...
This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 2928 switch. This feature helps prevent malicious attacks on the switch by not relaying invalid ARP requests and responses to other ports in the same VLAN.
Page 408
MAC addresses in the body of the ARP packets do not match the addresses specified in the Ethernet header. Use the ip arp inspection validate {[src-mac] [dst-mac] [ip]} global configuration command. For more information, see the “Performing Validation Checks” section on page 20-11. Catalyst 2928 Switch Software Configuration Guide 20-2 OL-23389-01...
However, to validate the bindings of packets from nondynamic ARP inspection switches, configure the switch running dynamic ARP inspection with ARP ACLs. When you cannot determine such bindings, at Layer 3, isolate switches Catalyst 2928 Switch Software Configuration Guide 20-3 OL-23389-01...
You specify the type of packets that are logged by using the ip arp inspection vlan logging global configuration command. For configuration information, see the “Configuring the Log Buffer” section on page 20-12. Catalyst 2928 Switch Software Configuration Guide 20-4 OL-23389-01...
The number of entries in the log is 32. The number of system messages is limited to 5 per second. The logging-rate interval is 1 second. Per-VLAN logging All denied or dropped ARP packets are logged. Catalyst 2928 Switch Software Configuration Guide 20-5 OL-23389-01...
VLANs. You also can use the ip arp inspection limit none interface configuration command to make the rate unlimited. A high rate-limit on one VLAN can cause a denial-of-service attack to other VLANs when the software places the port in the error-disabled state. Catalyst 2928 Switch Software Configuration Guide 20-6 OL-23389-01...
VLANs separated by a comma. The range is 1 to 4094. Specify the same VLAN ID for both switches. Step 4 interface interface-id Specify the interface connected to the other switch, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 20-7 OL-23389-01...
VLAN 1. If the IP address of Host 2 is not static (it is impossible to apply the ACL configuration on Switch A) you must separate Switch A from Switch B at Layer 3 and use a router to route packets between them. Catalyst 2928 Switch Software Configuration Guide 20-8 OL-23389-01...
Page 415
ACL. Packets are permitted only if the access list permits them. Step 6 interface interface-id Specify the Switch A interface that is connected to Switch B, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 20-9 OL-23389-01...
After you configure the rate limit, the interface retains the rate limit even when its trust state is changed. If you enter the no ip arp inspection limit interface configuration command, the interface reverts to its default rate limit. Catalyst 2928 Switch Software Configuration Guide 20-10 OL-23389-01...
Dynamic ARP inspection intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. You can configure the switch to perform additional checks on the destination MAC address, the sender and target IP addresses, and the source MAC address. Catalyst 2928 Switch Software Configuration Guide 20-11 OL-23389-01...
A log-buffer entry can represent more than one packet. For example, if an interface receives many packets on the same VLAN with the same ARP parameters, the switch combines the packets as one entry in the log buffer and generates a single system message for the entry. Catalyst 2928 Switch Software Configuration Guide 20-12 OL-23389-01...
Page 419
The logs and interval settings interact. If the logs number X is greater than interval seconds Y, X divided by Y (X/Y) system messages are sent every second. Otherwise, one system message is sent every Y divided by X (Y/X) seconds. Catalyst 2928 Switch Software Configuration Guide 20-13 OL-23389-01...
Displays the configuration and the operating state of dynamic ARP inspection for the specified VLAN. If no VLANs are specified or if a range is specified, displays information only for VLANs with dynamic ARP inspection enabled (active). Catalyst 2928 Switch Software Configuration Guide 20-14 OL-23389-01...
Page 421
Clears the dynamic ARP inspection log buffer. show ip arp inspection log Displays the configuration and contents of the dynamic ARP inspection log buffer. For more information about these commands, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 20-15 OL-23389-01...
For complete syntax and usage information for the commands used in this chapter, see the switch Note command reference for this release and the “IP Multicast Routing Commands” section in the Cisco IOS IP Command Reference, Volume 3 of 3:Multicast, Release 12.2.
IGMP snooping feature on IGMPv2 or IGMPv1 hosts. IGMPv3 join and leave messages are not supported on switches running IGMP filtering. Note Catalyst 2928 Switch Software Configuration Guide 21-2 OL-23389-01...
Table 21-1, that includes the port numbers connected to Host 1 and the router. Table 21-1 IGMP Snooping Forwarding Table Destination Address Type of Packet Ports 224.1.2.3 IGMP 1, 2 Catalyst 2928 Switch Software Configuration Guide 21-3 OL-23389-01...
If the router receives no reports from a VLAN, it removes the group for the VLAN from its IGMP cache. Catalyst 2928 Switch Software Configuration Guide 21-4 OL-23389-01...
IGMPv2, and IGMPv3 reports for a group to the multicast devices. If you disable IGMP report suppression, all IGMP reports are forwarded to the multicast routers. For configuration steps, see the “Disabling IGMP Report Suppression” section on page 21-14. Catalyst 2928 Switch Software Configuration Guide 21-5 OL-23389-01...
VLANs, but can be enabled and disabled on a per-VLAN basis. Global IGMP snooping overrides the VLAN IGMP snooping. If global snooping is disabled, you cannot enable VLAN snooping. If global snooping is enabled, you can enable or disable VLAN snooping. Catalyst 2928 Switch Software Configuration Guide 21-6 OL-23389-01...
Snooping on IGMP queries, Protocol Independent Multicast (PIM) packets, and Distance Vector • Multicast Routing Protocol (DVMRP) packets Listening to Cisco Group Management Protocol (CGMP) packets from other routers • Statically connecting to a multicast router port with the ip igmp snooping mrouter global •...
The VLAN ID range is 1 to 1001 and 1006 to 4094. • The interface can be a physical interface or a port channel. • The port-channel range is 1 to 6. Step 3 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 21-8 OL-23389-01...
When you enable IGMP Immediate Leave, the switch immediately removes a port when it detects an IGMP Version 2 leave message on that port. You should only use the Immediate-Leave feature when there is a single receiver present on every port in the VLAN. Catalyst 2928 Switch Software Configuration Guide 21-9 OL-23389-01...
(Optional) Configure the IGMP leave time on the VLAN interface. The last-member-query-interval time range is 100 to 5000 milliseconds. Configuring the leave time on a VLAN overrides the globally Note configured timer. Step 4 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 21-10 OL-23389-01...
(Optional) Save your entries in the configuration file. To return to the default flooding query count, use the no ip igmp snooping tcn flood query count global configuration command. Catalyst 2928 Switch Software Configuration Guide 21-11 OL-23389-01...
Verify the TCN settings. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. To re-enable multicast flooding on an interface, use the ip igmp snooping tcn flood interface configuration command. Catalyst 2928 Switch Software Configuration Guide 21-12 OL-23389-01...
(Optional) Verify that the IGMP snooping querier is enabled on the VLAN interface. The VLAN ID range is 1 to 1001 and 1006 to 4094. Step 10 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 21-13 OL-23389-01...
You can display IGMP snooping information for dynamically learned and statically configured router ports and VLAN interfaces. You can also display MAC address multicast entries for a VLAN configured for IGMP snooping. Catalyst 2928 Switch Software Configuration Guide 21-14 OL-23389-01...
Page 437
IGMP query message in the VLAN and the configuration and operational state of the IGMP snooping querier in the VLAN. For more information about the keywords and options in these commands, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 21-15 OL-23389-01...
Default IGMP Filtering and Throttling Configuration Table 21-5 shows the default IGMP filtering configuration. Table 21-5 Default IGMP Filtering Configuration Feature Default Setting IGMP filters None applied IGMP maximum number of IGMP groups No maximum set Catalyst 2928 Switch Software Configuration Guide 21-16 OL-23389-01...
Step 5 Return to privileged EXEC mode. Step 6 show ip igmp profile profile number Verify the profile configuration. Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 21-17 OL-23389-01...
To remove a profile from an interface, use the no ip igmp filter profile number interface configuration command. This example shows how to apply IGMP profile 4 to a port: Switch(config)# interface gigabitethernet0/2 Switch(config-if)# ip igmp filter 4 Switch(config-if)# end Catalyst 2928 Switch Software Configuration Guide 21-18 OL-23389-01...
• to an EtherChannel port group. • When the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups action {deny | replace} command has no effect. Catalyst 2928 Switch Software Configuration Guide 21-19 OL-23389-01...
You can display IGMP profile characteristics, and you can display the IGMP profile and maximum group configuration for all interfaces on the switch or for a specified interface. You can also display the IGMP throttling configuration for all interfaces on the switch or for a specified interface. Catalyst 2928 Switch Software Configuration Guide 21-20 OL-23389-01...
Page 443
Displays the configuration of the specified interface or the configuration of all interfaces interface-id] on the switch, including (if configured) the maximum number of IGMP groups to which an interface can belong and the IGMP profile applied to the interface. Catalyst 2928 Switch Software Configuration Guide 21-21 OL-23389-01...
C H A P T E R Configuring Port-Based Traffic Control This chapter describes how to configure the port-based traffic control features on the Catalyst 2928 switch. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release.
Page 446
When the storm control threshold for multicast traffic is reached, all multicast traffic except control Note traffic, such as bridge protocol data unit (BDPU) and Cisco Discovery Protocol (CDP) frames, are blocked. The graph in Figure 22-1 shows broadcast traffic patterns on an interface over a given period of time.
Beginning in privileged EXEC mode, follow these steps to storm control and threshold levels: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 interface interface-id Specify the interface to be configured, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 22-3 OL-23389-01...
Page 448
Select the shutdown keyword to error-disable the port during • a storm. Select the trap keyword to generate an SNMP trap when a • storm is detected. Step 5 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 22-4 OL-23389-01...
(Optional) Configure the recovery time for error-disabled ports to be automatically re-enabled after they are error disabled by the arrival of small frames Step 5 interface interface-id Enter interface configuration mode, and specify the interface to be configured. Catalyst 2928 Switch Software Configuration Guide 22-5 OL-23389-01...
You can configure protected ports on a physical interface (for example, Gigabit Ethernet port 1) or an EtherChannel group (for example, port-channel 5). When you enable protected ports for a port channel, it is enabled for all ports in the port-channel group. Catalyst 2928 Switch Software Configuration Guide 22-6 OL-23389-01...
The interface can be a physical interface or an EtherChannel group. When you block multicast or unicast traffic for a port channel, it is blocked on all ports in the port-channel group. Catalyst 2928 Switch Software Configuration Guide 22-7 OL-23389-01...
MAC addresses allowed in the system. This number is the total of available MAC addresses, including those used for other Layer 2 functions and any other secure MAC addresses configured on interfaces. Catalyst 2928 Switch Software Configuration Guide 22-9 OL-23389-01...
1. Packets with unknown source addresses are dropped until you remove a sufficient number of secure MAC addresses. 2. The switch returns an error message if you manually configure an address that would cause a security violation. 3. Shuts down only the VLAN on which the violation occurred. Catalyst 2928 Switch Software Configuration Guide 22-10 OL-23389-01...
IP phone requires one MAC address. The Cisco IP phone address is learned on the voice VLAN, but is not learned on the access VLAN. If you connect a single PC to the Cisco IP phone, no additional MAC addresses are required. If you connect more than one PC to the Cisco IP phone, you must configure enough secure addresses to allow one for each PC and one for the phone.
(dynamic auto) cannot be configured as a secure port. Step 4 switchport voice vlan vlan-id Enable voice VLAN on a port. vlan-id—Specify the VLAN to be used for voice traffic. Step 5 switchport port-security Enable port security on the interface. Catalyst 2928 Switch Software Configuration Guide 22-12 OL-23389-01...
Page 457
The voice keyword is available only if a voice VLAN is configured on a port and if that port is not the access VLAN. If an interface is configured for voice VLAN, configure a maximum of two secure MAC addresses. Catalyst 2928 Switch Software Configuration Guide 22-13 OL-23389-01...
Page 458
You can manually re-enable it by entering the shutdown and no shutdown interface configuration commands or by using the clear errdisable interface vlan privileged EXEC command. Catalyst 2928 Switch Software Configuration Guide 22-14 OL-23389-01...
Page 459
VLAN. Step 11 Return to privileged EXEC mode. Step 12 show port-security Verify your entries. Step 13 copy running-config (Optional) Save your entries in the configuration file. startup-config Catalyst 2928 Switch Software Configuration Guide 22-15 OL-23389-01...
[interface interface-id] address Displays all secure MAC addresses configured on all switch interfaces or on a specified interface with aging information for each address. show port-security interface interface-id vlan Displays the number of secure MAC addresses configured per VLAN on the specified interface. Catalyst 2928 Switch Software Configuration Guide 22-18 OL-23389-01...
• Understanding CDP CDP is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches) and allows network management applications to discover Cisco devices that are neighbors of already known devices. With CDP, network management applications can learn the device type and the Simple Network Management Protocol (SNMP) agent address of neighboring devices running lower-layer, transparent protocols.
Enter global configuration mode. Step 2 cdp timer seconds (Optional) Set the transmission frequency of CDP updates in seconds. The range is 5 to 254; the default is 60 seconds. Catalyst 2928 Switch Software Configuration Guide 23-2 OL-23389-01...
23-5. Disabling and Enabling CDP CDP is enabled by default. Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Note Disabling CDP can interrupt cluster discovery and device connectivity. For more information, see Chapter 5, “Clustering Switches.”...
(Optional) Save your entries in the configuration file. This example shows how to enable CDP on a port when it has been disabled. Switch# configure terminal Switch(config)# interface gigabitethernet0/1 Switch(config-if)# cdp enable Switch(config-if)# end Catalyst 2928 Switch Software Configuration Guide 23-4 OL-23389-01...
You can limit the display to neighbors of a specific interface or expand the display to provide more detailed information. show cdp traffic Display CDP counters, including the number of packets sent and received and checksum errors. Catalyst 2928 Switch Software Configuration Guide 23-5 OL-23389-01...
Understanding LLDP and LLDP-MED LLDP The Cisco Discovery Protocol (CDP) is a device discovery protocol that runs over Layer 2 (the data link layer) on all Cisco-manufactured devices (routers, bridges, access servers, and switches). CDP allows network management applications to automatically discover and learn about other Cisco devices connected to the network.
Provides location information from the switch to the endpoint device. The location TLV can send this information: Civic location information – Provides the civic address information and postal information. Examples of civic location information are street address, road name, and postal community name information. Catalyst 2928 Switch Software Configuration Guide 24-2 OL-23389-01...
This way the interface has the voice or voice-signaling VLAN network-policy profile applied on the interface. • You cannot configure static secure MAC addresses on an interface that has a network-policy profile. Catalyst 2928 Switch Software Configuration Guide 24-3 OL-23389-01...
You can also select the LLDP and LLDP-MED TLVs to send and receive. Beginning in privileged EXEC mode, follow these steps to configure these characteristics: Steps 2 through 5 are all optional and can be performed in any order. Note Catalyst 2928 Switch Software Configuration Guide 24-4 OL-23389-01...
By using the lldp interface configuration command, you can configure the interface not to send the TLVs listed in Table 24-2. Table 24-2 LLDP-MED TLVs LLDP-MED TLV Description inventory-management LLDP-MED inventory management TLV location LLDP-MED location TLV Catalyst 2928 Switch Software Configuration Guide 24-5 OL-23389-01...
Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 network-policy profile profile Specify the network-policy profile number, and enter network-policy number configuration mode. The range is 1 to 4294967295. Catalyst 2928 Switch Software Configuration Guide 24-6 OL-23389-01...
Page 475
Switch(config-if)# lldp med-tlv-select network-policy This example shows how to configure the voice application type for the native VLAN with priority tagging: Switch(config-network-policy)# voice vlan dot1p cos 4 Switch(config-network-policy)# voice vlan dot1p dscp 34 Catalyst 2928 Switch Software Configuration Guide 24-7 OL-23389-01...
Display LLDP counters, including the number of packets sent and received, number of packets discarded, and number of unrecognized TLVs. show location Display the location information for an endpoint. show network-policy profile Display the configured network-policy profiles. Catalyst 2928 Switch Software Configuration Guide 24-8 OL-23389-01...
A unidirectional link occurs whenever traffic sent by a local device is received by its neighbor but traffic from the neighbor is not received by the local device. Catalyst 2928 Switch Software Configuration Guide 25-1 OL-23389-01...
Because this behavior is the same on all UDLD neighbors, the sender of the echoes expects to receive an echo in reply. Catalyst 2928 Switch Software Configuration Guide 25-2 OL-23389-01...
When configuring the mode (normal or aggressive), make sure that the same mode is configured on • both sides of the link. Caution Loop guard works only on point-to-point links. We recommend that each end of the link has a directly connected device that is running STP. Catalyst 2928 Switch Software Configuration Guide 25-4 OL-23389-01...
UDLD on a port: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 interface interface-id Specify the port to be enabled for UDLD, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 25-5 OL-23389-01...
To display the UDLD status for the specified port or for all ports, use the show udld [interface-id] privileged EXEC command. For detailed information about the fields in the command output, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 25-6 OL-23389-01...
C H A P T E R Configuring SPAN This chapter describes how to configure Switched Port Analyzer (SPAN) and on the Catalyst 2928 switch. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release.
You can have multiple destination ports in a SPAN session, but no more than 64 destination ports. • • You can configure two separate SPAN source sessions with separate or overlapping sets of SPAN source ports and VLANs. Catalyst 2928 Switch Software Configuration Guide 26-2 OL-23389-01...
The default configuration for local SPAN session ports is to send all packets untagged. SPAN also does not normally monitor bridge protocol data unit (BPDU) packets and Layer 2 protocols, such as Cisco Discovery Protocol (CDP), VLAN Trunk Protocol (VTP), Dynamic Trunking Protocol (DTP), Spanning Tree Protocol (STP), and Port Aggregation Protocol (PAgP).
• You cannot use filter VLANs in the same session with VLAN sources. • You can monitor only Ethernet VLANs. Catalyst 2928 Switch Software Configuration Guide 26-4 OL-23389-01...
A destination port that belongs to a source VLAN of any SPAN session is excluded from the source • list and is not monitored. The maximum number of destination ports in a switch is 64. • Catalyst 2928 Switch Software Configuration Guide 26-5 OL-23389-01...
SPAN destination port; however, IEEE 802.1x is disabled until the port is removed as a SPAN destination. For SPAN sessions, do not enable IEEE 802.1x on ports with monitored egress when ingress forwarding is enabled on the destination port. Catalyst 2928 Switch Software Configuration Guide 26-6 OL-23389-01...
Entering SPAN configuration commands does not remove previously configured SPAN parameters. • You must enter the no monitor session {session_number | all | local} global configuration command to delete configured SPAN parameters. Catalyst 2928 Switch Software Configuration Guide 26-7 OL-23389-01...
{session_number | all | Remove any existing SPAN configuration for the session. local} For session_number, the range is 1 to 66. Specify all to remove all SPAN sessions and local to remove all local sessions. Catalyst 2928 Switch Software Configuration Guide 26-8 OL-23389-01...
Page 491
If not selected, the default is to send packets in native form (untagged). You can use monitor session session_number destination Note command multiple times to configure multiple destination ports. Catalyst 2928 Switch Software Configuration Guide 26-9 OL-23389-01...
VLANs and the destination ports, and to enable incoming traffic on the destination port for a network security device (such as a Cisco IDS Sensor Appliance). For details about the keywords not related to incoming traffic, see the “Creating a Local SPAN Session”...
(Optional) Use a comma (,) to specify a series of VLANs, or use a hyphen (-) to specify a range of VLANs. Enter a space before and after the comma; enter a space before and after the hyphen. Catalyst 2928 Switch Software Configuration Guide 26-12 OL-23389-01...
Switch(config)# end Displaying SPAN Status To display the current SPAN configuration, use the show monitor user EXEC command. You can also use the show running-config privileged EXEC command to display configured SPAN sessions. Catalyst 2928 Switch Software Configuration Guide 26-13 OL-23389-01...
C H A P T E R Configuring RMON This chapter describes how to configure Remote Network Monitoring (RMON) on the Catalyst 2928 switch. RMON is a standard monitoring specification that defines a set of statistics and functions that can be exchanged between RMON-compliant console systems and network probes.
• Configuring RMON Alarms and Events, page 27-3 (required) • Collecting Group History Statistics on an Interface, page 27-5 (optional) • Collecting Group Ethernet Statistics on an Interface, page 27-5 (optional) • Catalyst 2928 Switch Software Configuration Guide 27-2 OL-23389-01...
-2147483648 to 2147483647. (Optional) For event-number, specify the event • number to trigger when the rising or falling threshold exceeds its limit. (Optional) For owner string, specify the owner • of the alarm. Catalyst 2928 Switch Software Configuration Guide 27-3 OL-23389-01...
Page 500
This example also generates an SNMP trap when the event is triggered. Switch(config)# rmon event 1 log trap eventtrap description "High ifOutErrors" owner jjones Catalyst 2928 Switch Software Configuration Guide 27-4 OL-23389-01...
This procedure is optional. Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 interface interface-id Specify the interface on which to collect statistics, and enter interface configuration mode. Catalyst 2928 Switch Software Configuration Guide 27-5 OL-23389-01...
Displays the RMON statistics table. For information about the fields in these displays, see the “System Management Commands” section in the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. Catalyst 2928 Switch Software Configuration Guide 27-6 OL-23389-01...
This chapter describes how to configure system message logging on the Catalyst 2928 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2. Understanding System Message Logging, page 28-1 •...
Table 28-4 on page 28-13. severity Single-digit code from 0 to 7 that is the severity of the message. For a description of the severity levels, see Table 28-3 on page 28-9. Catalyst 2928 Switch Software Configuration Guide 28-2 OL-23389-01...
Message logging is enabled by default. It must be enabled to send messages to any destination other than the console. When enabled, log messages are sent to a logging process, which logs messages to designated locations asynchronously to the processes that generated the messages. Catalyst 2928 Switch Software Configuration Guide 28-3 OL-23389-01...
Use the show memory privileged EXEC command to view the free processor memory on the switch. However, this value is the maximum available, and the buffer size should not be set to this amount. Catalyst 2928 Switch Software Configuration Guide 28-4 OL-23389-01...
You can also configure the maximum number of buffers for storing asynchronous messages for the terminal after which messages are dropped. Catalyst 2928 Switch Software Configuration Guide 28-5 OL-23389-01...
Page 508
(Optional) Save your entries in the configuration file. To disable synchronization of unsolicited messages and debug output, use the no logging synchronous [level severity-level | all] [limit number-of-buffers] line configuration command. Catalyst 2928 Switch Software Configuration Guide 28-6 OL-23389-01...
To disable logging to the console, use the no logging console global configuration command. To disable logging to a terminal other than the console, use the no logging monitor global configuration command. To disable logging to syslog servers, use the no logging trap global configuration command. Catalyst 2928 Switch Software Configuration Guide 28-8 OL-23389-01...
Change the default level of syslog messages stored in the history file and sent to the SNMP server. Table 28-3 on page 28-9 for a list of level keywords. By default, warnings, errors, critical, alerts, and emergencies messages are sent. Catalyst 2928 Switch Software Configuration Guide 28-9 OL-23389-01...
[end-number] | statistics} [provisioning] privileged EXEC command to display the complete configuration log or the log for specified parameters. The default is that configuration logging is disabled. For information about the commands, see the Cisco IOS Configuration Fundamentals and Network Management Command Reference, Release 12.3 T at this URL: http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_command_reference_chapter0918 6a00801a8086.html#wp1114989...
Add a line such as the following to the file /etc/syslog.conf: Step 1 cisco.log local7.debug /usr/adm/logs/ Catalyst 2928 Switch Software Configuration Guide 28-11 OL-23389-01...
To remove a syslog server, use the no logging host global configuration command, and specify the syslog server IP address. To disable logging to syslog servers, enter the no logging trap global configuration command. Catalyst 2928 Switch Software Configuration Guide 28-12 OL-23389-01...
Displaying the Logging Configuration To display the logging configuration and the contents of the log buffer, use the show logging privileged EXEC command. For information about the fields in this display, see the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2.
Page 516
Chapter 28 Configuring System Message Logging Displaying the Logging Configuration Catalyst 2928 Switch Software Configuration Guide 28-14 OL-23389-01...
Catalyst 2928 switch. For complete syntax and usage information for the commands used in this chapter, see the command Note reference for this release and the Cisco IOS Network Management Command Reference, Release 12.4 from the Cisco.com page at this URL: http://www.cisco.com/en/US/docs/ios/netmgmt/command/reference/nm_book.html •...
A combination of the security level and the security model determine which security mechanism is used when handling an SNMP packet. Available security models are SNMPv1, SNMPv2C, and SNMPv3. Catalyst 2928 Switch Software Configuration Guide 29-2 OL-23389-01...
1. With this operation, an SNMP manager does not need to know the exact variable name. A sequential search is performed to find the needed variable from within a table. 2. The get-bulk command only works with SNMPv2 or later. Catalyst 2928 Switch Software Configuration Guide 29-3 OL-23389-01...
(@esN, where N is the switch number) to the first configured RW and RO community strings on the command switch and propagates them to the member switches. For more information, see Chapter 5, “Clustering Switches” and see Getting Started with Cisco Network Assistant, available on Cisco.com. Using SNMP to Access MIB Variables An example of an NMS is the CiscoWorks network management software.
2 an ifIndex value of 10003, this value is the same after the switch reboots. The switch uses one of the values in Table 29-3 to assign an ifIndex value to an interface: Table 29-3 ifIndex Values Interface Type ifIndex Range 1–4999 EtherChannel 5000–5012 Loopback 5013–5077 Catalyst 2928 Switch Software Configuration Guide 29-5 OL-23389-01...
SNMP notification type If no type is specified, all notifications are sent. 1. This is the default when the switch starts and the startup configuration does not have any snmp-server global configuration commands. Catalyst 2928 Switch Software Configuration Guide 29-6 OL-23389-01...
The no snmp-server global configuration command disables all running versions (Version 1, Version 2C, and Version 3) on the device. No specific Cisco IOS command exists to enable SNMP. The first snmp-server global configuration command that you enter enables all versions of SNMP.
Place ones in the bit positions that you want to ignore. Recall that the access list is always terminated by an implicit deny statement for everything. Step 4 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 29-8 OL-23389-01...
If you select remote, specify the ip-address of the device that • contains the remote copy of SNMP and the optional User Datagram Protocol (UDP) port on the remote device. The default is 162. Catalyst 2928 Switch Software Configuration Guide 29-9 OL-23389-01...
Page 526
64 characters) that is the name of the view in which you specify a notify, inform, or trap. • (Optional) Enter access access-list with a string (not to exceed 64 characters) that is the name of the access list. Catalyst 2928 Switch Software Configuration Guide 29-10 OL-23389-01...
A trap manager is a management station that receives and processes traps. Traps are system alerts that the switch generates when certain events occur. By default, no trap manager is defined, and no traps are sent. Switches running this Cisco IOS release can have an unlimited number of trap managers. Catalyst 2928 Switch Software Configuration Guide...
Page 528
Generates a trap for Open Shortest Path First (OSPF) changes. You can enable any or all of these traps: Cisco specific, errors, link-state advertisement, rate limit, retransmit, and state changes. Generates a trap for Protocol-Independent Multicast (PIM) changes. You can enable any or all of these traps: invalid PIM messages, neighbor changes, and rendezvous point (RP)-mapping changes.
Page 530
(for traps and informs). To enable a host to receive an inform, you must configure an snmp-server host informs command for the host and globally enable informs by using the snmp-server enable traps command. Catalyst 2928 Switch Software Configuration Guide 29-14 OL-23389-01...
Limit TFTP servers used for configuration file copies through access-list-number SNMP to the servers in the access list. For access-list-number, enter an IP standard access list numbered from 1 to 99 and 1300 to 1999. Catalyst 2928 Switch Software Configuration Guide 29-15 OL-23389-01...
This example shows how to allow read-only access for all objects to members of access list 4 that use the comaccess community string. No other SNMP managers have access to any objects. SNMP Authentication Failure traps are sent by SNMPv2C to the host cisco.com using the community string public.
Switch(config)# snmp-server enable traps entity Switch(config)# snmp-server host cisco.com restricted entity This example shows how to enable the switch to send all traps to the host myhost.cisco.com using the community string public: Switch(config)# snmp-server enable traps Switch(config)# snmp-server host myhost.cisco.com public...
ACLs on all packets it forwards. On the Catalyst 2928 switch, you attach ACLs to VLAN interfaces to filter traffic to and from the CPU. You configure access lists to provide basic security for your network. If you do not configure ACLs, all packets passing through the switch could be allowed onto all parts of the network.
With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses. You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and a MAC access list to the interface. Catalyst 2928 Switch Software Configuration Guide 30-2 OL-23389-01...
ACEs were checking different hosts. Configuring IPv4 ACLs Configuring IP v4ACLs on the switch is the same as configuring IPv4 ACLs on other Cisco switches and routers. The process is briefly described here. For more detailed information on configuring ACLs, see the “Configuring IP Services”...
Access List Numbers Access List Number Type Supported 1–99 IP standard access list 100–199 IP extended access list 200–299 Protocol type-code access list 300–399 DECnet access list 400–499 XNS standard access list Catalyst 2928 Switch Software Configuration Guide 30-5 OL-23389-01...
0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard. The keyword host as an abbreviation for source and • source-wildcard of source 0.0.0.0. (Optional) The source-wildcard applies wildcard bits to the source. Catalyst 2928 Switch Software Configuration Guide 30-6 OL-23389-01...
(ospf), Payload Compression Protocol (pcp), Protocol Independent Multicast (pim), Transmission Control Protocol (tcp), or User Datagram Protocol (udp). Note ICMP echo-reply cannot be filtered. All other ICMP codes or types can be filtered. Catalyst 2928 Switch Software Configuration Guide 30-7 OL-23389-01...
Page 542
Configuring IPv4 ACLs For more details on the specific keywords for each protocol, see these command references: Cisco IOS IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.2 • Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols, Release 12.2 •...
Page 543
[precedence precedence] [tos tos] an abbreviation for a destination and destination wildcard of 0.0.0.0 [fragments] [time-range 255.255.255.255. time-range-name] [dscp dscp] You can use the any keyword in place of source and destination address and wildcard. Catalyst 2928 Switch Software Configuration Guide 30-9 OL-23389-01...
Page 544
TCP port. To see TCP port names, use the ? or see the “Configuring IP Services” section in the “IP Addressing and Services” chapter of the Cisco IOS IP Configuration Guide, Release 12.2. Use only TCP port numbers or names when filtering TCP.
Page 545
ICMP message type and code name. To see a list of ICMP message type names and code names, use the ?, or see the “Configuring IP Services” section of the Cisco IOS IP Configuration Guide, Release 12.2. Step access-list access-list-number (Optional) Define an extended IGMP access list and the access conditions.
• host source—A source and source wildcard of source 0.0.0.0. permit {source [source-wildcard] | host source any—A source and source wildcard of 0.0.0.0 • | any} 255.255.255.255. Catalyst 2928 Switch Software Configuration Guide 30-12 OL-23389-01...
Page 547
Being able to selectively remove lines from a named ACL is one reason you might use named ACLs instead of numbered ACLs. After creating a named ACL, you can apply it to interfaces (see the “Applying an IPv4 ACL to a VLAN Interface” section on page 30-16). Catalyst 2928 Switch Software Configuration Guide 30-13 OL-23389-01...
This example shows how to configure time ranges for workhours and to configure January 1, 2006, as a company holiday and to verify your configuration. Switch(config)# time-range workhours Switch(config-time-range)# periodic weekdays 8:00 to 12:00 Switch(config-time-range)# periodic weekdays 13:00 to 17:00 Switch(config-time-range)# exit Catalyst 2928 Switch Software Configuration Guide 30-14 OL-23389-01...
Smith is not allowed access: Switch(config)# access-list 1 remark Permit only Jones workstation through Switch(config)# access-list 1 permit 171.69.2.88 Switch(config)# access-list 1 remark Do not allow Smith through Switch(config)# access-list 1 deny 171.69.3.13 Catalyst 2928 Switch Software Configuration Guide 30-15 OL-23389-01...
(SNMP, Telnet, SSH, and so on). ACLs attached to VLAN interfaces do not impact the hardware switching of packets on the VLAN. When controlling access to a VLAN interface, you can use a named or numbered ACL. • Catalyst 2928 Switch Software Configuration Guide 30-16 OL-23389-01...
When you enter the show ip access-lists privileged EXEC command, the match count displayed does not account for packets that are access controlled in hardware. Use the show access-lists hardware counters privileged EXEC command to obtain some basic hardware ACL statistics for switched packets. Catalyst 2928 Switch Software Configuration Guide 30-17 OL-23389-01...
This section provides examples of configuring and applying IPv4 ACLs. For detailed information about compiling ACLs, see the Cisco IOS Security Configuration Guide, Release 12.2 and to the Configuring IP Services” section in the “IP Addressing and Services” chapter of the Cisco IOS IP Configuration Guide, Release 12.2.
TCP traffic. It permits any other IP traffic. Switch(config)# ip access-list extended marketing_group Switch(config-ext-nacl)# permit tcp any 171.69.0.0 0.0.255.255 eq telnet Switch(config-ext-nacl)# deny tcp any any Switch(config-ext-nacl)# permit ip any any Switch(config-ext-nacl)# exit Catalyst 2928 Switch Software Configuration Guide 30-19 OL-23389-01...
In this example of a named ACL, the Jones subnet is not allowed to use outbound Telnet: Switch(config)# ip access-list extended telnetting Switch(config-ext-nacl)# remark Do not allow Jones subnet to telnet out Switch(config-ext-nacl)# deny tcp 171.69.0.0 0.0.255.255 any eq telnet Catalyst 2928 Switch Software Configuration Guide 30-20 OL-23389-01...
[interface interface-id] Displays the contents of the configuration file for the switch or the specified interface, including all configured MAC and IP access lists and which access groups are applied to an interface. Catalyst 2928 Switch Software Configuration Guide 30-21 OL-23389-01...
This chapter describes how to configure quality of service (QoS) by using standard QoS commands on the Catalyst 2928 switch. With QoS, you can provide preferential treatment to certain types of traffic at the expense of others. Without QoS, the switch offers best-effort service to each packet, regardless of the packet contents or size.
Page 558
Implementing QoS in your network can be a simple or complex task and depends on the QoS features offered by your internetworking devices, the traffic types and patterns in your network, and the granularity of control that you need over incoming and outgoing traffic. Catalyst 2928 Switch Software Configuration Guide 31-2 OL-23389-01...
During classification, the switch performs a lookup and assigns a QoS label to the packet. The QoS label identifies all QoS actions to be performed on the packet and from which queue the packet is sent. Catalyst 2928 Switch Software Configuration Guide 31-3...
Figure 31-4 Queueing Flowchart for Ingress Ports Shaped round robin (SRR) services the priority queue for its configured share before servicing the other Note queue. Catalyst 2928 Switch Software Configuration Guide 31-4 OL-23389-01...
All traffic exiting the switch flows through one of these four queues and is subjected to a threshold based on the QoS label assigned to the packet. Catalyst 2928 Switch Software Configuration Guide 31-5...
QoS processing. • You are likely to lose data when you change queue settings; therefore, try to make changes when traffic is at a minimum. Catalyst 2928 Switch Software Configuration Guide 31-8 OL-23389-01...
QoS domain can be configured to one of the trusted states because there is no need to classify the packets at every switch within the QoS domain. Figure 31-6 shows a sample network topology. Catalyst 2928 Switch Software Configuration Guide 31-9 OL-23389-01...
Page 566
CoS value is 0. Step 4 Return to privileged EXEC mode. Step 5 show mls qos interface Verify your entries. Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file. Catalyst 2928 Switch Software Configuration Guide 31-10 OL-23389-01...
DSCP field in an incoming packet, and the DSCP field in the outgoing packet is based on the QoS configuration, including the port trust setting, policing and marking, and the DSCP-to-DSCP mutation map. Catalyst 2928 Switch Software Configuration Guide 31-11 OL-23389-01...
Mapping CoS Values to an Ingress Queue You can prioritize traffic by placing packets with particular CoSs into certain queues and adjusting the queue thresholds so that packets with lower priorities are dropped. Catalyst 2928 Switch Software Configuration Guide 31-12 OL-23389-01...
Then, SRR shares the remaining bandwidth with both ingress queues and services them as specified by the weights configured with the mls qos srr-queue input bandwidth weight1 weight2 global configuration command. Catalyst 2928 Switch Software Configuration Guide 31-13 OL-23389-01...
• Does the bandwidth of the port need to be rate limited? • How often should the egress queues be serviced and which technique (shaped, shared, or both) • should be used? Catalyst 2928 Switch Software Configuration Guide 31-14 OL-23389-01...
3 is predefined. It is set to the queue-full state. • For cos1...cos8, enter up to eight values, and separate each value with a space. The range is 0 to 7. Step 3 Return to privileged EXEC mode. Catalyst 2928 Switch Software Configuration Guide 31-15 OL-23389-01...
To disable the egress expedite queue, use the no priority-queue out interface configuration command. This example shows how to enable the egress expedite queue. Switch(config)# interface gigabitethernet0/1 Switch(config-if)# priority-queue out Switch(config-if)# end Catalyst 2928 Switch Software Configuration Guide 31-16 OL-23389-01...
[cos-input-q | cos-output-q] Display QoS mapping information. show mls qos vlan vlan-id Display the policy maps attached to the specified SVI. show running-config | include rewrite Display the CoS transparency setting. Catalyst 2928 Switch Software Configuration Guide 31-17 OL-23389-01...
Page 574
Chapter 31 Configuring QoS Displaying Standard QoS Information Catalyst 2928 Switch Software Configuration Guide 31-18 OL-23389-01...
C H A P T E R Configuring EtherChannels This chapter describes how to configure EtherChannels on Layer 2 ports on the Catalyst 2928 switch. EtherChannel provides fault-tolerant high-speed links between switches, routers, and servers. You can use it to increase the bandwidth between the wiring closets and the data center, and you can deploy it anywhere in the network where bottlenecks are likely to occur.
EtherChannel, and the failed link. Inbound broadcast and multicast packets on one link in an EtherChannel are blocked from returning on any other link of the EtherChannel. Catalyst 2928 Switch Software Configuration Guide 32-2 OL-23389-01...
To change the parameters of all ports in an EtherChannel, apply configuration commands to the port-channel interface, for example, spanning-tree commands or commands to configure a Layer 2 EtherChannel as a trunk. Catalyst 2928 Switch Software Configuration Guide 32-3 OL-23389-01...
Understanding EtherChannels Port Aggregation Protocol The Port Aggregation Protocol (PAgP) is a Cisco-proprietary protocol that can be run only on Cisco switches and on those switches licensed by vendors to support PAgP. PAgP facilitates the automatic creation of EtherChannels by exchanging PAgP packets between Ethernet ports.
Link Aggregation Control Protocol The LACP is defined in IEEE 802.3ad and enables Cisco switches to manage Ethernet channels between switches that conform to the IEEE 802.3ad protocol. LACP facilitates the automatic creation of EtherChannels by exchanging LACP packets between Ethernet ports.
With source-and-destination MAC-address forwarding, packets sent from host A to host B, host A to host C, and host C to host B could all use different ports in the channel. Catalyst 2928 Switch Software Configuration Guide 32-6 OL-23389-01...
Page 581
MAC address, using the destination-MAC address always chooses the same link in the channel. Using source addresses or IP addresses might result in better load balancing. Catalyst 2928 Switch Software Configuration Guide 32-7...
After you configure an EtherChannel, configuration changes applied to the port-channel interface apply Note to all the physical ports assigned to the port-channel interface, and configuration changes applied to the physical port affect only the port where you apply the configuration. Catalyst 2928 Switch Software Configuration Guide 32-8 OL-23389-01...
Spanning-tree path cost for each VLAN – Spanning-tree port priority for each VLAN – Spanning-tree Port Fast setting – Do not configure a port to be a member of more than one EtherChannel group. • Catalyst 2928 Switch Software Configuration Guide 32-9 OL-23389-01...
For a LACP EtherChannel, you can configure up to 16 Ethernet ports of the same type. Up to eight ports can be active, and up to eight ports can be in standby mode. Catalyst 2928 Switch Software Configuration Guide 32-10 OL-23389-01...
Page 585
Verify your entries. Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file. To remove a port from the EtherChannel group, use the no channel-group interface configuration command. Catalyst 2928 Switch Software Configuration Guide 32-11 OL-23389-01...
When the link partner of the Catalyst 2928 switch is a physical learner (such as a Catalyst 1900 series switch), we recommend that you configure the Catalyst 2928 switch as a physical-port learner by using the pagp learn-method physical-port interface configuration command.
In priority comparisons, numerically lower values have higher priority. The priority decides which ports should be put in standby mode when there is a hardware limitation that prevents all compatible ports from aggregating. Catalyst 2928 Switch Software Configuration Guide 32-14 OL-23389-01...
The hot-standby ports that have lower port numbers become active in the channel first. You can use the show etherchannel summary privileged EXEC command to see which ports are in the hot-standby mode (denoted with an H port-state flag). Catalyst 2928 Switch Software Configuration Guide 32-15 OL-23389-01...
Displays LACP information such as traffic information, the internal | neighbor} internal LACP configuration, and neighbor information. You can clear PAgP channel-group information and traffic counters by using the clear pagp {channel-group-number counters | counters} privileged EXEC command. Catalyst 2928 Switch Software Configuration Guide 32-16 OL-23389-01...
Page 591
You can clear LACP channel-group information and traffic counters by using the clear lacp {channel-group-number counters | counters} privileged EXEC command. For detailed information about the fields in the displays, see the command reference for this release. Catalyst 2928 Switch Software Configuration Guide 32-17 OL-23389-01...
Page 592
Chapter 32 Configuring EtherChannels Displaying EtherChannel, PAgP, and LACP Status Catalyst 2928 Switch Software Configuration Guide 32-18 OL-23389-01...
This chapter describes how to identify and resolve software problems related to the Cisco IOS software on the Catalyst 2928 switch. Depending on the nature of the problem, you can use the command-line interface (CLI), the device manager, or Network Assistant to identify and solve problems.
From your PC, download the software image tar file (image_filename.tar) from Cisco.com. Step 1 The Cisco IOS image is stored as a bin file in a directory in the tar file. For information about locating the software image files on Cisco.com, see the release notes.
After the Xmodem request appears, use the appropriate command on the terminal-emulation software to Step 11 start the transfer and to copy the software image into flash memory. Boot the newly downloaded Cisco IOS image. Step 12 switch:boot flash:image_filename.bin Use the archive download-sw privileged EXEC command to download the software image to the Step 13 switch.
Oct 01 2010 22:31:59 config.text -rwx Oct 01 2010 02:21:30 vlan.dat 16128000 bytes total (10003456 bytes free) Rename the configuration file to config.text.old. Step 5 This file contains the password definition. switch: rename flash:config.text flash:config.text.old Catalyst 2928 Switch Software Configuration Guide 33-4 OL-23389-01...
Page 597
To re-enable the interface, enter the interface vlan vlan-id global configuration command, and specify the VLAN ID of the shutdown interface. With the switch in interface configuration mode, enter the no shutdown command. Step 14 Reload the switch: Switch# reload Catalyst 2928 Switch Software Configuration Guide 33-5 OL-23389-01...
Continue with the configuration dialog? [yes/no]: N At the switch prompt, enter privileged EXEC mode: Step 5 Switch> enable Enter global configuration mode: Step 6 Switch# configure terminal Step 7 Change the password: Catalyst 2928 Switch Software Configuration Guide 33-6 OL-23389-01...
• Replacing a Failed Command Switch with Another Switch, page 33-9 These recovery procedures require that you have physical access to the switch. For information on command-capable switches, see the release notes. Catalyst 2928 Switch Software Configuration Guide 33-7 OL-23389-01...
Enter Y at the first prompt. Step 10 The prompts in the setup program vary depending on the member switch that you selected to be the command switch: Continue with configuration dialog? [yes/no]: y Configuring global parameters: Catalyst 2928 Switch Software Configuration Guide 33-8 OL-23389-01...
--- System Configuration Dialog --- Continue with configuration dialog? [yes/no]: y At any point you may enter a question mark '?' for help. Use ctrl-c to abort configuration dialog at any prompt. Catalyst 2928 Switch Software Configuration Guide 33-9 OL-23389-01...
Page 602
Start your browser, and enter the IP address of the new command switch. Step 13 From the Cluster menu, select Add to Cluster to display a list of candidate switches to add to the cluster. Step 14 Catalyst 2928 Switch Software Configuration Guide 33-10 OL-23389-01...
A member switch (Catalyst 3750, Catalyst 3560, Catalyst 3550, Catalyst 3500 XL, Catalyst 2970, Catalyst 2960, Catalyst 2950, Catalyst 2928, Catalyst 2900 XL, Catalyst 2820, and Catalyst 1900 switch) cannot connect to the command switch through a port that is defined as a network port.
Disabled Port Caused by Power Loss If a powered device (such as a Cisco IP Phone 7910) that is connected to a PoE switch port and is powered by an AC power source loses power from the AC power source, the device might enter an error-disabled state.
Troubleshooting Monitoring SFP Module Status If the module is identified as a Cisco SFP module, but the system is unable to read vendor-data information to verify its accuracy, an SFP module error message is generated. In this case, you should remove and re-insert the SFP module.
The switch can only identify the path from the source device to the destination device. It cannot identify the path that a packet takes from source host to the source device or from the destination device to the destination host. Catalyst 2928 Switch Software Configuration Guide 33-14 OL-23389-01...
Using Layer 2 Traceroute Usage Guidelines These are the Layer 2 traceroute usage guidelines: Cisco Discovery Protocol (CDP) must be enabled on all the devices in the network. For Layer 2 • traceroute to function properly, do not disable CDP.
ICMP port-unreachable error to the source. Because all errors except port-unreachable errors come from intermediate hops, the receipt of a port-unreachable error means that this message was sent by the destination port. Catalyst 2928 Switch Software Configuration Guide 33-16 OL-23389-01...
Port unreachable. To end a trace in progress, enter the escape sequence (Ctrl-^ X by default). Simultaneously press and release the Ctrl, Shift, and 6 keys and then press the X key. Catalyst 2928 Switch Software Configuration Guide 33-17 OL-23389-01...
These sections explains how you use debug commands to diagnose and resolve internetworking problems: • Enabling Debugging on a Specific Feature, page 33-19 • Enabling All-System Diagnostics, page 33-19 Redirecting Debug and Error Message Output, page 33-20 • Catalyst 2928 Switch Software Configuration Guide 33-18 OL-23389-01...
For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. It is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.
Extended crashinfo file—The switch automatically creates this file when the system is failing. Basic crashinfo Files The information in the basic file includes the Cisco IOS image name and version that failed, a list of the processor registers, and a stack trace. You can provide this information to the Cisco technical support representative by using the show tech-support privileged EXEC command.
The number of initial attempts to fix the invalid values or masks. Retries The number of attempts to fix the invalid values or masks. Failures The number of failed attempts to fix the invalid values or masks. Catalyst 2928 Switch Software Configuration Guide 33-23 OL-23389-01...
For more information about the show platform tcam errors privileged EXEC command, see the command reference for this release. Troubleshooting Tables These tables are a condensed version of troubleshooting documents on Cisco.com. “Troubleshooting CPU Utilization” section on page 33-24 •...
This example shows normal CPU utilization. The output shows that utilization for the last 5 seconds is 8%/0%, which has this meaning: The total CPU utilization is 8 percent, including both time running Cisco IOS processes and time • spent handling interrupts The time spent handling interrupts is zero percent.
Page 618
(available PoE). Use the show inline power and show inline power detail commands to verify the amount of available power. For more information, see No PoE On One Port on Cisco.com. Catalyst 2928 Switch Software Configuration Guide 33-26 OL-23389-01...
Page 619
This normally produces an alarm. Check the log again for alarms reported earlier by system messages. For more information, see No PoE On Any Port or a Group of Ports Cisco.com. Catalyst 2928 Switch Software Configuration Guide 33-27 OL-23389-01...
Page 620
Verify that sufficient power is available for the powered device type before you A non-Cisco powered device is connected connect it. to a Cisco PoE switch, but never powers on or powers on and then quickly powers off. Use the show interface status command to verify that the switch detects the Non-PoE devices work normally.
Make sure that your FTP client is in passive mode. Step 1 Some FTP clients do not support passive mode. Note Use FTP to access the server ftp.cisco.com. Step 2 Log in with the username anonymous. Step 3 Enter your e-mail username when prompted for the password.
Page 624
Appendix A Supported MIBs Using FTP to Access the MIB Files Catalyst 2928 Switch Software Configuration Guide OL-23389-01...
Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 2928 switch flash file system, how to copy configuration files, and how to archive (upload and download) software images to a switch.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Displaying Available File Systems To display the available file systems on your switch, use the show file systems privileged EXEC command as shown in this example.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Setting the Default File System You can specify the file system or directory that the system uses as the default file system by using the cd filesystem: privileged EXEC command.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Creating and Removing Directories Beginning in privileged EXEC mode, follow these steps to create and remove a directory: Command Purpose...
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Some invalid combinations of source and destination exist. Specifically, you cannot copy these combinations: • From a running configuration to a running configuration From a startup configuration to a startup configuration •...
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System Creating a tar File To create a tar file and write files into it, use this privileged EXEC command: archive tar /create destination-url flash:/file-url For destination-url, specify the destination URL alias for the local or network file system and the name of the tar file to create.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the Flash File System c2928-lanlitek9-mz.122-55.EZ/c2928-lanlitek9-mz.122-55.EZ.bin (4590080 bytes) c2928-lanlitek9-mz.122-55.EZ/info (219 bytes) This example shows how to display only the /html directory and its contents: Switch# archive tar /table flash:c2928-lanlitek9-mz.122-55.0.02.EZ/html c2928-lanlitek9-mz.122-55.EZ/html...
This section describes how to create, load, and maintain configuration files. Configuration files contain commands entered to customize the function of the Cisco IOS software. A way to create a basic configuration file is to use the setup program or to enter the setup privileged EXEC command.
Page 633
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Use these guidelines when creating a configuration file: We recommend that you connect through the console port for the initial configuration of the switch.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Copy the configuration file to the appropriate server location. For example, copy the file to the TFTP Step 4 directory on the workstation (usually /tftpboot on a UNIX workstation).
Page 635
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Downloading the Configuration File By Using TFTP To configure the switch by using a configuration file downloaded from a TFTP server, follow these steps: Step 1 Copy the configuration file to the appropriate TFTP directory on the workstation.
The FTP protocol requires a client to send a remote username and password on each FTP request to a server. When you copy a configuration file from the switch to a server by using FTP, the Cisco IOS software sends the first valid username in this list: The username specified in the copy command if a username is specified.
Page 637
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files If you are accessing the switch through the console or a Telnet session and you do not have a valid • username, make sure that the current FTP username is the one that you want to use for the FTP download.
Page 638
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files This example shows how to specify a remote username of netadmin1. The software copies the configuration file host2-confg from the netadmin1 directory on the remote server with an IP address of 172.16.101.101 to the switch startup configuration.
The RCP requires a client to send a remote username with each RCP request to a server. When you copy a configuration file from the switch to a server, the Cisco IOS software sends the first valid username in this list: The username specified in the copy command if a username is specified.
Page 640
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Preparing to Download or Upload a Configuration File By Using RCP Before you begin downloading or uploading a configuration file by using RCP, do these tasks: Ensure that the workstation acting as the RCP server supports the remote shell (rsh).
Page 641
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files Command Purpose Step 5 Return to privileged EXEC mode. Step 6 copy Using RCP, copy the configuration file from a network rcp:[[[//[username@]location]/directory]/filename]...
Depending on the setting of the file prompt global configuration command, you might be prompted for confirmation before you delete a file. By default, the switch prompts for confirmation on destructive file operations. For more information about the file prompt command, see the Cisco IOS Command Reference for Release 12.2.
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images You cannot restore a file after it has been deleted. Caution Working with Software Images This section describes how to archive (download and upload) software image files, which contain the system software, the Cisco IOS code, and the embedded device manager software.
Page 644
Image Location on the Switch The Cisco IOS image is stored as a .bin file in a directory that shows the version number. A subdirectory contains the files needed for web management. The image is stored on the system board flash memory (flash:).
Field Description total_image_file_size Specifies the size of all the images (the Cisco IOS image and the web management files) in the tar file, which is an approximate measure of how much flash memory is required to hold them image_feature Describes the core functionality of the image...
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Ensure that the switch has a route to the TFTP server. The switch and the TFTP server must be in • the same subnetwork if you do not have a router to route traffic between subnets. Check connectivity to the TFTP server by using the ping command.
Page 647
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose Step 3 archive download-sw /overwrite /reload Download the image file from the TFTP server to the switch, and tftp:[[//location]/directory]/image-name.tar overwrite the current image.
The archive upload-sw privileged EXEC command builds an image file on the server by uploading these files in order: info, the Cisco IOS image, and the web management files. After these files are uploaded, the upload algorithm creates the tar file format.
Page 649
The FTP protocol requires a client to send a remote username and password on each FTP request to a server. When you copy an image file from the switch to a server by using FTP, the Cisco IOS software sends the first valid username in this list: The username specified in the archive download-sw or archive upload-sw privileged EXEC •...
Page 650
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Downloading an Image File By Using FTP You can download a new image file and overwrite the current image or keep the current image.
Page 651
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose Step 8 archive download-sw /leave-old-sw /reload Download the image file from the FTP server to the switch, ftp:[[//username[:password]@location]/directory] and keep the current image.
The archive upload-sw command builds an image file on the server by uploading these files in order: info, the Cisco IOS image, and the web management files. After these files are uploaded, the upload algorithm creates the tar file format.
RCP requires a client to send a remote username on each RCP request to a server. When you copy an image from the switch to a server by using RCP, the Cisco IOS software sends the first valid username in this list: The username specified in the archive download-sw or archive upload-sw privileged EXEC •...
Page 654
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images If you are accessing the switch through the console or a Telnet session and you do not have a valid • username, make sure that the current RCP username is the one that you want to use for the RCP download.
Page 655
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Command Purpose Step 6 archive download-sw /overwrite /reload Download the image file from the RCP server to the switch, rcp:[[[//[username@]location]/directory]/image-na and overwrite the current image.
Page 656
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images The algorithm installs the downloaded image onto the system board flash device (flash:). The image is placed into a new directory named with the software version string, and the BOOT environment variable is updated to point to the newly installed image.
Page 657
The archive upload-sw privileged EXEC command builds an image file on the server by uploading these files in order: info, the Cisco IOS image, and the web management files. After these files are uploaded, the upload algorithm creates the tar file format.
Page 658
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images Catalyst 2928 Switch Software Configuration Guide B-34 OL-23389-01...
This appendix lists some of the command-line interface (CLI) commands that appear when you enter the question mark (?) at the Catalyst 2928 switch prompt but are not supported in this release, either because they are not tested or because of Catalyst 2928 switch hardware limitations. This is not a complete list.
Appendix C Unsupported Commands in Cisco IOS Release 12.2(55)EZ MAC Address Commands Unsupported Global Configuration Commands interface tunnel Unsupported Interface Configuration Commands transmit-interface type number MAC Address Commands Unsupported Privileged EXEC Commands show mac-address-table show mac-address-table address show mac-address-table aging-time...
Appendix C Unsupported Commands in Cisco IOS Release 12.2(55)EZ Miscellaneous Miscellaneous Unsupported Privileged EXEC Commands file verify auto show cable-diagnostics prbs test cable-diagnostics prbs Unsupported Global Configuration Commands errdisable recovery cause unicast flood l2protocol-tunnel global drop-threshold service compress-config stack-mac persistent timer...
Appendix C Unsupported Commands in Cisco IOS Release 12.2(55)EZ RADIUS RADIUS Unsupported Global Configuration Commands aaa nas port extended aaa authentication feature default enable aaa authentication feature default line aaa nas port extended radius-server configure radius-server extended-portnames SNMP Unsupported Global Configuration Commands...
Appendix C Unsupported Commands in Cisco IOS Release 12.2(55)EZ Unsupported vlan-config Command private-vlan Unsupported User EXEC Commands show running-config vlan show vlan ifindex show vlan private-vlan Unsupported Privileged EXEC Commands vtp {password password | pruning | version number} This command has been replaced by the vtp global configuration command.
IPv4 30-12 ACLs port 30-2 ACEs 30-1 resequencing entries 30-12 any keyword 30-9 standard IPv4 applying creating 30-6 time ranges to 30-14 matching criteria 30-5 to an interface 30-16 support for Catalyst 2928 Switch Software Configuration Guide IN-1 OL-23389-01...
Page 666
STP brand new switches 16-8, 16-21 MAC address table connectivity 7-20 maximum different VLANs for MSTP 17-23, 17-24 management VLANs for STP non-CDP-capable devices 16-21, 16-22 alarms, RMON noncluster-capable devices 27-3 Catalyst 2928 Switch Software Configuration Guide IN-2 OL-23389-01...
Page 667
DHCP snooping database automatic discovery 19-7 IP source guard defined 19-14 binding table, DHCP snooping requirements See DHCP snooping binding database See also command switch, cluster standby group, and member switch blocking packets 22-7 Catalyst 2928 Switch Software Configuration Guide IN-3 OL-23389-01...
Page 668
LRE profile considerations 5-13 CIST regional root managing See MSTP through CLI 5-13 CIST root through SNMP 5-14 See MSTP planning civic location 24-2 class of service See CoS clearing interfaces 12-28 Catalyst 2928 Switch Software Configuration Guide IN-4 OL-23389-01...
Page 678
21-17 source IP and MAC address filtering 19-14 IP information static bindings assigned adding 19-16, 19-18 manually deleting 3-14 19-17 through DHCP-based autoconfiguration static hosts 19-18 default configuration Catalyst 2928 Switch Software Configuration Guide IN-14 OL-23389-01...
Page 679
LEDs, switch enabling 18-15 See hardware installation guide support for lightweight directory access protocol LRE profiles, considerations in switch clusters 5-13 See LDAP line configuration mode Link Aggregation Control Protocol See EtherChannel Catalyst 2928 Switch Software Configuration Guide IN-15 OL-23389-01...
Page 680
24-2 monitoring management options access groups 30-21 cables for unidirectional links 25-1 clustering 23-5 features overview IGMP management VLAN filters 21-21 considerations in switch clusters snooping 21-14 discovery through different management VLANs Catalyst 2928 Switch Software Configuration Guide IN-16 OL-23389-01...
Page 681
17-6 terminology 17-5 instances supported 16-9 interface state, blocking to forwarding 18-2 interoperability and compatibility among modes 16-10 interoperability with IEEE 802.1D described 17-8 restarting migration process 17-25 Catalyst 2928 Switch Software Configuration Guide IN-17 OL-23389-01...
Page 683
12-5 See EtherChannel CDP with power consumption, described 12-4 CDP with power negotiation, described 12-4 Cisco intelligent power management 12-4 configuring 12-21 cutoff power determining 12-7 cutoff-power support for 12-6 Catalyst 2928 Switch Software Configuration Guide IN-19 OL-23389-01...
Page 684
9-20 authentication server multiple-hosts mode, described defined ports RADIUS server authorization state and dot1x port-control command client, defined authorized and unauthorized configuration guidelines 9-19 voice VLAN 9-13 Catalyst 2928 Switch Software Configuration Guide IN-20 OL-23389-01...
Page 685
VLAN 13-3 changing the default for lines port priority command switch 5-14 MSTP exiting 17-19 logging into 16-16 mapping on member switches 5-14 overview 8-2, 8-7 setting a command with Catalyst 2928 Switch Software Configuration Guide IN-21 OL-23389-01...
Page 686
CoS value 31-11 query solicitation, IGMP 21-12 DSCP transparency 31-11 egress queue characteristics 31-14 ingress queue characteristics 31-12 port trust states within the domain 31-9 default standard configuration 31-7 DSCP transparency 31-11 Catalyst 2928 Switch Software Configuration Guide IN-22 OL-23389-01...
Page 687
IEEE 802.1Q trunking interoperability 16-10 resetting a UDLD-shutdown interface 25-6 instances supported 16-9 restricted VLAN Rapid Spanning Tree Protocol configuring 9-29 See RSTP described 9-12, 9-15 rcommand command 5-13 using with IEEE 802.1x 9-12, 9-15 Catalyst 2928 Switch Software Configuration Guide IN-23 OL-23389-01...
Page 688
17-9 MSTP See also MSTP 17-17 16-14 running configuration, saving 3-14 RSPAN default configuration 26-7 destination ports 26-5 displaying status 26-13 interaction with other features 26-6 monitored ports 26-4 Catalyst 2928 Switch Software Configuration Guide IN-24 OL-23389-01...
Page 689
29-4 setup program configuration examples 29-16 failed command switch replacement 33-9 default configuration 29-6 replacing failed command switch 33-8 engine ID 29-7 severity levels, defining in system messages 28-8 groups 29-7, 29-9 Catalyst 2928 Switch Software Configuration Guide IN-25 OL-23389-01...
Page 692
16-3 inferior BPDU 16-3 root switch instances supported 16-9 configuring 16-14 interface state, blocking to forwarding 18-2 effects of extended system ID 16-3, 16-14 election 16-3 unexpected behavior 16-14 Catalyst 2928 Switch Software Configuration Guide IN-28 OL-23389-01...
Page 693
TLV 24-2 system clock configuring daylight saving time 7-13 manually 7-11 summer time 7-13 time zones 7-12 displaying the time and date 7-12 overview See also NTP system description TLV 24-1 Catalyst 2928 Switch Software Configuration Guide IN-29 OL-23389-01...
Page 694
33-23 time-range command 30-14 space time ranges in ACLs 30-14 HFTM 33-23 time stamps in log messages 28-7 HQATM 33-23 time zones 7-12 unassigned 33-23 TLVs defined 24-1 LLDP 24-1 LLDP-MED 24-2 Catalyst 2928 Switch Software Configuration Guide IN-30 OL-23389-01...
Page 697
SPAN 26-12 802.1Q frames 15-5 modifying 13-7 connecting to an IP phone 15-4 native, configuring 13-17 default configuration 15-3 normal-range 13-1, 13-4 described 15-1 number supported displaying 15-6 Catalyst 2928 Switch Software Configuration Guide IN-33 OL-23389-01...
Page 698
10-13 transparent 14-3, 14-10 configuring RADIUS server parameters on the switch 10-11 monitoring 14-14 configuring switch-to-RADIUS-server passwords 14-7 communication 10-11 customizeable web pages 10-6 default configuration 10-9 description 10-1 device roles 10-2 Catalyst 2928 Switch Software Configuration Guide IN-34 OL-23389-01...
Page 699
10-17 switch as proxy 10-2 web-based authentication, interactions with other features 10-7 weighted tail drop See WTD wired location service location TLV 24-2 described 31-4 support for Xmodem protocol 33-2 Catalyst 2928 Switch Software Configuration Guide IN-35 OL-23389-01...