Sign In
Upload
Manuals
Brands
Cisco Manuals
Switch
3020 - Cisco Catalyst Blade Switch
Cisco 3020 - Cisco Catalyst Blade Switch Manuals
Manuals and User Guides for Cisco 3020 - Cisco Catalyst Blade Switch. We have
13
Cisco 3020 - Cisco Catalyst Blade Switch manuals available for free PDF download: Software Configuration Manual, Command Reference Manual, Configuration Manual, Getting Started, Release Note, Getting Started Manual, Installation Manual, Quickspecs
Cisco 3020 - Cisco Catalyst Blade Switch Software Configuration Manual (960 pages)
Catalyst Blade Switch for HP
Brand:
Cisco
| Category:
Switch
| Size: 9.66 MB
Table of Contents
Table of Contents
3
Related Publications
36
Obtaining Documentation and Submitting a Service Request
37
Features
39
Chapter 1 Overview
40
Ease-Of-Deployment and Ease-Of-Use Features
40
Performance Features
40
Management Options
41
Manageability Features
42
Availability and Redundancy Features
43
VLAN Features
44
Security Features
44
Qos and Cos Features
46
Layer 3 Features
47
Monitoring Features
48
Default Settings after Initial Switch Configuration
48
Design Concepts for Using the Switch
51
Where to Go Next
54
CHAPTER 2 Using the Command-Line Interface2-1
55
Understanding Command Modes
55
C H a P T E R 2 Using the Command-Line Interface
56
Understanding the Help System
57
Understanding Abbreviated Commands
58
Understanding no and Default Forms of Commands
58
Understanding CLI Error Messages
59
Using Configuration Logging
59
Using Command History
60
Changing the Command History Buffer Size
60
Recalling Commands
60
Disabling the Command History Feature
61
Using Editing Features
61
Enabling and Disabling Editing Features
61
Editing Commands through Keystrokes
61
Editing Command Lines that Wrap
63
Searching and Filtering Output of Show and more Commands
64
Accessing the CLI
64
Chapter 3 Assigning the Switch IP Address and Default Gateway
65
Understanding the Bootup Process
65
Assigning Switch Information
66
Default Switch Information
67
Understanding DHCP-Based Autoconfiguration
67
DHCP Client Request Process
68
Understanding DHCP-Based Autoconfiguration and Image Update
68
DHCP Auto-Image Update
69
DHCP Autoconfiguration
69
Limitations and Restrictions
69
Configuring DHCP-Based Autoconfiguration
70
Configuring the TFTP Server
70
DHCP Server Configuration Guidelines
70
Configuring the DNS
71
Configuring the Relay Device
71
Obtaining Configuration Files
72
Example Configuration
73
Configuring the DHCP Auto Configuration and Image Update Features
75
Configuring DHCP Autoconfiguration (Only Configuration File)
75
Configuring DHCP Auto-Image Update (Configuration File and Image)
76
Configuring the Client
77
Manually Assigning IP Information
78
Checking and Saving the Running Configuration
79
Modifying the Startup Configuration
81
Default Bootup Configuration
82
Automatically Downloading a Configuration File
82
Specifying the Filename to Read and Write the System Configuration
82
Booting up Manually
83
Booting up a Specific Software Image
83
Controlling Environment Variables
84
Scheduling a Reload of the Software Image
85
Configuring a Scheduled Reload
86
Displaying Scheduled Reload Information
87
Chapter 4 Configuring Cisco IOS CNS Agents
89
Understanding Cisco Configuration Engine Software
89
Chapter 4 Configuring Cisco IO CN Agent
90
Configuration Service
90
Event Service
91
Namespace Mapper
91
What You Should Know about the CNS Ids and Device Hostnames
91
Configid
91
Deviceid
92
Hostname and Deviceid
92
Using Hostname, Deviceid, and Configid
92
Understanding Cisco IOS Agents
93
Initial Configuration
93
Incremental (Partial) Configuration
94
Synchronized Configuration
94
Configuring Cisco IOS Agents
94
Enabling Automated CNS Configuration
94
Enabling the CNS Event Agent
96
Enabling the Cisco IOS CNS Agent
97
Enabling an Initial Configuration
97
Enabling a Partial Configuration
101
Displaying CNS Configuration
102
CHAPTER 5 Administering the Switch
104
Managing the System Time and Date
104
Understanding Network Time Protocol
104
Configuring NTP
105
Configuring NTP Authentication
106
Default NTP Configuration
106
Configuring NTP Associations
107
Configuring NTP Broadcast Service
108
Configuring NTP Access Restrictions
110
Configuring the Source IP Address for NTP Packets
112
Displaying the NTP Configuration
113
Configuring Time and Date Manually
113
Setting the System Clock
113
Displaying the Time and Date Configuration
114
Configuring the Time Zone
114
Configuring Summer Time (Daylight Saving Time)
115
Configuring a System Name and Prompt
116
Default System Name and Prompt Configuration
117
Configuring a System Name
117
Understanding DNS
117
Default DNS Configuration
118
Setting up DNS
118
Displaying the DNS Configuration
119
Creating a Banner
119
Default Banner Configuration
119
Configuring a Message-Of-The-Day Login Banner
120
Configuring a Login Banner
121
Managing the MAC Address Table
121
Building the Address Table
122
MAC Addresses and Vlans
122
Default MAC Address Table Configuration
123
Changing the Address Aging Time
123
Removing Dynamic Address Entries
124
Configuring MAC Address Notification Traps
124
Adding and Removing Static Address Entries
126
Configuring Unicast MAC Address Filtering
127
Displaying Address Table Entries
128
Managing the ARP Table
129
Chapter 6 Configuring SDM Templates
131
Understanding the SDM Templates
131
Dual Ipv4 and Ipv6 SDM Templates
132
Configuring the Switch SDM Template
133
Default SDM Template
133
SDM Template Configuration Guidelines
134
Setting the SDM Template
134
Displaying the SDM Templates
135
CHAPTER 7 Configuring Switch-Based Authentication
137
Preventing Unauthorized Access to Your Switch
137
C H a P T E R 7 Configuring Switch-Based Authentication
138
Protecting Access to Privileged EXEC Commands
138
Default Password and Privilege Level Configuration
138
Setting or Changing a Static Enable Password
139
Protecting Enable and Enable Secret Passwords with Encryption
139
Disabling Password Recovery
141
Setting a Telnet Password for a Terminal Line
142
Configuring Username and Password Pairs
142
Configuring Multiple Privilege Levels
143
Setting the Privilege Level for a Command
144
Changing the Default Privilege Level for Lines
145
Logging into and Exiting a Privilege Level
145
Controlling Switch Access with TACACS
146
Understanding TACACS
146
TACACS+ Operation
148
Configuring TACACS
148
Default TACACS+ Configuration
149
Identifying the TACACS+ Server Host and Setting the Authentication Key
149
Configuring TACACS+ Login Authentication
150
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
152
Starting TACACS+ Accounting
153
Displaying the TACACS+ Configuration
153
Controlling Switch Access with RADIUS
153
Understanding RADIUS
154
RADIUS Operation
155
Configuring RADIUS
156
Default RADIUS Configuration
156
Identifying the RADIUS Server Host
156
Configuring RADIUS Login Authentication
159
Defining AAA Server Groups
161
Configuring RADIUS Authorization for User Privileged Access and Network Services
163
Starting RADIUS Accounting
164
Configuring Settings for All RADIUS Servers
165
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
165
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
167
Displaying the RADIUS Configuration
167
Controlling Switch Access with Kerberos
168
Understanding Kerberos
168
Kerberos Operation
170
Authenticating to a Boundary Switch
170
Obtaining a TGT from a KDC
171
Authenticating to Network Services
171
Configuring Kerberos
171
Configuring the Switch for Local Authentication and Authorization
172
Configuring the Switch for Secure Shell
173
Understanding SSH
173
SSH Servers, Integrated Clients, and Supported Versions
173
Limitations
174
Configuring SSH
174
Configuration Guidelines
174
Setting up the Switch to Run SSH
175
Configuring the SSH Server
176
Displaying the SSH Configuration and Status
177
Configuring the Switch for Secure Socket Layer HTTP
177
Understanding Secure HTTP Servers and Clients
177
Certificate Authority Trustpoints
178
Ciphersuites
179
Configuring Secure HTTP Servers and Clients
180
Default SSL Configuration
180
SSL Configuration Guidelines
180
Configuring a CA Trustpoint
180
Configuring the Secure HTTP Server
181
Configuring the Secure HTTP Client
183
Displaying Secure HTTP Server and Client Status
183
Configuring the Switch for Secure Copy Protocol
184
Information about Secure Copy
184
CHAPTER 8 Configuring IEEE 802.1X Port-Based Authentication8-1
185
Understanding IEEE 802.1X Port-Based Authentication
185
C H a P T E R 8 Configuring IEEE 802.1X Port-Based Authentication
186
Configuring IEEE 802.1X Authentication
186
Device Roles
186
Authentication Process
187
Authentication Initiation and Message Exchange
189
Ports in Authorized and Unauthorized States
191
IEEE 802.1X Host Mode
191
IEEE 802.1X Accounting Attribute-Value Pairs
192
IEEE 802.1X Accounting
192
Using 802.1X Readiness Check
193
Using IEEE 802.1X Authentication with VLAN Assignment
194
Using IEEE 802.1X Authentication with Per-User Acls
195
Using IEEE 802.1X Authentication with Guest VLAN
196
Using IEEE 802.1X Authentication with Restricted VLAN
197
Using IEEE 802.1X Authentication with Inaccessible Authentication Bypass
198
Using IEEE 802.1X Authentication with Voice VLAN Ports
199
Using IEEE 802.1X Authentication with Port Security
199
Using IEEE 802.1X Authentication with Wake-On-LAN
200
Using IEEE 802.1X Authentication with MAC Authentication Bypass
201
Network Admission Control Layer 2 IEEE 802.1X Validation
202
Using Web Authentication
202
Web Authentication with Automatic MAC Check
203
Configuring IEEE 802.1X Authentication
203
Default IEEE 802.1X Authentication Configuration
204
IEEE 802.1X Authentication Configuration Guidelines
205
IEEE 802.1X Authentication
205
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
206
MAC Authentication Bypass
207
Configuring 802.1X Readiness Check
207
Configuring IEEE 802.1X Authentication
209
Configuring the Switch-To-RADIUS-Server Communication
210
Configuring the Host Mode
212
Configuring Periodic Re-Authentication
212
Manually Re-Authenticating a Client Connected to a Port
213
Changing the Quiet Period
213
Changing the Switch-To-Client Retransmission Time
214
Setting the Switch-To-Client Frame-Retransmission Number
215
Setting the Re-Authentication Number
215
Configuring IEEE 802.1X Accounting
216
Configuring a Guest VLAN
217
Configuring a Restricted VLAN
218
Configuring the Inaccessible Authentication Bypass Feature
219
Configuring IEEE 802.1X Authentication with Wol
222
Configuring MAC Authentication Bypass
222
Configuring NAC Layer 2 IEEE 802.1X Validation
223
Configuring Web Authentication
224
Disabling IEEE 802.1X Authentication on the Port
227
Resetting the IEEE 802.1X Authentication Configuration to the Default Values
227
Displaying IEEE 802.1X Statistics and Status
228
CHAPTER 9 Configuring Interface Characteristics9-1
229
Understanding Interface Types
229
C H a P T E R 9 Configuring Interface Characteristics
230
Port-Based Vlans
230
Switch Ports
230
Routed Ports
232
Etherchannel Port Groups
233
Switch Virtual Interfaces
233
Connecting Interfaces
234
Dual-Purpose Uplink Ports
234
Management-Only Interface
235
Understanding Interface Types
230
Access Ports
231
Internal Gigabit Ethernet Ports
231
Trunk Ports
231
Tunnel Ports
232
Using Interface Configuration Mode
235
Procedures for Configuring Interfaces
236
Configuring a Range of Interfaces
237
Configuring and Using Interface Range Macros
238
Configuring Ethernet Interfaces
240
Default Ethernet Interface Configuration
240
Setting the Type of a Dual-Purpose Uplink Port
241
Configuring Interface Speed and Duplex Mode
243
Speed and Duplex Configuration Guidelines
243
Setting the Interface Speed and Duplex Parameters
244
Configuring IEEE 802.3X Flow Control
245
Configuring Auto-MDIX on an Interface
246
Adding a Description for an Interface
247
Configuring Layer 3 Interfaces
247
Configuring the System MTU
249
Monitoring and Maintaining the Interfaces
250
Monitoring Interface Status
251
Clearing and Resetting Interfaces and Counters
251
Shutting down and Restarting the Interface
252
Chapter 10 Configuring Smartports Macros
253
Understanding Smartports Macros
253
Configuring Smartports Macros
254
Default Smartports Macro Configuration
254
Smartports Macro Configuration Guidelines
255
Creating Smartports Macros
256
Applying Smartports Macros
257
Applying Cisco-Default Smartports Macros
258
Displaying Smartports Macros
260
Chapter 11 Configuring Vlans
261
Understanding Vlans
261
Supported Vlans
262
VLAN Port Membership Modes
263
Configuring Normal-Range Vlans
264
Token Ring Vlans
266
Normal-Range VLAN Configuration Guidelines
266
VLAN Configuration Mode Options
267
VLAN Configuration in Config-Vlan Mode
267
VLAN Configuration in VLAN Database Configuration Mode
267
Default Ethernet VLAN Configuration
268
Saving VLAN Configuration
267
Creating or Modifying an Ethernet VLAN
269
Deleting a VLAN
270
Assigning Static-Access Ports to a VLAN
271
Configuring Extended-Range Vlans
272
Default VLAN Configuration
272
Creating an Extended-Range VLAN
273
Extended-Range VLAN Configuration Guidelines
273
Creating an Extended-Range VLAN with an Internal VLAN ID
275
Configuring VLAN Trunks
276
Trunking Overview
276
Figure
277
Table
277
Encapsulation Types
278
Displaying Vlans
276
IEEE 802.1Q Configuration Considerations
279
Configuring VMPS
287
Dynamic-Access Port VLAN Membership
288
Understanding VMPS
288
Default VMPS Client Configuration
289
VMPS Configuration Guidelines
289
Configuring Dynamic-Access Ports on VMPS Clients
290
Configuring the VMPS Client
290
Entering the IP Address of the VMPS
290
Changing the Reconfirmation Interval
291
Reconfirming VLAN Memberships
291
Changing the Retry Count
292
Monitoring the VMPS
292
Troubleshooting Dynamic-Access Port VLAN Membership
293
VMPS Configuration Example
293
Configuring VTP
295
Understanding VTP
295
Configuring an Ethernet Interface as a Trunk Port
279
Interaction with Other Features
280
Configuring a Trunk Port
281
Defining the Allowed Vlans on a Trunk
282
Changing the Pruning-Eligible List
283
Configuring the Native VLAN for Untagged Traffic
283
Default Layer 2 Ethernet Interface VLAN Configuration
279
Configuring Trunk Ports for Load Sharing
284
Load Sharing Using STP Port Priorities
284
Load Sharing Using STP Path Cost
286
Advertisement
Cisco 3020 - Cisco Catalyst Blade Switch Configuration Manual (712 pages)
Cisco Catalyst Blade Switch 3020 for HP Software Configuration Guide, Rel. 12.2(25)SEF1
Brand:
Cisco
| Category:
Switch
| Size: 8.23 MB
Table of Contents
Table of Contents
4
Related Publications
30
Obtaining Documentation
31
Product Documentation DVD
31
Cisco Product Security Overview
32
Documentation Feedback
32
Ordering Documentation
32
Obtaining Technical Assistance
33
Reporting Security Problems in Cisco Products
33
Submitting a Service Request
34
Definitions of Service Request Severity
35
Obtaining Additional Publications and Information
35
Performance Features
38
Manageability Features
39
Management Options
39
Availability and Redundancy Features
40
Security Features
41
Vlan Features
41
Qos and Cos Features
43
Default Settings after Initial Switch Configuration
44
Monitoring Features
44
Design Concepts for Using the Switch
46
Chapter 2 Using the Command-Line Interface
49
Where to Go Next
49
Understanding Command Modes
51
Understanding the Help System
53
Understanding Abbreviated Commands
54
Understanding no and Default Forms of Commands
54
Understanding CLI Error Messages
55
Using Configuration Logging
55
Using Command History
56
Changing the Command History Buffer Size
56
Recalling Commands
56
Disabling the Command History Feature
57
Using Editing Features
57
Enabling and Disabling Editing Features
57
Editing Commands through Keystrokes
57
Editing Command Lines that Wrap
59
Searching and Filtering Output of Show and more Commands
60
Accessing the CLI
60
Accessing the CLI through a Console Connection or through Telnet
60
Chapter 3 Assigning the Switch IP Address and Default Gateway
63
Understanding the Boot Process
63
Assigning Switch Information
64
Default Switch Information
65
Understanding DHCP-Based Autoconfiguration
65
DHCP Client Request Process
66
Configuring DHCP-Based Autoconfiguration
67
Configuring the TFTP Server
67
DHCP Server Configuration Guidelines
67
Configuring the DNS
68
Configuring the Relay Device
68
Obtaining Configuration Files
69
Example Configuration
70
Manually Assigning IP Information
72
Checking and Saving the Running Configuration
72
Modifying the Startup Configuration
75
Default Boot Configuration
76
Automatically Downloading a Configuration File
76
Specifying the Filename to Read and Write the System Configuration
76
Booting Manually
77
Booting a Specific Software Image
78
Controlling Environment Variables
78
Scheduling a Reload of the Software Image
80
Configuring a Scheduled Reload
80
Displaying Scheduled Reload Information
81
Chapter 4 Configuring Cisco IOS CNS Agents
83
Understanding Cisco Configuration Engine Software
83
Configuration Service
84
Event Service
85
Namespace Mapper
85
What You Should Know about the CNS Ids and Device Hostnames
85
Configid
85
Deviceid
86
Hostname and Deviceid
86
Using Hostname, Deviceid, and Configid
86
Understanding Cisco IOS Agents
87
Initial Configuration
87
Incremental (Partial) Configuration
88
Synchronized Configuration
88
Configuring Cisco IOS Agents
88
Enabling Automated CNS Configuration
88
Enabling the CNS Event Agent
90
Enabling the Cisco IOS CNS Agent
91
Enabling an Initial Configuration
91
Enabling a Partial Configuration
93
Displaying CNS Configuration
94
CHAPTER 5 Administering the Switch
96
Managing the System Time and Date
96
Understanding Network Time Protocol
96
Configuring NTP
97
Configuring NTP Authentication
98
Default NTP Configuration
98
Configuring NTP Associations
99
Configuring NTP Broadcast Service
100
Configuring NTP Access Restrictions
102
Configuring the Source IP Address for NTP Packets
104
Displaying the NTP Configuration
105
Configuring Time and Date Manually
105
Setting the System Clock
105
Displaying the Time and Date Configuration
106
Configuring the Time Zone
106
Configuring Summer Time (Daylight Saving Time)
107
Configuring a System Name and Prompt
108
Default System Name and Prompt Configuration
109
Configuring a System Name
109
Understanding DNS
109
Default DNS Configuration
110
Setting up DNS
110
Displaying the DNS Configuration
111
Creating a Banner
111
Default Banner Configuration
111
Configuring a Message-Of-The-Day Login Banner
112
Configuring a Login Banner
113
Managing the MAC Address Table
113
Building the Address Table
114
MAC Addresses and Vlans
114
Default MAC Address Table Configuration
115
Changing the Address Aging Time
115
Removing Dynamic Address Entries
116
Configuring MAC Address Notification Traps
116
Adding and Removing Static Address Entries
118
Configuring Unicast MAC Address Filtering
119
Displaying Address Table Entries
120
Managing the ARP Table
120
CHAPTER 6 Configuring Switch-Based Authentication
121
Preventing Unauthorized Access to Your Switch
121
Protecting Access to Privileged EXEC Commands
122
Default Password and Privilege Level Configuration
122
Setting or Changing a Static Enable Password
123
Protecting Enable and Enable Secret Passwords with Encryption
123
Disabling Password Recovery
125
Setting a Telnet Password for a Terminal Line
126
Configuring Username and Password Pairs
126
Configuring Multiple Privilege Levels
127
Setting the Privilege Level for a Command
128
Changing the Default Privilege Level for Lines
129
Logging into and Exiting a Privilege Level
129
Controlling Switch Access with TACACS
130
Understanding TACACS
130
TACACS+ Operation
132
Configuring TACACS
132
Default TACACS+ Configuration
133
Identifying the TACACS+ Server Host and Setting the Authentication Key
133
Configuring TACACS+ Login Authentication
134
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
136
Starting TACACS+ Accounting
137
Displaying the TACACS+ Configuration
137
Controlling Switch Access with RADIUS
137
Understanding RADIUS
138
RADIUS Operation
139
Configuring RADIUS
140
Default RADIUS Configuration
140
Identifying the RADIUS Server Host
140
Configuring RADIUS Login Authentication
143
Defining AAA Server Groups
145
Configuring RADIUS Authorization for User Privileged Access and Network Services
147
Starting RADIUS Accounting
148
Configuring Settings for All RADIUS Servers
149
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
149
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
151
Displaying the RADIUS Configuration
151
Controlling Switch Access with Kerberos
152
Understanding Kerberos
152
Kerberos Operation
154
Authenticating to a Boundary Switch
154
Authenticating to Network Services
155
Obtaining a TGT from a KDC
155
Configuring Kerberos
155
Configuring the Switch for Local Authentication and Authorization
156
Configuring the Switch for Secure Shell
157
Understanding SSH
158
SSH Servers, Integrated Clients, and Supported Versions
158
Limitations
159
Configuring SSH
159
Configuration Guidelines
159
Setting up the Switch to Run SSH
159
Configuring the SSH Server
161
Displaying the SSH Configuration and Status
161
Configuring the Switch for Secure Socket Layer HTTP
162
Understanding Secure HTTP Servers and Clients
162
Certificate Authority Trustpoints
162
Ciphersuites
164
Configuring Secure HTTP Servers and Clients
164
Default SSL Configuration
164
Configuring a CA Trustpoint
165
SSL Configuration Guidelines
165
Configuring the Secure HTTP Server
166
Configuring the Secure HTTP Client
167
Displaying Secure HTTP Server and Client Status
168
Configuring the Switch for Secure Copy Protocol
168
Information about Secure Copy
169
Understanding IEEE 802.1X Port-Based Authentication
171
CHAPTER 7 Configuring IEEE 802.1X Port-Based Authentication
172
Device Roles
172
Authentication Process
173
Authentication Initiation and Message Exchange
175
Ports in Authorized and Unauthorized States
177
IEEE 802.1X Host Mode
178
IEEE 802.1X Accounting
179
IEEE 802.1X Accounting Attribute-Value Pairs
179
Using IEEE 802.1X Authentication with VLAN Assignment
180
Using IEEE 802.1X Authentication with Per-User Acls
181
Using IEEE 802.1X Authentication with Guest VLAN
182
Using IEEE 802.1X Authentication with Restricted VLAN
183
Using IEEE 802.1X Authentication with Inaccessible Authentication Bypass
184
Using IEEE 802.1X Authentication with Voice VLAN Ports
185
Using IEEE 802.1X Authentication with Port Security
185
Using IEEE 802.1X Authentication with Wake-On-LAN
186
Using IEEE 802.1X Authentication with MAC Authentication Bypass
187
Configuring IEEE 802.1X Authentication
188
Default IEEE 802.1X Authentication Configuration
189
IEEE 802.1X Authentication Configuration Guidelines
190
IEEE 802.1X Authentication
190
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
191
MAC Authentication Bypass
192
Configuring IEEE 802.1X Authentication
192
Configuring the Switch-To-RADIUS-Server Communication
193
Configuring the Host Mode
195
Configuring Periodic Re-Authentication
195
Manually Re-Authenticating a Client Connected to a Port
196
Changing the Quiet Period
196
Changing the Switch-To-Client Retransmission Time
197
Setting the Switch-To-Client Frame-Retransmission Number
198
Setting the Re-Authentication Number
199
Configuring IEEE 802.1X Accounting
199
Configuring a Guest VLAN
200
Configuring a Restricted VLAN
201
Configuring the Inaccessible Authentication Bypass Feature
203
Configuring IEEE 802.1X Authentication with Wol
205
Configuring MAC Authentication Bypass
206
Configuring IEEE 802.1X Authentication Using a RADIUS Server
207
Disabling IEEE 802.1X Authentication on the Port
208
Resetting the IEEE 802.1X Authentication Configuration to the Default Values
208
Displaying IEEE 802.1X Statistics and Status
209
CHAPTER 8 Configuring Interface Characteristics
211
Understanding Interface Types
211
Port-Based Vlans
212
Switch Ports
212
Internal Gigabit Ethernet Ports
212
Access Ports
213
Trunk Ports
213
Etherchannel Port Groups
214
Dual-Purpose Uplink Ports
214
Connecting Interfaces
215
Management-Only Interface
215
Using Interface Configuration Mode
216
Procedures for Configuring Interfaces
216
Configuring a Range of Interfaces
217
Configuring and Using Interface Range Macros
218
Configuring Ethernet Interfaces
220
Default Ethernet Interface Configuration
220
Configuring Interface Speed and Duplex Mode
221
Setting the Type of a Dual-Purpose Uplink Port
221
Speed and Duplex Configuration Guidelines
221
Setting the Interface Speed and Duplex Parameters
224
Configuring IEEE 802.3X Flow Control
225
Configuring Auto-MDIX on an Interface
226
Adding a Description for an Interface
227
Configuring the System MTU
228
Monitoring and Maintaining the Interfaces
229
Monitoring Interface Status
229
Clearing and Resetting Interfaces and Counters
230
Shutting down and Restarting the Interface
230
Cisco 3020 - Cisco Catalyst Blade Switch Command Reference Manual (744 pages)
Cisco Catalyst Blade Switch 3020 for HP Command Reference, Rel. 12.2(25)SEF1
Brand:
Cisco
| Category:
Switch
| Size: 6.59 MB
Table of Contents
Table of Contents
3
Preface
15
Audience
15
Purpose
15
Conventions
15
Related Publications
16
Obtaining Documentation
17
Cisco.com
17
Product Documentation DVD
17
Ordering Documentation
17
Documentation Feedback
18
Cisco Product Security Overview
18
Reporting Security Problems in Cisco Products
18
Obtaining Technical Assistance
19
Cisco Technical Support & Documentation Website
19
Submitting a Service Request
20
Definitions of Service Request Severity
20
Obtaining Additional Publications and Information
20
Chapter 1 Using the Command-Line Interface
23
CLI Command Modes
23
User EXEC Mode
25
Privileged EXEC Mode
25
Global Configuration Mode
25
Interface Configuration Mode
26
Config-Vlan Mode
26
VLAN Configuration Mode
27
Line Configuration Mode
27
Chapter 2 Cisco Catalyst Blade Switch 3020 for HP Cisco IOS Commands
29
Aaa Accounting Dot1X
29
Aaa Authentication Dot1X
31
Aaa Authorization Network
33
Action
34
Archive Download-Sw
36
Archive Tar
39
Archive Upload-Sw
42
Auto Qos Voip
44
Boot Boothlpr
48
Boot Config-File
49
Boot Enable-Break
50
Boot Helper
51
Boot Helper-Config-File
52
Boot Manual
53
Boot Private-Config-File
54
Boot System
55
Channel-Group
56
Channel-Protocol
59
Class
60
Class-Map
62
Clear Dot1X
64
Clear Eap Sessions
65
Clear Lacp
66
Clear Mac Address-Table
67
Clear Mac Address-Table Move Update
69
Clear Pagp
70
Clear Port-Security
71
Clear Spanning-Tree Counters
73
Clear Spanning-Tree Detected-Protocols
74
Clear Vmps Statistics
75
Clear Vtp Counters
76
Define Interface-Range
77
Delete
79
Deny (MAC Access-List Configuration)
80
Dot1X
83
Dot1X Auth-Fail Max-Attempts
85
Dot1X Auth-Fail Vlan
87
Dot1X Control-Direction
89
Dot1X Critical (Global Configuration)
91
Dot1X Critical (Interface Configuration)
93
Dot1X Default
95
Dot1X Guest-Vlan
96
Dot1X Host-Mode
98
Dot1X Initialize
99
Dot1X Mac-Auth-Bypass
100
Dot1X Max-Reauth-Req
102
Dot1X Max-Req
103
Dot1X Pae
104
Dot1X Port-Control
105
Dot1X Re-Authenticate
107
Dot1X Reauthentication
108
Dot1X Timeout
109
Duplex
112
Errdisable Detect Cause
114
Errdisable Recovery
116
Exception Crashinfo
118
Flowcontrol
119
Interface Port-Channel
121
Interface Range
123
Interface Vlan
125
Ip Access-Group
126
Ip Address
128
Ip Dhcp Snooping
130
Ip Dhcp Snooping Information Option
131
Ip Dhcp Snooping Information Option Allow-Untrusted
133
Ip Dhcp Snooping Information Option Format Remote-ID
135
Ip Dhcp Snooping Limit Rate
137
Ip Dhcp Snooping Trust
138
Ip Dhcp Snooping Verify
139
Ip Dhcp Snooping Vlan
140
Ip Dhcp Snooping Vlan Information Option Format-Type Circuit-ID String
141
Ip Igmp Filter
143
Ip Igmp Max-Groups
144
Ip Igmp Profile
146
Ip Igmp Snooping
148
Ip Igmp Snooping Last-Member-Query-Interval
150
Ip Igmp Snooping Querier
152
Ip Igmp Snooping Report-Suppression
154
Ip Igmp Snooping Tcn
156
Ip Igmp Snooping Tcn Flood
158
Ip Igmp Snooping Vlan Immediate-Leave
159
Ip Igmp Snooping Vlan Mrouter
161
Ip Igmp Snooping Vlan Static
163
Advertisement
Cisco 3020 - Cisco Catalyst Blade Switch Getting Started (122 pages)
VPN 3000 Series Concentrator
Brand:
Cisco
| Category:
Network Hardware
| Size: 2.03 MB
Table of Contents
Table of Contents
3
Audience
5
Organization
5
Preface
5
Related Documentation
6
Conventions
8
Obtaining Documentation
9
Obtaining Technical Assistance
12
Obtaining Additional Publications and Information
14
Chapter 1 Understanding the VPN 3000 Concentrator
15
Hardware Features
16
Software Features
18
How the VPN Concentrator Works
21
Where the VPN Concentrator Fits in Your Network
22
Physical Specifications
22
Chapter 2 Installing and Powering up the VPN Concentrator
25
Preparing to Install
25
Unpacking
27
Installing the VPN Concentrator Hardware
28
Connecting Hardware
32
Powering up
35
Beginning Quick Configuration
36
Chapter 3 Using the VPN Concentrator Manager for Quick Configuration
43
Logging in to the VPN Concentrator Manager
44
Starting Quick Configuration
45
Configuring IP Interfaces
46
Configuring System Information
49
Configuring Tunneling Protocols and Options
51
Configuring Address Assignment
52
Configuring Authentication
53
Configuring the Internal Server User Database
59
Configuring the Ipsec Group
60
Changing Admin Password
63
Finishing Quick Configuration
64
Saving the Active Configuration
64
What Next
65
Using Other VPN Concentrator Manager Functions
65
Understanding the VPN Concentrator Manager Window
66
Chapter 4 Using the Command-Line Interface for Quick Configuration
69
Configuring Ethernet Interfaces
70
Configuring System Information
72
Configuring Tunneling Protocols and Options
73
Configuring Address Assignment
74
Configuring Authentication
76
Configuring the Ipsec Group
82
Changing the Admin Password
85
Completing Quick Configuration
85
Saving the Active Configuration
86
Exiting the CLI
86
What Next
86
Cisco 3020 - Cisco Catalyst Blade Switch Release Note (54 pages)
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(40)SE1 and Later
Brand:
Cisco
| Category:
Switch
| Size: 0.81 MB
Table of Contents
Hardware Requirements
3
System Requirements
2
Table
2
Table of Contents
3
Upgrading the Switch Software
3
Table
3
Hardware Requirements
3
Software Requirements
3
Finding the Software Version and Feature Set" Section
4
Deciding Which Files to Use" Section
4
Upgrading a Switch by Using the Device Manager" Section
5
Upgrading a Switch by Using the CLI" Section
5
Recovering from a Software Failure" Section
6
Installation Notes
6
New Software Features
6
Limitations and Restrictions
7
Cisco IOS Limitations" Section
7
Configuration" Section
7
Limitations and Restrictions
7
Ethernet" Section
8
IP Telephony" Section
8
IP" Section
8
Logging Event-Spanning-Tree Command" Section
9
MAC Addressing Multicasting" Section
9
Qos" Section
10
SPAN and RSPAN" Section
10
Device Manager Limitations" Section
11
Trunking" Section
11
VLAN" Section
11
Important Notes
11
Open Caveats
14
Documentation Updates
17
Updates to Software Configuration Guide
18
Configuration Replacement and Rollback" Section
18
Understanding Configuration Replacement and Rollback
19
Configuration Guidelines
20
Configuring the Configuration Archive
20
Performing a Configuration Replacement or Rollback Operation
21
Dot1X Timeout TX-Period" Section
18
MAC Address-Table Move Update" Section
18
LLDP-Med Location TLV" Section
22
Configuring Private Vlans" Section
23
Monitoring Private Vlans
36
Show Location
44
Updates to System Messages Guides" Section
51
Changed System Messages" Section
52
Related Documentation
52
Cisco 3020 - Cisco Catalyst Blade Switch Getting Started Manual (37 pages)
Cisco Catalyst Blade Switch 3020 for HP
Brand:
Cisco
| Category:
Switch
| Size: 2.5 MB
Table of Contents
Taking out What You Need
2
Hp C-Class Bladesystem Architecture
5
Installing the Switch Module in the Blade Server
6
Switch Module IP Addresses
9
Running Express Setup
9
Information You Need to Run Express Setup
10
Using the Onboard Administrator to Assign an IP Address to the Switch Module Fa0 Interface
14
Completing the Express Setup Fields
17
Refreshing the PC IP Address
19
Using the Device Manager
19
Managing the Switch Module
19
Command Line Interface
20
Other Management Options
21
In Case of Difficulty
21
Troubleshooting Express Setup
22
Resetting the Switch Module
23
Accessing Help Online
23
For more Information
24
Obtaining Documentation
25
Product Documentation DVD
25
Ordering Documentation
25
Documentation Feedback
26
Cisco Product Security Overview
26
Reporting Security Problems in Cisco Products
27
Obtaining Technical Assistance
28
Cisco Technical Support & Documentation Website
28
Submitting a Service Request
28
Definitions of Service Request Severity
29
Obtaining Additional Publications and Information
29
Cisco 90-Day Limited Hardware Warranty Terms
31
Cisco 3020 - Cisco Catalyst Blade Switch Release Note (41 pages)
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(35)SE and later
Brand:
Cisco
| Category:
Switch
| Size: 0.53 MB
Table of Contents
System Requirements
2
Hardware Supported
2
Hardware Requirements
2
Software Requirements
3
Upgrading the Switch Software
3
Recovering from a Software Failure
5
Installation Notes
6
Limitations and Restrictions
6
Important Notes
11
Open Caveats
13
Documentation Updates
19
Dot1X Fallback
23
Fallback Profile
24
Show Fallback Profile
27
Related Documentation
33
Obtaining Documentation
34
Product Documentation DVD
34
Ordering Documentation
34
Documentation Feedback
34
Cisco Product Security Overview
35
Reporting Security Problems in Cisco Products
35
Obtaining Technical Assistance
36
Submitting a Service Request
37
Definitions of Service Request Severity
37
Obtaining Additional Publications and Information
38
Cisco 3020 - Cisco Catalyst Blade Switch Getting Started Manual (31 pages)
Catalyst Blade Switch 3000 Series for HP
Brand:
Cisco
| Category:
Switch
| Size: 1.03 MB
Table of Contents
About this Guide
2
Shipping Box Contents
3
Taking out What You Need
3
Cisco Catalyst Blade Switch 3020 for HP
6
Mode Button
7
Health LED
7
Installing the Switch Module in the Blade Enclosure
10
Using the Onboard Administrator to Assign an IP Address to the Switch Module and Running Express Setup
13
Using Express Setup
16
Using the Device Manager
19
Using the Command Line Interface
21
Other Management Options
22
Stack Cabling Configurations
24
Connecting the Stackwise Plus Cables
24
Install and Connect to Devices in the 10-Gigabit Ethernet Slots
26
Verify Port Connectivity
27
In Case of Difficulty
27
Resetting the Switch Module
27
Accessing Help Online
28
For more Information
28
Cisco 3020 - Cisco Catalyst Blade Switch Release Note (27 pages)
Release Notes for Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(50)SE and Later
Brand:
Cisco
| Category:
Switch
| Size: 0.26 MB
Table of Contents
System Requirements
2
Hardware Supported
2
Hardware Requirements
3
Software Requirements
3
Upgrading the Switch Software
3
Recovering from a Software Failure
6
Installation Notes
6
New Software Features
6
Limitations and Restrictions
7
Important Notes
11
Open Caveats
13
Documentation Updates
17
Related Documentation
25
Cisco 3020 - Cisco Catalyst Blade Switch Release Note (23 pages)
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(37)SE and later
Brand:
Cisco
| Category:
Switch
| Size: 0.42 MB
Table of Contents
System Requirements
2
Hardware Supported
2
Hardware Requirements
3
Software Requirements
3
Upgrading the Switch Software
3
Recovering from a Software Failure
6
Installation Notes
6
New Software Features
6
Limitations and Restrictions
7
Important Notes
11
Open Caveats
13
Documentation Updates
20
Related Documentation
22
Cisco 3020 - Cisco Catalyst Blade Switch Release Note (21 pages)
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(44)SE
Brand:
Cisco
| Category:
Switch
| Size: 0.27 MB
Table of Contents
System Requirements
2
Hardware Supported
2
Hardware Requirements
2
Software Requirements
3
Upgrading the Switch Software
3
Recovering from a Software Failure
6
Installation Notes
6
New Software Features
6
Limitations and Restrictions
7
Important Notes
12
Open Caveats
14
Resolved Caveats
15
Documentation Updates
17
Related Documentation
20
Obtaining Documentation, Obtaining Support, and Security Guidelines
20
Cisco 3020 - Cisco Catalyst Blade Switch Installation Manual (21 pages)
Brand:
Cisco
| Category:
Switch
| Size: 0.99 MB
Table of Contents
Switch Installation
1
Preparing for Installation
1
Installation Guidelines
3
Verifying Package Contents
4
Installing the Switch Module in the Blade Server
6
Switch Module Ip Addresses
8
Running Express Setup
9
Refreshing the Pc Ip Address
15
Installing and Removing Sfp Modules
15
Installing Sfp Modules into Sfp Module Slots
16
Removing Sfp Modules from Sfp Module Slots
17
Connecting to Sfp Modules
19
Where to Go Next
20
Cisco 3020 - Cisco Catalyst Blade Switch Quickspecs (12 pages)
Blade Switch for HP c-Class BladeSystem
Brand:
Cisco
| Category:
Switch
| Size: 0.23 MB
Advertisement
Related Products
Cisco Small Business 300
Cisco Catalyst 3030
Cisco Catalyst 3032
Cisco Catalyst 3040
Cisco 300 Series
Cisco Catalyst 3012
Cisco Small Business 300 1.1 Series
Cisco SG 300- 28P
Cisco Nexus 3048TP
Cisco 3750E-24PD - Catalyst Switch - Stackable
Cisco Categories
Switch
IP Phone
Network Router
Wireless Access Point
Conference System
More Cisco Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL