Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
2950G 24 - Catalyst Switch
Cisco 2950G 24 - Catalyst Switch Manuals
Manuals and User Guides for Cisco 2950G 24 - Catalyst Switch. We have
5
Cisco 2950G 24 - Catalyst Switch manuals available for free PDF download: Software Configuration Manual, Migration Manual, Datasheet, Product Support Bulletin, Product Bulletin
Cisco 2950G 24 - Catalyst Switch Software Configuration Manual (648 pages)
Desktop Switch
Brand:
Cisco
| Category:
Switch
| Size: 7.64 MB
Table of Contents
Table of Contents
4
Chapter 2 Using the Command-Line Interface
26
Related Publications
29
Obtaining Documentation
29
World Wide Web
29
Ordering Documentation
30
Documentation Feedback
30
Obtaining Technical Assistance
30
Management Options
39
Management Interface Options
39
Advantages of Using Cms and Clustering Switches
39
Network Configuration Examples
40
Design Concepts for Using the Switch
40
Collapsed Backbone and Switch Cluster Configuration
45
Large Campus Configuration
46
Hotel Network Configuration
48
Multidwelling Network Using Catalyst 2950 Switches
50
Where to Go Next
53
IOS Command Modes
55
Getting Help
57
Specifying Ports in Interface Configuration Mode
58
Abbreviating Commands
59
Using no and Default Forms of Commands
59
Understanding CLI Messages
59
Using Command History
60
Changing the Command History Buffer Size
60
Recalling Commands
60
Disabling the Command History Feature
61
Using Editing Features
61
Enabling and Disabling Editing Features
61
Editing Commands through Keystrokes
62
Editing Command Lines that Wrap
63
Searching and Filtering Output of Show and more Commands
64
Accessing the CLI
64
Accessing the CLI from a Browser
65
Chapter 3 Getting Started with CM
68
Features
68
Front Panel View
70
Cluster Tree
72
Front-Panel Images
73
Redundant Power System LED
74
Port Modes and Leds
74
VLAN Membership Modes
75
Topology View
76
Topology Icons
78
Device and Link Labels
79
Colors in the Topology View
80
Topology Display Options
81
Menus and Toolbar
81
Menu Bar
81
Toolbar
86
Front Panel View Popup Menus
87
Device Popup Menu
87
Port Popup Menu
87
Topology View Popup Menus
88
Link Popup Menu
88
Device Popup Menus
89
Interaction Modes
91
Guide Mode
91
Expert Mode
91
Wizards
92
Tool Tips
92
Online Help
92
CMS Window Components
94
Host Name List
94
Tabs, Lists, and Tables
95
Filter Editor
95
Icons Used in Windows
95
Buttons
96
Accessing CMS
96
Access Modes in CMS
97
HTTP Access to CMS
98
Verifying Your Changes
98
Change Notification
98
Error Checking
98
Saving Your Configuration
99
Restoring Your Configuration
99
CMS Preferences
99
Using Different Versions of CMS
100
Where to Go Next
100
Chapter 4 Assigning the Switch IP Address and Default Gateway
101
Understanding the Boot Process
101
Assigning Switch Information
102
Default Switch Information
103
Understanding DHCP-Based Autoconfiguration
103
DHCP Client Request Process
104
Configuring the DHCP Server
105
Configuring the TFTP Server
105
Configuring the DNS
106
Configuring the Relay Device
106
Obtaining Configuration Files
107
Example Configuration
108
Manually Assigning IP Information
110
Checking and Saving the Running Configuration
110
Chapter 5 Configuring IE2100 CNS Agents
113
Understanding IE2100 Series Configuration Registrar Software
113
Chapter 5 Configuring IE2100 CN Agent
114
CNS Configuration Service
114
CNS Event Service
115
Namespace Mapper
115
What You Should Know about Configid, Deviceid, and Host Name
115
Configid
115
Deviceid
116
Host Name and Deviceid
116
Using Host Name, Deviceid, and Configid
116
Understanding CNS Embedded Agents
117
Initial Configuration
117
Incremental (Partial) Configuration
118
Synchronized Configuration
118
Configuring CNS Embedded Agents
118
Enabling Automated CNS Configuration
118
Enabling the CNS Event Agent
120
Enabling the CNS Configuration Agent
121
Enabling an Initial Configuration
121
Enabling a Partial Configuration
124
Displaying CNS Configuration
125
Chapter 6 Clustering Switches
127
Understanding Switch Clusters
128
Command Switch Characteristics
129
Standby Command Switch Characteristics
129
Candidate Switch and Member Switch Characteristics
130
Planning a Switch Cluster
131
Automatic Discovery of Cluster Candidates and Members
131
Discovery through CDP Hops
132
Discovery through Non-CDP-Capable and Noncluster-Capable Devices
133
Discovery through the same Management VLAN
134
Discovery through Different Management Vlans
135
Discovery of Newly Installed Switches
136
HSRP and Standby Command Switches
138
Other Considerations for Cluster Standby Groups
139
Virtual IP Addresses
139
Automatic Recovery of Cluster Configuration
141
IP Addresses
141
Host Names
142
Passwords
142
SNMP Community Strings
142
TACACS+ and RADIUS
143
Access Modes in CMS
143
Management VLAN
144
LRE Profiles
144
Availability of Switch-Specific Features in Switch Clusters
145
Creating a Switch Cluster
145
Enabling a Command Switch
145
Adding Member Switches
146
Creating a Cluster Standby Group
148
Verifying a Switch Cluster
150
Using the CLI to Manage Switch Clusters
151
Catalyst 1900 and Catalyst 2820 CLI Considerations
151
Using SNMP to Manage Switch Clusters
152
Preventing Unauthorized Access to Your Switch
153
Chapter 7 Administering the Switch
154
Protecting Access to Privileged EXEC Commands
154
Default Password and Privilege Level Configuration
154
Setting or Changing a Static Enable Password
155
Protecting Enable and Enable Secret Passwords with Encryption
156
Disabling Password Recovery
157
Setting a Telnet Password for a Terminal Line
158
Configuring Username and Password Pairs
159
Configuring Multiple Privilege Levels
160
Setting the Privilege Level for a Command
160
Changing the Default Privilege Level for Lines
161
Logging into and Exiting a Privilege Level
162
Controlling Switch Access with TACACS
162
Understanding TACACS
162
TACACS+ Operation
164
Configuring TACACS
164
Default TACACS+ Configuration
165
Identifying the TACACS+ Server Host and Setting the Authentication Key
165
Configuring TACACS+ Login Authentication
166
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
168
Starting TACACS+ Accounting
169
Displaying the TACACS+ Configuration
169
Controlling Switch Access with RADIUS
170
Understanding RADIUS
170
RADIUS Operation
171
Configuring RADIUS
172
Default RADIUS Configuration
172
Identifying the RADIUS Server Host
172
Displaying the RADIUS Configuration
183
Configuring RADIUS Login Authentication
175
Defining AAA Server Groups
177
Configuring RADIUS Authorization for User Privileged Access and Network Services
179
Starting RADIUS Accounting
180
Configuring Settings for All RADIUS Servers
181
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
181
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
182
Configuring the Switch for Local Authentication and Authorization
184
Configuring the Switch for Secure Shell
185
Configuring SSH
185
Understanding SSH
185
Managing the System Time and Date
186
Understanding Network Time Protocol
186
Understanding the System Clock
186
Configuring NTP
188
Configuring Time and Date Manually
195
Displaying the Time and Date Configuration
196
Setting the System Clock
196
Configuring the Time Zone
197
Configuring Summer Time (Daylight Saving Time)
198
Default NTP Configuration
189
Configuring NTP Authentication
189
Configuring NTP Associations
190
Configuring NTP Broadcast Service
191
Configuring NTP Access Restrictions
192
Configuring the Source IP Address for NTP Packets
194
Displaying the NTP Configuration
195
Configuring a System Name and Prompt
200
Configuring a System Name
200
Default System Name and Prompt Configuration
200
Configuring a System Prompt
201
Understanding DNS
201
Default DNS Configuration
202
Setting up DNS
202
Displaying the DNS Configuration
203
Creating a Banner
203
Default Banner Configuration
203
Configuring a Message-Of-The-Day Login Banner
204
Configuring a Login Banner
205
Managing the MAC Address Table
206
Building the Address Table
206
Changing the Address Aging Time
207
Default MAC Address Table Configuration
207
MAC Addresses and Vlans
207
Configuring MAC Address Notification Traps
208
Removing Dynamic Address Entries
208
Adding and Removing Static Address Entries
210
Adding and Removing Secure Addresses
211
Displaying Address Table Entries
212
Managing the ARP Table
213
Switch Software Releases
213
CHAPTER 8 Configuring 802.1X Port-Based Authentication
215
Understanding 802.1X Port-Based Authentication
215
C H a P T E R 8 Configuring 802.1X Port-Based Authentication
216
Device Roles
216
Authentication Initiation and Message Exchange
217
Ports in Authorized and Unauthorized States
218
Supported Topologies
219
Configuring 802.1X Authentication
219
Default 802.1X Configuration
220
802.1X Configuration Guidelines
221
Enabling 802.1X Authentication
222
Configuring the Switch-To-RADIUS-Server Communication
223
Enabling Periodic Re-Authentication
224
Manually Re-Authenticating a Client Connected to a Port
225
Changing the Quiet Period
225
Changing the Switch-To-Client Retransmission Time
226
Setting the Switch-To-Client Frame-Retransmission Number
227
Displaying 802.1X Statistics and Status
228
Enabling Multiple Hosts
227
Resetting the 802.1X Configuration to the Default Values
228
Chapter 9 Configuring the Switch Interfaces
229
Understanding Interface Types
229
Access Ports
230
Trunk Ports
230
Port-Based Vlans
231
Etherchannel Port Groups
231
Connecting Interfaces
231
Using the Interface Command
232
Procedures for Configuring Interfaces
232
Configuring a Range of Interfaces
234
Configuring and Using Interface-Range Macros
236
Configuring Switch Interfaces
237
Default Ethernet Interface Configuration
238
SFP Configuration
238
Configuring Interface Speed and Duplex Mode
239
Configuration Guidelines
240
Setting the Interface Speed and Duplex Parameters
241
Configuring Media Types for Gigabit Interfaces
242
Configuring IEEE 802.3X Flow Control on Gigabit Ethernet Ports
242
Adding a Description for an Interface
244
Monitoring and Maintaining the Interfaces
244
Monitoring Interface and Controller Status
244
Clearing and Resetting Interfaces and Counters
247
Shutting down and Restarting the Interface
247
Chapter 10 Configuring LRE
249
Ports on the 2950 LRE
249
LRE Links and LRE Profiles
250
LRE Profiles
250
LRE Sequences
252
CPE Ethernet Links
253
Configuring LRE Ports
253
Environmental Guidelines for LRE Links
254
Guidelines for Using LRE Profiles
255
CPE Ethernet Link Guidelines
255
Considerations for Connected Cisco 575 LRE Cpes
255
Considerations for Connected Cisco 585 LRE Cpes
255
Assigning a Global Profile to All LRE Ports
256
Assigning a Global Sequence to All LRE Ports
257
Assigning a Profile to a Specific LRE Port
257
Assigning a Sequence to a Specific LRE Port
258
Using Rate Selection to Automatically Assign Profiles
258
Precedence
259
Profile Locking
259
Link Qualification and SNR Margins
260
LRE Link Persistence
262
Upgrading LRE Switch Firmware
263
Configuring for an LRE Upgrade
263
Performing an LRE Upgrade
264
Controller Configuration of LRE Upgrades
265
Global Configuration of LRE Upgrades
265
LRE Upgrade Behavior Details
266
LRE Upgrade Example
266
LRE Link Monitor
262
Understanding Spanning-Tree Features
269
Configuring STP
270
Understanding Spanning-Tree Features
270
Chapter 11 Configuring STP
270
STP Overview
270
Supported Spanning-Tree Instances
270
Bridge Protocol Data Units
270
Election of the Root Switch
271
Bridge ID, Switch Priority, and Extended System ID
272
Spanning-Tree Timers
272
Creating the Spanning-Tree Topology
273
Spanning-Tree Interface States
273
Blocking State
275
Listening State
275
Learning State
275
Forwarding State
275
Disabled State
276
Spanning-Tree Address Management
276
STP and IEEE 802.1Q Trunks
276
Spanning Tree and Redundant Connectivity
276
Accelerated Aging to Retain Connectivity
277
Configuring Spanning-Tree Features
277
Default STP Configuration
278
STP Configuration Guidelines
278
Disabling STP
280
Configuring the Root Switch
280
Configuring a Secondary Root Switch
282
Configuring the Port Priority
283
Configuring the Path Cost
284
Configuring the Switch Priority of a VLAN
286
Configuring the Hello Time
287
Configuring the Forwarding-Delay Time for a VLAN
287
Configuring the Maximum-Aging Time for a VLAN
288
Configuring STP for Use in a Cascaded Stack
288
Displaying the Spanning-Tree Status
289
Chapter 12 Configuring RSTP and MSTP
291
Understanding RSTP
292
Port Roles and the Active Topology
292
Rapid Convergence
293
Synchronization of Port Roles
294
Bridge Protocol Data Unit Format and Processing
295
Processing Inferior BPDU Information
296
Processing Superior BPDU Information
296
Topology Changes
296
Understanding MSTP
297
Multiple Spanning-Tree Regions
297
IST, CIST, and CST
298
Operations Within an MST Region
298
Operations between MST Regions
299
Hop Count
300
Boundary Ports
300
Configuring RSTP and MSTP Features
301
Default RSTP and MSTP Configuration
302
RSTP and MSTP Configuration Guidelines
302
Specifying the MST Region Configuration and Enabling MSTP
303
Configuring the Root Switch
304
Configuring a Secondary Root Switch
306
Configuring the Port Priority
307
Configuring the Path Cost
308
Configuring the Hello Time
309
Configuring the Switch Priority
309
Configuring the Forwarding-Delay Time
310
Configuring the Maximum-Aging Time
311
Configuring the Maximum-Hop Count
311
Restarting the Protocol Migration Process
312
Specifying the Link Type to Ensure Rapid Transitions
312
Interoperability with 802.1D STP
301
Displaying the MST Configuration and Status
313
CHAPTER 13 Configuring Optional Spanning-Tree Features
316
Understanding Optional Spanning-Tree Features
316
Understanding Port Fast
316
Understanding BPDU Guard
317
Understanding BPDU Filtering
317
Understanding Uplinkfast
318
Understanding Cross-Stack Uplinkfast
319
How CSUF Works
320
Events that Cause Fast Convergence
321
Connecting the Stack Ports
322
Limitations
322
Understanding Backbonefast
324
Understanding Root Guard
326
Configuring Optional Spanning-Tree Features
326
Default Optional Spanning-Tree Configuration
328
Enabling Port Fast
328
Enabling BPDU Guard
329
Enabling BPDU Filtering
330
Enabling Uplinkfast for Use with Redundant Links
331
Enabling Cross-Stack Uplinkfast
332
Enabling Backbonefast
333
Enabling Root Guard
333
Enabling Loop Guard
334
Displaying the Spanning-Tree Status
335
Understanding Vlans
337
Chapter 14 Configuring VLAN
338
Supported Vlans
338
VLAN Port Membership Modes
339
Configuring Normal-Range Vlans
340
Token Ring Vlans
341
Normal-Range VLAN Configuration Guidelines
341
VLAN Configuration Mode Options
342
VLAN Configuration in Config-Vlan Mode
342
VLAN Configuration in VLAN Configuration Mode
342
Saving VLAN Configuration
343
Default Ethernet VLAN Configuration
344
Creating or Modifying an Ethernet VLAN
344
Deleting a VLAN
346
Assigning Static-Access Ports to a VLAN
347
Configuring Extended-Range Vlans
348
Default VLAN Configuration
348
Extended-Range VLAN Configuration Guidelines
348
Creating an Extended-Range VLAN
349
Displaying Vlans
350
Configuring VLAN Trunks
351
Trunking Overview
351
802.1Q Configuration Considerations
352
Default Layer 2 Ethernet Interface VLAN Configuration
353
Configuring an Ethernet Interface as a Trunk Port
353
Interaction with Other Features
353
Configuring a Trunk Port
354
Defining the Allowed Vlans on a Trunk
355
Changing the Pruning-Eligible List
356
Configuring the Native VLAN for Untagged Traffic
356
Load Sharing Using STP
357
Load Sharing Using STP Port Priorities
357
Load Sharing Using STP Path Cost
359
Configuring VMPS
360
Understanding VMPS
361
Dynamic Port VLAN Membership
361
VMPS Database Configuration File
362
Default VMPS Configuration
363
VMPS Configuration Guidelines
364
Configuring the VMPS Client
364
Entering the IP Address of the VMPS
364
Configuring Dynamic Access Ports on VMPS Clients
365
Changing the Reconfirmation Interval
366
Changing the Retry Count
366
Reconfirming VLAN Memberships
366
Monitoring the VMPS
367
Troubleshooting Dynamic Port VLAN Membership
367
VMPS Configuration Example
368
Configuring VTP
370
Understanding VTP
370
Chapter 15 Configuring VTP
370
The VTP Domain
370
VTP Modes
371
VTP Advertisements
371
VTP Version 2
372
VTP Pruning
372
Configuring VTP
372
Default VTP Configuration
374
VTP Configuration Options
375
VTP Configuration in Global Configuration Modes
375
VTP Configuration in VLAN Configuration Mode
375
VTP Configuration Guidelines
376
Domain Names
376
Passwords
376
Upgrading from Previous Software Releases
376
Configuration Requirements
377
VTP Version
377
Configuring a VTP Server
377
Configuring a VTP Client
379
Disabling VTP (VTP Transparent Mode)
380
Enabling VTP Version 2
381
Enabling VTP Pruning
382
Adding a VTP Client Switch to a VTP Domain
383
Monitoring VTP
384
Chapter 16 Configuring Voice VLAN
385
Understanding Voice VLAN
385
Configuring Voice VLAN
386
Default Voice VLAN Configuration
386
Voice VLAN Configuration Guidelines
387
Configuring a Port to Connect to a Cisco 7960 IP Phone
387
Configuring Ports to Carry Voice Traffic in 802.1P Priority Tagged Frames
388
Configuring Ports to Carry Voice Traffic in 802.1Q Frames
388
Overriding the Cos Priority of Incoming Data Frames
389
Configuring the IP Phone to Trust the Cos Priority of Incoming Data Frames
390
Displaying Voice VLAN
390
Understanding IGMP Snooping
391
Chapter 17 Configuring IGMP Snooping and MVR
392
Joining a Multicast Group
392
Leaving a Multicast Group
394
Immediate-Leave Processing
394
Configuring IGMP Snooping
395
Default IGMP Snooping Configuration
395
Enabling or Disabling IGMP Snooping
395
Setting the Snooping Method
396
Configuring a Multicast Router Port
397
Configuring a Host Statically to Join a Group
398
Enabling IGMP Immediate-Leave Processing
399
Disabling IP Multicast-Source-Only Learning
399
Displaying IGMP Snooping Information
401
Understanding Multicast VLAN Registration
403
Using MVR in a Multicast Television Application
403
Configuring MVR
405
Default MVR Configuration
405
MVR Configuration Guidelines and Limitations
406
Configuring MVR Global Parameters
406
Configuring MVR Interfaces
407
Displaying MVR Information
409
Configuring IGMP Filtering
410
Default IGMP Filtering Configuration
411
Configuring IGMP Profiles
411
Applying IGMP Profiles
412
Setting the Maximum Number of IGMP Groups
413
Displaying IGMP Filtering Configuration
414
CHAPTER 18 Configuring Port-Based Traffic Control
415
Configuring Storm Control
415
Understanding Storm Control
415
Default Storm Control Configuration
416
Enabling Storm Control
416
C H a P T E R 18 Configuring Port-Based Traffic Control
417
Disabling Storm Control
417
Configuring Protected Ports
417
Configuring Port Security
418
Understanding Port Security
419
Secure MAC Addresses
419
Security Violations
420
Default Port Security Configuration
421
Port Security Configuration Guidelines
421
Enabling and Configuring Port Security
421
Enabling and Configuring Port Security Aging
424
Displaying Port-Based Traffic Control Settings
426
Chapter 19 Configuring UDLD
427
Understanding UDLD
427
Configuring UDLD
427
Default UDLD Configuration
429
Enabling UDLD Globally
430
Enabling UDLD on an Interface
430
Resetting an Interface Shut down by UDLD
431
Displaying UDLD Status
432
Chapter 20 Configuring CDP
433
Understanding CDP
433
Configuring CDP
434
Default CDP Configuration
434
Configuring the CDP Characteristics
434
Disabling and Enabling CDP
435
Disabling and Enabling CDP on an Interface
436
Monitoring and Maintaining CDP
437
Chapter 21 Configuring SPAN and RSPAN
439
Understanding SPAN and RSPAN
439
SPAN and RSPAN Concepts and Terminology
441
SPAN Session
441
Traffic Types
441
Source Port
442
Destination Port
443
Reflector Port
443
SPAN Traffic
444
VLAN-Based SPAN
444
SPAN and RSPAN Interaction with Other Features
445
SPAN and RSPAN Session Limits
446
Default SPAN and RSPAN Configuration
446
Configuring SPAN
446
SPAN Configuration Guidelines
446
Creating a SPAN Session and Specifying Ports to Monitor
447
Removing Ports from a SPAN Session
449
Specifying Vlans to Monitor
450
Specifying Vlans to Filter
451
Configuring RSPAN
452
RSPAN Configuration Guidelines
452
Creating an RSPAN Session
453
Creating an RSPAN Destination Session
454
Removing Ports from an RSPAN Session
455
Specifying Vlans to Monitor
456
Specifying Vlans to Filter
457
Displaying SPAN and RSPAN Status
458
Chapter 22 Configuring RMON
459
Understanding RMON
459
Configuring RMON
460
Default RMON Configuration
461
Configuring RMON Alarms and Events
461
Configuring RMON Collection on an Interface
463
Displaying RMON Status
464
Chapter 23 Configuring System Message Logging
465
Understanding System Message Logging
465
Configuring System Message Logging
466
System Log Message Format
466
Default System Message Logging Configuration
467
Disabling and Enabling Message Logging
468
Setting the Message Display Destination Device
468
Synchronizing Log Messages
470
Enabling and Disabling Timestamps on Log Messages
471
Enabling and Disabling Sequence Numbers in Log Messages
472
Defining the Message Severity Level
472
Limiting Syslog Messages Sent to the History Table and to SNMP
474
Configuring UNIX Syslog Servers
474
Configuring the UNIX System Logging Facility
475
Logging Messages to a UNIX Syslog Daemon
475
Displaying the Logging Configuration
476
Chapter 24 Configuring SNMP
477
Understanding SNMP
477
SNMP Versions
478
SNMP Manager Functions
479
SNMP Agent Functions
479
SNMP Community Strings
480
Using SNMP to Access MIB Variables
480
SNMP Notifications
481
Configuring SNMP
481
Default SNMP Configuration
482
SNMP Configuration Guidelines
482
Disabling the SNMP Agent
483
Configuring Community Strings
483
Configuring SNMP Groups and Users
484
Configuring SNMP Notifications
486
Setting the Agent Contact and Location Information
489
Limiting TFTP Servers Used through SNMP
489
SNMP Examples
490
Displaying SNMP Status
491
Chapter 25 Configuring Network Security with Acls
493
Understanding Acls
494
Handling Fragmented and Unfragmented Traffic
495
Understanding Access Control Parameters
496
Guidelines for Applying Acls to Physical Interfaces
498
Configuring Acls
498
Unsupported Features
499
Creating Standard and Extended IP Acls
499
ACL Numbers
500
Creating a Numbered Standard ACL
501
Creating a Numbered Extended ACL
502
Creating Named Standard and Extended Acls
505
Applying Time Ranges to Acls
507
Including Comments about Entries in Acls
509
Creating Named MAC Extended Acls
510
Creating MAC Access Groups
511
Applying Acls to Terminal Lines or Physical Interfaces
512
Applying Acls to a Terminal Line
512
Applying Acls to a Physical Interface
513
Displaying ACL Information
513
Displaying Acls
514
Displaying Access Groups
515
Examples for Compiling Acls
515
Numbered ACL Examples
517
Extended ACL Examples
517
Named ACL Example
517
Commented IP ACL Entry Examples
517
Chapter 26 Configuring Qos
519
Understanding Qos
520
Basic Qos Model
521
Classification
522
Classification Based on Qos Acls
523
Classification Based on Class Maps and Policy Maps
524
Policing and Marking
524
Mapping Tables
525
Queueing and Scheduling
525
How Class of Service Works
525
Cos and WRR
526
Port Priority
526
Port Scheduling
526
Configuring Qos
527
Default Qos Configuration
527
Configuration Guidelines
528
Configuring Classification Using Port Trust States
528
Configuring the Trust State on Ports Within the Qos Domain
528
Configuring the Cos Value for an Interface
531
Configuring Trusted Boundary
531
Enabling Pass-Through Mode
533
Configuring a Qos Policy
534
Classifying Traffic by Using Acls
534
Classifying Traffic by Using Class Maps
534
Classifying, Policing, and Marking Traffic by Using Policy Maps
539
Configuring Cos Maps
542
Configuring the Cos-To-DSCP Map
543
Configuring the DSCP-To-Cos Map
544
Configuring Cos and WRR
545
Configuring Cos Priority Queues
545
Configuring WRR
545
Displaying Qos Information
546
Qos Configuration Examples
547
Qos Configuration for the Existing Wiring Closet
548
Qos Configuration for the Intelligent Wiring Closet
548
Chapter 27 Configuring Etherchannels
551
Understanding Etherchannels
551
Understanding Port-Channel Interfaces
552
Understanding the Port Aggregation Protocol
553
Pagp Modes
554
Pagp Interaction with Other Features
555
Physical Learners and Aggregate-Port Learners
555
Understanding Load Balancing and Forwarding Methods
555
Configuring Etherchannels
557
Default Etherchannel Configuration
557
Etherchannel Configuration Guidelines
558
Configuring Layer 2 Etherchannels
558
Configuring Etherchannel Load Balancing
560
Configuring the Pagp Learn Method and Priority
561
Displaying Etherchannel and Pagp Status
561
Chapter 28 Troubleshooting
563
LRE Statistics
563
Using Recovery Procedures
568
Recovering from Corrupted Software
568
Recovering from a Lost or Forgotten Password
568
Recovering from a Command Switch Failure
570
Replacing a Failed Command Switch with a Cluster Member
571
Replacing a Failed Command Switch with Another Switch
572
Recovering from Lost Member Connectivity
573
Preventing Autonegotiation Mismatches
574
Troubleshooting LRE Port Configuration
574
GBIC and SFP Module Security and Identification
575
Using Debug Commands
576
Enabling Debugging on a Specific Feature
576
Enabling All-System Diagnostics
577
Redirecting Debug and Error Message Output
577
Using the Crashinfo File
577
Appendix
579
Supported Mibs
579
MIB List
579
Using FTP to Access the MIB Files
580
Appendix A Supported MIB
580
Appendix
583
Working with the IOS File System, Configuration Files, and Software Images
583
Working with the Flash File System
583
Displaying Available File Systems
584
A P P E N D I X B Working with the IOS File System, Configuration Files, and Software Images
585
Setting the Default File System
585
Displaying Information about Files on a File System
585
Changing Directories and Displaying the Working Directory
586
Creating and Removing Directories
586
Copying Files
587
Deleting Files
587
Creating, Displaying, and Extracting Tar Files
588
Creating a Tar File
588
Displaying the Contents of a Tar File
589
Extracting a Tar File
589
Displaying the Contents of a File
590
Working with Configuration Files
590
Guidelines for Creating and Using Configuration Files
591
Configuration File Types and Location
592
Creating a Configuration File by Using a Text Editor
592
Copying Configuration Files by Using TFTP
593
Preparing to Download or Upload a Configuration File by Using TFTP
593
Downloading the Configuration File by Using TFTP
594
Uploading the Configuration File by Using TFTP
594
Copying Configuration Files by Using FTP
595
Downloading a Configuration File by Using FTP
595
Preparing to Download or Upload a Configuration File by Using FTP
595
Uploading a Configuration File by Using FTP
595
Copying Configuration Files by Using RCP
598
Downloading a Configuration File by Using RCP
598
Preparing to Download or Upload a Configuration File by Using RCP
598
Uploading a Configuration File by Using RCP
598
Clearing Configuration Information
601
Clearing the Startup Configuration File
601
Deleting a Stored Configuration File
602
Working with Software Images
602
Image Location on the Switch
602
Tar File Format of Images on a Server or Cisco.com
603
Copying Image Files by Using TFTP
604
Downloading an Image File by Using TFTP
604
Preparing to Download or Upload an Image File by Using TFTP
604
Uploading an Image File by Using TFTP
604
Copying Image Files by Using FTP
607
Downloading an Image File by Using FTP
607
Preparing to Download or Upload an Image File by Using FTP
607
Uploading an Image File by Using FTP
607
Copying Image Files by Using RCP
611
Downloading an Image File by Using RCP
611
Preparing to Download or Upload an Image File by Using RCP
611
Uploading an Image File by Using RCP
611
I N D E X
617
Advertisement
Cisco 2950G 24 - Catalyst Switch Datasheet (19 pages)
Catalyst 2950 Series Switches with Enhanced Image Software
Brand:
Cisco
| Category:
Switch
| Size: 0.14 MB
Table of Contents
Product Overview
1
Cisco Catalyst 2950 Series Switches
2
Additional Cisco Catalyst 2950 Series Switches
2
Cisco Catalyst 2950 Series Long-Reach Ethernet (LRE) Switches
2
Cisco Catalyst 2950 Series with Standard Image Software
2
Intelligence in the Network
3
Network Security through Advanced Security Features
3
Network Control through Advanced Quality of Service and Rate Limiting
4
Network Management
5
Product Features and Benefits
6
Product Specifications
11
Service and Support
15
Ordering Information
16
Additional Information
16
Cisco 2950G 24 - Catalyst Switch Migration Manual (25 pages)
Cisco Catalyst 2950-12: Supplementary Guide
Brand:
Cisco
| Category:
Switch
| Size: 0.85 MB
Table of Contents
Product Comparisons
8
Cisco Twingig Converter Module
15
Power over Ethernet
18
Gigabit Ethernet
19
Additional Resources
24
Advertisement
Cisco 2950G 24 - Catalyst Switch Product Support Bulletin (5 pages)
Software Feature Comparison
Brand:
Cisco
| Category:
Switch
| Size: 0.06 MB
Cisco 2950G 24 - Catalyst Switch Product Bulletin (3 pages)
for Cisco Catalyst 3550, 2950, 2950 LRE, 2940, and 2955 Series Switches and CIGESM Blade Switch
Brand:
Cisco
| Category:
Software
| Size: 0.18 MB
Advertisement
Related Products
Cisco 2950G 48 - Catalyst Switch - Stackable
Cisco Catalyst 2950G-12
Cisco Catalyst 2950G-24-DC
Cisco Catalyst 2950G-48-EI
Cisco Catalyst 2950G-24-EI-DC
Cisco Catalyst 2950G-24-EI
Cisco Catalyst 2950G-12-EI
Cisco 2950sx 24 - catalyst switch - stackable
Cisco Catalyst 2950-24
Cisco Catalyst 2950SX-24
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Conference System
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL