B 1523e Consolidated 2960cx 3560cx CG
B 1523e Consolidated 2960cx 3560cx CG
2(3)E
(Catalyst 3560-CX and 2960-CX Switches)
First Published: 2015-03-11
Last Modified: 2015-07-10
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
© 2015 Cisco Systems, Inc. All rights reserved.
CONTENTS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
iii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
iv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
v
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
vi
Contents
PART II IPv6 95
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
vii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
viii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
ix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
x
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xiii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xiv
Contents
Examples 284
Examples: PVST+ Simulation 284
Monitoring MST Configuration and Status 287
Feature Information for MSTP 288
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xv
Contents
Examples 316
Examples: Configuring PortFast Edge on a Specified Interface 316
Examples: Configuring a PortFast Network Port on a Specified Interface 316
Example: Configuring Bridge Assurance 317
Monitoring the Spanning-Tree Status 318
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xvi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xvii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xviii
Contents
CHAPTER 21 Configuring Flex Links and the MAC Address-Table Move Update Feature 405
Finding Feature Information 405
Restrictions for Configuring Flex Links and MAC Address-Table Move Update 405
Information About Flex Links and MAC Address-Table Move Update 406
Flex Links 406
Flex Links Configuration 406
VLAN Flex Links Load Balancing and Support 407
Multicast Fast Convergence with Flex Links Failover 407
Learning the Other Flex Links Port as the mrouter Port 407
Generating IGMP Reports 408
Leaking IGMP Reports 408
MAC Address-Table Move Update 408
Flex Links VLAN Load Balancing Configuration Guidelines 410
MAC Address-Table Move Update Configuration Guidelines 410
Default Flex Links and MAC Address-Table Move Update Configuration 410
How to Configure Flex Links and the MAC Address-Table Move Update Feature 410
Configuring Flex Links 410
Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages 415
Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update 415
Configuration Examples for Flex Links 416
Configuring Flex Links: Examples 416
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xx
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxiii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxiv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxvi
Contents
CHAPTER 33 Configuring Cache Services Using the Web Cache Communication Protocol 631
Finding Feature Information 631
Prerequisites for WCCP 631
Restrictions for WCCP 632
Information About WCCP 633
WCCP Overview 633
WCCP Message Exchange 633
WCCP Negotiation 634
MD5 Security 634
Packet Redirection and Service Groups 634
How to Configure WCCP 636
Default WCCP Configuration 636
Enabling the Cache Service 636
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxvii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxviii
Contents
Examples: Classifying, Policing, and Marking Traffic by Using Aggregate Policers 739
Examples: Configuring DSCP Maps 740
Examples: Configuring Ingress Queue Characteristics 742
Examples: Configuring Egress Queue Characteristics 743
Where to Go Next 744
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxx
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxiii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxiv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxvi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxvii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxviii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xxxix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xl
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xli
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xlii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xliii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xliv
Contents
CHAPTER 50 Controlling Switch Access with Passwords and Privilege Levels 1153
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xlv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xlvi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xlvii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xlviii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
xlix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
l
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
li
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
liii
Contents
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs 1390
VLAN ID-based MAC Authentication 1390
802.1x Authentication with Guest VLAN 1390
802.1x Authentication with Restricted VLAN 1391
802.1x Authentication with Inaccessible Authentication Bypass 1392
Inaccessible Authentication Bypass Support on Multiple-Authentication Ports 1392
Inaccessible Authentication Bypass Authentication Results 1393
Inaccessible Authentication Bypass Feature Interactions 1393
802.1x Critical Voice VLAN 1394
802.1x User Distribution 1394
802.1x User Distribution Configuration Guidelines 1395
IEEE 802.1x Authentication with Voice VLAN Ports 1395
IEEE 802.1x Authentication with Port Security 1396
IEEE 802.1x Authentication with Wake-on-LAN 1396
IEEE 802.1x Authentication with MAC Authentication Bypass 1396
Network Admission Control Layer 2 IEEE 802.1x Validation 1398
Flexible Authentication Ordering 1398
Open1x Authentication 1399
Multidomain Authentication 1399
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT) 1401
Voice Aware 802.1x Security 1402
Common Session ID 1403
How to Configure 802.1x Port-Based Authentication 1403
Default 802.1x Authentication Configuration 1403
802.1x Authentication Configuration Guidelines 1405
802.1x Authentication 1405
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
1406
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
liv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lvi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lvii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lviii
Contents
How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface
1545
How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface 1553
How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface 1554
How to Configure IPv6 Source Guard 1555
How to Attach an IPv6 Source Guard Policy to an Interface 1556
How to Configure IPv6 Source Guard 1557
How to Attach an IPv6 Source Guard Policy to an Interface 1558
How to attach an IPv6 Source Guard Policy to a Layer 2 EtherChannel Interface 1559
How to Configure IPv6 Prefix Guard 1560
How to Attach an IPv6 Prefix Guard Policy to an Interface 1561
How to attach an IPv6 Prefix Guard Policy to a Layer 2 EtherChannel Interface 1562
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lx
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxiii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxiv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxv
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxvi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxvii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxviii
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxix
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxx
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxxi
Contents
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxxii
Preface
This book describes configuration information and examples for NetFlow Lite on the switch.
• Document Conventions, on page lxxiii
• Related Documentation, on page lxxv
• Obtaining Documentation and Submitting a Service Request, on page lxxv
Document Conventions
This document uses the following conventions:
Convention Description
^ or Ctrl Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For
example, the key combination ^D or Ctrl-D means that you hold down the Control
key while you press the D key. (Keys are indicated in capital letters but are not
case sensitive.)
bold font Commands and keywords and user-entered text appear in bold font.
Italic font Document titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
Courier font Terminal sessions and information the system displays appear in courier font.
Bold Courier font Bold Courier font indicates text that the user must enter.
[x] Elements in square brackets are optional.
... An ellipsis (three consecutive nonbolded periods without spaces) after a syntax
element indicates that the element can be repeated.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxxiii
Preface
Preface
Convention Description
[x {y | z}] Nested set of square brackets or braces indicate optional or required choices within
optional or required elements. Braces and a vertical bar within square brackets
indicate a required choice within an optional element.
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual.
Tip Means the following information will help you solve a problem.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or
loss of data.
Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxxiv
Preface
Related Documentation
Related Documentation
Note Before installing or upgrading the switch, refer to the switch release notes.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxxv
Preface
Obtaining Documentation and Submitting a Service Request
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
lxxvi
CHAPTER 1
Using the Command-Line Interface
• Information About Using the Command-Line Interface, on page 1
• How to Use the CLI to Configure Features, on page 5
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1
Using the Command-Line Interface
Command Modes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
2
Using the Command-Line Interface
Understanding Abbreviated Commands
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
3
Using the Command-Line Interface
Configuration Logging
Configuration Logging
You can log and view changes to the switch configuration. You can use the Configuration Change Logging
and Notification feature to track changes on a per-session and per-user basis. The logger tracks each
configuration command that is applied, the user who entered the command, the time that the command was
entered, and the parser return code for the command. This feature includes a mechanism for asynchronous
notification to registered applications whenever the configuration changes. You can choose to have the
notifications sent to the syslog.
SUMMARY STEPS
1. help
2. abbreviated-command-entry ?
3. abbreviated-command-entry <Tab>
4. ?
5. command ?
6. command keyword ?
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
4
Using the Command-Line Interface
How to Use the CLI to Configure Features
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
5
Using the Command-Line Interface
Recalling Commands
SUMMARY STEPS
1. terminal history [size number-of-lines]
DETAILED STEPS
Recalling Commands
To recall commands from the history buffer, perform one of the actions listed in this table. These actions are
optional.
Note The arrow keys function only on ANSI-compatible terminals such as VT100s.
SUMMARY STEPS
1. Ctrl-P or use the up arrow key
2. Ctrl-N or use the down arrow key
3. show history
DETAILED STEPS
Step 2 Ctrl-N or use the down arrow key Returns to more recent commands in the history buffer after
recalling commands with Ctrl-P or the up arrow key. Repeat
the key sequence to recall successively more recent
commands.
Step 3 show history Lists the last several commands that you just entered in
privileged EXEC mode. The number of commands that
Example:
appear is controlled by the setting of the terminal history
SwitchDevice# show history global configuration command and the history line
configuration command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
6
Using the Command-Line Interface
Enabling and Disabling Editing Features
SUMMARY STEPS
1. terminal no history
DETAILED STEPS
SUMMARY STEPS
1. terminal editing
2. terminal no editing
DETAILED STEPS
Step 2 terminal no editing Disables the enhanced editing mode for the current terminal
session in privileged EXEC mode.
Example:
SwitchDevice# terminal no editing
Note The arrow keys function only on ANSI-compatible terminals such as VT100s.
Ctrl-B or use the left arrow key Moves the cursor back one character.
Ctrl-F or use the right arrow Moves the cursor forward one character.
key
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
7
Using the Command-Line Interface
Editing Command Lines That Wrap
Ctrl-T Transposes the character to the left of the cursor with the character located
at the cursor.
Delete or Backspace key Erases the character to the left of the cursor.
Ctrl-K Deletes all characters from the cursor to the end of the command line.
Ctrl-U or Ctrl-X Deletes all characters from the cursor to the beginning of the command
line.
Esc U Capitalizes letters from the cursor to the end of the word.
Return key Scrolls down a line or screen on displays that are longer than the terminal
screen can display.
Note The More prompt is used for any output that has more lines
than can be displayed on the terminal screen, including show
command output. You can use the Return and Space bar
keystrokes whenever you see the More prompt.
Ctrl-L or Ctrl-R Redisplays the current command line if the switch suddenly sends a
message to your screen.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
8
Using the Command-Line Interface
Searching and Filtering Output of show and more Commands
Note The arrow keys function only on ANSI-compatible terminals such as VT100s.
The following example shows how to wrap a command line that extends beyond a single line on the screen.
SUMMARY STEPS
1. access-list
2. Ctrl-A
3. Return key
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
9
Using the Command-Line Interface
Accessing the CLI Through a Console Connection or Through Telnet
SUMMARY STEPS
1. {show | more} command | {begin | include | exclude} regular-expression
DETAILED STEPS
Procedure
• Connect the switch console port to a management station or dial-up modem. For information about
connecting to the console, see the switch hardware installation guide.
• Use any Telnet TCP/IP or encrypted Secure Shell (SSH) package from a remote management station.
The switch must have network connectivity with the Telnet or SSH client, and the switch must have an
enable secret password configured.
• The switch supports up to 16 simultaneous Telnet sessions. Changes made by one Telnet user are
reflected in all other Telnet sessions.
• The switch supports up to five simultaneous secure SSH sessions.
After you connect through the console port, through a Telnet session or through an SSH session, the
user EXEC prompt appears on the management station.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
10
PA R T I
Interface and Hardware
• Configuring Interface Characteristics, on page 13
• Configuring Auto-MDIX, on page 39
• Configuring LLDP, LLDP-MED, and Wired Location Service, on page 43
• Configuring MultiGigabit Ports on WS-C3560CX-8PD-S, on page 61
• Configuring System MTU, on page 65
• Configuring Boot Fast, on page 69
• Configuring PoE, on page 73
• Configuring EEE, on page 91
CHAPTER 2
Configuring Interface Characteristics
• Finding Feature Information, on page 13
• Information About Configuring Interface Characteristics, on page 13
• How to Configure Interface Characteristics, on page 21
• Monitoring Interface Characteristics, on page 34
• Configuration Examples for Interface Characteristics, on page 35
Port-Based VLANs
A VLAN is a switched network that is logically segmented by function, team, or application, without regard
to the physical location of the users. Packets received on a port are forwarded only to ports that belong to the
same VLAN as the receiving port. Network devices in different VLANs cannot communicate with one another
without a Layer 3 device to route traffic between the VLANs.
VLAN partitions provide hard firewalls for traffic in the VLAN, and each VLAN has its own MAC address
table. A VLAN comes into existence when a local port is configured to be associated with the VLAN, when
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
13
Interface and Hardware
Switch Ports
the VLAN Trunking Protocol (VTP) learns of its existence from a neighbor on a trunk, or when a user creates
a VLAN. VLANs can be formed with ports across the stack.
To configure VLANs, use the vlan vlan-id global configuration command to enter VLAN configuration mode.
The VLAN configurations for normal-range VLANs (VLAN IDs 1 to 1005) are saved in the VLAN database.
If VTP is version 1 or 2, to configure extended-range VLANs (VLAN IDs 1006 to 4094), you must first set
VTP mode to transparent. Extended-range VLANs created in transparent mode are not added to the VLAN
database but are saved in the switch running configuration. With VTP version 3, you can create extended-range
VLANs in client or server mode. These VLANs are saved in the VLAN database.
In a switch stack, the VLAN database is downloaded to all switches in a stack, and all switches in the stack
build the same VLAN database. The running configuration and the saved configuration are the same for all
switches in a stack.
Add ports to a VLAN by using the switchport interface configuration commands:
• Identify the interface.
• For a trunk port, set trunk characteristics, and, if desired, define the VLANs to which it can belong.
• For an access port, set and define the VLAN to which it belongs.
Switch Ports
Switch ports are Layer 2-only interfaces associated with a physical port. Switch ports belong to one or more
VLANs. A switch port can be an access port or a trunk port. You can configure a port as an access port or
trunk port or let the Dynamic Trunking Protocol (DTP) operate on a per-port basis to set the switchport mode
by negotiating with the port on the other end of the link. switch ports are used for managing the physical
interface and associated Layer 2 protocols and do not handle routing or bridging.
Configure switch ports by using the switchport interface configuration commands.
Access Ports
An access port belongs to and carries the traffic of only one VLAN (unless it is configured as a voice VLAN
port). Traffic is received and sent in native formats with no VLAN tagging. Traffic arriving on an access port
is assumed to belong to the VLAN assigned to the port. If an access port receives a tagged packet (Inter-Switch
Link [ISL] or IEEE 802.1Q tagged), the packet is dropped, and the source address is not learned.
The types of access ports supported are:
• Static access ports are manually assigned to a VLAN (or through a RADIUS server for use with IEEE
802.1x.
• VLAN membership of dynamic access ports is learned through incoming packets. By default, a dynamic
access port is not a member of any VLAN, and forwarding to and from the port is enabled only when
the VLAN membership of the port is discovered. Dynamic access ports on the switch are assigned to a
VLAN by a VLAN Membership Policy Server (VMPS). The VMPS can be a Catalyst 6500 series switch;
the switch cannot be a VMPS server.
You can also configure an access port with an attached Cisco IP Phone to use one VLAN for voice traffic and
another VLAN for data traffic from a device attached to the phone.
Trunk Ports
A trunk port carries the traffic of multiple VLANs and by default is a member of all VLANs in the VLAN
database.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
14
Interface and Hardware
Switch Virtual Interfaces
The switch supports only IEEE 802.1Q trunk ports. An IEEE 802.1Q trunk port supports simultaneous tagged
and untagged traffic. An IEEE 802.1Q trunk port is assigned a default port VLAN ID (PVID), and all untagged
traffic travels on the port default PVID. All untagged traffic and tagged traffic with a NULL VLAN ID are
assumed to belong to the port default PVID. A packet with a VLAN ID equal to the outgoing port default
PVID is sent untagged. All other traffic is sent with a VLAN tag.
Although by default, a trunk port is a member of every VLAN known to the VTP, you can limit VLAN
membership by configuring an allowed list of VLANs for each trunk port. The list of allowed VLANs does
not affect any other port but the associated trunk port. By default, all possible VLANs (VLAN ID 1 to 4094)
are in the allowed list. A trunk port can become a member of a VLAN only if VTP knows of the VLAN and
if the VLAN is in the enabled state. If VTP learns of a new, enabled VLAN and the VLAN is in the allowed
list for a trunk port, the trunk port automatically becomes a member of that VLAN and traffic is forwarded
to and from the trunk port for that VLAN. If VTP learns of a new, enabled VLAN that is not in the allowed
list for a trunk port, the port does not become a member of the VLAN, and no traffic for the VLAN is forwarded
to or from the port.
SVIs provide IP host connectivity only to the system. SVIs are created the first time that you enter the vlan
interface configuration command for a VLAN interface. The VLAN corresponds to the VLAN tag associated
with data frames on an ISL or IEEE 802.1Q encapsulated trunk or the VLAN ID configured for an access
port. Configure a VLAN interface for each VLAN for which you want to route traffic, and assign it an IP
address.
Although the switch stack or switch supports a total of 1005 VLANs and SVIs, the interrelationship between
the number of SVIs and routed ports and the number of other features being configured might impact CPU
performance because of hardware limitations.
When you create an SVI, it does not become active until it is associated with a physical port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
15
Interface and Hardware
EtherChannel Port Groups
Note The protocol link state for VLAN interfaces come up when the first switchport belonging to the corresponding
VLAN link comes up and is in STP forwarding state.
The default action, when a VLAN has multiple ports, is that the SVI goes down when all ports in the VLAN
go down. You can use the SVI autostate exclude feature to configure a port so that it is not included in the
SVI line-state up-or-down calculation. For example, if the only active port on the VLAN is a monitoring port,
you might configure autostate exclude on that port so that the VLAN goes down when all other ports go down.
When enabled on a port, autostate exclude applies to all VLANs that are enabled on that port.
The VLAN interface is brought up when one Layer 2 port in the VLAN has had time to converge (transition
from STP listening-learning state to forwarding state). This prevents features such as routing protocols from
using the VLAN interface as if it were fully operational and minimizes other problems, such as routing black
holes.
Note Cisco Catalyst 2960-CX and 3560-CX support a maximum of six EtherChannel port groups.
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power
source. The device does not receive redundant power when it is only connected to the PoE port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
16
Interface and Hardware
USB Mini-Type B Console Port
Console output appears on devices connected to both ports, but console input is active on only one port at a
time. By default, the USB connector takes precedence over the RJ-45 connector.
Note Windows PCs require a driver for the USB port. See the hardware installation guide for driver installation
instructions.
Use the supplied USB Type A-to-USB mini-Type B cable to connect a PC or other device to the switch. The
connected device must include a terminal emulation application. When the switch detects a valid USB
connection to a powered-on device that supports host functionality (such as a PC), input from the RJ-45
console is immediately disabled, and input from the USB console is enabled. Removing the USB connection
immediately reenables input from the RJ-45 console connection. An LED on the switch shows which console
connection is in use.
Interface Connections
Devices within a single VLAN can communicate directly through any switch. Ports in different VLANs cannot
exchange data without going through a routing device.
In the following configuration example, when Host A in VLAN 20 sends data to Host B in VLAN 30, the
data must go from Host A to the switch, to the router, back to the switch, and then to Host B.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
17
Interface and Hardware
Interface Configuration Mode
With a standard Layer 2 switch, ports in different VLANs have to exchange information through a router.
Note The Catalyst 3560-CX and 2960-CX switches do not support stacking. Ignore all references to stacking
throughout this book.
You can identify physical interfaces by physically checking the interface location on the switch. You can also
use the show privileged EXEC commands to display information about a specific interface or all the interfaces
on the switch. The remainder of this chapter primarily provides physical interface configuration procedures.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
18
Interface and Hardware
Default Ethernet Interface Configuration
Flow control Flow control is set to receive: off. It is always off for sent
packets.
Auto-MDIX Enabled.
Note The switch might not support a pre-standard
powered device—such as Cisco IP phones and
access points that do not fully support IEEE
802.3af—if that powered device is connected to the
switch through a crossover cable. This is regardless
of whether auto-MIDX is enabled on the switch
port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
19
Interface and Hardware
Interface Speed and Duplex Mode
Keepalive messages Disabled on SFP module ports; enabled on all other ports.
• If both ends of the line support autonegotiation, we highly recommend the default setting of auto
negotiation.
• If one interface supports autonegotiation and the other end does not, configure duplex and speed on both
interfaces; do not use the auto setting on the supported side.
• When STP is enabled and a port is reconfigured, the switch can take up to 30 seconds to check for loops.
The port LED is amber while STP reconfigureAs best practice, we suggest configuring the speed and
duplex options on a link to auto or to fixed on both the ends. If one side of the link is configured to auto
and the other side is configured to fixed, the link will not be up and this is expected.s.
• As best practice, we suggest configuring the speed and duplex options on a link to auto or to fixed on
both the ends. If one side of the link is configured to auto and the other side is configured to fixed, the
link will not be up and this is expected.
Caution Changing the interface speed and duplex mode configuration might shut down and re-enable the interface
during the reconfiguration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
20
Interface and Hardware
IEEE 802.3x Flow Control
Note The switch ports can receive, but not send, pause frames.
You use the flowcontrol interface configuration command to set the interface’s ability to receive pause frames
to on, off, or desired. The default state is off.
When set to desired, an interface can operate with an attached device that is required to send flow-control
packets or with an attached device that is not required to but can send flow-control packets.
These rules apply to flow control settings on the device:
• receive on (or desired): The port cannot send pause frames but can operate with an attached device that
is required to or can send pause frames; the port can receive pause frames.
• receive off: Flow control does not operate in either direction. In case of congestion, no indication is given
to the link partner, and no pause frames are sent or received by either device.
Note For details on the command settings and the resulting flow control resolution on local and remote ports, see
the flowcontrol interface configuration command in the command reference for this release.
Procedure
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
21
Interface and Hardware
Adding a Description for an Interface
Step 3 interface Identifies the interface type, and the number of the
connector.
Example:
Note You do not need to add a space between the
SwitchDevice(config)# interface interface type and the interface number. For
gigabitethernet1/0/1 example, in the preceding line, you can specify
SwitchDevice(config-if)#
either gigabitethernet 1/0/1,
gigabitethernet1/0/1, gi 1/0/1, or gi1/0/1.
Step 4 Follow each interface command with the interface Defines the protocols and applications that will run on the
configuration commands that the interface requires. interface. The commands are collected and applied to the
interface when you enter another interface command or
enter end to return to privileged EXEC mode.
Step 5 interface range or interface range macro (Optional) Configures a range of interfaces.
Note Interfaces configured in a range must be the same
type and must be configured with the same
feature options.
Step 6 show interfaces Displays a list of all interfaces on or configured for the
switch. A report is provided for each interface that the
device supports or for the specified interface.
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
22
Interface and Hardware
Configuring a Range of Interfaces
Step 3 interface interface-id Specifies the interface for which you are adding a
description, and enter interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 4 description string Adds a description (up to 240 characters) for an interface.
Example:
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface range {port-range | macro macro_name}
4. end
5. show interfaces [interface-id]
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
23
Interface and Hardware
Configuring a Range of Interfaces
DETAILED STEPS
SwitchDevice> enable
Step 3 interface range {port-range | macro macro_name} Specifies the range of interfaces (VLANs or physical ports)
to be configured, and enter interface-range configuration
Example:
mode.
SwitchDevice(config)# interface range macro • You can use the interface range command to
configure up to five port ranges or a previously defined
macro.
• The macro variable is explained in the Configuring
and Using Interface Range Macros, on page 25.
• In a comma-separated port-range, you must enter the
interface type for each entry and enter spaces before
and after the comma.
• In a hyphen-separated port-range, you do not need to
re-enter the interface type, but you must enter a space
before the hyphen.
SwitchDevice(config)# end
Step 5 show interfaces [interface-id] Verifies the configuration of the interfaces in the range.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
24
Interface and Hardware
Configuring and Using Interface Range Macros
SUMMARY STEPS
1. enable
2. configure terminal
3. define interface-range macro_name interface-range
4. interface range macro macro_name
5. end
6. show running-config | include define
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 define interface-range macro_name interface-range Defines the interface-range macro, and save it in NVRAM.
Example: • The macro_name is a 32-character maximum character
string.
SwitchDevice(config)# define interface-range
enet_list gigabitethernet1/0/1 - 2 • A macro can contain up to five comma-separated
interface ranges.
• Each interface-range must consist of the same port
type.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
25
Interface and Hardware
Configuring Ethernet Interfaces
Step 4 interface range macro macro_name Selects the interface range to be configured using the values
saved in the interface-range macro called macro_name.
Example:
You can now use the normal configuration commands to
SwitchDevice(config)# interface range macro apply the configuration to all interfaces in the defined
enet_list macro.
SwitchDevice(config)# end
Step 6 show running-config | include define Shows the defined interface range macro configuration.
Example:
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. speed {10 | 100 | 1000 | 2500 | 5000 | 10000 | auto [10 | 100 | 1000 | 2500 | 5000 | 10000] | nonegotiate}
5. duplex {auto | full | half}
6. end
7. show interfaces interface-id
8. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
26
Interface and Hardware
Setting the Interface Speed and Duplex Parameters
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical interface to be configured, and enter
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/3
Step 4 speed {10 | 100 | 1000 | 2500 | 5000 | 10000 | auto [10 | Enter the appropriate speed parameter for the interface:
100 | 1000 | 2500 | 5000 | 10000] | nonegotiate}
• Enter 10, 100, 1000 2500, 5000, or 10000 to set a
Example: specific speed for the interface.
SwitchDevice(config-if)# speed 10
• Enter auto to enable the interface to autonegotiate
speed with the connected device. If you specify a speed
and also set the auto keyword, the port autonegotiates
only at the specified speeds.
• The nonegotiate keyword is available only for SFP
module ports. SFP module ports operate only at 1000
Mb/s but can be configured to not negotiate if
connected to a device that does not support
autonegotiation.
Step 5 duplex {auto | full | half} This command is not available on a 10-Gigabit Ethernet
interface.
Example:
Enter the duplex parameter for the interface.
SwitchDevice(config-if)# duplex half
Enable half-duplex mode (for interfaces operating only at
10 or 100 Mb/s). You cannot configure half-duplex mode
for interfaces operating at 1000 Mb/s.
You can configure the duplex setting when the speed is set
to auto.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
27
Interface and Hardware
Configuring IEEE 802.3x Flow Control
SwitchDevice(config-if)# end
Step 7 show interfaces interface-id Displays the interface speed and duplex mode configuration.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
28
Interface and Hardware
Configuring SVI Autostate Exclude
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 3 flowcontrol {receive} {on | off | desired} Configures the flow control mode for the port.
Example:
SwitchDevice(config-if)# end
Step 5 show interfaces interface-id Verifies the interface flow control settings.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
29
Interface and Hardware
Shutting Down and Restarting the Interface
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies a Layer 2 interface (physical port or port channel),
and enter interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 4 switchport autostate exclude Excludes the access or trunk port when defining the status
of an SVI line state (up or down)
Example:
SwitchDevice(config-if)# end
Step 6 show running config interface interface-id (Optional) Shows the running configuration.
Verifies the configuration.
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
30
Interface and Hardware
Shutting Down and Restarting the Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. interface {vlan vlan-id} | { gigabitethernetinterface-id} | {port-channel port-channel-number}
4. shutdown
5. no shutdown
6. end
7. show running-config
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# interface
gigabitethernet1/0/2
SwitchDevice(config-if)# shutdown
SwitchDevice(config-if)# no shutdown
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
31
Interface and Hardware
Configuring the Console Media Type
SUMMARY STEPS
1. enable
2. configure terminal
3. line console 0
4. media-type rj45
5. end
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 line console 0 Configures the console and enters line configuration mode.
Example:
Step 4 media-type rj45 Configures the console media type to be only RJ-45 port.
If you do not enter this command and both types are
Example:
connected, the USB port is used by default.
SwitchDevice(config-line)# media-type rj45
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
32
Interface and Hardware
Configuring the USB Inactivity Timeout
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. line console 0
4. usb-inactivity-timeout timeout-minutes
5. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 line console 0 Configures the console and enters line configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
33
Interface and Hardware
Monitoring Interface Characteristics
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show interfaces interface-id status Displays interface status or a list of interfaces in the
[err-disabled] error-disabled state.
show interfaces [interface-id] switchport Displays administrative and operational status of switching
(nonrouting) ports. You can use this command to find out if a
port is in routing or in switching mode.
show interfaces [interface-id] description Displays the description configured on an interface or all
interfaces and the interface status.
show ip interface [interface-id] Displays the usability status of all interfaces configured for IP
routing or the specified interface.
show interface [interface-id] stats Displays the input and output packets by the switching path
for the interface.
show interfaces interface-id (Optional) Displays speed and duplex on the interface.
show interfaces transceiver (Optional) Displays Digital Optical Monitoring (DOM) status
dom-supported-list on the connect SFP modules.
show interfaces transceiver properties (Optional) Displays temperature, voltage, or amount of current
on the interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
34
Interface and Hardware
Clearing and Resetting Interfaces and Counters
Command Purpose
show interfaces [interface-id] [{transceiver Displays physical and operational status about an SFP module.
properties | detail}] module number]
show running-config interface Displays the running configuration in RAM for the interface.
[interface-id]
show controllers ethernet-controller Displays the operational state of the auto-MDIX feature on the
interface-id phy interface.
Command Purpose
clear line [number | console 0 | vty number] Resets the hardware logic on an asynchronous serial line.
Note The clear counters privileged EXEC command does not clear counters retrieved by using Simple Network
Management Protocol (SNMP), but only those seen with the show interface privileged EXEC command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
35
Interface and Hardware
Configuring a Range of Interfaces: Examples
This example shows how to use a comma to add different interface type strings to the range to enable Gigabit
Ethernet ports 1 to 3 and 10-Gigabit Ethernet ports 1 and 2 to receive flow-control pause frames:
If you enter multiple configuration commands while you are in interface-range mode, each command is
executed as it is entered. The commands are not batched and executed after you exit interface-range mode. If
you exit interface-range configuration mode while the commands are being executed, some commands might
not be executed on all interfaces in the range. Wait until the command prompt reappears before exiting
interface-range configuration mode.
This example shows how to enter interface-range configuration mode for the interface-range macro enet_list:
This example shows how to delete the interface-range macro enet_list and to verify that it was deleted.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
36
Interface and Hardware
Setting Interface Speed and Duplex Mode: Example
This example shows how to set the interface speed to 100 Mb/s on a 10/100/1000 Mb/s port:
This example reverses the previous configuration and immediately activates any USB console that is connected.
If there is no (input) activity on a USB console port for the configured number of minutes, the inactivity
timeout setting applies to the RJ-45 port, and a log shows this occurrence:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
37
Interface and Hardware
Configuring the USB Inactivity Timeout: Example
At this point, the only way to reactivate the USB console port is to disconnect and reconnect the cable.
When the USB cable on the switch has been disconnected and reconnected, a log similar to this appears:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
38
CHAPTER 3
Configuring Auto-MDIX
• Prerequisites for Auto-MDIX, on page 39
• Restrictions for Auto-MDIX, on page 39
• Information about Configuring Auto-MDIX, on page 39
• How to Configure Auto-MDIX, on page 40
• Example for Configuring Auto-MDIX, on page 41
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
39
Interface and Hardware
How to Configure Auto-MDIX
This table shows the link states that result from auto-MDIX settings and correct and incorrect cabling.
Local Side Auto-MDIX Remote Side Auto-MDIX With Correct Cabling With Incorrect Cabling
On On Link up Link up
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical interface to be configured, and enter
interface configuration mode.
Example:
SwitchDevice(config)# interface
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
40
Interface and Hardware
Example for Configuring Auto-MDIX
Step 4 speed auto Configures the interface to autonegotiate speed with the
connected device.
Example:
Step 5 duplex auto Configures the interface to autonegotiate duplex mode with
the connected device.
Example:
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
41
Interface and Hardware
Example for Configuring Auto-MDIX
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
42
CHAPTER 4
Configuring LLDP, LLDP-MED, and Wired
Location Service
• Finding Feature Information, on page 43
• LLDP, LLDP-MED, and Wired Location Service Overview, on page 43
• How to Configure LLDP, LLDP-MED, and Wired Location Service, on page 47
• Configuration Examples for LLDP, LLDP-MED, and Wired Location Service, on page 59
• Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service, on page 59
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
43
Interface and Hardware
LLDP Supported TLVs
These organizationally specific LLDP TLVs are also advertised to support LLDP-MED.
• Port VLAN ID TLV (IEEE 802.1 organizationally specific TLVs)
• MAC/PHY configuration/status TLV (IEEE 802.3 organizationally specific TLVs)
LLDP-MED
LLDP for Media Endpoint Devices (LLDP-MED) is an extension to LLDP that operates between endpoint
devices such as IP phones and network devices such as switches. It specifically provides support for voice
over IP (VoIP) applications and provides additional TLVs for capabilities discovery, network policy, Power
over Ethernet, inventory management and location information. By default, all LLDP-MED TLVs are enabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
44
Interface and Hardware
Wired Location Service
tagging mode. These profile attributes are then maintained centrally on the switch and propagated to the
phone.
• Power management TLV
Enables advanced power management between LLDP-MED endpoint and network connectivity devices.
Allows switches and phones to convey power information, such as how the device is powered, power
priority, and how much power the device needs.
LLDP-MED also supports an extended power TLV to advertise fine-grained power requirements, end-point
power priority, and end-point and network connectivity-device power status. LLDP is enabled and power
is applied to a port, the power TLV determines the actual power requirement of the endpoint device so
that the system power budget can be adjusted accordingly. The switch processes the requests and either
grants or denies power based on the current power budget. If the request is granted, the switch updates
the power budget. If the request is denied, the switch turns off power to the port, generates a syslog
message, and updates the power budget. If LLDP-MED is disabled or if the endpoint does not support
the LLDP-MED power TLV, the initial allocation value is used throughout the duration of the connection.
You can change power settings by entering the power inline {auto [max max-wattage] | never | static
[max max-wattage]} interface configuration command. By default the PoE interface is in auto mode; If
no value is specified, the maximum is allowed (30 W).
• Inventory management TLV
Allows an endpoint to send detailed inventory information about itself to the switch, including information
hardware revision, firmware version, software version, serial number, manufacturer name, model name,
and asset ID TLV.
• Location TLV
Provides location information from the switch to the endpoint device. The location TLV can send this
information:
• Civic location information
Provides the civic address information and postal information. Examples of civic location information
are street address, road name, and postal community name information.
• ELIN location information
Provides the location information of a caller. The location is determined by the Emergency location
identifier number (ELIN), which is a phone number that routes an emergency call to the local public
safety answering point (PSAP) and which the PSAP can use to call back the emergency caller.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
45
Interface and Hardware
Default LLDP Configuration
When the switch determines the presence or absence of a device on a link-up or link-down event, it obtains
the client-specific information such as the MAC address, IP address, and username. If the client is LLDP-MED-
or CDP-capable, the switch obtains the serial number and UDI through the LLDP-MED location TLV or
CDP.
Depending on the device capabilities, the switch obtains this client information at link up:
• Slot and port specified in port connection
• MAC address specified in the client MAC address
• IP address specified in port connection
• 802.1X username if applicable
• Device category is specified as a wired station
• State is specified as new
• Serial number, UDI
• Model number
• Time in seconds since the switch detected the association
Depending on the device capabilities, the switch obtains this client information at link down:
• Slot and port that was disconnected
• MAC address
• IP address
• 802.1X username if applicable
• Device category is specified as a wired station
• State is specified as delete
• Serial number, UDI
• Time in seconds since the switch detected the disassociation
When the switch shuts down, it sends an attachment notification with the state delete and the IP address before
closing the NMSP connection to the MSE. The MSE interprets this notification as disassociation for all the
wired clients associated with the switch.
If you change a location address on the switch, the switch sends an NMSP location notification message that
identifies the affected ports and the changed address information.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
46
Interface and Hardware
Restrictions for LLDP
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
47
Interface and Hardware
Enabling LLDP
DETAILED STEPS
SwitchDevice> enable
Step 4 interface interface-id Specifies the interface on which you are enabling LLDP,
and enter interface configuration mode.
Example:
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
48
Interface and Hardware
Configuring LLDP Characteristics
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note Steps 2 through 5 are optional and can be performed in any order.
SUMMARY STEPS
1. enable
2. configure terminal
3. lldp holdtime seconds
4. lldp reinit delay
5. lldp timer rate
6. lldp tlv-select
7. interface interface-id
8. lldp med-tlv-select
9. end
10. show lldp
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
49
Interface and Hardware
Configuring LLDP Characteristics
Step 3 lldp holdtime seconds (Optional) Specifies the amount of time a receiving device
should hold the information from your device before
Example:
discarding it.
SwitchDevice(config)# lldp holdtime 120 The range is 0 to 65535 seconds; the default is 120 seconds.
Step 4 lldp reinit delay (Optional) Specifies the delay time in seconds for LLDP
to initialize on an interface.
Example:
The range is 2 to 5 seconds; the default is 2 seconds.
SwitchDevice(config)# lldp reinit 2
Step 5 lldp timer rate (Optional) Sets the sending frequency of LLDP updates
in seconds.
Example:
The range is 5 to 65534 seconds; the default is 30 seconds.
SwitchDevice(config)# lldp timer 30
Step 6 lldp tlv-select (Optional) Specifies the LLDP TLVs to send or receive.
Example:
SwitchDevice(config)# tlv-select
Step 7 interface interface-id Specifies the interface on which you are enabling LLDP,
and enter interface configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
50
Interface and Hardware
Configuring LLDP-MED TLVs
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. lldp med-tlv-select
5. end
6. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
51
Interface and Hardware
Configuring Network-Policy TLV
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you are enabling LLDP,
and enter interface configuration mode.
Example:
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
52
Interface and Hardware
Configuring Network-Policy TLV
DETAILED STEPS
SwitchDevice> enable
Step 3 network-policy profile profile number Specifies the network-policy profile number, and enter
network-policy configuration mode. The range is 1 to
Example:
4294967295.
SwitchDevice(config)# network-policy profile 1
Step 4 {voice | voice-signaling} vlan [vlan-id {cos cvalue | dscp Configures the policy attributes:
dvalue}] | [[dot1p {cos cvalue | dscp dvalue}] | none |
• voice—Specifies the voice application type.
untagged]
Example: • voice-signaling—Specifies the voice-signaling
application type.
SwitchDevice(config-network-policy)# voice vlan • vlan—Specifies the native VLAN for voice traffic.
100 cos 4
• vlan-id—(Optional) Specifies the VLAN for voice
traffic. The range is 1 to 4094.
• cos cvalue—(Optional) Specifies the Layer 2 priority
class of service (CoS) for the configured VLAN. The
range is 0 to 7; the default is 5.
• dscp dvalue—(Optional) Specifies the differentiated
services code point (DSCP) value for the configured
VLAN. The range is 0 to 63; the default is 46.
• dot1p—(Optional) Configures the telephone to use
IEEE 802.1p priority tagging and use VLAN 0 (the
native VLAN).
• none—(Optional) Do not instruct the IP telephone
about the voice VLAN. The telephone uses the
configuration from the telephone key pad.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
53
Interface and Hardware
Configuring Network-Policy TLV
SwitchDevice(config)# exit
Step 6 interface interface-id Specifies the interface on which you are configuring a
network-policy profile, and enter interface configuration
Example:
mode.
SwitchDevice (config)# interface
gigabitethernet2/0/1
SwitchDevice(config-if)# network-policy 1
SwitchDevice(config)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
54
Interface and Hardware
Configuring Location TLV and Wired Location Service
SUMMARY STEPS
1. configure terminal
2. location {admin-tag string | civic-location identifier {id | host} | elin-location string identifier id |
custom-location identifier {id | host} | geo-location identifier {id | host}}
3. exit
4. interface interface-id
5. location {additional-location-information word | civic-location-id {id | host} | elin-location-id id |
custom-location-id {id | host} | geo-location-id {id | host} }
6. end
7. Use one of the following:
• show location admin-tag string
• show location civic-location identifier id
• show location elin-location identifier id
8. copy running-config startup-config
DETAILED STEPS
Step 2 location {admin-tag string | civic-location identifier {id Specifies the location information for an endpoint.
| host} | elin-location string identifier id | custom-location
• admin-tag—Specifies an administrative tag or site
identifier {id | host} | geo-location identifier {id | host}}
information.
Example:
• civic-location—Specifies civic location information.
SwitchDevice(config)# location civic-location • elin-location—Specifies emergency location
identifier 1
information (ELIN).
SwitchDevice(config-civic)# number 3550
• custom-location—Specifies custom location
SwitchDevice(config-civic)# primary-road-name
information.
"Cisco Way"
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
55
Interface and Hardware
Configuring Location TLV and Wired Location Service
SwitchDevice(config-civic)# exit
Step 4 interface interface-id Specifies the interface on which you are configuring the
location information, and enter interface configuration
Example:
mode.
SwitchDevice (config)# interface
gigabitethernet2/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
56
Interface and Hardware
Enabling Wired Location Service on the Switch
SwitchDevice(config-if)# end
or
or
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. nmsp notification interval {attachment | location} interval-seconds
4. end
5. show network-policy profile
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
57
Interface and Hardware
Enabling Wired Location Service on the Switch
DETAILED STEPS
SwitchDevice> enable
Step 3 nmsp notification interval {attachment | location} Specifies the NMSP notification interval.
interval-seconds
attachment—Specifies the attachment notification interval.
Example:
location—Specifies the location notification interval.
SwitchDevice(config)# nmsp notification interval interval-seconds—Duration in seconds before the switch
location 10 sends the MSE the location or attachment updates. The
range is 1 to 30; the default is 30.
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
58
Interface and Hardware
Configuration Examples for LLDP, LLDP-MED, and Wired Location Service
This example shows how to configure the voice application type for the native VLAN with priority tagging:
Command Description
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
59
Interface and Hardware
Monitoring and Maintaining LLDP, LLDP-MED, and Wired Location Service
Command Description
show lldp interface [interface-id] Displays information about interfaces with LLDP
enabled.
You can limit the display to a specific interface.
show lldp neighbors [interface-id] [detail] Displays information about neighbors, including
device type, interface type and number, holdtime
settings, capabilities, and port ID.
You can limit the display to neighbors of a specific
interface or expand the display for more detailed
information.
show location admin-tag string Displays the location information for the specified
administrative tag or site.
show location civic-location identifier id Displays the location information for a specific global
civic location.
show location elin-location identifier id Displays the location information for an emergency
location
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
60
CHAPTER 5
Configuring MultiGigabit Ports on
WS-C3560CX-8PD-S
• Finding Feature Information, on page 61
• Overview of MultiGigabit Ports, on page 61
• Restrictions for MultiGigabit Ports, on page 61
• Supported Cable Types and Maximum Length, on page 62
• Setting the Interface Speed, on page 62
• Examples: Setting the Interface Speed, on page 63
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
61
Interface and Hardware
Supported Cable Types and Maximum Length
SUMMARY STEPS
1. enable
2. configure terminal
3. interface tengigabitethernetslot/interface
4. speed [100 | 1000 | 2500 | 5000 | 10000 | auto [100 | 1000 | 2500 | 5000 | 10000]]
5. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
62
Interface and Hardware
Examples: Setting the Interface Speed
Step 4 speed [100 | 1000 | 2500 | 5000 | 10000 | auto [100 | 1000 Sets the interface speed.
| 2500 | 5000 | 10000]]
Note 10G speed is supported only on Category6 and
Example: Category6A cables.
SwitchDevice (config-if)# speed 5000
SwitchDevice(config)# end
What to do next
To restore autonegotiation (default setting), enter the no speed command in the interface configuration mode.
Related Topics
Examples: Setting the Interface Speed, on page 63
This example shows how to allow the Multigigabit Ethernet interface 1/0/2 to autonegotiate the speed and
duplex mode:
SwitchDevice(config)# interface gigabitethernet 1/0/2
SwitchDevice(config-if)# speed auto
This example shows how to limit speed negotiation to 2.5G on the Multigigabit Ethernet interface 1/0/1:
SwitchDevice(config)# interface gigabitethernet 1/0/1
SwitchDevice(config-if)# speed auto 2500
Related Topics
Setting the Interface Speed, on page 62
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
63
Interface and Hardware
Examples: Setting the Interface Speed
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
64
CHAPTER 6
Configuring System MTU
• Finding Feature Information, on page 65
• Information about the MTU, on page 65
• How to Configure MTU , on page 66
• Configuration Examples for System MTU, on page 67
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
65
Interface and Hardware
How to Configure MTU
system mtu global configuration command. You can increase the MTU size to support jumbo frames
on all Gigabit Ethernet interfaces by using the system mtu jumbo global configuration command.
• Gigabit Ethernet ports are not affected by the system mtu command; 10/100 ports are not affected by
the system mtu jumbo command. If you do not configure the system mtu jumbo command, the setting
of the system mtu command applies to all Gigabit Ethernet interfaces.
SUMMARY STEPS
1. configure terminal
2. system mtu bytes
3. system mtu jumbo bytes
4. end
5. copy running-config startup-config
6. reload
7. show system mtu
DETAILED STEPS
Step 2 system mtu bytes The range is 1500 to 1998 bytes; the default is 1500 bytes.
Example:
SwitchDevice(config)# system mtu 2500
Step 3 system mtu jumbo bytes The range is 1500 to 9198 bytes; the default is 1500 bytes.
Example:
SwitchDevice(config)# system mtu jumbo 7500
Step 5 copy running-config startup-config Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
66
Interface and Hardware
Configuration Examples for System MTU
If you enter a value that is outside the allowed range for the specific type of interface, the value is not accepted.
This example shows the response when you try to set Gigabit Ethernet interfaces to an out-of-range number:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
67
Interface and Hardware
Configuration Examples for System MTU
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
68
CHAPTER 7
Configuring Boot Fast
• Finding Feature Information, on page 69
• Configuring Boot Fast on the switch, on page 69
Note When Fast boot is enabled, you can still run the POST tests manually from the command line interface, once
the switch has booted up, using diagnostic start command.
SUMMARY STEPS
1. enable
2. configure terminal
3. boot fast
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
69
Interface and Hardware
Disabling Boot Fast
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. no boot fast
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
70
Interface and Hardware
Disabling Boot Fast
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
71
Interface and Hardware
Disabling Boot Fast
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
72
CHAPTER 8
Configuring PoE
• Finding Feature Information, on page 73
• Information about PoE, on page 73
• How to Configure PoE, on page 79
• Monitoring Power Status, on page 89
• Configuration Examples for Configuring PoE, on page 90
A powered device can receive redundant power when it is connected to a PoE switch port and to an AC power
source. The device does not receive redundant power when it is only connected to the PoE port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
73
Interface and Hardware
Example: Configuring PoE and PoE Pass-Through Ports on WS-C3560CX-8PT-S
derived from its uplink ports (PD1 or PD2) or from the voltage supplied by external auxiliary power supply
(AUX). The switch will enable powering over PoE, PoE+ and UPOE, as well as AC and DC input.
The power available from uplinks and one of the power adapter will be added for increased input power,
which translates to a higher PoE budget. Some of this power will be used for system power and rest would
be provided to downlink POE+ ports as pass-through power that will be available to power other PoE peripheral
devices like IP phones, IP Cameras and so on.
• The Catalyst WS-C3560CX-8PT-S will support powering from 2xUPOE uplinks.
• It will support a DC power adaptor which will enable the switch to be powered by 24V DC input.
• AUX contributes 78W to the system.
• The power sources (AC or DC) and PoE will be additive. The table below lists different power values
for PoE budget.
The switch is expected to boot with T1 power and negotiate to T2 power which is known as Low Power
Bootup. The Low Power Bootup occurs in the following case:
• One of the uplink port is connected to the PSE.
• No Auxiliary power adapter is connected.
In this case, the switch will power up in low power mode with ASIC powered down and negotiate power
using CDP/LLDP. The system will power up and initialize ASIC once power is negotiated and continue to
boot without software reload.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
74
Interface and Hardware
Supported Protocols and Standards
Available : The PoE received on this link is used for powering this switch and
providing PoE pass-through if applicable.
Note All these power sources adds up to the POE budget. The system consumption is approximately 24W.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
75
Interface and Hardware
Power Management Modes
1 4W
2 7W
3 15.4 W
The switch monitors and tracks requests for power and grants power only when it is available. The switch
tracks its power budget (the amount of power available on the switch for PoE). Theswitch performs
power-accounting calculations when a port is granted or denied power to keep the power budget up to date.
After power is applied to the port, the switch uses CDP to determine the CDP-specific power consumption
requirement of the connected Cisco powered devices, which is the amount of power to allocate based on the
CDP messages. The switch adjusts the power budget accordingly. This does not apply to third-party PoE
devices. The switch processes a request and either grants or denies power. If the request is granted, the switch
updates the power budget. If the request is denied, the switch ensures that power to the port is turned off,
generates a syslog message, and updates the LEDs. Powered devices can also negotiate with the switch for
more power.
With PoE+, powered devices use IEEE 802.3at and LLDP power with media dependent interface (MDI) type,
length, and value descriptions (TLVs), Power-via-MDI TLVs, for negotiating power up to 30 W. Cisco
pre-standard devices and Cisco IEEE powered devices can use CDP or the IEEE 802.3at power-via-MDI
power negotiation mechanism to request power levels up to 30 W.
Note The initial allocation for Class 0, Class 3, and Class 4 powered devices is 15.4 W. When a device starts up
and uses CDP or LLDP to send a request for more than 15.4 W, it can be allocated up to the maximum of 30
W.
Note The CDP-specific power consumption requirement is referred to as the actual power consumption requirement
in the software configuration guides and command references.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
76
Interface and Hardware
Power Monitoring and Power Policing
If the switch has enough power for all the powered devices, they all come up. If enough power is available
for all powered devices connected to the switch, power is turned on to all devices. If there is not enough
available PoE, or if a device is disconnected and reconnected while other devices are waiting for power,
it cannot be determined which devices are granted or are denied power.
If granting power would exceed the system power budget, the switch denies power, ensures that power
to the port is turned off, generates a syslog message, and updates the LEDs. After power has been denied,
the switch periodically rechecks the power budget and continues to attempt to grant the request for power.
If a device being powered by the switch is then connected to wall power, the switch might continue to
power the device. The switch might continue to report that it is still powering the device whether the
device is being powered by the switch or receiving power from an AC power source.
If a powered device is removed, the switch automatically detects the disconnect and removes power from
the port. You can connect a nonpowered device without damaging it.
You can specify the maximum wattage that is allowed on the port. If the IEEE class maximum wattage
of the powered device is greater than the configured maximum value, the switch does not provide power
to the port. If the switch powers a powered device, but the powered device later requests through CDP
messages more than the configured maximum value, the switch removes power to the port. The power
that was allocated to the powered device is reclaimed into the global power budget. If you do not specify
a wattage, the switch delivers the maximum value. Use the auto setting on any PoE port. The auto mode
is the default setting.
• static—The switch pre-allocates power to the port (even when no powered device is connected) and
guarantees that power will be available for the port. The switch allocates the port configured maximum
wattage, and the amount is never adjusted through the IEEE class or by CDP messages from the powered
device. Because power is pre-allocated, any powered device that uses less than or equal to the maximum
wattage is guaranteed to be powered when it is connected to the static port. The port no longer participates
in the first-come, first-served model.
However, if the powered-device IEEE class is greater than the maximum wattage, the switch does not
supply power to it. If the switch learns through CDP messages that the powered device is consuming
more than the maximum wattage, the switch shuts down the powered device.
If you do not specify a wattage, the switch pre-allocates the maximum value. The switch powers the port
only if it discovers a powered device. Use the static setting on a high-priority interface.
• never—The switch disables powered-device detection and never powers the PoE port even if an unpowered
device is connected. Use this mode only when you want to make sure that power is never applied to a
PoE-capable port, making the port a data-only port.
For most situations, the default configuration (auto mode) works well, providing plug-and-play operation. No
further configuration is required. However, perform this task to configure a PoE port for a higher priority, to
make it data only, or to specify a maximum wattage to disallow high-power powered devices on a port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
77
Interface and Hardware
Maximum Power Allocation (Cutoff Power) on a PoE Port
The switch senses the real-time power consumption of the connected device as follows:
1. The switch monitors the real-time power consumption on individual ports.
2. The switch records the power consumption, including peak power usage. The switch reports the information
through the CISCO-POWER-ETHERNET-EXT-MIB.
3. If power policing is enabled, the switch polices power usage by comparing the real-time power consumption
to the maximum power allocated to the device. The maximum power consumption is also referred to as
the cutoff power on a PoE port.
If the device uses more than the maximum power allocation on the port, the switch can either turn off
power to the port, or the switch can generate a syslog message and update the LEDs (the port LED is now
blinking amber) while still providing power to the device based on the switch configuration. By default,
power-usage policing is disabled on all PoE ports.
If error recovery from the PoE error-disabled state is enabled, the switch automatically takes the PoE port
out of the error-disabled state after the specified amount of time.
If error recovery is disabled, you can manually re-enable the PoE port by using the shutdown and no
shutdown interface configuration commands.
4. If policing is disabled, no action occurs when the powered device consumes more than the maximum
power allocation on the PoE port, which could adversely affect the switch.
Use the first or second method in the previous list to manually configure the cutoff-power value by entering
the power inline consumption default wattage or the power inline [auto | static max] max-wattage command.
If you do not manually configure the cutoff-power value, the switch automatically determines it by using CDP
power negotiation or the device IEEE classification and LLDP power negotiation. If CDP or LLDP are not
enabled, the default value of 30 W is applied. However without CDP or LLDP, the switch does not allow
devices to consume more than 15.4 W of power because values from 15400 to 30000 mW are only allocated
based on CDP or LLDP requests. If a powered device consumes more than 15.4 W without CDP or LLDP
negotiation, the device might be in violation of the maximum current (Imax) limitation and might experience
an Icut fault for drawing more current than the maximum. The port remains in the fault state for a time before
attempting to power on again. If the port continuously draws more than 15.4 W, the cycle repeats.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
78
Interface and Hardware
Power Consumption Values
Note When a powered device connected to a PoE+ port restarts and sends a CDP or LLDP packet with a power
TLV, the switch locks to the power-negotiation protocol of that first packet and does not respond to power
requests from the other protocol. For example, if the switch is locked to CDP, it does not provide power to
devices that send LLDP requests. If CDP is disabled after the switch has locked on it, the switch does not
respond to LLDP power requests and can no longer power on any accessories. In this case, you should restart
the powered device.
Note When you make PoE configuration changes, the port being configured drops power. Depending on the new
configuration, the state of the other PoE ports, and the state of the power budget, the port might not be powered
up again. For example, port 1 is in the auto and on state, and you configure it for static mode. The switch
removes power from port 1, detects the powered device, and repowers the port. If port 1 is in the auto and on
state and you configure it with a maximum wattage of 10 W, the switch removes power from the port and
then redetects the powered device. The switch repowers the port only if the powered device is a class 1, class
2, or a Cisco-only powered device.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
79
Interface and Hardware
Configuring a Power Management Mode on a PoE Port
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. power inline {auto [max max-wattage] | never | static [max max-wattage]}
5. end
6. show power inline [interface-id | module switch-number]
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical port to be configured, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 4 power inline {auto [max max-wattage] | never | static Configures the PoE mode on the port. The keywords have
[max max-wattage]} these meanings:
Example: • auto—Enables powered-device detection. If enough
SwitchDevice(config-if)# power inline auto power is available, automatically allocates power to
the PoE port after device detection. This is the default
setting.
• max max-wattage—Limits the power allowed on the
port. If no value is specified, the maximum is allowed.
• max max-wattage—Limits the power allowed on the
port. The range is 4000 to 30000 mW. If no value is
specified, the maximum is allowed.
• never —Disables device detection, and disable power
to the port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
80
Interface and Hardware
Fast POE
Step 6 show power inline [interface-id | module switch-number] Displays PoE status for a switch, for the specified interface.
Example:
SwitchDevice# show power inline
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Fast POE
Fast PoE - This feature remembers the last power drawn from a particular PSE port and switches on power
the moment AC power is plugged in (within 15 to 20 seconds of switching on power) without waiting for IOS
to boot up. When poe-ha is enabled on a particular port, the switch on a recovery after power failure, provides
power to the connected endpoint devices within short duration before even the IOS forwarding starts up.
This feature can be configured by the same command as poe-ha. If the user replaces the power device connected
to a port when the switch is powered off, then this new device will get the power which the previous device
was drawing.
Note You will need to configure the poe-ha command before connecting the PD, or you will need to manually
shut/unshut the port after configuring poe-ha.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
81
Interface and Hardware
Configuring PoE and PoE Pass-Through Ports on Catalyst WS-C3560CX-8PT-S
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. power inline port poe-ha
5. end
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical port to be configured, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
82
Interface and Hardware
Persistent POE
Persistent POE
The Persistent POE provides uninterrupted power to connected PD device even when the PSE switch is
booting.
Note Power to the ports will be interrupted in case of MCU firmware upgrade and ports will be back up immediately
after the upgrade.
Note This feature is available only on the following models of Catalyst 3560-CX and Catalyst 2960-CX switches:
• WS-3560CX-8PC-S
• WS-3560CX-12PC-S
• WS-C3560CX-8XPD-S
• WS-C2960CX-8PC-L
Fast POE
Fast PoE - This feature remembers the last power drawn from a particular PSE port and switches on power
the moment AC power is plugged in (within 15 to 20 seconds of switching on power) without waiting for IOS
to boot up. When poe-ha is enabled on a particular port, the switch on a recovery after power failure, provides
power to the connected endpoint devices within short duration before even the IOS forwarding starts up.
This feature can be configured by the same command as poe-ha. If the user replaces the power device connected
to a port when the switch is powered off, then this new device will get the power which the previous device
was drawing.
Note You will need to configure the poe-ha command before connecting the PD, or you will need to manually
shut/unshut the port after configuring poe-ha.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. power inline port poe-ha
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
83
Interface and Hardware
Budgeting Power for Devices Connected to a PoE Port
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical port to be configured, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
84
Interface and Hardware
Budgeting Power to All PoE ports
Caution You should carefully plan your switch power budget, enable the power monitoring feature, and make certain
not to oversubscribe the power supply.
Note When you manually configure the power budget, you must also consider the power loss over the cable between
the switch and the powered device.
SUMMARY STEPS
1. enable
2. configure terminal
3. no cdp run
4. power inline consumption default wattage
5. end
6. show power inline consumption default
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 power inline consumption default wattage Configures the power consumption of powered devices
connected to each PoE port.
Example:
SwitchDevice(config)# power inline consumption The range for each device is 4000 to 30000 mW (PoE+).
default 5000 The default is 30000 mW.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
85
Interface and Hardware
Budgeting Power to a Specific PoE Port
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. no cdp run
4. interface interface-id
5. power inline consumption wattage
6. end
7. show power inline consumption
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 interface interface-id Specifies the physical port to be configured, and enter
interface configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
86
Interface and Hardware
Configuring Power Policing
Step 5 power inline consumption wattage Configures the power consumption of a powered device
connected to a PoE port on the switch.
Example:
SwitchDevice(config-if)# power inline consumption The range for each device is 4000 to 30000 mW (PoE+).
5000 The default is 30000 mW (PoE+).
Step 7 show power inline consumption Displays the power consumption data.
Example:
SwitchDevice# show power inline consumption
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. power inline police [action{log | errdisable}]
5. exit
6. Use one of the following:
• errdisable detect cause inline-power
• errdisable recovery cause inline-power
• errdisable recovery interval interval
7. exit
8. Use one of the following:
• show power inline police
• show errdisable recovery
9. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
87
Interface and Hardware
Configuring Power Policing
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical port to be configured, and enter
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 4 power inline police [action{log | errdisable}] If the real-time power consumption exceeds the maximum
power allocation on the port, configures the switch to take
Example:
one of these actions:
SwitchDevice(config-if)# power inline police
• power inline police—Shuts down the PoE port, turns
off power to it, and puts it in the error-disabled state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
88
Interface and Hardware
Monitoring Power Status
Step 8 Use one of the following: Displays the power monitoring status, and verify the error
recovery settings.
• show power inline police
• show errdisable recovery
Example:
SwitchDevice# show power inline police
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show env power switch (Optional) Displays the status of the internal power supplies for the
specified switch.
show power inline [interface-id Displays PoE status for a switch, for an interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
89
Interface and Hardware
Configuration Examples for Configuring PoE
Command Purpose
show env power Displays the status of the power supplies for the specified switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
90
CHAPTER 9
Configuring EEE
• Finding Feature Information, on page 91
• Information About EEE, on page 91
• Restrictions for EEE, on page 92
• How to Configure EEE, on page 92
• Monitoring EEE, on page 93
• Configuration Examples for Configuring EEE, on page 93
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
91
Interface and Hardware
Restrictions for EEE
DETAILED STEPS
Step 2 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
92
Interface and Hardware
Monitoring EEE
SwitchDevice(config-if)# no power
efficient-ethernet auto
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Monitoring EEE
Table 13: Commands for Displaying EEE Settings
Command Purpose
show eee capabilities interface interface-id Displays EEE capabilities for the specified interface.
show eee status interface interface-id Displays EEE status information for the specified
interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
93
Interface and Hardware
Configuration Examples for Configuring EEE
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
94
PA R T II
IPv6
• Configuring MLD Snooping, on page 97
• Configuring IPv6 Unicast Routing, on page 111
• Implementing IPv6 Multicast, on page 165
CHAPTER 10
Configuring MLD Snooping
This module contains details of configuring MLD snooping
• Finding Feature Information, on page 97
• Information About Configuring IPv6 MLD Snooping, on page 97
• How to Configure IPv6 MLD Snooping, on page 101
• Displaying MLD Snooping Information, on page 108
• Configuration Examples for Configuring MLD Snooping, on page 109
Note For complete syntax and usage information for the commands used in this chapter, see the command reference
for this release or the Cisco IOS documentation referenced in the procedures.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
97
IPv6
MLD Messages
is forwarded to only those interfaces associated with IP multicast devices. In IPv6, MLD snooping performs
a similar function. With MLD snooping, IPv6 multicast data is selectively forwarded to a list of ports that
want to receive the data, instead of being flooded to all ports in a VLAN. This list is constructed by snooping
IPv6 multicast control packets.
MLD is a protocol used by IPv6 multicast routers to discover the presence of multicast listeners (nodes wishing
to receive IPv6 multicast packets) on the links that are directly attached to the routers and to discover which
multicast packets are of interest to neighboring nodes. MLD is derived from IGMP; MLD Version 1 (MLDv1)
is equivalent to IGMPv2, and MLD Version 2 (MLDv2) is equivalent to IGMPv3. MLD is a subprotocol of
Internet Control Message Protocol Version 6 (ICMPv6), and MLD messages are a subset of ICMPv6 messages,
identified in IPv6 packets by a preceding Next Header value of 58.
The switch supports two versions of MLD snooping:
• MLDv1 snooping detects MLDv1 control packets and sets up traffic bridging based on IPv6 destination
multicast addresses.
• MLDv2 basic snooping (MBSS) uses MLDv2 control packets to set up traffic forwarding based on IPv6
destination multicast addresses.
The switch can snoop on both MLDv1 and MLDv2 protocol packets and bridge IPv6 multicast data based on
destination IPv6 multicast addresses.
Note The switch does not support MLDv2 enhanced snooping, which sets up IPv6 source and destination multicast
address-based forwarding.
MLD snooping can be enabled or disabled globally or per VLAN. When MLD snooping is enabled, a per-VLAN
IPv6 multicast address table is constructed in software and hardware. The switch then performs IPv6
multicast-address based bridging in hardware.
MLD Messages
MLDv1 supports three types of messages:
• Listener Queries are the equivalent of IGMPv2 queries and are either General Queries or
Multicast-Address-Specific Queries (MASQs).
• Multicast Listener Reports are the equivalent of IGMPv2 reports
• Multicast Listener Done messages are the equivalent of IGMPv2 leave messages.
MLDv2 supports MLDv2 queries and reports, as well as MLDv1 Report and Done messages.
Message timers and state transitions resulting from messages being sent or received are the same as those of
IGMPv2 messages. MLD messages that do not have valid link-local IPv6 source addresses are ignored by
MLD routers and switches.
MLD Queries
The switch sends out MLD queries, constructs an IPv6 multicast address database, and generates MLD
group-specific and MLD group-and-source-specific queries in response to MLD Done messages. The switch
also supports report suppression, report proxying, Immediate-Leave functionality, and static IPv6 multicast
group address configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
98
IPv6
Multicast Client Aging Robustness
When MLD snooping is disabled, all MLD queries are flooded in the ingress VLAN.
When MLD snooping is enabled, received MLD queries are flooded in the ingress VLAN, and a copy of the
query is sent to the CPU for processing. From the received query, MLD snooping builds the IPv6 multicast
address database. It detects multicast router ports, maintains timers, sets report response time, learns the querier
IP source address for the VLAN, learns the querier port in the VLAN, and maintains multicast-address aging.
Note When the IPv6 multicast router is a Catalyst 6500 switch and you are using extended VLANs (in the range
1006 to 4094), IPv6 MLD snooping must be enabled on the extended VLAN on the Catalyst 6500 switch in
order for the Catalyst 2960, 2960-S, 2960-C, 2960-X or 2960-CX switch to receive queries on the VLAN.
For normal-range VLANs (1 to 1005), it is not necessary to enable IPv6 MLD snooping on the VLAN on the
Catalyst 6500 switch.
When a group exists in the MLD snooping database, the switch responds to a group-specific query by sending
an MLDv1 report. When the group is unknown, the group-specific query is flooded to the ingress VLAN.
When a host wants to leave a multicast group, it can send out an MLD Done message (equivalent to IGMP
Leave message). When the switch receives an MLDv1 Done message, if Immediate- Leave is not enabled,
the switch sends an MASQ to the port from which the message was received to determine if other devices
connected to the port should remain in the multicast group.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
99
IPv6
MLD Reports
MLD Reports
The processing of MLDv1 join messages is essentially the same as with IGMPv2. When no IPv6 multicast
routers are detected in a VLAN, reports are not processed or forwarded from the switch. When IPv6 multicast
routers are detected and an MLDv1 report is received, an IPv6 multicast group address is entered in the VLAN
MLD database. Then all IPv6 multicast traffic to the group within the VLAN is forwarded using this address.
When MLD snooping is disabled, reports are flooded in the ingress VLAN.
When MLD snooping is enabled, MLD report suppression, called listener message suppression, is automatically
enabled. With report suppression, the switch forwards the first MLDv1 report received by a group to IPv6
multicast routers; subsequent reports for the group are not sent to the routers. When MLD snooping is disabled,
report suppression is disabled, and all MLDv1 reports are flooded to the ingress VLAN.
The switch also supports MLDv1 proxy reporting. When an MLDv1 MASQ is received, the switch responds
with MLDv1 reports for the address on which the query arrived if the group exists in the switch on another
port and if the port on which the query arrived is not the last member port for the address.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
100
IPv6
How to Configure IPv6 MLD Snooping
MLD snooping (per VLAN) Enabled. MLD snooping must be globally enabled for VLAN
MLD snooping to take place.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
101
IPv6
Enabling or Disabling MLD Snooping on the Switch (CLI)
switch in order for the switch to receive queries on the VLAN. For normal-range VLANs (1 to 1005), it
is not necessary to enable IPv6 MLD snooping on the VLAN on the Catalyst 6500 switch.
• MLD snooping and IGMP snooping act independently of each other. You can enable both features at
the same time on the switch.
Procedure
SwitchDevice(config)# end
Step 4 copy running-config startup-config (Optional) Save your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
102
IPv6
Enabling or Disabling MLD Snooping on a VLAN (CLI)
SwitchDevice(config)# reload
Procedure
Step 3 ipv6 mld snooping vlan vlan-id Enables MLD snooping on the VLAN. The VLAN ID range
is 1 to 1001 and 1006 to 4094.
Example:
Note MLD snooping must be globally enabled for
SwitchDevice(config)# ipv6 mld snooping vlan 1 VLAN snooping to be enabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
103
IPv6
Configuring a Multicast Router Port (CLI)
Procedure
Step 2 ipv6 mld snooping vlan vlan-id static Configures a multicast group with a Layer 2 port as a
ipv6_multicast_address interface interface-id member of a multicast group:
Example: • vlan-id is the multicast group VLAN ID. The VLAN
ID range is 1 to 1001 and 1006 to 4094.
SwitchDevice(config)# ipv6 mld snooping vlan 1
static FF12::3 interface gigabitethernet • ipv6_multicast_address is the 128-bit group IPv6
0/1 address. The address must be in the form specified in
RFC 2373.
• interface-id is the member port. It can be a physical
interface or a port channel (1 to 48).
SwitchDevice(config)# end
Step 4 Use one of the following: Verifies the static member port and the IPv6 address.
• show ipv6 mld snooping address
• show ipv6 mld snooping address vlan vlan-id
Example:
or
SwitchDevice# show ipv6 mld snooping vlan 1
Note Static connections to multicast routers are supported only on switch ports.
Beginning in privileged EXEC mode, follow these steps to add a multicast router port to a VLAN:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
104
IPv6
Enabling MLD Immediate Leave (CLI)
Procedure
Step 2 ipv6 mld snooping vlan vlan-id mrouter interface Specifies the multicast router VLAN ID, and specify the
interface-id interface to the multicast router.
Example: • The VLAN ID range is 1 to 1001 and 1006 to 4094.
SwitchDevice(config)# ipv6 mld snooping vlan 1
mrouter interface gigabitethernet
• The interface can be a physical interface or a port
0/2 channel. The port-channel range is 1 to 48.
Step 4 show ipv6 mld snooping mrouter [ vlan vlan-id ] Verifies that IPv6 MLD snooping is enabled on the VLAN
interface.
Example:
SwitchDevice# show ipv6 mld snooping mrouter vlan
1
Procedure
Step 2 ipv6 mld snooping vlan vlan-id immediate-leave Enables MLD Immediate Leave on the VLAN interface.
Example:
SwitchDevice(config)# ipv6 mld snooping vlan 1
immediate-leave
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
105
IPv6
Configuring MLD Snooping Queries (CLI)
Step 4 show ipv6 mld snooping vlan vlan-id Verifies that Immediate Leave is enabled on the VLAN
interface.
Example:
SwitchDevice# show ipv6 mld snooping vlan 1
Procedure
Step 2 ipv6 mld snooping robustness-variable value (Optional) Sets the number of queries that are sent before
switch will deletes a listener (port) that does not respond
Example:
to a general query. The range is 1 to 3; the default is 2.
SwitchDevice(config)# ipv6 mld snooping
robustness-variable 3
Step 3 ipv6 mld snooping vlan vlan-id robustness-variable (Optional) Sets the robustness variable on a VLAN basis,
value which determines the number of general queries that MLD
snooping sends before aging out a multicast address when
Example:
there is no MLD report response. The range is 1 to 3; the
SwitchDevice(config)# ipv6 mld snooping vlan 1 default is 0. When set to 0, the number used is the global
robustness-variable 3
robustness variable value.
Step 4 ipv6 mld snooping last-listener-query-count count (Optional) Sets the number of MASQs that the switch
sends before aging out an MLD client. The range is 1 to
Example:
7; the default is 2. The queries are sent 1 second apart.
SwitchDevice(config)# ipv6 mld snooping
last-listener-query-count 7
Step 5 ipv6 mld snooping vlan vlan-id (Optional) Sets the last-listener query count on a VLAN
last-listener-query-count count basis. This value overrides the value configured globally.
The range is 1 to 7; the default is 0. When set to 0, the
Example:
global count value is used. Queries are sent 1 second apart.
SwitchDevice(config)# ipv6 mld snooping vlan 1
last-listener-query-count 7
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
106
IPv6
Disabling MLD Listener Message Suppression (CLI)
Step 7 ipv6 mld snooping vlan vlan-id (Optional) Sets the last-listener query interval on a VLAN
last-listener-query-interval interval basis. This value overrides the value configured globally.
The range is 0 to 32,768 thousands of a second. The default
Example:
is 0. When set to 0, the global last-listener query interval
SwitchDevice(config)# ipv6 mld snooping vlan 1 is used.
last-listener-query-interval 2000
Step 8 ipv6 mld snooping tcn query solicit (Optional) Enables topology change notification (TCN)
solicitation, which means that VLANs flood all IPv6
Example:
multicast traffic for the configured number of queries
SwitchDevice(config)# ipv6 mld snooping tcn query before sending multicast data to only those ports requesting
solicit
to receive it. The default is for TCN to be disabled.
Step 9 ipv6 mld snooping tcn flood query count count (Optional) When TCN is enabled, specifies the number of
TCN queries to be sent. The range is from 1 to 10; the
Example:
default is 2.
SwitchDevice(config)# ipv6 mld snooping tcn flood
query count 5
Step 11 show ipv6 mld snooping querier [ vlan vlan-id] (Optional) Verifies that the MLD snooping querier
information for the switch or for the VLAN.
Example:
SwitchDevice(config)# show ipv6 mld snooping
querier vlan 1
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
107
IPv6
Displaying MLD Snooping Information
Step 4 show ipv6 mld snooping Verify that IPv6 MLD snooping report suppression is
disabled.
Example:
SwitchDevice# show ipv6 mld snooping
Command Purpose
show ipv6 mld snooping [ vlan Displays the MLD snooping configuration information for all VLANs
vlan-id ] on the switch or for a specified VLAN.
(Optional) Enter vlan vlan-id to display information for a single VLAN.
The VLAN ID range is 1 to 1001 and 1006 to 4094.
show ipv6 mld snooping mrouter Displays information on dynamically learned and manually configured
[ vlan vlan-id ] multicast router interfaces. When you enable MLD snooping, the switch
automatically learns the interface to which a multicast router is connected.
These are dynamically learned interfaces.
(Optional) Enters vlan vlan-id to display information for a single VLAN.
The VLAN ID range is 1 to 1001 and 1006 to 4094.
show ipv6 mld snooping querier Displays information about the IPv6 address and incoming port for the
[ vlan vlan-id ] most-recently received MLD query messages in the VLAN.
(Optional) Enters vlan vlan-id to display information for a single
VLAN.The VLAN ID range is 1 to 1001 and 1006 to 4094.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
108
IPv6
Configuration Examples for Configuring MLD Snooping
Command Purpose
show ipv6 mld snooping address Displays all IPv6 multicast address information or specific IPv6 multicast
[ vlan vlan-id ] [ count | address information for the switch or a VLAN.
dynamic | user ]
• Enters count to show the group count on the switch or in a VLAN.
• Enters dynamic to display MLD snooping learned group
information for the switch or for a VLAN.
• Entesr user to display MLD snooping user-configured group
information for the switch or for a VLAN.
show ipv6 mld snooping address Displays MLD snooping for the specified VLAN and IPv6 multicast
vlan vlan-id [ address.
ipv6-multicast-address ]
1/0/1
SwitchDevice(config)# end
0/2
SwitchDevice(config)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
109
IPv6
Configuring MLD Snooping Queries: Example
This example shows how to set the MLD snooping last-listener query count for a VLAN to 3:
This example shows how to set the MLD snooping last-listener query interval (maximum response time) to
2000 (2 seconds):
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
110
CHAPTER 11
Configuring IPv6 Unicast Routing
• Finding Feature Information, on page 111
• Information About Configuring IPv6 Unicast Routing, on page 111
• Configuring DHCP for IPv6 Address Assignment, on page 157
• Configuration Examples for IPv6 Unicast Routing, on page 161
Understanding IPv6
IPv4 users can move to IPv6 and receive services such as end-to-end security, quality of service (QoS), and
globally unique addresses. The IPv6 address space reduces the need for private addresses and Network Address
Translation (NAT) processing by border routers at network edges.
For information about how Cisco Systems implements IPv6, go to:
http://www.cisco.com/en/US/products/ps6553/products_ios_technology_home.html
For information about IPv6 and other features in this chapter
• See the Cisco IOS IPv6 Configuration Library.
• Use the Search field on Cisco.com to locate the Cisco IOS software documentation. For example, if you
want information about static routes, you can enter Implementing Static Routes for IPv6 in the search
field to learn about static routes.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
111
IPv6
IPv6 Addresses
IPv6 Addresses
The switch supports only IPv6 unicast addresses. It does not support site-local unicast addresses, or anycast
addresses.
The IPv6 128-bit addresses are represented as a series of eight 16-bit hexadecimal fields separated by colons
in the format: n:n:n:n:n:n:n:n. This is an example of an IPv6 address:
2031:0000:130F:0000:0000:09C0:080F:130B
For easier implementation, leading zeros in each field are optional. This is the same address without leading
zeros:
2031:0:130F:0:0:9C0:80F:130B
You can also use two colons (::) to represent successive hexadecimal fields of zeros, but you can use this short
version only once in each address:
2031:0:130F::09C0:080F:130B
For more information about IPv6 address formats, address types, and the IPv6 packet header, see the
“Implementing IPv6 Addressing and Basic Connectivity” chapter of Cisco IOS IPv6 Configuration Library
on Cisco.com.
In the "Implementing Addressing and Basic Connectivity" chapter, these sections apply to the Catalyst 2960,
2960-S, 2960-C, 2960-X, 2960-CX and 3560-CX switches:
• IPv6 Address Formats
• IPv6 Address Type: Multicast
• IPv6 Address Output Display
• Simplified IPv6 Packet Header
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
112
IPv6
DNS for IPv6
For more information, see the section about IPv6 unicast addresses in the “Implementing IPv6 Addressing
and Basic Connectivity” chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
ICMPv6
The Internet Control Message Protocol (ICMP) in IPv6 generates error messages, such as ICMP destination
unreachable messages, to report errors during processing and other diagnostic functions. In IPv6, ICMP
packets are also used in the neighbor discovery protocol and path MTU discovery.
Neighbor Discovery
The switch supports NDP for IPv6, a protocol running on top of ICMPv6, and static neighbor entries for IPv6
stations that do not support NDP. The IPv6 neighbor discovery process uses ICMP messages and solicited-node
multicast addresses to determine the link-layer address of a neighbor on the same network (local link), to
verify the reachability of the neighbor, and to keep track of neighboring routers.
The switch supports ICMPv6 redirect for routes with mask lengths less than 64 bits. ICMP redirect is not
supported for host routes or for summarized routes with mask lengths greater than 64 bits.
Neighbor discovery throttling ensures that the switch CPU is not unnecessarily burdened while it is in the
process of obtaining the next hop forwarding information to route an IPv6 packet. The switch drops any
additional IPv6 packets whose next hop is the same neighbor that the switch is actively trying to resolve. This
drop avoids further load on the CPU.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
113
IPv6
IPv6 Stateless Autoconfiguration and Duplicate Address Detection
IPv6 Applications
The switch has IPv6 support for these applications:
• Ping, traceroute, and Telnet
• Secure Shell (SSH) over an IPv6 transport
• HTTP server access over IPv6 transport
• DNS resolver for AAAA over IPv4 transport
• Cisco Discovery Protocol (CDP) support for IPv6 addresses
For more information about managing these applications, see the Cisco IOS IPv6 Configuration Library on
Cisco.com.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
114
IPv6
OSPF for IPv6
The graceful restart feature requires that neighboring switches be graceful-restart aware.
For more information, see the Implementing OSPF for IPv6 chapter in the Cisco IOS IPv6 Configuration
Library on Cisco.com.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
115
IPv6
EIGRP IPv6
Note When configuring HSRP for IPv6, you must enable HSRP version 2 (HSRPv2) on the interface.
EIGRP IPv6
Switches running the IP services feature set support the Enhanced Interior Gateway Routing Protocol (EIGRP)
for IPv6. It is configured on the interfaces on which it runs and does not require a global IPv6 address.
Note Switches running the IP base feature set do not support any IPv6 EIGRP features, including IPv6 EIGRP stub
routing.
Before running, an instance of EIGRP IPv6 requires an implicit or explicit router ID. An implicit router ID
is derived from a local IPv4 address, so any IPv4 node always has an available router ID. However, EIGRP
IPv6 might be running in a network with only IPv6 nodes and therefore might not have an available IPv4
router ID.
For more information about EIGRP for IPv6, see the “Implementing EIGRP for IPv6” chapter in the Cisco
IOS IPv6 Configuration Library on Cisco.com.
For support over IPv6, SNMP modifies the existing IP transport mapping to simultaneously support IPv4 and
IPv6. These SNMP actions support IPv6 transport management:
• Opens User Datagram Protocol (UDP) SNMP socket with default settings
• Provides a new transport mechanism called SR_IPV6_TRANSPORT
• Sends SNMP notifications over IPv6 transport
• Supports SNMP-named access lists for IPv6 transport
• Supports SNMP proxy forwarding using IPv6 transport
• Verifies SNMP Manager feature works with IPv6 transport
For information on SNMP over IPv6, including configuration procedures, see the “Managing Cisco IOS
Applications over IPv6” chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
For information about syslog over IPv6, including configuration procedures, see the “Implementing IPv6
Addressing and Basic Connectivity” chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
116
IPv6
HTTP(S) Over IPv6
Configuring IPv6
Default IPv6 Configuration
Table 16: Default IPv6 Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
117
IPv6
Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI)
To forward IPv6 traffic on an interface, you must configure a global IPv6 address on that interface. Configuring
an IPv6 address on an interface automatically configures a link-local address and activates IPv6 for the
interface. The configured interface automatically joins these required multicast groups for that link:
• solicited-node multicast group FF02:0:0:0:0:1:ff00::/104 for each unicast address assigned to the interface
(this address is used in the neighbor discovery process.)
• all-nodes link-local multicast group FF02::1
• all-routers link-local multicast group FF02::2
For more information about configuring IPv6 routing, see the “Implementing Addressing and Basic Connectivity
for IPv6” chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
Beginning in privileged EXEC mode, follow these steps to assign an IPv6 address to a Layer 3 interface and
enable IPv6 routing:
Procedure
Step 2 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure. The interface can be a
Example:
physical interface, a switch virtual interface (SVI), or a
Layer 3 EtherChannel.
SwitchDevice(config)# interface gigabitethernet
1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
118
IPv6
Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI)
SwitchDevice(config-if)# no switchport
Step 4 Use one of the following: • Specifies a global IPv6 address with an extended
unique identifier (EUI) in the low-order 64 bits of the
• ipv6 address ipv6-prefix/prefix length eui-64
IPv6 address. Specify only the network prefix; the
• ipv6 address ipv6-address/prefix length last 64 bits are automatically computed from the
• ipv6 address ipv6-address link-local switch MAC address. This enables IPv6 processing
• ipv6 enable on the interface.
Example: • Manually configures an IPv6 address on the interface.
SwitchDevice(config-if)# ipv6 address
2001:0DB8:c18:1::/64 eui 64 • Specifies a link-local address on the interface to be
used instead of the link-local address that is
SwitchDevice(config-if)# ipv6 address automatically configured when IPv6 is enabled on
2001:0DB8:c18:1::/64 the interface. This command enables IPv6 processing
on the interface.
SwitchDevice(config-if)# ipv6 address
• Automatically configures an IPv6 link-local address
2001:0DB8:c18:1:: link-local
on the interface, and enables the interface for IPv6
processing. The link-local address can only be used
SwitchDevice(config-if)# ipv6 enable
to communicate with nodes on the same link.
SwitchDevice(config-if)# exit
SwitchDevice(config)# ip routing
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
119
IPv6
Configuring First Hop Security in IPv6
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy running-config startup-config
Related Topics
Configuring IPv6 Addressing and Enabling IPv6 Routing: Example, on page 161
• By default, a snooping policy has a security-level of guard. When such a snooping policy is configured
on an access switch, external IPv6 Router Advertisement (RA) or Dynamic Host Configuration Protocol
for IPv6 (DHCPv6) server packets are blocked, even though the uplink port facing the router or DHCP
server/relay is configured as a trusted port. To allow IPv6 RA or DHCPv6 server messages, do the
following:
• Apply an IPv6 RA-guard policy (for RA) or IPv6 DHCP-guard policy (for DHCP server messages
) on the uplink port.
• Configure a snooping policy with a lower security-level, for example glean or inspect. However;
configuring a lower security level is not recommended with such a snooping policy, because benefits
of First Hop security features are not effective.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
120
IPv6
Information about First Hop Security in IPv6
When a policy is configured or modified, the attributes of the policy are stored or updated in the software
policy database, then applied as was specified. The following IPv6 policies are currently supported:
• IPv6 Snooping Policy—IPv6 Snooping Policy acts as a container policy that enables most of the features
available with FHS in IPv6.
• IPv6 FHS Binding Table Content—A database table of IPv6 neighbors connected to the switch is created
from information sources such as Neighbor Discovery (ND) protocol snooping. This database, or binding,
table is used by various IPv6 guard features (such as IPv6 ND Inspection) to validate the link-layer
address (LLA), the IPv4 or IPv6 address, and prefix binding of the neighbors to prevent spoofing and
redirect attacks.
• IPv6 Neighbor Discovery Inspection—IPv6 ND inspection learns and secures bindings for stateless
autoconfiguration addresses in Layer 2 neighbor tables. IPv6 ND inspection analyzes neighbor discovery
messages in order to build a trusted binding table database and IPv6 neighbor discovery messages that
do not conform are dropped. An ND message is considered trustworthy if its IPv6-to-Media Access
Control (MAC) mapping is verifiable.
This feature mitigates some of the inherent vulnerabilities of the ND mechanism, such as attacks on
DAD, address resolution, router discovery, and the neighbor cache.
• IPv6 Router Advertisement Guard—The IPv6 Router Advertisement (RA) guard feature enables the
network administrator to block or reject unwanted or rogue RA guard messages that arrive at the network
switch platform. RAs are used by routers to announce themselves on the link. The RA Guard feature
analyzes the RAs and filters out bogus RAs sent by unauthorized routers. In host mode, all router
advertisement and router redirect messages are disallowed on the port. The RA guard feature compares
configuration information on the Layer 2 device with the information found in the received RA frame.
Once the Layer 2 device has validated the content of the RA frame and router redirect frame against the
configuration, it forwards the RA to its unicast or multicast destination. If the RA frame content is not
validated, the RA is dropped.
• IPv6 DHCP Guard—The IPv6 DHCP Guard feature blocks reply and advertisement messages that come
from unauthorized DHCPv6 servers and relay agents. IPv6 DHCP guard can prevent forged messages
from being entered in the binding table and block DHCPv6 server messages when they are received on
ports that are not explicitly configured as facing a DHCPv6 server or DHCP relay. To use this feature,
configure a policy and attach it to an interface or a VLAN. To debug DHCP guard packets, use the debug
ipv6 snooping dhcp-guard privileged EXEC command.
• IPv6 Source Guard—Like IPv4 Source Guard, IPv6 Source Guard validates the source address or prefix
to prevent source address spoofing.
A source guard programs the hardware to allow or deny traffic based on source or destination addresses.
It deals exclusively with data packet traffic.
The IPv6 source guard feature provides the ability to use the IPv6 binding table to install PACLs to
prevent a host from sending packets with an invalid IPv6 source address.
To debug source-guard packets, use the debug ipv6 snooping source-guard privileged EXEC command.
Note The IPv6 PACL feature is supported only in the ingress direction; it is not
supported in the egress direction.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
121
IPv6
Information about First Hop Security in IPv6
For more information on IPv6 Source Guard, see the IPv6 Source Guard chapter of the Cisco IOS IPv6
Configuration Guide Library on Cisco.com.
• IPv6 Prefix Guard—The IPv6 prefix guard feature works within the IPv6 source guard feature, to enable
the device to deny traffic originated from non-topologically correct addresses. IPv6 prefix guard is often
used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix
delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced
with an address outside this range.
For more information on IPv6 Prefix Guard, see the IPv6 Prefix Guard chapter of the Cisco IOS IPv6
Configuration Guide Library on Cisco.com.
• IPv6 Destination Guard—The IPv6 destination guard feature works with IPv6 neighbor discovery to
ensure that the device performs address resolution only for those addresses that are known to be active
on the link. It relies on the address glean functionality to populate all destinations active on the link into
the binding table and then blocks resolutions before they happen when the destination is not found in the
binding table.
For more information about IPv6 Destination Guard, see the IPv6 Destination Guard chapter of the Cisco
IOS IPv6 Configuration Guide Library on Cisco.com.
• IPv6 Neighbor Discovery Multicast Suppress—The IPv6 Neighbor Discovery multicast suppress feature
is an IPv6 snooping feature that runs on a switch or a wireless controller and is used to reduce the amount
of control traffic necessary for proper link operations.
• DHCPv6 Relay—Lightweight DHCPv6 Relay Agent—The DHCPv6 Relay—Lightweight DHCPv6
Relay Agent feature allows relay agent information to be inserted by an access node that performs a
link-layer bridging (non-routing) function. Lightweight DHCPv6 Relay Agent (LDRA) functionality
can be implemented in existing access nodes, such as DSL access multiplexers (DSLAMs) and Ethernet
switches, that do not support IPv6 control or routing functions. LDRA is used to insert relay-agent options
in DHCP version 6 (DHCPv6) message exchanges primarily to identify client-facing interfaces. LDRA
functionality can be enabled on an interface and on a VLAN.
For more information about DHCPv6 Relay, See the DHCPv6 Relay—Lightweight DHCPv6 Relay
Agent section of the IP Addressing: DHCP Configuration Guide, Cisco IOS Release 15.1SG.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
122
IPv6
How to configure an IPv6 Snooping Policy
SUMMARY STEPS
1. enable
2. configure terminal
3. IPv6 snooping policy policy -name
4. [data-glean |default | device-role [node|switch] |limit {address-countvalue } | no | protocol
[all | nodhcp | ndp] |security-level [glean | guard| inspect]| tracking [disable | enable]|
trusted-port }
5. exit
6. show ipv6 snooping policypolicy-name
DETAILED STEPS
SwitchDevice> enable
Step 3 IPv6 snooping policy policy -name Creates a snooping policy in global configuration mode.
Step 4 [data-glean |default | device-role [node|switch] Enables data address gleaning, validates messages against
|limit {address-countvalue } | no | protocol [all | various criteria, specifies the security level for messages.
nodhcp | ndp] |security-level [glean | guard|
• (Optional) data-glean—Enables data address gleaning.
inspect]| tracking [disable | enable]| trusted-port
This option is disabled by default.
}
• (Optional) default—Sets all default options.
• (Optional) device-role [node | switch]—Qualifies the
role of the device attached to the port.
• (Optional) limit {address-count value}—Limits the
number ofaddresses allowed per target.
• (Optional) no—Negates a command or set its defaults.
• (Optional) protocol [ all | dhcp | ndp]—Specifies
which protocol should be redirected to the snooping
feature for analysis. The default, is all. To change the
default, use the no protocol command.
• (Optional) security-level [glean | guard |
inspect]—Specifies the level of security enforced by
the feature.
• glean—Gleans addresses from messages and
populates the binding table without any
verification.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
123
IPv6
How to Attach an IPv6 Snooping Policy to an Interface or VLAN
Step 6 show ipv6 snooping policypolicy-name Displays the snooping policy configuration.
SUMMARY STEPS
1. enable
2. configure terminal
3. Perform one of the following tasks:
• interface type number
• switchport
• ipv6 snooping [attach-policy policy_name]
OR
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
124
IPv6
How to Attach an IPv6 Neighbor Discovery Multicast Suppress Policy on a Device
SwitchDevice> enable
Step 3 Perform one of the following tasks: Specifies an interface type and number, and enters the
interface configuration mode.
• interface type number
Note type can be physical interface or ether-channel.
• switchport
Configures the interface as a Layer 2 port.
• ipv6 snooping [attach-policy policy_name]
Attaches the snooping policy (where data gleaning is
OR
enabled) to an interface. Specifies the port and the policy
that is attached to the port.
• vlan configuration vlan list
• ipv6 snooping attach-policy policy-name Note If you have enabled data-glean on a snooping
policy, you must attach it to an interface and not
a VLAN.
Step 4 show ipv6 snooping policy policy-name Displays the snooping policy configuration.
Step 5 show ipv6 neighbors binding Displays the binding table entries populated by the snooping
policy.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 nd suppress policy policy-name
4. mode dad-proxy
5. mode full-proxy
6. mode mc-proxy
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
125
IPv6
How to Attach an IPv6 Neighbor Discovery Multicast Suppress Policy on an Interface
Step 4 mode dad-proxy Enables Neighbor Discovery suppress in IPv6 DAD proxy
mode.
SUMMARY STEPS
1. enable
2. configure terminal
3. Perform one of the following tasks:
• interface type number
• ipv6 nd inspection [attach-policy policy_name [ vlan { add | except | none | remove | all} vlan
[ vlan1, vlan2, vlan3...]]]
OR
DETAILED STEPS
SwitchDevice> enable
Step 3 Perform one of the following tasks: Specifies an interface type and number, and places the
device in interface configuration mode.
• interface type number
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
126
IPv6
How to Attach an IPv6 Neighbor Discovery Multicast Suppress Policy to a Layer 2 EtherChannel Interface
How to Attach an IPv6 Neighbor Discovery Multicast Suppress Policy to a Layer 2 EtherChannel Interface
To attach an IPv6 Neighbor Discovery Multicast Suppress policy on an EtherChannel interface, complete the
following steps:
SUMMARY STEPS
1. enable
2. configure terminal
3. Perform one of the following tasks:
• interface port-channel port-channel-number
• ipv6 nd inspection [attach-policy policy_name [ vlan { add | except | none | remove | all} vlan
[ vlan1, vlan2, vlan3...]]]
OR
DETAILED STEPS
SwitchDevice> enable
Step 3 Perform one of the following tasks: Specifies an interface type and port number and places the
switch in the port channel configuration mode.
• interface port-channel port-channel-number
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
127
IPv6
How to Configure an IPv6 DHCP Guard Policy
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 dhcp guard policy policy-name
4. [default | device-role [client | server] |no | exit | trusted-port]
5. exit
6. Perform one of the following tasks:
• interface type number
• ipv6 dhcp guard attach-policy policy-name
OR
DETAILED STEPS
SwitchDevice> enable
Step 3 ipv6 dhcp guard policy policy-name Specifies the DHCPv6 Guard policy name and enters
DHCPv6 Guard Policy configuration mode.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
128
IPv6
How to Configure an IPv6 DHCP Guard Policy
Step 5 exit Exits the DHCP guard policy global configuration mode.
Step 6 Perform one of the following tasks: Specifies an interface type and number and enters the
interface configuration mode.
• interface type number
Attaches the DHCP guard policy to an interface or VLAN.
• ipv6 dhcp guard attach-policy policy-name
OR
Step 7 show ipv6 dhcp guard policy policy_name Displays the DHCP guard policy configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
129
IPv6
How to Configure IPv6 Source Guard
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 source-guard policy policy_name
4. [deny global-autoconf] [permit link-local] [default{. . . }] [exit] [no{. . . }]
5. ipv6 source-guard[attach-policypolicy-name]
6. exit
7. show ipv6 source-guard policypolicy_name
DETAILED STEPS
SwitchDevice> enable
Step 3 ipv6 source-guard policy policy_name Specifies the IPv6 Source Guard policy name and enters
IPv6 Source Guard policy configuration mode.
Step 4 [deny global-autoconf] [permit link-local] [default{. . . Defines the IPv6 Source Guard policy.
}] [exit] [no{. . . }]
• deny global-autoconf—Denies data traffic from
auto-configured global addresses. This is useful when
all global addresses on a link are DHCP-assigned and
the administrator wants to block hosts with
self-configured addresses to send traffic.
• permit link-local—Allows all data traffic that is
sourced by a link-local address.
Step 7 show ipv6 source-guard policypolicy_name Shows the policy configuration and all the interfaces where
the policy is applied.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
130
IPv6
Configuring Default Router Preference (CLI)
Procedure
Step 2 interface interface-id Enters interface configuration mode and identifies the
Layer 3 interface on which you want to specify the DRP.
Example:
Step 3 ipv6 nd router-preference {high | medium | low} Specifies a DRP for the router on the switch interface.
Example:
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
131
IPv6
Configuring IPv6 ICMP Rate Limiting (CLI)
Related Topics
Configuring Default Router Preference: Example, on page 162
Procedure
Step 2 ipv6 icmp error-interval interval [bucketsize] Configures the interval and bucket size for IPv6 ICMP error
messages:
Example:
• interval—The interval (in milliseconds) between
SwitchDevice(config)# ipv6 icmp error-interval 50 tokens being added to the bucket. The range is from 0
20 to 2147483647 milliseconds.
• bucketsize—(Optional) The maximum number of
tokens stored in the bucket. The range is from 1 to 200.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
132
IPv6
Configuring CEF and dCEF for IPv6
Related Topics
Configuring IPv6 ICMP Rate Limiting: Example, on page 163
Procedure
Step 2 ipv6 route ipv6-prefix/prefix length {ipv6-address | Configures a static IPv6 route.
interface-id [ipv6-address]} [administrative distance]
• ipv6-prefix—The IPv6 network that is the destination
Example: of the static route. It can also be a hostname when static
host routes are configured.
SwitchDevice(config)# ipv6 route 2001:0DB8::/32
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
133
IPv6
Configuring Static Routing for IPv6 (CLI)
SwitchDevice(config)# end
Step 4 Use one of the following: Verifies your entries by displaying the contents of the IPv6
routing table.
• show ipv6 static [ ipv6-address | ipv6-prefix/prefix
length ] [interface interface-id ] [detail]][recursive] • interface interface-id—(Optional) Displays only those
[detail] static routes with the specified interface as an egress
• show ipv6 route static [updated] interface.
Example: • recursive—(Optional) Displays only recursive static
routes. The recursive keyword is mutually exclusive
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
134
IPv6
Configuring RIP for IPv6 (CLI)
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Configuring Static Routing for IPv6: Example, on page 163
Procedure
Step 2 ipv6 router rip name Configures an IPv6 RIP routing process, and enters router
configuration mode for the process.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
135
IPv6
Configuring RIP for IPv6 (CLI)
SwitchDevice(config-router)# exit
Step 5 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
Step 6 ipv6 rip name enable Enables the specified IPv6 RIP routing process on the
interface.
Example:
Step 7 ipv6 rip name default-information {only | originate} (Optional) Originates the IPv6 default route (::/0) into the
RIP routing process updates sent from the specified
Example:
interface.
SwitchDevice(config-if)# ipv6 rip cisco Note To avoid routing loops after the IPv6 default
default-information only route (::/0) is originated from any interface, the
routing process ignores all default routes
received on any interface.
SwitchDevice(config)# end
Step 9 Use one of the following: • Displays information about current IPv6 RIP
processes.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
136
IPv6
Configuring OSPF for IPv6 (CLI)
or
SwitchDevice# show ipv6 rip
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Configuring RIP for IPv6: Example, on page 164
For more information about configuring OSPF routing for IPv6, see the “Implementing OSPF for IPv6”
chapter in the Cisco IOS IPv6 Configuration Library on Cisco.com.
Procedure
Step 2 ipv6 router ospf process-id Enables OSPF router configuration mode for the process.
The process ID is the number assigned administratively
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
137
IPv6
Configuring OSPF for IPv6 (CLI)
Step 3 area area-id range {ipv6-prefix/prefix length} [advertise (Optional) Consolidates and summarizes routes at an area
| not-advertise] [cost cost] boundary.
Example: • area-id—Identifier of the area about which routes are
to be summarized. It can be specified as either a
SwitchDevice(config)# area .3 range 2001:0DB8::/32 decimal value or as an IPv6 prefix.
not-advertise
• ipv6-prefix/prefix length—The destination IPv6
network and a decimal value that shows how many
of the high-order contiguous bits of the address
comprise the prefix (the network portion of the
address). A slash mark (/) must precede the decimal
value.
• advertise—(Optional) Sets the address range status
to advertise and generate a Type 3 summary link-state
advertisement (LSA).
• not-advertise—(Optional) Sets the address range
status to DoNotAdvertise. The Type 3 summary LSA
is suppressed, and component networks remain hidden
from other networks.
• cost cost—(Optional) Sets the metric or cost for this
summary route, which is used during OSPF SPF
calculation to determine the shortest paths to the
destination. The value can be 0 to 16777215.
Step 4 maximum paths number-paths (Optional) Defines the maximum number of equal-cost
routes to the same destination that IPv6 OSPF should enter
Example:
in the routing table. The range is from 1 to 32, and the
default is 16 paths.
SwitchDevice(config)# maximum paths 16
SwitchDevice(config-if)# exit
Step 6 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
Step 7 ipv6 ospf process-id area area-id [instance instance-id] Enables OSPF for IPv6 on the interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
138
IPv6
Tuning LSA and SPF Timers for OSPFv3 Fast Convergence
SwitchDevice(config)# end
Step 9 Use one of the following: • Displays information about OSPF interfaces.
• show ipv6 ospf [ process-id ] [ area-id ] interface • Displays general information about OSPF routing
[ interface-id ] processes.
• show ipv6 ospf [ process-id ] [ area-id ]
Example:
SwitchDevice# show ipv6 ospf 21 interface
gigabitethernet2/0/1
or
SwitchDevice# show ipv6 ospf 21
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
139
IPv6
Configuring LSA and SPF Throttling for OSPFv3 Fast Convergence
DETAILED STEPS
SwitchDevice> enable
Step 4 timers lsa arrival milliseconds Sets the minimum interval at which the software accepts
the same LSA from OSPFv3 neighbors.
Step 6 timers pacing lsa-groupseconds Changes the interval at which OSPFv3 LSAs are collected
into a group and refreshed, checksummed, or aged.
Step 7 timers pacing retransmissionmilliseconds Configures LSA retransmission packet pacing in OSPFv3.
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
140
IPv6
Configuring EIGRP for IPv6
DETAILED STEPS
SwitchDevice> enable
Step 4 timers throttle spf spf-start spf-hold spf-max-wait Turns on SPF throttling.
Step 5 timers throttle lsastart-intervalhold-intervalmax-interval Sets rate-limiting values for OSPFv3 LSA generation.
Step 6 timers lsa arrivalmilliseconds Sets the minimum interval at which the software accepts
the same LSA from OSPFv3 neighbors.
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
141
IPv6
Configuring HSRP for IPv6
Note Before configuring an HSRP for IPv6 group, you must enable the forwarding of IPv6 packets by using the
ipv6 unicast-routing global configuration command and enable IPv6 on the interface on which you will
configure an HSRP for IPv6 group.
Procedure
Step 2 interface interface-id Enters interface configuration mode, and enters the Layer 3
interface on which you want to specify the standby version.
Example:
Step 3 standby version {1 | 2} Sets the HSRP version. Enter 2 to change the HSRP version.
The default is 1.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
142
IPv6
Enabling an HSRP Group for IPv6
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Step 2 interface interface-id Enters interface configuration mode, and enters the Layer 3
interface on which you want to enable HSRP for IPv6.
Example:
Step 3 standby [group-number] ipv6 {link-local-address | Creates (or enables) the HSRP for IPv6 group.
autoconfig}
• (Optional) group-number—The group number on the
Example: interface for which HSRP is being enabled. The range
is 0 to 4095. The default is 0. If there is only one HSRP
SwitchDevice(config-if)# standby 2 ipv6 auto config group, you do not need to enter a group number.
• Enter the link-local address of the Hot Standby router
interface, or enable the link-local address to be
generated automatically from the link-local prefix and
a modified EUI-64 format interface identifier, where
the EUI-64 interface identifier is created from the
relevant HSRP virtual MAC address.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
143
IPv6
Enabling an HSRP Group for IPv6
Step 5 standby [group-number] priority priority Sets a priority value used in choosing the active router.
The range is 1 to 255; the default priority is 100. The highest
Example:
number represents the highest priority.
SwitchDevice(config-if)# standby 2 priority 200 Use the no form of the command to restore the default
values.
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Enabling an HSRP Group for IPv6: Example, on page 162
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
144
IPv6
Configuring Multi-VRF CE
Configuring Multi-VRF CE
The switch supports multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices
(multi-VRF CE) when the it is running the IP services or advanced IP Services feature set. Multi-VRF CE
allows a service provider to support two or more VPNs with overlapping IP addresses.
Note The switch does not use Multiprotocol Label Switching (MPLS) to support VPNs.
Forwarding table The default for an interface is the global routing table.
Configuring VRFs
For complete syntax and usage information for the commands, see the switch command reference for this
release and the Cisco IOS Switching Services Command Reference.
Procedure
Step 3 vrf definition vrf-name Names the VRF, and enters VRF configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
145
IPv6
Configuring VRFs
Step 6 route-target {export | import | both} Creates a list of import, export, or import and export route
route-target-ext-community target communities for the specified VRF. Enter either an
AS system number and an arbitrary number (xxx:y) or an
Example:
IP address and an arbitrary number (A.B.C.D:y). The
route-target-ext-community should be the same as the
SwitchDevice(config-vrf)# route-target both 100:2
route-distinguisher entered in Step 4.
Step 7 import map route-map (Optional) Associates a route map with the VRF.
Example:
Step 8 interface interface-id Specifies the Layer 3 interface to be associated with the
VRF, and enter interface configuration mode. The interface
Example:
can be a routed port or SVI.
SwitchDevice(config-vrf)# interface
gigabitethernet 1/0/1
Step 9 vrf forwarding vrf-name Associates the VRF with the Layer 3 interface.
Example:
SwitchDevice(config)# end
Step 11 show vrf [brief | detail | interfaces] [vrf-name] Verifies the configuration. Displays information about the
configured VRFs.
Example:
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
146
IPv6
Configuring VRF-Aware Services
Note The switch does not support VRF-aware services for Unicast Reverse Path
Forwarding (uRPF) or Network Time Protocol (NTP).
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
147
IPv6
Configuring VRF-Aware Services for HSRP
Procedure
Procedure
Step 2 interface interface-id Enters interface configuration mode, and enter the Layer 3
interface on which you want to enable HSRP.
Example:
SwitchDevice# interface gigabitethernet1/0/1
SwitchDevice# no switchport
Step 5 ipv6 addressipv6 address Enters the IPv6 address for the interface.
Example:
Step 6 standby 1 ipv6ipv6 address Enables HSRP and configures the virtual IP address.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
148
IPv6
Configuring VRF-Aware Services for Traceroute
SwitchDevice(config)# end
Procedure
Procedure
Step 2 ip ftp source-interface interface-type interface-number Specifies the source IP address for FTP connections.
Example:
SwitchDevice(config)#end
Step 5 ip tftp source-interface interface-type interface-number Specifies the source IP address for TFTP connections.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
149
IPv6
Configuring a VPN Routing Session
SwitchDevice(config)# end
SwitchDevice(config)#end
Note To configure an EIGRP routing process to run within a VRF instance, you must configure an
autonomous-system number by entering the autonomous-system autonomous-system-number address-family
configuration mode command.
Procedure
Step 2 router ospfv3 process-id Enables OSPF routing, specifies a VPN forwarding table,
and enter router configuration mode.
Example:
Step 3 router router-id Specifies the OSPF router-id in IP address format for this
OSPFv3 process.
Example:
Step 4 log-adjacency-changes (Optional) Logs changes in the adjacency state. This is the
default state.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
150
IPv6
Configuring BGP PE to CE Routing Sessions
SwitchDevice(config-router)# log-adjacency-changes
Step 5 address-family ipv6 unicast vrf vrf-name Enters address family command mode for the VRF.
Example:
Step 6 area area-id normal Specifies OSPFv3 area parameters and type.
Example:
SwitchDevice(config-router)# area 2
Step 7 redistribute bgp autonomous-system-number Redistributes routes from BGP routing process to OSPF
routing process.
Example:
SwitchDevice(config-router)# end
Step 9 show ospfv3 vrf vrf-name Verifies the configuration of the OSPFv3 network.
Example:
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
151
IPv6
Configuring BGP PE to CE Routing Sessions
Step 3 bgp router id router-id Configures a fixed 32-bit router id as the identifier of the
local router running BGP.
Example:
Step 4 redistribute ospf process-id Sets the switch to redistribute OSPF internal routes.
Example:
Step 5 address-family ipv6 vrf vrf-name Defines BGP parameters for PE to CE routing sessions,
and enter VRF address-family mode.
Example:
Step 6 network ipv6 network-number Specifies an IPv6 Network number to announce via BGP.
Example:
Step 7 neighbor ipv6 address remote-as as-number Defines a BGP session between PE and CE routers.
Example:
Step 8 neighbor address activate Activates the advertisement of the IPv4 address family.
Example:
SwitchDevice(config-router)# end
Step 10 show bgp vrf vrf-name Verifies BGP configuration on the VRF.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
152
IPv6
Multi-VRF CE Configuration Example
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
153
IPv6
Multi-VRF CE Configuration Example
Configure the physical interfaces on Switch A. Gigabit Ethernet interface 1/0/24 is a trunk connection to the
PE. Gigabit Ethernet ports 1/0/1 and 1/0/2 connect to VPNs.
Configure the VLANs used on Switch A. VLAN 10 is used by VRF 11 between the CE and the PE. VLAN
20 is used by VRF 12 between the CE and the PE. VLANs 118 and 208 are used for the VPNs that include
Switch E and Switch D, respectively:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
154
IPv6
Multi-VRF CE Configuration Example
Switch D belongs to VPN 1. Configure the connection to Switch A by using these commands.
Switch E belongs to VPN 2. Configure the connection to Switch A by using these commands.
When used on switch B (the PE router), these commands configure only the connections to the CE device,
Switch A.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
155
IPv6
Displaying Multi-VRF CE Status
SwitchDevice(config-vrf-af)# exit
SwitchDevice(config-vrf)# exit
Command Purpose
show ipv6 protocols vrfvrf -name Displays routing protocol information associated with
a VRF.
show ipv6 route vrfvrf -name [connected] [protocol Displays IP routing table information associated with
[as-number] ] [list] [mobile] [odr] [profile] [static] a VRF.
[summary] [supernets-only]
show ipv6 vrf [brief | detail | interfaces] [vrf-name] Displays information about the defined VRF instances.
Displaying IPv6
For complete syntax and usage information on these commands, see the Cisco IOS command reference
publications.
Command Purpose
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
156
IPv6
Configuring DHCP for IPv6 Address Assignment
Command Purpose
show ipv6 protocols Displays a list of IPv6 routing protocols on the switch.
Related Topics
Displaying IPv6: Example, on page 164
• The switch can act as a DHCPv6 client, server, or relay agent. The DHCPv6 client, server, and relay
function are mutually exclusive on an interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
157
IPv6
Enabling DHCPv6 Server Function (CLI)
Procedure
Step 2 ipv6 dhcp pool poolname Enters DHCP pool configuration mode, and define the
name for the IPv6 DHCP pool. The pool name can be a
Example:
symbolic string (such as Engineering) or an integer (such
as 0).
SwitchDevice(config)# ipv6 dhcp pool 7
Step 3 address prefix IPv6-prefix {lifetime} {t1 t1 | infinite} (Optional) Specifies an address prefix for address
assignment.
Example:
This address must be in hexadecimal, using 16-bit values
SwitchDevice(config-dhcpv6)# address prefix between colons.
2001:1000::0/64 lifetime 3600
lifetime t1 t1—Specifies a time interval (in seconds) that
an IPv6 address prefix remains in the valid state. The range
is 5 to 4294967295 seconds. Specify infinite for no time
interval.
Step 6 suboption number {address IPv6-address | ascii (Optional) Enters a vendor-specific suboption number.
ASCII-string | hex hex-string} The range is 1 to 65535. Enter an IPv6 address, ASCII
text, or a hex string as defined by the suboption parameters.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
158
IPv6
Enabling DHCPv6 Server Function (CLI)
SwitchDevice(config-dhcpv6-vs)# suboption 1
address 1000:235D::
SwitchDevice(config-dhcpv6-vs)# exit
SwitchDevice(config-dhcpv6)# exit
Step 9 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
Step 10 ipv6 dhcp server [poolname | automatic] [rapid-commit] Enables DHCPv6 server function on an interface.
[preference value] [allow-hint]
• poolname—(Optional) User-defined name for the
Example: IPv6 DHCP pool. The pool name can be a symbolic
string (such as Engineering) or an integer (such as 0).
SwitchDevice(config-if)# ipv6 dhcp server
automatic • automatic—(Optional) Enables the system to
automatically determine which pool to use when
allocating addresses for a client.
• rapid-commit—(Optional) Allows two-message
exchange method.
• preference value—(Optional) Configures the
preference value carried in the preference option in
the advertise message sent by the server. The range
is from 0 to 255. The preference value default is 0.
• allow-hint—(Optional) Specifies whether the server
should consider client suggestions in the SOLICIT
message. By default, the server ignores client hints.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
159
IPv6
Enabling DHCPv6 Client Function (CLI)
or
SwitchDevice# show ipv6 dhcp interface
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Enabling DHCPv6 Server Function: Example, on page 162
Procedure
Step 2 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
Step 3 ipv6 address dhcp [rapid-commit] Enables the interface to acquire an IPv6 address from the
DHCPv6 server.
Example:
rapid-commit—(Optional) Allow two-message exchange
SwitchDevice(config-if)# ipv6 address dhcp method for address assignment.
rapid-commit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
160
IPv6
Configuration Examples for IPv6 Unicast Routing
SwitchDevice(config)# end
Step 6 show ipv6 dhcp interface Verifies that the DHCPv6 client is enabled on an interface.
Example:
Related Topics
Enabling DHCPv6 Client Function: Example, on page 163
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
161
IPv6
Configuring Default Router Preference: Example
Related Topics
Configuring IPv6 Addressing and Enabling IPv6 Routing (CLI), on page 118
Related Topics
Configuring Default Router Preference (CLI), on page 131
Note This procedure is the minimum number of steps required to enable HSRP for IPv6. Other configurations are
optional.
Related Topics
Enabling an HSRP Group for IPv6, on page 143
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
162
IPv6
Enabling DHCPv6 Client Function: Example
This example shows how to configure a pool called testgroup with three link-addresses and an IPv6 address
prefix:
This example shows how to configure a pool called 350 with vendor-specific options:
Related Topics
Enabling DHCPv6 Server Function (CLI), on page 158
Related Topics
Enabling DHCPv6 Client Function (CLI), on page 160
Related Topics
Configuring IPv6 ICMP Rate Limiting (CLI), on page 132
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
163
IPv6
Configuring RIP for IPv6: Example
Related Topics
Configuring Static Routing for IPv6 (CLI), on page 133
Related Topics
Configuring RIP for IPv6 (CLI), on page 135
Related Topics
Displaying IPv6, on page 156
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
164
CHAPTER 12
Implementing IPv6 Multicast
• Finding Feature Information, on page 165
• Information About Implementing IPv6 Multicast Routing, on page 165
• Implementing IPv6 Multicast, on page 175
Note IPv6 Multicast Routing is supported only on Cisco Catalyst 3560-CX switches.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
165
IPv6
IPv6 Multicast Routing Implementation
Switches use the MLD protocol to learn whether members of a group are present on their directly attached
subnets. Hosts join multicast groups by sending MLD report messages. The network then delivers data to a
potentially unlimited number of receivers, using only one copy of the multicast data on each subnet. IPv6
hosts that wish to receive the traffic are known as group members.
Packets delivered to group members are identified by a single multicast group address. Multicast packets are
delivered to a group using best-effort reliability, just like IPv6 unicast packets.
The multicast environment consists of senders and receivers. Any host, regardless of whether it is a member
of a group, can send to a group. However, only members of a group can listen to and receive the message.
A multicast address is chosen for the receivers in a multicast group. Senders use that address as the destination
address of a datagram to reach all members of the group.
Membership in a multicast group is dynamic; hosts can join and leave at any time. There is no restriction on
the location or number of members in a multicast group. A host can be a member of more than one multicast
group at a time.
How active a multicast group is, its duration, and its membership can vary from group to group and from time
to time. A group that has members may have no activity.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
166
IPv6
IPV6 MLD Proxy
functionality consists mainly of source access control and accounting, receiver access control and accounting,
and provisioning of this access control mechanism.
Multicast access control provides an interface between multicast and authentication, authorization, and
accounting (AAA) for provisioning, authorizing, and accounting at the last-hop switch, receiver access control
functions in multicast, and group or channel disabling capability in multicast.
When you deploy a new multicast service environment, it is necessary to add user authentication and provide
a user profile download on a per-interface basis. The use of AAA and IPv6 multicast supports user authentication
and downloading of the user profile in a multicast environment.
The event that triggers the download of a multicast access-control profile from the RADIUS server to the
access switch is arrival of an MLD join on the access switch. When this event occurs, a user can cause the
authorization cache to time out and request download periodically or use an appropriate multicast clear
command to trigger a new download in case of profile changes.
Accounting occurs via RADIUS accounting. Start and stop accounting records are sent to the RADIUS server
from the access switch. In order for you to track resource consumption on a per-stream basis, these accounting
records provide information about the multicast source and group. The start record is sent when the last-hop
switch receives a new MLD report, and the stop record is sent upon MLD leave or if the group or channel is
deleted for any reason.
PIM-Sparse Mode
IPv6 multicast provides support for intradomain multicast routing using PIM-SM. PIM-SM uses unicast
routing to provide reverse-path information for multicast tree building, but it is not dependent on any particular
unicast routing protocol.
PIM-SM is used in a multicast network when relatively few switches are involved in each multicast and these
switches do not forward multicast packets for a group, unless there is an explicit request for the traffic. PIM-SM
distributes information about active sources by forwarding data packets on the shared tree. PIM-SM initially
uses shared trees, which requires the use of an RP.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
167
IPv6
Designated Switch
Requests are accomplished via PIM joins, which are sent hop by hop toward the root node of the tree. The
root node of a tree in PIM-SM is the RP in the case of a shared tree or the first-hop switch that is directly
connected to the multicast source in the case of a shortest path tree (SPT). The RP keeps track of multicast
groups and the hosts that send multicast packets are registered with the RP by that host's first-hop switch.
As a PIM join travels up the tree, switches along the path set up multicast forwarding state so that the requested
multicast traffic will be forwarded back down the tree. When multicast traffic is no longer needed, a switch
sends a PIM prune up the tree toward the root node to prune (or remove) the unnecessary traffic. As this PIM
prune travels hop by hop up the tree, each switch updates its forwarding state appropriately. Ultimately, the
forwarding state associated with a multicast group or source is removed.
A multicast data sender sends data destined for a multicast group. The designated switch (DR) of the sender
takes those data packets, unicast-encapsulates them, and sends them directly to the RP. The RP receives these
encapsulated data packets, de-encapsulates them, and forwards them onto the shared tree. The packets then
follow the (*, G) multicast tree state in the switches on the RP tree, being replicated wherever the RP tree
branches, and eventually reaching all the receivers for that multicast group. The process of encapsulating data
packets to the RP is called registering, and the encapsulation packets are called PIM register packets.
Designated Switch
Cisco switches use PIM-SM to forward multicast traffic and follow an election process to select a designated
switch when there is more than one switch on a LAN segment.
The designated switch is responsible for sending PIM register and PIM join and prune messages toward the
RP to inform it about active sources and host group membership.
If there are multiple PIM-SM switches on a LAN, a designated switch must be elected to avoid duplicating
multicast traffic for connected hosts. The PIM switch with the highest IPv6 address becomes the DR for the
LAN unless you choose to force the DR election by use of the ipv6 pim dr-priority command. This command
allows you to specify the DR priority of each switch on the LAN segment (default priority = 1) so that the
switch with the highest priority will be elected as the DR. If all switches on the LAN segment have the same
priority, then the highest IPv6 address is again used as the tiebreaker.
If the DR should fail, the PIM-SM provides a way to detect the failure of Switch A and elect a failover DR.
If the DR (Switch A) became inoperable, Switch B would detect this situation when its neighbor adjacency
with Switch A timed out. Because Switch B has been hearing MLD membership reports from Host A, it
already has MLD state for Group A on this interface and would immediately send a join to the RP when it
became the new DR. This step reestablishes traffic flow down a new branch of the shared tree via Switch B.
Additionally, if Host A were sourcing traffic, Switch B would initiate a new register process immediately
after receiving the next multicast packet from Host A. This action would trigger the RP to join the SPT to
Host A via a new branch through Switch B.
Note • Two PIM switches are neighbors if there is a direct connection between them. To display your PIM
neighbors, use the show ipv6 pim neighbor privileged EXEC command.
• The DR election process is required only on multiaccess LANs.
Rendezvous Point
IPv6 PIM provides embedded RP support. Embedded RP support allows the switch to learn RP information
using the multicast group destination address instead of the statically configured RP. For switches that are
the RP, the switch must be statically configured as the RP.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
168
IPv6
PIMv6 Anycast RP Solution Overview
The switch searches for embedded RP group addresses in MLD reports or PIM messages and data packets.
On finding such an address, the switch learns the RP for the group from the address itself. It then uses this
learned RP for all protocol activity for the group. For switches that are the RP, the switch is advertised as an
embedded RP must be configured as the RP.
To select a static RP over an embedded RP, the specific embedded RP group range or mask must be configured
in the access list of the static RP. When PIM is configured in sparse mode, you must also choose one or more
switches to operate as an RP. An RP is a single common root placed at a chosen point of a shared distribution
tree and is configured statically in each box.
PIM DRs forward data from directly connected multicast sources to the RP for distribution down the shared
tree. Data is forwarded to the RP in one of two ways:
• Data is encapsulated in register packets and unicast directly to the RP by the first-hop switch operating
as the DR.
• If the RP has itself joined the source tree, it is multicast-forwarded per the RPF forwarding algorithm
described in the PIM-Sparse Mode section.
The RP address is used by first-hop switches to send PIM register messages on behalf of a host sending a
packet to the group. The RP address is also used by last-hop switches to send PIM join and prune messages
to the RP to inform it about group membership. You must configure the RP address on all switches (including
the RP switch).
A PIM switch can be an RP for more than one group. Only one RP address can be used at a time within a
PIM domain for a certain group. The conditions specified by the access list determine for which groups the
switch is an RP.
IPv6 multicast supports the PIM accept register feature, which is the ability to perform PIM-SM register
message filtering at the RP. The user can match an access list or compare the AS path for the registered source
with the AS path specified in a route map.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
169
IPv6
IPv6 BSR: Configure RP Mapping
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
170
IPv6
PIM Shared Tree and Source Tree (Shortest-Path Tree)
SSM mapping allows the switch to look up the source of a multicast MLD version 1 report either in the running
configuration of the switch or from a DNS server. The switch can then initiate an (S, G) join toward the source.
Join and prune messages are sent for sources and RPs. They are sent hop-by-hop and are processed by each
PIM switch along the path to the source or RP. Register and register-stop messages are not sent hop-by-hop.
They are sent by the designated switch that is directly connected to a source and are received by the RP for
the group.
PIM uses both source trees and RP-rooted shared trees to forward datagrams; the RPF check is performed
differently for each, as follows:
• If a PIM switch has source-tree state (that is, an (S, G) entry is present in the multicast routing table),
the switch performs the RPF check against the IPv6 address of the source of the multicast packet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
171
IPv6
Routable Address Hello Option
• If a PIM switch has shared-tree state (and no explicit source-tree state), it performs the RPF check on
the RP's address (which is known when members join the group).
Sparse-mode PIM uses the RPF lookup function to determine where it needs to send joins and prunes. (S, G)
joins (which are source-tree states) are sent toward the source. (*, G) joins (which are shared-tree states) are
sent toward the RP.
Bidirectional PIM
Bidirectional PIM allows multicast switches to keep reduced state information, as compared with unidirectional
shared trees in PIM-SM. Bidirectional shared trees convey data from sources to the rendezvous point address
(RPA) and distribute them from the RPA to the receivers. Unlike PIM-SM, bidirectional PIM does not switch
over to the source tree, and there is no register encapsulation of data from the source to the RP.
A single designated forwarder (DF) exists for each RPA on every link within a bidirectional PIM domain
(including multiaccess and point-to-point links). The only exception is the RPL on which no DF exists. The
DF is the switch on the link with the best route to the RPA, which is determined by comparing MRIB-provided
metrics. A DF for a given RPA forwards downstream traffic onto its link and forwards upstream traffic from
its link toward the rendezvous point link (RPL). The DF performs this function for all bidirectional groups
that map to the RPA. The DF on a link is also responsible for processing Join messages from downstream
switches on the link as well as ensuring that packets are forwarded to local receivers discovered through a
local membership mechanism such as MLD.
Bidirectional PIM offers advantages when there are many moderate or low-rate sources. However, the
bidirectional shared trees may have worse delay characteristics than do the source trees built in PIM-SM
(depending on the topology).
Only static configuration of bidirectional RPs is supported in IPv6.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
172
IPv6
Static Mroutes
Static Mroutes
IPv6 static mroutes behave much in the same way as IPv4 static mroutes used to influence the RPF check.
IPv6 static mroutes share the same database as IPv6 static routes and are implemented by extending static
route support for RPF checks. Static mroutes support equal-cost multipath mroutes, and they also support
unicast-only static routes.
MRIB
The Multicast Routing Information Base (MRIB) is a protocol-independent repository of multicast routing
entries instantiated by multicast routing protocols (routing clients). Its main function is to provide independence
between routing protocols and the Multicast Forwarding Information Base (MFIB). It also acts as a coordination
and communication point among its clients.
Routing clients use the services provided by the MRIB to instantiate routing entries and retrieve changes made
to routing entries by other clients. Besides routing clients, MRIB also has forwarding clients (MFIB instances)
and special clients such as MLD. MFIB retrieves its forwarding entries from MRIB and notifies the MRIB
of any events related to packet reception. These notifications can either be explicitly requested by routing
clients or spontaneously generated by the MFIB.
Another important function of the MRIB is to allow for the coordination of multiple routing clients in
establishing multicast connectivity within the same multicast session. MRIB also allows for the coordination
between MLD and routing protocols.
MFIB
The MFIB is a platform-independent and routing-protocol-independent library for IPv6 software. Its main
purpose is to provide a Cisco IOS platform with an interface with which to read the IPv6 multicast forwarding
table and notifications when the forwarding table changes. The information provided by the MFIB has clearly
defined forwarding semantics and is designed to make it easy for the platform to translate to its specific
hardware or software forwarding mechanisms.
When routing or topology changes occur in the network, the IPv6 routing table is updated, and those changes
are reflected in the MFIB. The MFIB maintains next-hop address information based on the information in the
IPv6 routing table. Because there is a one-to-one correlation between MFIB entries and routing table entries,
the MFIB contains all known routes and eliminates the need for route cache maintenance that is associated
with switching paths such as fast switching and optimum switching.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
173
IPv6
IPv6 Multicast Process Switching and Fast Switching
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
174
IPv6
NSF and SSO Support In IPv6 Multicast
Procedure
Step 3 copy running-config startup-config (Optional) Save your entries in the configuration file.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
175
IPv6
Customizing and Verifying MLD on an Interface
Procedure
Step 2 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Step 3 ipv6 mld join-group [group-address] [include | exclude] Configures MLD reporting for a specified group and
{source-address | source-list [acl]} source.
Example:
Step 4 ipv6 mld access-group access-list-name Allows the user to perform IPv6 multicast receiver access
control.
Example:
Step 5 ipv6 mld static-group [group-address] [include | exclude] Statically forwards traffic for the multicast group onto a
{source-address | source-list [acl]} specified interface and cause the interface to behave as if
a MLD joiner were present on the interface.
Example:
Step 6 ipv6 mld query-max-response-time seconds Configures the maximum response time advertised in MLD
queries.
Example:
Step 7 ipv6 mld query-timeout seconds Configures the timeout value before the switch takes over
as the querier for the interface.
Example:
Step 9 show ipv6 mld groups [link-local] [ group-name | Displays the multicast groups that are directly connected
group-address] [interface-type interface-number] [detail to the switch and that were learned through MLD.
| explicit]
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
176
IPv6
Implementing MLD Group Limits
Step 10 show ipv6 mld groups summary Displays the number of (*, G) and (S, G) membership
reports present in the MLD cache.
Example:
Step 11 show ipv6 mld interface [type number] Displays multicast-related information about an interface.
Example:
Step 12 debug ipv6 mld [group-name | group-address | Enables debugging on MLD protocol activity.
interface-type]
Example:
Step 13 debug ipv6 mld explicit [group-name | group-address Displays information related to the explicit tracking of
hosts.
Example:
Switch # debug ipv6 mld explicit
Step 14 copy running-config startup-config (Optional) Save your entries in the configuration file.
SUMMARY STEPS
1. enable
2. configure terminal
3. ipv6 mld [vrf vrf-name] state-limit number
4. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
177
IPv6
Implementing MLD Group Limits per Interface
DETAILED STEPS
SwitchDevice# enable
Step 3 ipv6 mld [vrf vrf-name] state-limit number Limits the number of MLD states globally.
Example:
SwitchDevice(config)# ipv6 mld state-limit 300
Step 4 copy running-config startup-config (Optional) Save your entries in the configuration file.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ipv6 mld limit number [except]access-list
5. copy running-config startup-config
DETAILED STEPS
SwitchDevice# enable
Step 3 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
178
IPv6
Configuring Explicit Tracking of Receivers to Track Host Behavior
Step 4 ipv6 mld limit number [except]access-list Limits the number of MLD states on a per-interface basis.
Example:
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Switch(config)# interface GigabitEthernet 1/0/1
Step 4 copy running-config startup-config (Optional) Save your entries in the configuration file.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
179
IPv6
Enabling AAA Access Control for IPv6 Multicast
Procedure
Step 3 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 aaa authorization multicast default [ method3 | method4 Enables AAA authorization and sets parameters that restrict
] user access to an IPv6 multicast network.
Example:
Switch (config)# aaa authorization multicast
default
Step 3 aaa accounting multicast default [ start-stop | stop- only Enables AAA accounting of IPv6 multicast services for
[ broadcast ] [method1 ] [method2] [method3] [method2] billing or security purposes when you use RADIUS.
Example:
Switch (config)# aaa accounting multicast default
Step 4 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Switch (config)# interface FastEthernet 1/0
Step 5 ipv6 multicast aaa account receive access-list-name Enables AAA accounting on specified groups or chacopy
access-list-name[throttlethrottle-number] running-config startup-confignnels.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
180
IPv6
Disabling the Switch from Receiving Unauthenticated Multicast Traffic
Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 ipv6 multicast [ vrfvrf-name ] group-range Disables multicast protocol actions and traffic forwarding
[access-list-name for unauthorized groups or channels on all the interfaces in
a switch.
Example:
Step 3 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 ipv6 mld host-proxy [group-acl] Enables the MLD proxy feature.
Example:
Step 3 ipv6 mld host-proxy interface[ group-acl] Enables the MLD proxy feature on a specified interface on
an RP.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
181
IPv6
Resetting Authorization Status on an MLD Interface
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 show ipv6 mld traffic Displays the MLD traffic counters.
Example:
Step 3 copy running-config startup-config (Optional) Save your entries in the configuration file.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
182
IPv6
Clearing the MLD Interface Counters
Procedure
Step 2 copy running-config startup-config (Optional) Save your entries in the configuration file.
Configuring PIM
This section explains how to configure PIM.
Procedure
Step 2 ipv6 pim rp-address ipv6-address[group-access-list] Configures the address of a PIM RP for a particular group
range.
Example:
Step 3 exit Exits global configuration mode, and returns the switch to
privileged EXEC mode.
Example:
Step 4 show ipv6 pim interface [state-on] [state-off] Displays information about interfaces configured for PIM.
[type-number]
Example:
Step 5 show ipv6 pim group-map [group-name | group-address] Displays an IPv6 multicast group mapping table.
| [group-range | group-mask] [info-source {bsr | default
| embedded-rp | static}]
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
183
IPv6
Configuring PIM Options
Step 6 show ipv6 pim neighbor [detail] [interface-type Displays the PIM neighbors discovered by the Cisco IOS
interface-number | count] software.
Example:
Step 7 show ipv6 pim range-list [config] [rp-address | rp-name] Displays information about IPv6 multicast range lists.
Example:
Step 8 show ipv6 pim tunnel [interface-type interface-number] Displays information about the PIM register encapsulation
and de-encapsulation tunnels on an interface.
Example:
Step 9 debug ipv6 pim [group-name | group-address | interface Enables debugging on PIM protocol activity.
interface-type | bsr | group | mvpn | neighbor]
Example:
Step 10 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 ipv6 pim spt-threshold infinity [group-list Configures when a PIM leaf switch joins the SPT for the
access-list-name] specified groups.
Example:
Step 3 ipv6 pim accept-register {list access-list | route-map Accepts or rejects registers at the RP.
map-name}
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
184
IPv6
Configuring Bidirectional PIM and Displaying Bidirectional PIM Information
Step 4 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Step 5 ipv6 pim dr-priority value Configures the DR priority on a PIM switch.
Example:
Step 6 ipv6 pim hello-interval seconds Configures the frequency of PIM hello messages on an
interface.
Example:
Step 7 ipv6 pim join-prune-interval seconds Configures periodic join and prune announcement intervals
for a specified interface.
Example:
Step 9 ipv6 pim join-prune statistic [interface-type] Displays the average join-prune aggregation for the most
recently aggregated packets for each interface.
Example:
Step 10 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
185
IPv6
Resetting the PIM Traffic Counters
Step 3 exit Exits global configuration mode, and returns the switch to
privileged EXEC mode.
Example:
Step 4 show ipv6 pim [vrf vrf-name] df [interface-type Displays the designated forwarder (DF)-election state of
interface-number] [rp-address] each interface for RP.
Example:
Step 5 show ipv6 pim [vrf vrf-name] df winner [interface-type Displays the DF-election winner on each interface for each
interface-number] [rp-address] RP.
Example:
Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 show ipv6 pim traffic Displays the PIM traffic counters.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
186
IPv6
Clearing the PIM Topology Table to Reset the MRIB Connection
Procedure
Step 2 show ipv6 mrib client [filter] [name {client-name | Displays multicast-related information about an interface.
client-name : client-id}]
Example:
Step 3 show ipv6 mrib route {link-local | summary | Displays the MRIB route information.
[sourceaddress-or-name | *] [groupname-or-address[
prefix-length]]]
Example:
Step 4 show ipv6 pim topology [groupname-or-address Displays PIM topology table information for a specific
[sourceaddress-or-name] | link-local | route-count group or all groups.
[detail]]
Example:
Step 5 debug ipv6 mrib client Enables debugging on MRIB client management activity.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
187
IPv6
Configuring a BSR
Step 8 debug ipv6 mrib route [group-name | group-address] Displays information about MRIB routing entry-related
activity.
Example:
Step 9 debug ipv6 mrib table Enables debugging on MRIB table management activity.
Example:
Step 10 copy running-config startup-config (Optional) Save your entries in the configuration file.
Configuring a BSR
The tasks included here are described below.
Procedure
Step 2 ipv6 pim bsr candidate bsr Configures a switch to be a candidate BSR.
ipv6-address[hash-mask-length] [priority priority-value]
Example:
Step 3 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Step 4 ipv6 pim bsr border Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
188
IPv6
Sending PIM RP Advertisements to the BSR
Step 6 show ipv6 pim bsr {election | rp-cache | candidate-rp} Displays information related to PIM BSR protocol
processing.
Example:
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 ipv6 pim bsr candidate rp ipv6-address [group-list Sends PIM RP advertisements to the BSR.
access-list-name] [priority priority-value] [interval
seconds]
Example:
Step 3 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Step 4 ipv6 pim bsr border Configures a border for all BSMs of any scope on a
specified interface.
Example:
Step 5 copy running-config startup-config (Optional) Save your entries in the configuration file.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
189
IPv6
Configuring BSR Switches to Announce Scope-to-RP Mappings
Procedure
Step 2 ipv6 pim bsr candidate rp ipv6-address Configures a switch to be a candidate BSR.
[hash-mask-length] [priority priority-value]
Example:
Step 3 ipv6 pim bsr candidate rp ipv6-address [group-list Configures the candidate RP to send PIM RP advertisements
access-list-name] [priority priority-value] [interval to the BSR.
seconds]
Example:
Step 4 interface type number Specifies an interface type and number, and places the
switch in interface configuration mode.
Example:
Step 5 ipv6 multicast boundary scope scope-value Configures a multicast boundary on the interface for a
specified scope.
Example:
Step 6 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
190
IPv6
Configuring SSM Mapping
Step 3 copy running-config startup-config (Optional) Save your entries in the configuration file.
Note To use DNS-based SSM mapping, the switch needs to find at least one correctly configured DNS server, to
which the switch may be directly attached.
Procedure
Step 2 ipv6 mld ssm-map enable Enables the SSM mapping feature for groups in the
configured SSM range.
Example:
Step 3 no ipv6 mld ssm-map query dns Disables DNS-based SSM mapping.
Example:
Step 4 ipv6 mld ssm-map static access-list source-address Configures static SSM mappings.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
191
IPv6
Configuring Static Mroutes
Switch(config-if) # exit
Step 6 show ipv6 mld ssm-map [source-address] Displays SSM mapping information.
Example:
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 ipv6 route {ipv6-prefix / prefix-length ipv6-address | Establishes static IPv6 routes. The example shows a static
interface-type interface-number ipv6-address]} route used for both unicast routing and multicast RPF
[administrative-distance] [administrative-multicast-distance selection.
| unicast | multicast] [tag tag]
Example:
Step 3 exit Exits global configuration mode, and returns the switch to
privileged EXEC mode.
Example:
Switch # exit
Step 4 show ipv6 mroute [link-local | [group-name | Displays the contents of the IPv6 multicast routing table.
group-address [source-address | source-name]] [summary]
[count]
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
192
IPv6
Using MFIB in IPv6 Multicast
Step 6 show ipv6 rpf [ipv6-prefix] Checks RPF information for a given unicast host address
and prefix.
Example:
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file.
Procedure
Step 2 show ipv6 mfib [all | linkscope | group-name | Displays the contents of the IPv6 multicast routing table.
group-address [source-name | source-address]] count
Example:
Step 3 show ipv6 mfib interface Displays information about IPv6 multicast-enabled
interfaces and their forwarding status.
Example:
Step 4 show ipv6 mfib status Displays general MFIB configuration and operational status.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
193
IPv6
Resetting MFIB Traffic Counters
Step 5 show ipv6 mfib summary Displays summary information about the number of IPv6
MFIB entries and interfaces.
Example:
Switch # show ipv6 mfib summary
Step 6 debug ipv6 mfib [group-name | group-address] [adjacency Enables debugging output on the IPv6 MFIB.
| db | fs | init | interface | mrib [detail] | nat | pak |
platform | ppr | ps | signal | table]
Example:
Switch # debug ipv6 mfib FF04::10 pak
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
194
PA R T III
Layer 2
• Configuring IEEE 802.1Q and Layer 2 Protocol Tunneling, on page 197
• Configuring Spanning Tree Protocol, on page 223
• Configuring Multiple Spanning-Tree Protocol, on page 249
• Configuring Optional Spanning-Tree Features, on page 289
• Configuring Bidirection Forwarding Detection, on page 321
• Configuring EtherChannels, on page 351
• Configuring Link-State Tracking, on page 383
• Configuring Resilient Ethernet Protocol, on page 389
• Configuring Flex Links and the MAC Address-Table Move Update Feature, on page 405
• Configuring UniDirectional Link Detection, on page 421
CHAPTER 13
Configuring IEEE 802.1Q and Layer 2 Protocol
Tunneling
• Finding Feature Information, on page 197
• Prerequisites for Configuring Tunneling, on page 197
• Information about Tunneling, on page 200
• How to Configure Tunneling, on page 207
• Configuration Examples for IEEE 802.1Q and Layer 2 Protocol Tunneling, on page 218
• Monitoring Tunneling Status, on page 221
• Where to Go Next, on page 221
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
197
Layer 2
Layer 2 Protocol Tunneling
(SVI) that includes tunnel ports, untagged IP packets received from the tunnel port are recognized and
routed by the switch. Customers can access the Internet through its native VLAN. If this access is not
needed, you should not configure SVIs on VLANs that include tunnel ports.
• Fallback bridging is not supported on tunnel ports. Because all IEEE 802.1Q-tagged packets received
from a tunnel port are treated as non-IP packets, if fallback bridging is enabled on VLANs that have
tunnel ports configured, IP packets would be improperly bridged across VLANs. Therefore, you must
not enable fallback bridging on VLANs with tunnel ports.
• Tunnel ports do not support IP access control lists (ACLs).
• Layer 3 quality of service (QoS) ACLs and other QoS features related to Layer 3 information are not
supported on tunnel ports. MAC-based QoS is supported on tunnel ports.
• EtherChannel port groups are compatible with tunnel ports as long as the IEEE 802.1Q configuration is
consistent within an EtherChannel port group.
• Port Aggregation Protocol (PAgP), Link Aggregation Control Protocol (LACP), and UniDirectional Link
Detection (UDLD) are supported on IEEE 802.1Q tunnel ports.
• Dynamic Trunking Protocol (DTP) is not compatible with IEEE 802.1Q tunneling because you must
manually configure asymmetric links with tunnel ports and trunk ports.
• VLAN Trunking Protocol (VTP) does not work between devices that are connected by an asymmetrical
link or devices that communicate through a tunnel.
• Loopback detection is supported on IEEE 802.1Q tunnel ports.
• When a port is configured as an IEEE 802.1Q tunnel port, spanning-tree bridge protocol data unit (BPDU)
filtering is automatically enabled on the interface. Cisco Discovery Protocol (CDP) and the Layer Link
Discovery Protocol (LLDP) are automatically disabled on the interface.
Related Topics
Configuring an IEEE 802.1Q Tunneling Port, on page 207
Example: Configuring an IEEE 802.1Q Tunneling Port, on page 218
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
198
Layer 2
Layer 2 Tunneling for EtherChannels
Layer 2 protocol tunneling on the egress trunk port, this behavior is bypassed, and the switch forwards
control PDUs without any processing or modification.
• The switch supports PAgP, LACP, and UDLD tunneling for emulated point-to-point network topologies.
Protocol tunneling is disabled by default but can be enabled for the individual protocols on IEEE 802.1Q
tunnel ports or on access ports.
• If you enable PAgP or LACP tunneling, we recommend that you also enable UDLD on the interface for
faster link-failure detection.
• Loopback detection is not supported on Layer 2 protocol tunneling of PAgP, LACP, or UDLD packets.
• EtherChannel port groups are compatible with tunnel ports when the IEEE 802.1Q configuration is
consistent within an EtherChannel port group.
• If an encapsulated PDU (with the proprietary destination MAC address) is received from a tunnel port
or an access port with Layer 2 tunneling enabled, the tunnel port is shut down to prevent loops. The port
also shuts down when a configured shutdown threshold for the protocol is reached. You can manually
reenable the port (by entering a shutdown and a no shutdown command sequence). If errdisable recovery
is enabled, the operation is retried after a specified time interval.
• Only decapsulated PDUs are forwarded to the customer network. The spanning-tree instance running on
the service-provider network does not forward BPDUs to tunnel ports. CDP packets are not forwarded
from tunnel ports.
• When protocol tunneling is enabled on an interface, you can set a per-protocol, per-port, shutdown
threshold for the PDUs generated by the customer network. If the limit is exceeded, the port shuts down.
You can also limit BPDU rate by using QoS ACLs and policy maps on a tunnel port.
• When protocol tunneling is enabled on an interface, you can set a per-protocol, per-port, drop threshold
for the PDUs generated by the customer network. If the limit is exceeded, the port drops PDUs until the
rate at which it receives them is below the drop threshold.
• Because tunneled PDUs (especially STP BPDUs) must be delivered to all remote sites so that the customer
virtual network operates properly, you can give PDUs higher priority within the service-provider network
than data packets received from the same tunnel port. By default, the PDUs use the same CoS value as
data packets.
Related Topics
Configuring Layer 2 Protocol Tunneling, on page 210
Example: Configuring Layer 2 Protocol Tunneling, on page 219
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
199
Layer 2
Information about Tunneling
Note IEEE 802.1Q and Layer 2 protocol tunneling are supported only on Cisco Catalyst 3560-CX switches.
For complete syntax and usage information for the commands used in this chapter, see the command reference
for this release.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
200
Layer 2
IEEE 802.1Q Tunneling
Packets coming from the customer trunk port into the tunnel port on the service-provider edge switch are
normally IEEE 802.1Q-tagged with the appropriate VLAN ID. The tagged packets remain intact inside the
switch and when they exit the trunk port into the service-provider network, they are encapsulated with another
layer of an IEEE 802.1Q tag (called the metro tag) that contains the VLAN ID that is unique to the customer.
The original customer IEEE 802.1Q tag is preserved in the encapsulated packet. Therefore, packets entering
the service-provider network are double-tagged, with the outer (metro) tag containing the customer’s access
VLAN ID, and the inner VLAN ID being that of the incoming traffic.
When the double-tagged packet enters another trunk port in a service-provider core switch, the outer tag is
stripped as the switch processes the packet. When the packet exits another trunk port on the same core switch,
the same metro tag is again added to the packet.
Figure 4: Original (Normal), IEEE 802.1Q, and Double-Tagged Ethernet Packet Formats
When the packet enters the trunk port of the service-provider egress switch, the outer tag is again stripped as
the switch internally processes the packet. However, the metro tag is not added when the packet is sent out
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
201
Layer 2
IEEE 802.1Q Tunneling Configuration Guidelines
the tunnel port on the edge switch into the customer network. The packet is sent as a normal IEEE
802.1Q-tagged frame to preserve the original VLAN numbers in the customer network.
In the above network figure, Customer A was assigned VLAN 30, and Customer B was assigned VLAN 40.
Packets entering the edge switch tunnel ports with IEEE 802.1Q tags are double-tagged when they enter the
service-provider network, with the outer tag containing VLAN ID 30 or 40, appropriately, and the inner tag
containing the original VLAN number, for example, VLAN 100. Even if both Customers A and B have VLAN
100 in their networks, the traffic remains segregated within the service-provider network because the outer
tag is different. Each customer controls its own VLAN numbering space, which is independent of the VLAN
numbering space used by other customers and the VLAN numbering space used by the service-provider
network.
At the outbound tunnel port, the original VLAN numbers on the customer’s network are recovered. It is
possible to have multiple levels of tunneling and tagging, but the switch supports only one level in this release.
If traffic coming from a customer network is not tagged (native VLAN frames), these packets are bridged or
routed as normal packets. All packets entering the service-provider network through a tunnel port on an edge
switch are treated as untagged packets, whether they are untagged or already tagged with IEEE 802.1Q headers.
The packets are encapsulated with the metro tag VLAN ID (set to the access VLAN of the tunnel port) when
they are sent through the service-provider network on an IEEE 802.1Q trunk port. The priority field on the
metro tag is set to the interface class of service (CoS) priority configured on the tunnel port. (The default is
zero if none is configured.)
Related Topics
Configuring an IEEE 802.1Q Tunneling Port, on page 207
Example: Configuring an IEEE 802.1Q Tunneling Port, on page 218
Native VLANs
When configuring IEEE 802.1Q tunneling on an edge switch, you must use IEEE 802.1Q trunk ports for
sending packets into the service-provider network. However, packets going through the core of the
service-provider network can be carried through IEEE 802.1Q trunks, ISL trunks, or nontrunking links. When
IEEE 802.1Q trunks are used in these core switches, the native VLANs of the IEEE 802.1Q trunks must not
match any native VLAN of the nontrunking (tunneling) port on the same switch because traffic on the native
VLAN would not be tagged on the IEEE 802.1Q sending trunk port.
In the following network figure, VLAN 40 is configured as the native VLAN for the IEEE 802.1Q trunk port
from Customer X at the ingress edge switch in the service-provider network (Switch B). Switch A of Customer
X sends a tagged packet on VLAN 30 to the ingress tunnel port of Switch B in the service-provider network,
which belongs to access VLAN 40. Because the access VLAN of the tunnel port (VLAN 40) is the same as
the native VLAN of the edge switch trunk port (VLAN 40), the metro tag is not added to tagged packets
received from the tunnel port. The packet carries only the VLAN 30 tag through the service-provider network
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
202
Layer 2
System MTU
to the trunk port of the egress-edgeswitch (Switch C) and is misdirected through the egress switch tunnel port
to Customer Y.
Figure 5: Potential Problems with IEEE 802.1Q Tunneling and Native VLANs
System MTU
The default system MTU for traffic on the switch is 1500 bytes.
You can configure 10-Gigabit and Gigabit Ethernet ports to support frames larger than 1500 bytes by using
the system mtu jumbo global configuration command.
The system MTU and system jumbo MTU values do not include the IEEE 802.1Q header. Because the IEEE
802.1Q tunneling feature increases the frame size by 4 bytes when the metro tag is added, you must configure
all switches in the service-provider network to be able to process maximum frames by adding 4 bytes to the
system MTU and system jumbo MTU sizes.
For example, the switch supports a maximum frame size of 1496 bytes with one of these configurations:
• The switch has a system jumbo MTU value of 1500 bytes, and the switchport mode dot1q tunnel
interface configuration command is configured on a 10-Gigabit or Gigabit Ethernet switch port.
• The switch member has a system MTU value of 1500 bytes, and the switchport mode dot1q tunnel
interface configuration command is configured on a Fast Ethernet port of the member.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
203
Layer 2
Default IEEE 802.1Q Tunneling Configuration
Note To provide interoperability with third-party vendors, you can use the Layer 2 protocol-tunnel bypass feature.
Bypass mode transparently forwards control PDUs to vendor switches that have different ways of controlling
protocol tunneling. You implement bypass mode by enabling Layer 2 protocol tunneling on the egress trunk
port. When Layer 2 protocol tunneling is enabled on the trunk port, the encapsulated tunnel MAC address is
removed and the protocol packets have their normal MAC address.
Layer 2 protocol tunneling can be used independently or can enhance IEEE 802.1Q tunneling. If protocol
tunneling is not enabled on IEEE 802.1Q tunneling ports, remoteswitches at the receiving end of the
service-provider network do not receive the PDUs and cannot properly run STP, CDP, and VTP. When
protocol tunneling is enabled, Layer 2 protocols within each customer’s network are totally separate from
those running within the service-provider network. Customer switches on different sites that send traffic
through the service-provider network with IEEE 802.1Q tunneling achieve complete knowledge of the
customer’s VLAN. If IEEE 802.1Q tunneling is not used, you can still enable Layer 2 protocol tunneling by
connecting to the customer switch through access ports and by enabling tunneling on the service-provider
access port.
For example, in the following figure (Layer 2 Protocol Tunneling), Customer X has four switches in the same
VLAN, that are connected through the service-provider network. If the network does not tunnel PDUs, switches
on the far ends of the network cannot properly run STP, CDP, and VTP. For example, STP for a VLAN on
a switch in Customer X, Site 1, will build a spanning tree on theswitches at that site without considering
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
204
Layer 2
Layer 2 Protocol Tunneling Overview
convergence parameters based on Customer X’s switch in Site 2. This could result in the topology shown in
the Layer 2 Network Topology without Proper Convergence figure.
Figure 6: Layer 2 Protocol Tunneling
In an SP network, you can use Layer 2 protocol tunneling to enhance the creation of EtherChannels by
emulating a point-to-point network topology. When you enable protocol tunneling (PAgP or LACP) on the
SP switch, remote customer switches receive the PDUs and can negotiate the automatic creation of
EtherChannels.
For example, in the following figure (Layer 2 Protocol Tunneling for EtherChannels), Customer A has two
switches in the same VLAN that are connected through the SP network. When the network tunnels PDUs,
switches on the far ends of the network can negotiate the automatic creation of EtherChannels without needing
dedicated lines.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
205
Layer 2
Layer 2 Protocol Tunneling on Ports
Note PAgP, LACP, and UDLD protocol tunneling is only intended to emulate a point-to-point topology. An
erroneous configuration that sends tunneled packets to many ports could lead to a network failure.
When the Layer 2 PDUs that entered the service-provider inbound edge switch through a Layer 2
protocol-enabled port exit through the trunk port into the service-provider network, the switch overwrites the
customer PDU-destination MAC address with a well-known Cisco proprietary multicast address
(01-00-0c-cd-cd-d0). If IEEE 802.1Q tunneling is enabled, packets are also double-tagged; the outer tag is
the customer metro tag, and the inner tag is the customer’s VLAN tag. The core switches ignore the inner
tags and forward the packet to all trunk ports in the same metro VLAN. The edge switches on the outbound
side restore the proper Layer 2 protocol and MAC address information and forward the packets to all tunnel
or access ports in the same metro VLAN. Therefore, the Layer 2 PDUs remain intact and are delivered across
the service-provider infrastructure to the other side of the customer network.
See the Layer 2 Protocol Tunneling figure in Layer 2 Protocol Tunneling Overview, on page 204, with Customer
X and Customer Y in access VLANs 30 and 40, respectively. Asymmetric links connect the customers in Site
1 to edge switches in the service-provider network. The Layer 2 PDUs (for example, BPDUs) coming into
Switch B from Customer Y in Site 1 are forwarded to the infrastructure as double-tagged packets with the
well-known MAC address as the destination MAC address. These double-tagged packets have the metro
VLAN tag of 40, as well as an inner VLAN tag (for example, VLAN 100). When the double-tagged packets
enter Switch D, the outer VLAN tag 40 is removed, the well-known MAC address is replaced with the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
206
Layer 2
Default Layer 2 Protocol Tunneling Configuration
respective Layer 2 protocol MAC address, and the packet is sent to Customer Y on Site 2 as a single-tagged
frame in VLAN 100.
You can also enable Layer 2 protocol tunneling on access ports on the edge switch connected to access or
trunk ports on the customer switch. In this case, the encapsulation and decapsulation process is the same as
described in the previous paragraph, except that the packets are not double-tagged in the service-provider
network. The single tag is the customer-specific access VLAN tag.
Related Topics
Configuring Layer 2 Protocol Tunneling, on page 210
Example: Configuring Layer 2 Protocol Tunneling, on page 219
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
207
Layer 2
Configuring an IEEE 802.1Q Tunneling Port
• show dot1q-tunnel
• show running-config interface
10. show vlan dot1q tag native
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode for the interface to be
configured as a tunnel port. This should be the edge port
Example:
in the service-provider network that connects to the
customer switch. Valid interfaces include physical
SwitchDevice(config)# interface
gigabitethernet2/0/1 interfaces and port-channel logical interfaces (port channels
1 to 48).
Step 4 switchport access vlan vlan-id Specifies the default VLAN, which is used if the interface
stops trunking. This VLAN ID is specific to the particular
Example:
customer.
SwitchDevice(config-if)# switchport access vlan
2
Step 5 switchport mode dot1q-tunnel Sets the interface as an IEEE 802.1Q tunnel port.
Example: Note Use the no switchport mode dot1q-tunnel
interface configuration command to return the
SwitchDevice(config-if)# switchport mode port to the default state of dynamic desirable.
dot1q-tunnel
SwitchDevice(config-if)# exit
Step 7 vlan dot1q tag native (Optional) Sets the switch to enable tagging of native
VLAN packets on all IEEE 802.1Q trunk ports. When not
Example:
set, and a customer VLAN ID is the same as the native
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
208
Layer 2
Configuring an IEEE 802.1Q Tunneling Port
SwitchDevice(config)# end
Step 9 Use one of the following: Displays the ports configured for IEEE 802.1Q tunneling.
• show dot1q-tunnel Displays the ports that are in tunnel mode.
• show running-config interface
Example:
or
Step 10 show vlan dot1q tag native Displays IEEE 802.1Q native VLAN tagging status.
Example:
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IEEE 802.1Q Tunneling, on page 200
IEEE 802.1Q Tunneling, on page 197
Example: Configuring an IEEE 802.1Q Tunneling Port, on page 218
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
209
Layer 2
Configuring Layer 2 Protocol Tunneling
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface connected to the phone, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 Use one of the following: Configures the interface as an access port or an IEEE
802.1Q tunnel port.
• switchport mode access
• switchport mode dot1q-tunnel
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
210
Layer 2
Configuring Layer 2 Protocol Tunneling
or
Step 5 l2protocol-tunnel [cdp | lldp | point-to-point | stp | vtp] Enables protocol tunneling for the desired protocol. If no
keyword is entered, tunneling is enabled for all three Layer
Example:
2 protocols.
SwitchDevice# l2protocol-tunnel cdp Note Use the no l2protocol-tunnel [cdp | lldp |
point-to-point | stp | vtp] interface
configuration command to disable protocol
tunneling for one of the Layer 2 protocols or
for all three.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
211
Layer 2
Configuring Layer 2 Protocol Tunneling
SwitchDevice# exit
Step 9 errdisable recovery cause l2ptguard (Optional) Configures the recovery mechanism from a
Layer 2 maximum-rate error so that the interface is
Example:
reenabled and can try again. Errdisable recovery is disabled
by default; when enabled, the default time interval is 300
SwitchDevice(config)# errdisable recovery cause
l2ptguard seconds.
Step 10 l2protocol-tunnel cos value (Optional) Configures the CoS value for all tunneled Layer
2 PDUs. The range is 0 to 7; the default is the default CoS
Example:
value for the interface. If none is configured, the default
is 5.
SwitchDevice(config)# l2protocol-tunnel cos value
7
SwitchDevice(config)# end
Step 12 show l2protocol Displays the Layer 2 tunnel ports on the switch, including
the protocols configured, the thresholds, and the counters.
Example:
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Layer 2 Protocol Tunneling on Ports, on page 206
Layer 2 Protocol Tunneling , on page 198
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
212
Layer 2
Configuring the SP Edge Switch
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport mode dot1q-tunnel
5. l2protocol-tunnel point-to-point [pagp | lacp | udld]
6. l2protocol-tunnel shutdown-threshold [point-to-point [pagp | lacp | udld]] value
7. l2protocol-tunnel drop-threshold [point-to-point [pagp | lacp | udld]] value
8. no cdp enable
9. spanning-tree bpdu filter enable
10. exit
11. errdisable recovery cause l2ptguard
12. l2protocol-tunnel cos value
13. end
14. show l2protocol
15. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface connected to the phone, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
213
Layer 2
Configuring the SP Edge Switch
Step 4 switchport mode dot1q-tunnel Configures the interface as an IEEE 802.1Q tunnel port.
Example:
Step 5 l2protocol-tunnel point-to-point [pagp | lacp | udld] (Optional) Enables point-to-point protocol tunneling for
the desired protocol. If no keyword is entered, tunneling
Example:
is enabled for all three protocols.
SwitchDevice(config-if)# l2protocol-tunnel Note To avoid a network failure, make sure that the
point-to-point pagp network is a point-to-point topology before you
enable tunneling for PAgP, LACP, or UDLD
packets.
Step 6 l2protocol-tunnel shutdown-threshold [point-to-point (Optional) Configures the threshold for packets-per-second
[pagp | lacp | udld]] value accepted for encapsulation. The interface is disabled if the
configured threshold is exceeded. If no protocol option is
Example:
specified, the threshold applies to each of the tunneled
Layer 2 protocol types. The range is 1 to 4096. The default
SwitchDevice(config-if)# l2protocol-tunnel
shutdown-threshold point-to-point pagp 100 is to have no threshold configured.
Note If you also set a drop threshold on this interface,
the shutdown-threshold value must be greater
than or equal to the drop-threshold value.
Step 7 l2protocol-tunnel drop-threshold [point-to-point [pagp (Optional) Configures the threshold for packets-per-second
| lacp | udld]] value accepted for encapsulation. The interface drops packets if
the configured threshold is exceeded. If no protocol option
Example:
is specified, the threshold applies to each of the tunneled
Layer 2 protocol types. The range is 1 to 4096. The default
SwitchDevice(config-if)# l2protocol-tunnel
drop-threshold point-to-point pagp 500 is to have no threshold configured.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
214
Layer 2
Configuring the SP Edge Switch
Step 9 spanning-tree bpdu filter enable Enables BPDU filtering on the interface.
Example:
SwitchDevice(config-if)# exit
Step 11 errdisable recovery cause l2ptguard (Optional) Configures the recovery mechanism from a
Layer 2 maximum-rate error so that the interface is
Example:
reenabled and can try again. Errdisable recovery is disabled
by default; when enabled, the default time interval is 300
SwitchDevice(config)# errdisable recovery cause
l2ptguard seconds.
Step 12 l2protocol-tunnel cos value (Optional) Configures the CoS value for all tunneled Layer
2 PDUs. The range is 0 to 7; the default is the default CoS
Example:
value for the interface. If none is configured, the default
is 5.
SwitchDevice(config)# l2protocol-tunnel cos 2
SwitchDevice(config)# end
Step 14 show l2protocol Displays the Layer 2 tunnel ports on the switch, including
the protocols configured, the thresholds, and the counters.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
215
Layer 2
Configuring the Customer Switch
Related Topics
Examples: Configuring the SP Edge and Customer Switches, on page 219
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport trunk encapsulation dot1q
5. switchport mode trunk
6. udld port
7. channel-group channel-group-number mode desirable
8. exit
9. interface port-channel port-channel number
10. shutdown
11. no shutdown
12. end
13. show l2protocol
14. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
216
Layer 2
Configuring the Customer Switch
Step 3 interface interface-id Specifies the interface connected to the phone, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 switchport trunk encapsulation dot1q Sets the trunking encapsulation format to IEEE 802.1Q.
Example:
Step 7 channel-group channel-group-number mode desirable Assigns the interface to a channel group, and specifies
desirable for the PAgP mode.
Example:
SwitchDevice(config-if)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
217
Layer 2
Configuration Examples for IEEE 802.1Q and Layer 2 Protocol Tunneling
SwitchDevice(config)# shutdown
SwitchDevice(config)# no shutdown
SwitchDevice(config)# end
Step 13 show l2protocol Displays the Layer 2 tunnel ports on the switch, including
the protocols configured, the thresholds, and the counters.
Example:
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: Note Use the no switchport mode trunk, the no
udld enable, and the no channel group
SwitchDevice# copy running-config startup-config channel-group-number mode desirable
interface configuration commands to return the
interface to the default settings.
Related Topics
Examples: Configuring the SP Edge and Customer Switches, on page 219
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
218
Layer 2
Example: Configuring Layer 2 Protocol Tunneling
Related Topics
Configuring an IEEE 802.1Q Tunneling Port, on page 207
IEEE 802.1Q Tunneling, on page 200
IEEE 802.1Q Tunneling, on page 197
Related Topics
Configuring Layer 2 Protocol Tunneling, on page 210
Layer 2 Protocol Tunneling on Ports, on page 206
Layer 2 Protocol Tunneling , on page 198
Layer 2 Tunneling for EtherChannels, on page 199
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
219
Layer 2
Examples: Configuring the SP Edge and Customer Switches
This example shows how to configure the customer switch at Site 1. Fast Ethernet interfaces 1, 2, 3, and 4
are set for IEEE 802.1Q trunking, UDLD is enabled, EtherChannel group 1 is enabled, and the port channel
is shut down and then enabled to activate the EtherChannel configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
220
Layer 2
Monitoring Tunneling Status
Related Topics
Configuring the SP Edge Switch, on page 213
Configuring the Customer Switch, on page 216
Command Purpose
show l2protocol-tunnel interface interface-id Displays information about a specific Layer 2 protocol
tunneling port.
show vlan dot1q tag native Displays the status of native VLAN tagging on the
switch.
Where to Go Next
You can configure the following:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
221
Layer 2
Where to Go Next
• VTP
• VLANs
• VLAN Trunking
• Private VLANs
• VLAN Membership Policy Server (VMPS)
• Voice VLANs
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
222
CHAPTER 14
Configuring Spanning Tree Protocol
• Finding Feature Information, on page 223
• Restrictions for STP, on page 223
• Information About Spanning Tree Protocol, on page 224
• How to Configure Spanning-Tree Features, on page 234
• Monitoring Spanning-Tree Status, on page 247
Related Topics
Configuring the Root Switch , on page 237
Bridge ID, Device Priority, and Extended System ID, on page 226
Spanning-Tree Topology and BPDUs, on page 224
Accelerated Aging to Retain Connectivity, on page 231
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
223
Layer 2
Information About Spanning Tree Protocol
The switch that has all of its ports as the designated role or as the backup role is the root switch. The switch
that has at least one of its ports in the designated role is called the designated switch.
Spanning tree forces redundant data paths into a standby (blocked) state. If a network segment in the spanning
tree fails and a redundant path exists, the spanning-tree algorithm recalculates the spanning-tree topology and
activates the standby path. Switches send and receive spanning-tree frames, called bridge protocol data units
(BPDUs), at regular intervals. The switches do not forward these frames but use them to construct a loop-free
path. BPDUs contain information about the sending switch and its ports, including switch and MAC addresses,
switch priority, port priority, and path cost. Spanning tree uses this information to elect the root switch and
root port for the switched network and the root port and designated port for each switched segment.
When two ports on a switch are part of a loop, the spanning-tree and path cost settings control which port is
put in the forwarding state and which is put in the blocking state. The spanning-tree port priority value
represents the location of a port in the network topology and how well it is located to pass traffic. The path
cost value represents the media speed.
Note By default, the switch sends keepalive messages (to ensure the connection is up) only on interfaces that do
not have small form-factor pluggable (SFP) modules. You can change the default for an interface by entering
the [no] keepalive interface configuration command with no keywords.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
224
Layer 2
Spanning-Tree Topology and BPDUs
When the switches in a network are powered up, each functions as the root switch. Each switch sends a
configuration BPDU through all of its ports. The BPDUs communicate and compute the spanning-tree topology.
Each configuration BPDU contains this information:
• The unique bridge ID of the switch that the sending switch identifies as the root switch
• The spanning-tree path cost to the root
• The bridge ID of the sending switch
• Message age
• The identifier of the sending interface
• Values for the hello, forward delay, and max-age protocol timers
When a switch receives a configuration BPDU that contains superior information (lower bridge ID, lower
path cost, and so forth), it stores the information for that port. If this BPDU is received on the root port of the
switch, the switch also forwards it with an updated message to all attached LANs for which it is the designated
switch.
If a switch receives a configuration BPDU that contains inferior information to that currently stored for that
port, it discards the BPDU. If the switch is a designated switch for the LAN from which the inferior BPDU
was received, it sends that LAN a BPDU containing the up-to-date information stored for that port. In this
way, inferior information is discarded, and superior information is propagated on the network.
A BPDU exchange results in these actions:
• One switch in the network is elected as the root switch (the logical center of the spanning-tree topology
in a switched network). See the figure following the bullets.
For each VLAN, the switch with the highest switch priority (the lowest numerical priority value) is
elected as the root switch. If all switches are configured with the default priority (32768), the switch with
the lowest MAC address in the VLAN becomes the root switch. The switch priority value occupies the
most significant bits of the bridge ID, as shown in the following figure.
• A root port is selected for each switch (except the root switch). This port provides the best path (lowest
cost) when the switch forwards packets to the root switch.
• The shortest distance to the root switch is calculated for each switch based on the path cost.
• A designated switch for each LAN segment is selected. The designated switch incurs the lowest path
cost when forwarding packets from that LAN to the root switch. The port through which the designated
switch is attached to the LAN is called the designated port.
All paths that are not needed to reach the root switch from anywhere in the switched network are placed in
the spanning-tree blocking mode.
Related Topics
Configuring the Root Switch , on page 237
Restrictions for STP, on page 223
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
225
Layer 2
Bridge ID, Device Priority, and Extended System ID
Bit Bit Bit Bit Bit Bit Bit Bit 9 Bit 8 Bit 7 Bit 6 Bit 5 Bit 4 Bit 3 Bit 2 Bit 1
16 15 14 13 12 11 10
Spanning tree uses the extended system ID, the switch priority, and the allocated spanning-tree MAC address
to make the bridge ID unique for each VLAN.
Support for the extended system ID affects how you manually configure the root switch, the secondary root
switch, and the switch priority of a VLAN. For example, when you change the switch priority value, you
change the probability that the switch will be elected as the root switch. Configuring a higher value decreases
the probability; a lower value increases the probability.
If any root switch for the specified VLAN has a switch priority lower than 24576, the switch sets its own
priority for the specified VLAN to 4096 less than the lowest switch priority. 4096 is the value of the
least-significant bit of a 4-bit switch priority value as shown in the table.
Related Topics
Configuring the Root Switch , on page 237
Restrictions for STP, on page 223
Configuring the Root Switch , on page 269
Root Switch, on page 252
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
226
Layer 2
Spanning-Tree Interface States
values to interfaces that you want selected first and higher cost values that you want selected last. If all
interfaces have the same cost value, spanning tree puts the interface with the lowest interface number in the
forwarding state and blocks the other interfaces.
If your switch is a member of a switch stack, you must assign lower cost values to interfaces that you want
selected first and higher cost values that you want selected last instead of adjusting its port priority. For details,
see Related Topics.
Related Topics
Configuring Port Priority , on page 239
Configuring Path Cost , on page 241
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
227
Layer 2
Blocking State
Blocking State
A Layer 2 interface in the blocking state does not participate in frame forwarding. After initialization, a BPDU
is sent to each switch interface. A switch initially functions as the root until it exchanges BPDUs with other
switches. This exchange establishes which switch in the network is the root or root switch. If there is only
one switch in the network, no exchange occurs, the forward-delay timer expires, and the interface moves to
the listening state. An interface always enters the blocking state after switch initialization.
An interface in the blocking state performs these functions:
• Discards frames received on the interface
• Discards frames switched from another interface for forwarding
• Does not learn addresses
• Receives BPDUs
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
228
Layer 2
Listening State
Listening State
The listening state is the first state a Layer 2 interface enters after the blocking state. The interface enters this
state when the spanning tree decides that the interface should participate in frame forwarding.
An interface in the listening state performs these functions:
• Discards frames received on the interface
• Discards frames switched from another interface for forwarding
• Does not learn addresses
• Receives BPDUs
Learning State
A Layer 2 interface in the learning state prepares to participate in frame forwarding. The interface enters the
learning state from the listening state.
An interface in the learning state performs these functions:
• Discards frames received on the interface
• Discards frames switched from another interface for forwarding
• Learns addresses
• Receives BPDUs
Forwarding State
A Layer 2 interface in the forwarding state forwards frames. The interface enters the forwarding state from
the learning state.
An interface in the forwarding state performs these functions:
• Receives and forwards frames received on the interface
• Forwards frames switched from another interface
• Learns addresses
• Receives BPDUs
Disabled State
A Layer 2 interface in the disabled state does not participate in frame forwarding or in the spanning tree. An
interface in the disabled state is nonoperational.
A disabled interface performs these functions:
• Discards frames received on the interface
• Discards frames switched from another interface for forwarding
• Does not learn addresses
• Does not receive BPDUs
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
229
Layer 2
How a Switch or Port Becomes the Root Switch or Root Port
Switch A is elected as the root switch because the switch priority of all the switches is set to the default (32768)
and Switch A has the lowest MAC address. However, because of traffic patterns, number of forwarding
interfaces, or link types, Switch A might not be the ideal root switch. By increasing the priority (lowering the
numerical value) of the ideal switch so that it becomes the root switch, you force a spanning-tree recalculation
You can create a redundant backbone with spanning tree by connecting two switch interfaces to another device
or to two different devices. Spanning tree automatically disables one interface but enables it if the other one
fails. If one link is high-speed and the other is low-speed, the low-speed link is always disabled. If the speeds
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
230
Layer 2
Spanning-Tree Address Management
are the same, the port priority and port ID are added together, and spanning tree disables the link with the
highest value.
You can also create redundant links between switches by using EtherChannel groups.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
231
Layer 2
Supported Spanning-Tree Instances
• PVST+—This spanning-tree mode is based on the IEEE 802.1D standard and Cisco proprietary extensions.
The PVST+ runs on each VLAN on the switch up to the maximum supported, ensuring that each has a
loop-free path through the network.
The PVST+ provides Layer 2 load-balancing for the VLAN on which it runs. You can create different
logical topologies by using the VLANs on your network to ensure that all of your links are used but that
no one link is oversubscribed. Each instance of PVST+ on a VLAN has a single root switch. This root
switch propagates the spanning-tree information associated with that VLAN to all other switches in the
network. Because each switch has the same information about the network, this process ensures that the
network topology is maintained.
• Rapid PVST+—This spanning-tree mode is the same as PVST+ except that is uses a rapid convergence
based on the IEEE 802.1w standard. Beginning from the 15.2(4)E release, the default mode of STP is
Rapid PVST+ . To provide rapid convergence, the Rapid PVST+ immediately deletes dynamically learned
MAC address entries on a per-port basis upon receiving a topology change. By contrast, PVST+ uses a
short aging time for dynamically learned MAC address entries.
Rapid PVST+ uses the same configuration as PVST+ (except where noted), and the switch needs only
minimal extra configuration. The benefit of Rapid PVST+ is that you can migrate a large PVST+ install
base to Rapid PVST+ without having to learn the complexities of the Multiple Spanning Tree Protocol
(MSTP) configuration and without having to reprovision your network. In Rapid PVST+ mode, each
VLAN runs its own spanning-tree instance up to the maximum supported.
• MSTP—This spanning-tree mode is based on the IEEE 802.1s standard. You can map multiple VLANs
to the same spanning-tree instance, which reduces the number of spanning-tree instances required to
support a large number of VLANs. The MSTP runs on top of the RSTP (based on IEEE 802.1w), which
provides for rapid convergence of the spanning tree by eliminating the forward delay and by quickly
transitioning root ports and designated ports to the forwarding state. In a switch stack, the cross-stack
rapid transition (CSRT) feature performs the same function as RSTP. You cannot run MSTP without
RSTP or CSRT.
Related Topics
Changing the Spanning-Tree Mode , on page 234
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
232
Layer 2
STP and IEEE 802.1Q Trunks
Rapid PVST+ spanning-tree instances, the root switch must be a Rapid PVST+ switch. In the PVST+ instances,
the root switch must be a PVST+ switch. The PVST+ switches should be at the edge of the network.
All stack members run the same version of spanning tree (all PVST+, all Rapid PVST+, or all MSTP).
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
MSTP Configuration Guidelines, on page 251
Multiple Spanning-Tree Regions, on page 253
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
233
Layer 2
Default Spanning-Tree Configuration
Note Beginning from the 15.2(4)E release, the default mode of STP is Rapid PVST+.
Related Topics
Disabling Spanning Tree , on page 236
Supported Spanning-Tree Instances, on page 232
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
234
Layer 2
Changing the Spanning-Tree Mode
If you want to enable a mode that is different from the default mode, this procedure is required.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mode {pvst | mst | rapid-pvst}
4. interface interface-id
5. spanning-tree link-type point-to-point
6. end
7. clear spanning-tree detected-protocols
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mode {pvst | mst | rapid-pvst} Configures a spanning-tree mode. All stack members run
the same version of spanning tree.
Example:
• Select pvst to enable PVST+.
SwitchDevice(config)# spanning-tree mode pvst
• Select mst to enable MSTP.
• Select rapid-pvst to enable rapid PVST+.
Step 5 spanning-tree link-type point-to-point Specifies that the link type for this port is point-to-point.
Example: If you connect this port (local port) to a remote port through
a point-to-point link and the local port becomes a designated
SwitchDevice(config-if)# spanning-tree link-type port, the switch negotiates with the remote port and rapidly
point-to-point changes the local port to the forwarding state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
235
Layer 2
Disabling Spanning Tree
SwitchDevice(config-if)# end
Step 7 clear spanning-tree detected-protocols If any port on the switch is connected to a port on a legacy
IEEE 802.1D switch, this command restarts the protocol
Example:
migration process on the entire switch.
SwitchDevice# clear spanning-tree This step is optional if the designated switch detects that
detected-protocols this switch is running rapid PVST+.
Related Topics
Spanning-Tree Modes and Protocols, on page 231
Caution When spanning tree is disabled and loops are present in the topology, excessive traffic and indefinite packet
duplication can drastically reduce network performance.
SUMMARY STEPS
1. enable
2. configure terminal
3. no spanning-tree vlan vlan-id
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
236
Layer 2
Configuring the Root Switch
SwitchDevice(config)# end
Related Topics
Supported Spanning-Tree Instances, on page 232
Default Spanning-Tree Configuration, on page 234
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree vlan vlan-id root primary [diameter net-diameter
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
237
Layer 2
Configuring a Secondary Root Device
Step 3 spanning-tree vlan vlan-id root primary [diameter Configures a switch to become the root for the specified
net-diameter VLAN.
Example: • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
SwitchDevice(config)# spanning-tree vlan 20-24 root by a hyphen, or a series of VLANs separated by a
primary diameter 4 comma. The range is 1 to 4094.
• (Optional) For diameter net-diameter, specify the
maximum number of switches between any two end
stations. The range is 2 to 7.
SwitchDevice(config)# end
What to do next
After configuring the switch as the root switch, we recommend that you avoid manually configuring the hello
time, forward-delay time, and maximum-age time through the spanning-tree vlan vlan-id hello-time,
spanning-tree vlan vlan-id forward-time, and the spanning-tree vlan vlan-id max-age global configuration
commands.
Related Topics
Bridge ID, Device Priority, and Extended System ID, on page 226
Spanning-Tree Topology and BPDUs, on page 224
Accelerated Aging to Retain Connectivity, on page 231
Restrictions for STP, on page 223
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
238
Layer 2
Configuring Port Priority
2. configure terminal
3. spanning-tree vlan vlan-id root secondary [diameter net-diameter
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree vlan vlan-id root secondary [diameter Configures a switch to become the secondary root for the
net-diameter specified VLAN.
Example: • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
SwitchDevice(config)# spanning-tree vlan 20-24 root by a hyphen, or a series of VLANs separated by a
secondary diameter 4 comma. The range is 1 to 4094.
• (Optional) For diameter net-diameter, specify the
maximum number of switches between any two end
stations. The range is 2 to 7.
Use the same network diameter value that you used when
configuring the primary root switch.
SwitchDevice(config)# end
Note If your switch is a member of a switch stack, you must use the spanning-tree [vlan vlan-id] cost cost interface
configuration command instead of the spanning-tree [vlan vlan-id] port-priority priority interface
configuration command to select an interface to put in the forwarding state. Assign lower cost values to
interfaces that you want selected first and higher cost values that you want selected last.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
239
Layer 2
Configuring Port Priority
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree port-priority priority
5. spanning-tree vlan vlan-id port-priority priority
6. end
DETAILED STEPS
SwitchDevice> enable
Step 4 spanning-tree port-priority priority Configures the port priority for an interface.
Example: For priority, the range is 0 to 240, in increments of 16; the
default is 128. Valid values are 0, 16, 32, 48, 64, 80, 96,
SwitchDevice(config-if)# spanning-tree 112, 128, 144, 160, 176, 192, 208, 224, and 240. All other
port-priority 0 values are rejected. The lower the number, the higher the
priority.
Step 5 spanning-tree vlan vlan-id port-priority priority Configures the port priority for a VLAN.
Example: • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
SwitchDevice(config-if)# spanning-tree vlan 20-25 by a hyphen, or a series of VLANs separated by a
port-priority 0 comma. The range is 1 to 4094.
• For priority, the range is 0 to 240, in increments of 16;
the default is 128. Valid values are 0, 16, 32, 48, 64,
80, 96, 112, 128, 144, 160, 176, 192, 208, 224, and
240. All other values are rejected. The lower the
number, the higher the priority.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
240
Layer 2
Configuring Path Cost
SwitchDevice(config-if)# end
Related Topics
Port Priority Versus Path Cost, on page 226
How a Switch or Port Becomes the Root Switch or Root Port, on page 230
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree cost cost
5. spanning-tree vlan vlan-id cost cost
6. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
241
Layer 2
Configuring the Device Priority of a VLAN
Step 5 spanning-tree vlan vlan-id cost cost Configures the cost for a VLAN.
Example: If a loop occurs, spanning tree uses the path cost when
selecting an interface to place into the forwarding state. A
SwitchDevice(config-if)# spanning-tree vlan lower path cost represents higher-speed transmission.
10,12-15,20 cost 300
• For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
by a hyphen, or a series of VLANs separated by a
comma. The range is 1 to 4094.
• For cost, the range is 1 to 200000000; the default value
is derived from the media speed of the interface.
SwitchDevice(config-if)# end
The show spanning-tree interface interface-id privileged EXEC command displays information only for
ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged EXEC
command to confirm the configuration.
Related Topics
Port Priority Versus Path Cost, on page 226
Note Exercise care when using this command. For most situations, we recommend that you use the spanning-tree
vlan vlan-id root primary and the spanning-tree vlan vlan-id root secondary global configuration commands
to modify the switch priority.
SUMMARY STEPS
1. enable
2. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
242
Layer 2
Configuring the Hello Time
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree vlan vlan-id priority priority Configures the switch priority of a VLAN.
Example: • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
SwitchDevice(config)# spanning-tree vlan 20 by a hyphen, or a series of VLANs separated by a
priority 8192 comma. The range is 1 to 4094.
• For priority, the range is 0 to 61440 in increments of
4096; the default is 32768. The lower the number, the
more likely the switch will be chosen as the root
switch.
Valid priority values are 4096, 8192, 12288, 16384,
20480, 24576, 28672, 32768, 36864, 40960, 45056,
49152, 53248, 57344, and 61440. All other values are
rejected.
SwitchDevice(config-if)# end
SUMMARY STEPS
1. enable
2. spanning-tree vlan vlan-id hello-time seconds
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
243
Layer 2
Configuring the Forwarding-Delay Time for a VLAN
3. end
DETAILED STEPS
SwitchDevice> enable
Step 2 spanning-tree vlan vlan-id hello-time seconds Configures the hello time of a VLAN. The hello time is the
time interval between configuration messages generated
Example:
and sent by the root switch. These messages mean that the
switch is alive.
SwitchDevice(config)# spanning-tree vlan 20-24
hello-time 3 • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
by a hyphen, or a series of VLANs separated by a
comma. The range is 1 to 4094.
• For seconds, the range is 1 to 10; the default is 2.
SwitchDevice(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree vlan vlan-id forward-time seconds
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
244
Layer 2
Configuring the Maximum-Aging Time for a VLAN
Step 3 spanning-tree vlan vlan-id forward-time seconds Configures the forward time of a VLAN. The forwarding
delay is the number of seconds an interface waits before
Example:
changing from its spanning-tree learning and listening states
to the forwarding state.
SwitchDevice(config)# spanning-tree vlan 20,25
forward-time 18 • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
by a hyphen, or a series of VLANs separated by a
comma. The range is 1 to 4094.
• For seconds, the range is 4 to 30; the default is 15.
SwitchDevice(config)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree vlan vlan-id max-age seconds
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
245
Layer 2
Configuring the Transmit Hold-Count
Step 3 spanning-tree vlan vlan-id max-age seconds Configures the maximum-aging time of a VLAN. The
maximum-aging time is the number of seconds a switch
Example:
waits without receiving spanning-tree configuration
messages before attempting a reconfiguration.
SwitchDevice(config)# spanning-tree vlan 20 max-age
30 • For vlan-id, you can specify a single VLAN identified
by VLAN ID number, a range of VLANs separated
by a hyphen, or a series of VLANs separated by a
comma. The range is 1 to 4094.
• For seconds, the range is 6 to 40; the default is 20.
SwitchDevice(config-if)# end
Note Changing this parameter to a higher value can have a significant impact on CPU utilization, especially in
Rapid PVST+ mode. Lowering this value can slow down convergence in certain scenarios. We recommend
that you maintain the default setting.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree transmit hold-count value
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
246
Layer 2
Monitoring Spanning-Tree Status
Step 3 spanning-tree transmit hold-count value Configures the number of BPDUs that can be sent before
pausing for 1 second.
Example:
For value, the range is 1 to 20; the default is 6.
SwitchDevice(config)# spanning-tree transmit
hold-count 6
SwitchDevice(config)# end
show spanning-tree vlan vlan-id Displays spanning-tree information for the specified
VLAN.
show spanning-tree interface interface-id Displays spanning-tree information for the specified
interface.
show spanning-tree interface interface-id portfast Displays spanning-tree portfast information for the
specified interface.
show spanning-tree summary [totals] Displays a summary of interface states or displays the
total lines of the STP state section.
To clear spanning-tree counters, use the clear spanning-tree [interface interface-id] privileged EXEC
command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
247
Layer 2
Monitoring Spanning-Tree Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
248
CHAPTER 15
Configuring Multiple Spanning-Tree Protocol
• Finding Feature Information, on page 249
• Prerequisites for MSTP, on page 249
• Restrictions for MSTP, on page 250
• Information About MSTP, on page 251
• How to Configure MSTP Features, on page 266
• Examples, on page 284
• Monitoring MST Configuration and Status, on page 287
• Feature Information for MSTP, on page 288
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
249
Layer 2
Restrictions for MSTP
regions must contain the CST root, and all of the other MST regions must have a better path to the root
contained within the MST cloud than a path through the PVST+ or rapid-PVST+ cloud. You might have
to manually configure the switches in the clouds.
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
MSTP Configuration Guidelines, on page 251
Multiple Spanning-Tree Regions, on page 253
Table 26: PVST+, MSTP, and Rapid PVST+ Interoperability and Compatibility
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
MSTP Configuration Guidelines, on page 251
Multiple Spanning-Tree Regions, on page 253
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
250
Layer 2
Information About MSTP
Note The multiple spanning-tree (MST) implementation is based on the IEEE 802.1s standard.
The most common initial deployment of MSTP is in the backbone and distribution layers of a Layer 2 switched
network. This deployment provides the highly available network required in a service-provider environment.
When the switch is in the MST mode, the RSTP, which is based on IEEE 802.1w, is automatically enabled.
The RSTP provides rapid convergence of the spanning tree through explicit handshaking that eliminates the
IEEE 802.1D forwarding delay and quickly transitions root ports and designated ports to the forwarding state.
Both MSTP and RSTP improve the spanning-tree operation and maintain backward compatibility with
equipment that is based on the (original) IEEE 802.1D spanning tree, with existing Cisco-proprietary Multiple
Instance STP (MISTP), and with existing Cisco PVST+ and rapid per-VLAN spanning-tree plus (Rapid
PVST+).
A switch stack appears as a single spanning-tree node to the rest of the network, and all stack members use
the same switch ID.
10 Mb/s 2,000,000
1 Gb/s 20,000
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
251
Layer 2
Root Switch
10 Gb/s 2,000
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Prerequisites for MSTP, on page 249
Restrictions for MSTP, on page 250
Spanning-Tree Interoperability and Backward Compatibility, on page 232
Optional Spanning-Tree Configuration Guidelines
BackboneFast, on page 293
UplinkFast, on page 291
Root Switch
The switch maintains a spanning-tree instance for the group of VLANs mapped to it. A switch ID, consisting
of the switch priority and the switch MAC address, is associated with each instance. For a group of VLANs,
the switch with the lowest switch ID becomes the root switch.
When you configure a switch as the root, you modify the switch priority from the default value (32768) to a
significantly lower value so that the switch becomes the root switch for the specified spanning-tree instance.
When you enter this command, the switch checks the switch priorities of the root switches. Because of the
extended system ID support, the switch sets its own priority for the specified instance to 24576 if this value
will cause this switches to become the root for the specified spanning-tree instance.
If any root switch for the specified instance has a switch priority lower than 24576, the switch sets its own
priority to 4096 less than the lowest switch priority. (4096 is the value of the least-significant bit of a 4-bit
switch priority value. For more information, select "Bridge ID, Switch Priority, and Extended System ID"
link in Related Topics.
If your network consists of switches that support and do not support the extended system ID, it is unlikely
that the switch with the extended system ID support will become the root switch. The extended system ID
increases the switch priority value every time the VLAN number is greater than the priority of the connected
switches running older software.
The root switch for each spanning-tree instance should be a backbone or distribution switch. Do not configure
an access switch as the spanning-tree primary root.
Use the diameter keyword, which is available only for MST instance 0, to specify the Layer 2 network
diameter (that is, the maximum number of switch hops between any two end stations in the Layer 2 network).
When you specify the network diameter, the switch automatically sets an optimal hello time, forward-delay
time, and maximum-age time for a network of that diameter, which can significantly reduce the convergence
time. You can use the hello keyword to override the automatically calculated hello time.
Related Topics
Configuring the Root Switch , on page 269
Restrictions for MSTP, on page 250
Bridge ID, Device Priority, and Extended System ID, on page 226
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
252
Layer 2
Multiple Spanning-Tree Regions
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
253
Layer 2
Operations Within an MST Region
The spanning tree computed in a region appears as a subtree in the CST that encompasses the entire
switched domain. The CIST is formed by the spanning-tree algorithm running among switches that
support the IEEE 802.1w, IEEE 802.1s, and IEEE 802.1D standards. The CIST inside an MST region
is the same as the CST outside a region.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
254
Layer 2
IEEE 802.1s Terminology
CIST internal root path cost IST master path cost CIST internal path cost
CIST external root path cost Root path cost Root path cost
MSTI internal root path cost Root path cost Root path cost
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
255
Layer 2
Hop Count
Related Topics
Multiple Spanning-Tree Regions, on page 253
Operations Within an MST Region, on page 254
Operations Between MST Regions, on page 254
Hop Count
The IST and MST instances do not use the message-age and maximum-age information in the configuration
BPDU to compute the spanning-tree topology. Instead, they use the path cost to the root and a hop-count
mechanism similar to the IP time-to-live (TTL) mechanism.
By using the spanning-tree mst max-hops global configuration command, you can configure the maximum
hops inside the region and apply it to the IST and all MST instances in that region. The hop count achieves
the same result as the message-age information (triggers a reconfiguration). The root switch of the instance
always sends a BPDU (or M-record) with a cost of 0 and the hop count set to the maximum value. When a
switch receives this BPDU, it decrements the received remaining hop count by one and propagates this value
as the remaining hop count in the BPDUs it generates. When the count reaches zero, the switch discards the
BPDU and ages the information held for the port.
The message-age and maximum-age information in the RSTP portion of the BPDU remain the same throughout
the region, and the same values are propagated by the region designated ports at the boundary.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
256
Layer 2
Boundary Ports
Boundary Ports
In the Cisco prestandard implementation, a boundary port connects an MST region to a single spanning-tree
region running RSTP, to a single spanning-tree region running PVST+ or rapid PVST+, or to another MST
region with a different MST configuration. A boundary port also connects to a LAN, the designated switch
of which is either a single spanning-tree switch or a switch with a different MST configuration.
There is no definition of a boundary port in the IEEE 802.1s standard. The IEEE 802.1Q-2002 standard
identifies two kinds of messages that a port can receive:
• internal (coming from the same region)
• external (coming from another region)
When a message is internal, the CIST part is received by the CIST, and each MST instance receives its
respective M-record.
When a message is external, it is received only by the CIST. If the CIST role is root or alternate, or if the
external BPDU is a topology change, it could have an impact on the MST instances.
An MST region includes both switches and LANs. A segment belongs to the region of its designated port.
Therefore, a port in a different region than the designated port for a segment is a boundary port. This definition
allows two ports internal to a region to share a segment with a port belonging to a different region, creating
the possibility of a port receiving both internal and external messages.
The primary change from the Cisco prestandard implementation is that a designated port is not defined as
boundary, unless it is running in an STP-compatible mode.
Note If there is a legacy STP switch on the segment, messages are always considered external.
The other change from the Cisco prestandard implementation is that the CIST regional root switch ID field
is now inserted where an RSTP or legacy IEEE 802.1Q switch has the sender switch ID. The whole region
performs like a single virtual switch by sending a consistent sender switch ID to neighboring switches. In this
example, switch C would receive a BPDU with the same consistent sender switch ID of root, whether or not
A or B is designated for the segment.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
257
Layer 2
Interoperation Between Legacy and Standard Switches
• The boundary port is not the root port of the CIST regional root—The MSTI ports follow the state and
role of the CIST port. The standard provides less information, and it might be difficult to understand
why an MSTI port can be alternately blocking when it receives no BPDUs (MRecords). In this case,
although the boundary role no longer exists, the show commands identify a port as boundary in the type
column of the output.
Assume that A is a standard switch and B a prestandard switch, both configured to be in the same region. A
is the root switch for the CIST, and B has a root port (BX) on segment X and an alternate port (BY) on segment
Y. If segment Y flaps, and the port on BY becomes the alternate before sending out a single prestandard
BPDU, AY cannot detect that a prestandard switch is connected to Y and continues to send standard BPDUs.
The port BY is fixed in a boundary, and no load balancing is possible between A and B. The same problem
exists on segment X, but B might transmit topology
changes.
Note We recommend that you minimize the interaction between standard and prestandard MST implementations.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
258
Layer 2
Interoperability with IEEE 802.1D STP
This figure illustrates a unidirectional link failure that typically creates a bridging loop. Switch A is the root
switch, and its BPDUs are lost on the link leading to switch B. RSTP and MST BPDUs include the role and
state of the sending port. With this information, switch A can detect that switch B does not react to the superior
BPDUs it sends and that switch B is the designated, not root switch. As a result, switch A blocks (or keeps
RSTP Overview
The RSTP takes advantage of point-to-point wiring and provides rapid convergence of the spanning tree.
Reconfiguration of the spanning tree can occur in less than 1 second (in contrast to 50 seconds with the default
settings in the IEEE 802.1D spanning tree).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
259
Layer 2
Rapid Convergence
• Alternate port—Offers an alternate path toward the root switch to that provided by the current root port.
• Backup port—Acts as a backup for the path provided by a designated port toward the leaves of the
spanning tree. A backup port can exist only when two ports are connected in a loopback by a point-to-point
link or when a switch has two or more connections to a shared LAN segment.
• Disabled port—Has no role within the operation of the spanning tree.
A port with the root or a designated port role is included in the active topology. A port with the alternate or
backup port role is excluded from the active topology.
In a stable topology with consistent port roles throughout the network, the RSTP ensures that every root port
and designated port immediately transition to the forwarding state while all alternate and backup ports are
always in the discarding state (equivalent to blocking in IEEE 802.1D). The port state controls the operation
of the forwarding and learning processes.
Operational Status STP Port State RSTP Port State Is Port Included in the
(IEEE 802.1D) Active Topology?
To be consistent with Cisco STP implementations, this guide defines the port state as blocking instead of
discarding. Designated ports start in the listening state.
Rapid Convergence
The RSTP provides for rapid recovery of connectivity following the failure of a switch, a switch port, or a
LAN. It provides rapid convergence for edge ports, new root ports, and ports connected through point-to-point
links as follows:
• Edge ports—If you configure a port as an edge port on an RSTP switch by using the spanning-tree
portfast interface configuration command, the edge port immediately transitions to the forwarding state.
An edge port is the same as a Port Fast-enabled port, and you should enable it only on ports that connect
to a single end station.
• Root ports—If the RSTP selects a new root port, it blocks the old root port and immediately transitions
the new root port to the forwarding state.
• Point-to-point links—If you connect a port to another port through a point-to-point link and the local
port becomes a designated port, it negotiates a rapid transition with the other port by using the
proposal-agreement handshake to ensure a loop-free topology.
Figure 15: Proposal and Agreement Handshaking for Rapid Convergence
Switch A is connected to Switch B through a point-to-point link, and all of the ports are in the blocking
state. Assume that the priority of Switch A is a smaller numerical value than the priority of Switch B.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
260
Layer 2
Synchronization of Port Roles
Switch A sends a proposal message (a configuration BPDU with the proposal flag set) to Switch B,
proposing itself as the designated switch.
After receiving the proposal message, Switch B selects as its new root port the port from which the
proposal message was received, forces all nonedge ports to the blocking state, and sends an agreement
message (a BPDU with the agreement flag set) through its new root port.
After receiving Switch B’s agreement message, Switch A also immediately transitions its designated
port to the forwarding state. No loops in the network are formed because Switch B blocked all of its
nonedge ports and because there is a point-to-point link between Switches A and B.
When Switch C is connected to Switch B, a similar set of handshaking messages are exchanged. Switch
C selects the port connected to Switch B as its root port, and both ends immediately transition to the
forwarding state. With each iteration of this handshaking process, one more switch joins the active
topology. As the network converges, this proposal-agreement handshaking progresses from the root
toward the leaves of the spanning tree.
In a switch stack, the cross-stack rapid transition (CSRT) feature ensures that a stack member receives
acknowledgments from all stack members during the proposal-agreement handshaking before moving
the port to the forwarding state. CSRT is automatically enabled when the switch is in MST mode.
The switch learns the link type from the port duplex mode: a full-duplex port is considered to have a
point-to-point connection; a half-duplex port is considered to have a shared connection. You can override
the default setting that is controlled by the duplex setting by using the spanning-tree link-type interface
configuration command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
261
Layer 2
Bridge Protocol Data Unit Format and Processing
If a designated port is in the forwarding state and is not configured as an edge port, it transitions to the blocking
state when the RSTP forces it to synchronize with new root information. In general, when the RSTP forces a
port to synchronize with root information and the port does not satisfy any of the above conditions, its port
state is set to blocking.
Figure 16: Sequence of Events During Rapid Convergence
After ensuring that all of the ports are synchronized, the switch sends an agreement message to the designated
switch corresponding to its root port. When the switches connected by a point-to-point link are in agreement
about their port roles, the RSTP immediately transitions the port states to forwarding.
The RSTP BPDU format is the same as the IEEE 802.1D BPDU format except that the protocol version is
set to 2. A new 1-byte Version 1 Length field is set to zero, which means that no version 1 protocol information
is present.
Bit Function
1 Proposal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
262
Layer 2
Processing Superior BPDU Information
Bit Function
4 Learning
5 Forwarding
6 Agreement
The sending switch sets the proposal flag in the RSTP BPDU to propose itself as the designated switch on
that LAN. The port role in the proposal message is always set to the designated port.
The sending switch sets the agreement flag in the RSTP BPDU to accept the previous proposal. The port role
in the agreement message is always set to the root port.
The RSTP does not have a separate topology change notification (TCN) BPDU. It uses the topology change
(TC) flag to show the topology changes. However, for interoperability with IEEE 802.1D switches, the RSTP
switch processes and generates TCN BPDUs.
The learning and forwarding flags are set according to the state of the sending port.
Topology Changes
This section describes the differences between the RSTP and the IEEE 802.1D in handling spanning-tree
topology changes.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
263
Layer 2
Protocol Migration Process
• Detection—Unlike IEEE 802.1D in which any transition between the blocking and the forwarding state
causes a topology change, only transitions from the blocking to the forwarding state cause a topology
change with RSTP (only an increase in connectivity is considered a topology change). State changes on
an edge port do not cause a topology change. When an RSTP switch detects a topology change, it deletes
the learned information on all of its nonedge ports except on those from which it received the TC
notification.
• Notification—Unlike IEEE 802.1D, which uses TCN BPDUs, the RSTP does not use them. However,
for IEEE 802.1D interoperability, an RSTP switch processes and generates TCN BPDUs.
• Acknowledgement—When an RSTP switch receives a TCN message on a designated port from an IEEE
802.1D switch, it replies with an IEEE 802.1D configuration BPDU with the TCA bit set. However, if
the TC-while timer (the same as the topology-change timer in IEEE 802.1D) is active on a root port
connected to an IEEE 802.1D switch and a configuration BPDU with the TCA bit set is received, the
TC-while timer is reset.
This behavior is only required to support IEEE 802.1D switches. The RSTP BPDUs never have the TCA
bit set.
• Propagation—When an RSTP switch receives a TC message from another switch through a designated
or root port, it propagates the change to all of its nonedge, designated ports and to the root port (excluding
the port on which it is received). The switch starts the TC-while timer for all such ports and flushes the
information learned on them.
• Protocol migration—For backward compatibility with IEEE 802.1D switches, RSTP selectively sends
IEEE 802.1D configuration BPDUs and TCN BPDUs on a per-port basis.
When a port is initialized, the migrate-delay timer is started (specifies the minimum time during which
RSTP BPDUs are sent), and RSTP BPDUs are sent. While this timer is active, the switch processes all
BPDUs received on that port and ignores the protocol type.
If the switch receives an IEEE 802.1D BPDU after the port migration-delay timer has expired, it assumes
that it is connected to an IEEE 802.1D switch and starts using only IEEE 802.1D BPDUs. However, if
the RSTP switch is using IEEE 802.1D BPDUs on a port and receives an RSTP BPDU after the timer
has expired, it restarts the timer and starts using RSTP BPDUs on that port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
264
Layer 2
Default MSTP Configuration
Related Topics
Supported Spanning-Tree Instances, on page 232
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
265
Layer 2
How to Configure MSTP Features
Since Rapid PVST+ (802.1w) and MST BPDUs include the role and state of the sending port, Switch A detects
(from the inferior BPDU), that switch B does not react to the superior BPDUs it sends, because switch B has
the role of a designated port and not the root bridge. As a result, switch A blocks (or keeps blocking) its port,
thus preventing the bridging loop.
Note these guidelines and limitations relating to the dispute mechanism:
• It works only on switches running RSTP or MST (the dispute mechanism requires reading the role and
state of the port initiating BPDUs).
• It may result in loss of connectivity. For example, in the figure below, Bridge A cannot transmit on the
port it elected as a root port. As a result of this situation, there is loss of connectivity (r1 and r2 are
designated, a1 is root and a2 is alternate. There is only a one way connectivity between A and R).
Figure 18: Loss of Connectivity
• It may cause permanent bridging loops on shared segments. For example, in the figure below, suppose
that bridge R has the best priority, and that port b1 cannot receive any traffic from the shared segment 1
and sends inferior designated information on segment 1. Both r1 and a1 can detect this inconsistency.
However, with the current dispute mechanism, only r1 will revert to discarding while the root port a1
opens a permanent loop. However, this problem does not occur in Layer 2 switched networks that are
connected by point-to-point links.
Figure 19: Bridging Loops on Shared Segments
SUMMARY STEPS
1. enable
2. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
266
Layer 2
Specifying the MST Region Configuration and Enabling MSTP
DETAILED STEPS
SwitchDevice> enable
Step 5 name name Specifies the configuration name. The name string has a
maximum length of 32 characters and is case sensitive.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
267
Layer 2
Specifying the MST Region Configuration and Enabling MSTP
Step 6 revision version Specifies the configuration revision number. The range is
0 to 65535.
Example:
SwitchDevice(config-mst)# revision 1
SwitchDevice(config-mst)# exit
SwitchDevice(config)# end
Related Topics
MSTP Configuration Guidelines, on page 251
Multiple Spanning-Tree Regions, on page 253
Prerequisites for MSTP, on page 249
Restrictions for MSTP, on page 250
Spanning-Tree Interoperability and Backward Compatibility, on page 232
Optional Spanning-Tree Configuration Guidelines
BackboneFast, on page 293
UplinkFast, on page 291
Default MSTP Configuration, on page 265
Configuring the Root Switch , on page 269
Bridge ID, Device Priority, and Extended System ID, on page 226
Configuring a Secondary Root Switch , on page 270
Configuring Port Priority , on page 271
Configuring Path Cost , on page 273
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
268
Layer 2
Configuring the Root Switch
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst instance-id root primary
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mst instance-id root primary Configures a switch as the root switch.
Example: • For instance-id, you can specify a single instance, a
range of instances separated by a hyphen, or a series
SwitchDevice(config)# spanning-tree mst 0 root of instances separated by a comma. The range is 0 to
primary 4094.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
269
Layer 2
Configuring a Secondary Root Switch
SwitchDevice(config)# end
Related Topics
Root Switch, on page 252
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Restrictions for MSTP, on page 250
Bridge ID, Device Priority, and Extended System ID, on page 226
Configuring a Secondary Root Switch , on page 270
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst instance-id root secondary
4. end
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
270
Layer 2
Configuring Port Priority
SwitchDevice> enable
Step 3 spanning-tree mst instance-id root secondary Configures a switch as the secondary root switch.
Example: • For instance-id, you can specify a single instance, a
range of instances separated by a hyphen, or a series
SwitchDevice(config)# spanning-tree mst 0 root of instances separated by a comma. The range is 0 to
secondary 4094.
SwitchDevice(config)# end
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Configuring the Root Switch , on page 269
Note If the switch is a member of a switch stack, you must use the spanning-tree mst [instance-id] cost cost
interface configuration command instead of the spanning-tree mst [instance-id] port-priority priority
interface configuration command to select a port to put in the forwarding state. Assign lower cost values to
ports that you want selected first and higher cost values to ports that you want selected last. For more
information, see the path costs topic listed under Related Topics.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
271
Layer 2
Configuring Port Priority
You must also know the specified MST instance ID and the interface used. This example uses 0 as the instance
ID and GigabitEthernet1/0/1 as the interface because that was the instance ID and interface set up by the
instructions listed under Related Topics.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree mst instance-id port-priority priority
5. end
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# interface
GigabitEthernet1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
272
Layer 2
Configuring Path Cost
SwitchDevice(config-if)# end
The show spanning-tree mst interface interface-id privileged EXEC command displays information only
if the port is in a link-up operative state. Otherwise, you can use the show running-config interface privileged
EXEC command to confirm the configuration.
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Configuring Path Cost , on page 273
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree mst instance-id cost cost
5. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
273
Layer 2
Configuring the Switch Priority
SwitchDevice(config-if)# end
The show spanning-tree mst interface interface-id privileged EXEC command displays information only
for ports that are in a link-up operative state. Otherwise, you can use the show running-config privileged
EXEC command to confirm the configuration.
Related Topics
Configuring Port Priority , on page 271
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Note Exercise care when using this command. For normal network configurations, we recommend that you use the
spanning-tree mst instance-id root primary and the spanning-tree mst instance-id root secondary global
configuration commands to specify a switch as the root or secondary root switch. You should modify the
switch priority only in circumstances where these commands do not work.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
274
Layer 2
Configuring the Switch Priority
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst instance-id priority priority
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mst instance-id priority priority Configures the switch priority.
Example: • For instance-id, you can specify a single instance, a
range of instances separated by a hyphen, or a series
SwitchDevice(config)# spanning-tree mst 0 priority of instances separated by a comma. The range is 0 to
40960 4094.
• For priority, the range is 0 to 61440 in increments of
4096; the default is 32768. The lower the number, the
more likely the switch will be chosen as the root
switch.
Priority values are 0, 4096, 8192, 12288, 16384, 20480,
24576, 28672, 32768, 36864, 40960, 45056, 49152,
53248, 57344, and 61440. These are the only
acceptable values.
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
275
Layer 2
Configuring the Hello Time
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst hello-time seconds
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mst hello-time seconds Configures the hello time for all MST instances. The hello
time is the time interval between configuration messages
Example:
generated and sent by the root switch. These messages
indicate that the switch is alive.
SwitchDevice(config)# spanning-tree mst hello-time
4 For seconds, the range is 1 to 10; the default is 3.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
276
Layer 2
Configuring the Forwarding-Delay Time
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst forward-time seconds
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mst forward-time seconds Configures the forward time for all MST instances. The
forwarding delay is the number of seconds a port waits
Example:
before changing from its spanning-tree learning and
listening states to the forwarding state.
SwitchDevice(config)# spanning-tree mst
forward-time 25 For seconds, the range is 4 to 30; the default is 20.
SwitchDevice(config)# end
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
277
Layer 2
Configuring the Maximum-Aging Time
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst max-age seconds
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mst max-age seconds Configures the maximum-aging time for all MST instances.
The maximum-aging time is the number of seconds a switch
Example:
waits without receiving spanning-tree configuration
messages before attempting a reconfiguration.
SwitchDevice(config)# spanning-tree mst max-age 40
For seconds, the range is 6 to 40; the default is 20.
SwitchDevice(config)# end
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
278
Layer 2
Specifying the Link Type to Ensure Rapid Transitions
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree mst max-hops hop-count
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree mst max-hops hop-count Specifies the number of hops in a region before the BPDU
is discarded, and the information held for a port is aged.
Example:
For hop-count, the range is 1 to 255; the default is 20.
SwitchDevice(config)# spanning-tree mst max-hops
25
SwitchDevice(config)# end
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
279
Layer 2
Specifying the Link Type to Ensure Rapid Transitions
a half-duplex link physically connected point-to-point to a single port on a remote switch running MSTP, you
can override the default setting of the link type and enable rapid transitions to the forwarding state.
This procedure is optional.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree link-type point-to-point
5. end
DETAILED STEPS
SwitchDevice> enable
Step 4 spanning-tree link-type point-to-point Specifies that the link type of a port is point-to-point.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
280
Layer 2
Designating the Neighbor Type
SwitchDevice(config-if)# end
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree mst pre-standard
5. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
281
Layer 2
Restarting the Protocol Migration Process
SwitchDevice(config)# interface
GigabitEthernet1/0/1
Step 4 spanning-tree mst pre-standard Specifies that the port can send only prestandard BPDUs.
Example:
SwitchDevice(config-if)# end
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
SUMMARY STEPS
1. enable
2. Enter one of the following commands:
• clear spanning-tree detected-protocols
• clear spanning-tree detected-protocols interface interface-id
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
282
Layer 2
Configuring PVST+ Simulation
SwitchDevice> enable
Step 2 Enter one of the following commands: The switch reverts to the MSTP mode, and the protocol
migration process restarts.
• clear spanning-tree detected-protocols
• clear spanning-tree detected-protocols interface
interface-id
Example:
SwitchDevice# clear spanning-tree
detected-protocols
or
SwitchDevice# clear spanning-tree
detected-protocols interface GigabitEthernet1/0/1
What to do next
This procedure may need to be repeated if the switch receives more legacy IEEE 802.1D configuration BPDUs
(BPDUs with the protocol version set to 0).
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
Protocol Migration Process, on page 264
SUMMARY STEPS
1.
DETAILED STEPS
Example
What to do next
•
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
283
Layer 2
Examples
Examples
Examples: PVST+ Simulation
This example shows how to prevent the switch from automatically interoperating with a connecting switch
that is running Rapid PVST+:
This example shows how to prevent a port from automatically interoperating with a connecting device that
is running Rapid PVST+:
The following sample output shows the system message you receive when a SSTP BPDU is received on a
port and PVST+ simulation is disabled:
Message
SPANTREE_PVST_PEER_BLOCK: PVST BPDU detected on port %s [port number].
Severity
Critical
Explanation
A PVST+ peer was detected on the specified interface on the switch. PVST+
simulation feature is disabled, as a result of which the interface was
moved to the spanning tree
Blocking state.
Action
Identify the PVST+ switch from the network which might be configured
incorrectly.
The following sample output shows the system message you receive when peer inconsistency on the interface
is cleared:
Message
SPANTREE_PVST_PEER_UNBLOCK: Unblocking port %s [port number].
Severity
Critical
Explanation
The interface specified in the error message has been restored to normal
spanning tree state.
Action
None.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
284
Layer 2
Examples: PVST+ Simulation
This example shows the spanning tree status when port Gi3/14 has been configured to disable PVST+ simulation
and is currently in the peer type inconsistent state:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
285
Layer 2
Examples: PVST+ Simulation
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
286
Layer 2
Monitoring MST Configuration and Status
show spanning-tree mst configuration digest Displays the MD5 digest included in the current
MSTCI.
show spanning-tree mst Displays MST information for the all instances.
Note This command displays information for
ports in a link-up operative state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
287
Layer 2
Feature Information for MSTP
show spanning-tree mst instance-id Displays MST information for the specified instance.
Note This command displays information only
if the port is in a link-up operative state.
show spanning-tree mst interface interface-id Displays MST information for the specified interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
288
CHAPTER 16
Configuring Optional Spanning-Tree Features
• Finding Feature Information, on page 289
• Restriction for Optional Spanning-Tree Features, on page 289
• Information About Optional Spanning-Tree Features, on page 290
• How to Configure Optional Spanning-Tree Features, on page 299
• Examples, on page 316
• Monitoring the Spanning-Tree Status, on page 318
Related Topics
Enabling PortFast , on page 299
PortFast, on page 290
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
289
Layer 2
Information About Optional Spanning-Tree Features
You can use PortFast on interfaces connected to a single workstation or server to allow those devices to
immediately connect to the network, rather than waiting for the spanning tree to
converge.
Interfaces connected to a single workstation or server should not receive bridge protocol data units (BPDUs).
An interface with PortFast enabled goes through the normal cycle of spanning-tree status changes when the
switch is restarted.
You can enable this feature by enabling it on either the interface or on all nontrunking ports.
Related Topics
Enabling PortFast , on page 299
Restriction for Optional Spanning-Tree Features, on page 289
BPDU Guard
The Bridge Protocol Data Unit (BPDU) guard feature can be globally enabled on the switch or can be enabled
per port, but the feature operates with some differences.
When you enable BPDU guard at the global level on PortFast-enabled ports, spanning tree shuts down ports
that are in a PortFast-operational state if any BPDU is received on them. In a valid configuration,
PortFast-enabled ports do not receive BPDUs. Receiving a BPDU on a Port Fast-enabled port means an invalid
configuration, such as the connection of an unauthorized device, and the BPDU guard feature puts the port
in the error-disabled state. When this happens, the switch shuts down the entire port on which the violation
occurred.
When you enable BPDU guard at the interface level on any port without also enabling the PortFast feature,
and the port receives a BPDU, it is put in the error-disabled state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
290
Layer 2
BPDU Filtering
The BPDU guard feature provides a secure response to invalid configurations because you must manually
put the interface back in service. Use the BPDU guard feature in a service-provider network to prevent an
access port from participating in the spanning tree.
Related Topics
Enabling BPDU Guard , on page 301
BPDU Filtering
The BPDU filtering feature can be globally enabled on the switch or can be enabled per interface, but the
feature operates with some differences.
Enabling BPDU filtering on PortFast-enabled interfaces at the global level keeps those interfaces that are in
a PortFast-operational state from sending or receiving BPDUs. The interfaces still send a few BPDUs at
link-up before the switch begins to filter outbound BPDUs. You should globally enable BPDU filtering on a
switch so that hosts connected to these interfaces do not receive BPDUs. If a BPDU is received on a
PortFast-enabled interface, the interface loses its PortFast-operational status, and BPDU filtering is disabled.
Enabling BPDU filtering on an interface without also enabling the PortFast feature keeps the interface from
sending or receiving BPDUs.
Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in
spanning-tree loops.
You can enable the BPDU filtering feature for the entire switch or for an interface.
Related Topics
Enabling BPDU Filtering , on page 302
UplinkFast
Figure 21: Switches in a Hierarchical Network
Switches in hierarchical networks can be grouped into backbone switches, distribution switches, and access
switches. This complex network has distribution switches and access switches that each have at least one
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
291
Layer 2
UplinkFast
loops.
If a switch loses connectivity, it begins using the alternate paths as soon as the spanning tree selects a new
root port. You can accelerate the choice of a new root port when a link or switch fails or when the spanning
tree reconfigures itself by enabling UplinkFast. The root port transitions to the forwarding state immediately
without going through the listening and learning states, as it would with the normal spanning-tree procedures.
When the spanning tree reconfigures the new root port, other interfaces flood the network with multicast
packets, one for each address that was learned on the interface. You can limit these bursts of multicast traffic
by reducing the max-update-rate parameter (the default for this parameter is 150 packets per second). However,
if you enter zero, station-learning frames are not generated, so the spanning-tree topology converges more
slowly after a loss of connectivity.
Note UplinkFast is most useful in wiring-closet switches at the access or edge of the network. It is not appropriate
for backbone devices. This feature might not be useful for other types of applications.
UplinkFast provides fast convergence after a direct link failure and achieves load-balancing between redundant
Layer 2 links using uplink groups. An uplink group is a set of Layer 2 interfaces (per VLAN), only one of
which is forwarding at any given time. Specifically, an uplink group consists of the root port (which is
forwarding) and a set of blocked ports, except for self-looping ports. The uplink group provides an alternate
path in case the currently forwarding link fails.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
292
Layer 2
BackboneFast
This topology has no link failures. Switch A, the root switch, is connected directly to Switch B over link L1
and to Switch C over link L2. The Layer 2 interface on Switch C that is connected directly to Switch B is in
a blocking state.
Figure 23: UplinkFast Example After Direct Link Failure
If Switch C detects a link failure on the currently active link L2 on the root port (a direct link failure), UplinkFast
unblocks the blocked interface on Switch C and transitions it to the forwarding state without going through
the listening and learning states. This change takes approximately 1 to
5 seconds.
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
MSTP Configuration Guidelines, on page 251
Multiple Spanning-Tree Regions, on page 253
Enabling UplinkFast for Use with Redundant Links , on page 304
Events That Cause Fast Convergence
BackboneFast
BackboneFast detects indirect failures in the core of the backbone. BackboneFast is a complementary technology
to the UplinkFast feature, which responds to failures on links directly connected to access switches.
BackboneFast optimizes the maximum-age timer, which controls the amount of time the switch stores protocol
information received on an interface. When a switch receives an inferior BPDU from the designated port of
another switch, the BPDU is a signal that the other switch might have lost its path to the root, and BackboneFast
tries to find an alternate path to the root.
BackboneFast starts when a root port or blocked interface on a switch receives inferior BPDUs from its
designated switch. An inferior BPDU identifies a switch that declares itself as both the root bridge and the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
293
Layer 2
BackboneFast
designated switch. When a switch receives an inferior BPDU, it means that a link to which the switch is not
directly connected (an indirect link) has failed (that is, the designated switch has lost its connection to the root
switch). Under spanning-tree rules, the switch ignores inferior BPDUs for the maximum aging time (default
is 20 seconds).
The switch tries to find if it has an alternate path to the root switch. If the inferior BPDU arrives on a blocked
interface, the root port and other blocked interfaces on the switch become alternate paths to the root switch.
(Self-looped ports are not considered alternate paths to the root switch.) If the inferior BPDU arrives on the
root port, all blocked interfaces become alternate paths to the root switch. If the inferior BPDU arrives on the
root port and there are no blocked interfaces, the switch assumes that it has lost connectivity to the root switch,
causes the maximum aging time on the root port to expire, and becomes the root switch according to normal
spanning-tree rules.
If the switch has alternate paths to the root switch, it uses these alternate paths to send a root link query (RLQ)
request. The switch sends the RLQ request on all alternate paths to learn if any stack member has an alternate
root to the root switch and waits for an RLQ reply from other switches in the network and in the stack. The
switch sends the RLQ request on all alternate paths and waits for an RLQ reply from other switches in the
network.
When a stack member receives an RLQ reply from a nonstack member on a blocked interface and the reply
is destined for another nonstacked switch, it forwards the reply packet, regardless of the spanning-tree interface
state.
When a stack member receives an RLQ reply from a nonstack member and the response is destined for the
stack, the stack member forwards the reply so that all the other stack members receive it.
If the switch discovers that it still has an alternate path to the root, it expires the maximum aging time on the
interface that received the inferior BPDU. If all the alternate paths to the root switch indicate that the switch
has lost connectivity to the root switch, the switch expires the maximum aging time on the interface that
received the RLQ reply. If one or more alternate paths can still connect to the root switch, the switch makes
all interfaces on which it received an inferior BPDU its designated ports and moves them from the blocking
state (if they were in the blocking state), through the listening and learning states, and into the forwarding
state.
Figure 24: BackboneFast Example Before Indirect Link Failure
This is an example topology with no link failures. Switch A, the root switch, connects directly to Switch B
over link L1 and to Switch C over link L2. The Layer 2 interface on Switch C that connects directly to Switch
If link L1 fails, Switch C cannot detect this failure because it is not connected directly to link L1. However,
because Switch B is directly connected to the root switch over L1, it detects the failure, elects itself the root,
and begins sending BPDUs to Switch C, identifying itself as the root. When Switch C receives the inferior
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
294
Layer 2
BackboneFast
BPDUs from Switch B, Switch C assumes that an indirect failure has occurred. At that point, BackboneFast
allows the blocked interface on Switch C to move immediately to the listening state without waiting for the
maximum aging time for the interface to expire. BackboneFast then transitions the Layer 2 interface on
Switch C to the forwarding state, providing a path from Switch B to Switch A. The root-switch election takes
approximately 30 seconds, twice the Forward Delay time if the default Forward Delay time of 15 seconds is
set. BackboneFast reconfigures the topology to account for the failure of link
L1.
Figure 26: Adding a Switch in a Shared-Medium Topology
If a new switch is introduced into a shared-medium topology, BackboneFast is not activated because the
inferior BPDUs did not come from the recognized designated switch (Switch B). The new switch begins
sending inferior BPDUs that indicate it is the root switch. However, the other switches ignore these inferior
BPDUs, and the new switch learns that Switch B is the designated switch to Switch A, the root
switch.
Related Topics
Specifying the MST Region Configuration and Enabling MSTP , on page 266
MSTP Configuration Guidelines, on page 251
Multiple Spanning-Tree Regions, on page 253
Enabling BackboneFast , on page 306
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
295
Layer 2
EtherChannel Guard
EtherChannel Guard
You can use EtherChannel guard to detect an EtherChannel misconfiguration between the switch and a
connected device. A misconfiguration can occur if the switch interfaces are configured in an EtherChannel,
but the interfaces on the other device are not. A misconfiguration can also occur if the channel parameters are
not the same at both ends of the EtherChannel.
If the switch detects a misconfiguration on the other device, EtherChannel guard places the switch interfaces
in the error-disabled state, and displays an error message.
Related Topics
Enabling EtherChannel Guard , on page 307
Root Guard
Figure 27: Root Guard in a Service-Provider Network
The Layer 2 network of a service provider (SP) can include many connections to switches that are not owned
by the SP. In such a topology, the spanning tree can reconfigure itself and select a customer switch as the root
switch. You can avoid this situation by enabling root guard on SP switch interfaces that connect to switches
in your customer’s network. If spanning-tree calculations cause an interface in the customer network to be
selected as the root port, root guard then places the interface in the root-inconsistent (blocked) state to prevent
the customer’s switch from becoming the root switch or being in the path to the root.
If a switch outside the SP network becomes the root switch, the interface is blocked (root-inconsistent state),
and spanning tree selects a new root switch. The customer’s switch does not become the root switch and is
not in the path to the root.
If the switch is operating in multiple spanning-tree (MST) mode, root guard forces the interface to be a
designated port. If a boundary port is blocked in an internal spanning-tree (IST) instance because of root
guard, the interface also is blocked in all MST instances. A boundary port is an interface that connects to a
LAN, the designated switch of which is either an IEEE 802.1D switch or a switch with a different MST region
configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
296
Layer 2
Loop Guard
Root guard enabled on an interface applies to all the VLANs to which the interface belongs. VLANs can be
grouped and mapped to an MST instance.
Caution Misuse of the root guard feature can cause a loss of connectivity.
Related Topics
Enabling Root Guard , on page 308
Loop Guard
You can use loop guard to prevent alternate or root ports from becoming designated ports because of a failure
that leads to a unidirectional link. This feature is most effective when it is enabled on the entire switched
network. Loop guard prevents alternate and root ports from becoming designated ports, and spanning tree
does not send BPDUs on root or alternate ports.
When the switch is operating in PVST+ or rapid-PVST+ mode, loop guard prevents alternate and root ports
from becoming designated ports, and spanning tree does not send BPDUs on root or alternate ports.
When the switch is operating in MST mode, BPDUs are not sent on nonboundary ports only if the interface
is blocked by loop guard in all MST instances. On a boundary port, loop guard blocks the interface in all MST
instances.
Related Topics
Enabling Loop Guard , on page 310
Note If you configure a port connected to a Layer 2 switch or bridge as an edge port,
you might create a bridging loop.
• A PortFast network port—is connected only to a Layer 2 switch or bridge. Bridge Assurance is enabled
only on PortFast network ports. For more information, refer to Bridge Assurance.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
297
Layer 2
Bridge Assurance
Note If you configure a port that is connected to a Layer 2 host as a spanning tree
network port, the port will automatically move into the blocking state.
Note Beginning with Cisco IOS Release 15.2(4)E, or IOS XE 3.8.0E, if you enter the
spanning-tree portfast [trunk] command in the global or interface configuration
mode, the system automatically saves it as spanning-tree portfast edge [trunk].
Related Topics
Enabling PortFast Port Types, on page 311
Bridge Assurance
You can use Bridge Assurance to help prevent looping conditions that are caused by unidirectional links
(one-way traffic on a link or port), or a malfunction in a neighboring switch. Here a malfunction refers to a
switch that is not able to run STP any more, while still forwarding traffic (a brain dead switch).
BPDUs are sent out on all operational network ports, including alternate and backup ports, for each hello time
period. Bridge Assurance monitors the receipt of BPDUs on point-to-point links on all network ports. When
a port does not receive BPDUs within the alloted hello time period, the port is put into a blocked state (the
same as a port inconsistent state, which stops forwarding of frames). When the port resumes receipt of BPDUs,
the port resumes normal spanning tree operations.
Note Only Rapid PVST+ and MST spanning tree protocols support Bridge Assurance. PVST+ does not support
Bridge Assurance.
The following example shows how Bridge Assurance protects your network from bridging loops.
The following figure shows a network with normal STP topology.
Figure 28: Network with Normal STP Topology
The following figure demonstrates a potential network problem when the device fails (brain dead) and Bridge
Assurance is not enabled on the network.
Figure 29: Network Loop Due to a Malfunctioning Switch
The following figure shows the network with Bridge Assurance enabled, and the STP topology progressing
normally with bidirectional BDPUs issuing from every STP network port.
Figure 30: Network with STP Topology Running Bridge Assurance
The following figure shows how the potential network problem shown in figure Network Loop Due to a
Malfunctioning Switch does not occur when you have Bridge Assurance enabled on your network.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
298
Layer 2
How to Configure Optional Spanning-Tree Features
The system generates syslog messages when a port is block and unblocked. The following sample output
shows the log that is generated for each of these states:
BRIDGE_ASSURANCE_BLOCK
BRIDGE_ASSURANCE_UNBLOCK
Related Topics
Enabling Bridge Assurance, on page 315
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
299
Layer 2
Enabling PortFast
Caution Use PortFast only when connecting a single end station to an access or trunk port. Enabling this feature on
an interface connected to a switch or hub could prevent spanning tree from detecting and disabling loops in
your network, which could cause broadcast storms and address-learning problems.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree portfast [trunk]
5. end
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 4 spanning-tree portfast [trunk] Enables PortFast on an access port connected to a single
workstation or server. By specifying the trunk keyword,
Example:
you can enable PortFast on a trunk port.
SwitchDevice(config-if)# spanning-tree portfast Note To enable PortFast on trunk ports, you must use
trunk the spanning-tree portfast trunk interface
configuration command. The spanning-tree
portfast command will not work on trunk ports.
Make sure that there are no loops in the network
between the trunk port and the workstation or
server before you enable PortFast on a trunk port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
300
Layer 2
Enabling BPDU Guard
SwitchDevice(config-if)# end
What to do next
You can use the spanning-tree portfast default global configuration command to globally enable the PortFast
feature on all nontrunking ports.
Related Topics
PortFast, on page 290
Restriction for Optional Spanning-Tree Features, on page 289
Caution Configure PortFast only on ports that connect to end stations; otherwise, an accidental topology loop could
cause a data packet loop and disrupt switch and network operation.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree portfast bpduguard default
4. interface interface-id
5. spanning-tree portfast
6. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
301
Layer 2
Enabling BPDU Filtering
Step 4 interface interface-id Specifies the interface connected to an end station, and
enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
SwitchDevice(config-if)# end
What to do next
To prevent the port from shutting down, you can use the errdisable detect cause bpduguard shutdown vlan
global configuration command to shut down just the offending VLAN on the port where the violation occurred.
You also can use the spanning-tree bpduguard enable interface configuration command to enable BPDU
guard on any port without also enabling the PortFast feature. When the port receives a BPDU, it is put it in
the error-disabled state.
Related Topics
BPDU Guard, on page 290
Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in
spanning-tree loops.
You can enable the BPDU filtering feature if your switch is running PVST+, Rapid PVST+, or MSTP.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
302
Layer 2
Enabling BPDU Filtering
Caution Configure PortFast only on interfaces that connect to end stations; otherwise, an accidental topology loop
could cause a data packet loop and disrupt switch and network operation.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree portfast bpdufilter default
4. interface interface-id
5. spanning-tree portfast
6. end
DETAILED STEPS
SwitchDevice> enable
Step 4 interface interface-id Specifies the interface connected to an end station, and
enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 5 spanning-tree portfast Enables the PortFast feature on the specified interface.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
303
Layer 2
Enabling UplinkFast for Use with Redundant Links
SwitchDevice(config-if)# end
Related Topics
BPDU Filtering, on page 291
Note When you enable UplinkFast, it affects all VLANs on the switch or switch stack. You cannot configure
UplinkFast on an individual VLAN.
You can configure the UplinkFast or the Cross-Stack UplinkFast (CSUF) feature for Rapid PVST+ or for the
MSTP, but the feature remains disabled (inactive) until you change the spanning-tree mode to PVST+.
This procedure is optional. Follow these steps to enable UplinkFast and CSUF.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree uplinkfast [max-update-rate pkts-per-second]
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
304
Layer 2
Disabling UplinkFast
SwitchDevice(config)# end
When UplinkFast is enabled, the switch priority of all VLANs is set to 49152. If you change the path cost to
a value less than 3000 and you enable UplinkFast or UplinkFast is already enabled, the path cost of all interfaces
and VLAN trunks is increased by 3000 (if you change the path cost to 3000 or above, the path cost is not
altered). The changes to the switch priority and the path cost reduce the chance that a switch will become the
root switch.
When UplinkFast is disabled, the switch priorities of all VLANs and path costs of all interfaces are set to
default values if you did not modify them from their defaults.
When you enable the UplinkFast feature using these instructions, CSUF is automatically globally enabled on
nonstack port interfaces.
Related Topics
UplinkFast, on page 291
How Cross-Stack UplinkFast Works
Events That Cause Fast Convergence
Disabling UplinkFast
This procedure is optional.
Follow these steps to disable UplinkFast and Cross-Stack UplinkFast (CSUF).
SUMMARY STEPS
1. enable
2. configure terminal
3. no spanning-tree uplinkfast
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
305
Layer 2
Enabling BackboneFast
DETAILED STEPS
SwitchDevice> enable
Step 3 no spanning-tree uplinkfast Disables UplinkFast and CSUF on the switch and all of its
VLANs.
Example:
SwitchDevice(config)# no spanning-tree uplinkfast
SwitchDevice(config)# end
When UplinkFast is disabled, the switch priorities of all VLANs and path costs of all interfaces are set to
default values if you did not modify them from their defaults.
When you disable the UplinkFast feature using these instructions, CSUF is automatically globally disabled
on nonstack port interfaces.
Enabling BackboneFast
You can enable BackboneFast to detect indirect link failures and to start the spanning-tree reconfiguration
sooner.
You can configure the BackboneFast feature for Rapid PVST+ or for the MSTP, but the feature remains
disabled (inactive) until you change the spanning-tree mode to PVST+.
This procedure is optional. Follow these steps to enable BackboneFast on the switch.
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree backbonefast
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
306
Layer 2
Enabling EtherChannel Guard
4. end
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
Related Topics
BackboneFast, on page 293
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree etherchannel guard misconfig
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
307
Layer 2
Enabling Root Guard
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
What to do next
You can use the show interfaces status err-disabled privileged EXEC command to show which switch ports
are disabled because of an EtherChannel misconfiguration. On the remote device, you can enter the show
etherchannel summary privileged EXEC command to verify the EtherChannel configuration.
After the configuration is corrected, enter the shutdown and no shutdown interface configuration commands
on the port-channel interfaces that were misconfigured.
Related Topics
EtherChannel Guard, on page 296
Note You cannot enable both root guard and loop guard at the same time.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
308
Layer 2
Enabling Root Guard
You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP.
This procedure is optional.
Follow these steps to enable root guard on the switch.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. spanning-tree guard root
5. end
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# interface
gigabitethernet1/0/2
SwitchDevice(config-if)# end
Related Topics
Root Guard, on page 296
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
309
Layer 2
Enabling Loop Guard
Note You cannot enable both loop guard and root guard at the same time.
You can enable this feature if your switch is running PVST+, Rapid PVST+, or MSTP.
This procedure is optional. Follow these steps to enable loop guard on the switch.
SUMMARY STEPS
1. Enter one of the following commands:
• show spanning-tree active
• show spanning-tree mst
2. configure terminal
3. spanning-tree loopguard default
4. end
DETAILED STEPS
or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
310
Layer 2
Enabling PortFast Port Types
SwitchDevice(config)# end
Related Topics
Loop Guard, on page 297
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree portfast [edge | network | normal] default
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree portfast [edge | network | normal] default Configures the default state for all interfaces on the switch.
You have these options:
Example:
• (Optional) edge—Configures all interfaces as edge
SwitchDevice(config)# spanning-tree portfast ports. This assumes all ports are connected to
default hosts/servers.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
311
Layer 2
Configuring PortFast Edge on a Specified Interface
SwitchDevice(config)# end
Note Because the purpose of this type of port is to minimize the time that access ports must wait for spanning tree
to converge, it is most effective when used on access ports. If you enable PortFast edge on a port connecting
to another switch, you risk creating a spanning tree loop.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id | port-channel port_channel_number
4. spanning-tree portfast edge [trunk]
5. end
6. show running interface interface-id | port-channel port_channel_number
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
312
Layer 2
Configuring a PortFast Network Port on a Specified Interface
Step 4 spanning-tree portfast edge [trunk] Enables edge behavior on a Layer 2 access port connected
to an end workstation or server.
Example:
• (Optional) trunk—Enables edge behavior on a trunk
SwitchDevice(config-if)# spanning-tree portfast port. Use this keyword if the link is a trunk. Use this
trunk command only on ports that are connected to end host
devices that terminate VLANs and from which the
port should never receive STP BPDUs. Such end host
devices include workstations, servers, and ports on
routers that are not configured to support bridging.
• Use the no version of the command to disable PortFast
edge.
SwitchDevice(config-if)# end
Note Bridge Assurance is enabled only on PortFast network ports. For more information, refer to Bridge Assurance.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
313
Layer 2
Configuring a PortFast Network Port on a Specified Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id | port-channel port_channel_number
4. spanning-tree portfast edge network
5. end
6. show running interface interface-id | port-channel port_channel_number
DETAILED STEPS
SwitchDevice> enable
Step 4 spanning-tree portfast edge network Enables edge behavior on a Layer 2 access port connected
to an end workstation or server.
Example:
• Configures the port as a network port. If you have
SwitchDevice(config-if)# spanning-tree portfast enabled Bridge Assurance globally, it automatically
network runs on a spanning tree network port.
• Use the no version of the command to disable PortFast.
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
314
Layer 2
Enabling Bridge Assurance
SUMMARY STEPS
1. enable
2. configure terminal
3. spanning-tree bridge assurance
4. end
5. show spanning-tree summary
DETAILED STEPS
SwitchDevice> enable
Step 3 spanning-tree bridge assurance Enables Bridge Assurance on all network ports on the
switch.
Example:
Bridge Assurance is enabled by default.
SwitchDevice(config)# spanning-tree bridge
assurance Use the no version of the command to disable the feature.
Disabling Bridge Assurance causes all configured network
ports to behave as normal spanning tree ports.
SwitchDevice(config)# end
Step 5 show spanning-tree summary Displays spanning tree information and shows if Bridge
Assurance is enabled.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
315
Layer 2
Examples
Related Topics
Bridge Assurance, on page 298
Examples
Examples: Configuring PortFast Edge on a Specified Interface
This example shows how to enable edge behavior on GigabitEthernet interface 5/8:
Switch# configure terminal
Switch(config)# interface gigabitethernet 5/8
Switch(config-if)# spanning-tree portfast edge
Switch(config-if)# end
Switch#
This example shows how you can display that port GigabitEthernet 5/8 is currently in the edge state:
Switch# show spanning-tree vlan 200
VLAN0200
Spanning tree enabled protocol rstp
Root ID Priority 2
Address 001b.2a68.5fc0
Cost 3
Port 125 (GigabitEthernet5/9)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 2 (priority 0 sys-id-ext 2)
Address 7010.5c9c.5200
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Aging Time 0 sec
Interface Role Sts Cost Prio.Nbr Type
------------------- ---- --- --------- -------- --------------------------------
Gi5/8 Desg FWD 4 128.1 P2p Edge
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
316
Layer 2
Example: Configuring Bridge Assurance
VLAN0002
Spanning tree enabled protocol rstp
Root ID Priority 2
Address 7010.5c9c.5200
This bridge is the root
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Switch#
Note The output shows the port type as network and *BA_Inc, indicating that the port is in an inconsistent state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
317
Layer 2
Monitoring the Spanning-Tree Status
Switch#
Command Purpose
show spanning-tree active Displays spanning-tree information on active
interfaces only.
show spanning-tree interface interface-id Displays spanning-tree information for the specified
interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
318
Layer 2
Monitoring the Spanning-Tree Status
Command Purpose
show spanning-tree mst interface interface-id Displays MST information for the specified interface.
show spanning-tree summary [totals] Displays a summary of interface states or displays the
total lines of the spanning-tree state section.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
319
Layer 2
Monitoring the Spanning-Tree Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
320
CHAPTER 17
Configuring Bidirection Forwarding Detection
• Finding Feature Information, on page 321
• Prerequisites for Bidirectional Forwarding Detection, on page 321
• Restrictions for Bidirectional Forwarding Detection, on page 322
• Information About Bidirectional Forwarding Detection, on page 322
• How to Configure Bidirectional Forwarding Detection, on page 326
• Configuration Examples for Bidirectional Forwarding Detection, on page 339
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
321
Layer 2
Restrictions for Bidirectional Forwarding Detection
Neighbor Relationships
BFD provides fast BFD peer failure detection times independently of all media types, encapsulations, topologies,
and routing protocols BGP, EIGRP, IS-IS, and OSPF. By sending rapid failure detection notices to the routing
protocols in the local router to initiate the routing table recalculation process, BFD contributes to greatly
reduced overall network convergence time. The figure below shows a simple network with two routers running
OSPF and BFD. When OSPF discovers a neighbor (1) it sends a request to the local BFD process to initiate
a BFD neighbor session with the OSPF neighbor router (2). The BFD neighbor session with the OSPF neighbor
router is established (3).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
322
Layer 2
BFD Detection of Failures
The figure below shows what happens when a failure occurs in the network (1). The BFD neighbor session
with the OSPF neighbor router is torn down (2). BFD notifies the local OSPF process that the BFD neighbor
is no longer reachable (3). The local OSPF process tears down the OSPF neighbor relationship (4). If an
alternative path is available, the routers will immediately start converging on it.
Figure 33: Tearing Down an OSPF Neighbor Relationship
A routing protocol needs to register with BFD for every neighbor it acquires. Once a neighbor is registered,
BFD initiates a session with the neighbor if a session does not already exist.
OSPF registers with BFD when:
• A neighbor finite state machine (FSM) transitions to full state.
• Both OSPF BFD and BFD are enabled.
On broadcast interfaces, OSPF establishes a BFD session only with the designated router (DR) and backup
designated router (BDR), but not between any two routers in DROTHER state.
• Cisco devices will use one BFD session for multiple client protocols in the Cisco implementation of
BFD. For example, if a network is running OSPF and EIGRP across the same link to the same peer, only
one BFD session will be established, and BFD will share session information with both routing protocols.
However, IPv4 and IPv6 clients cannot share a BFD session.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
323
Layer 2
BFD Version Interoperability
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
324
Layer 2
Stateful BFD on the Standby RP
Maximum Number of BFD BFD Session Type Minimum Timer Value (ms) Clients Comments
Sessions
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
325
Layer 2
Benefits of Using BFD for Failure Detection
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. bfd interval milliseconds min_rx milliseconds multiplier interval-multiplier
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
326
Layer 2
Configuring BFD Support for Dynamic Routing Protocols
DETAILED STEPS
Switch> enable
Step 3 interface type number Specifies an interface type and number, and places the
device in interface configuration mode.
Example:
Step 4 bfd interval milliseconds min_rx milliseconds Enables BFD on the interface.
multiplier interval-multiplier
Disables BFD echo mode to enable Hardware Off-load.
Example:
Related Topics
Configuring BFD Echo Mode, on page 336
Configuring BFD Support for EIGRP, on page 329
Configuring BFD Support for BGP, on page 327
BFD Operation, on page 322
Configuring BFD Support for OSPF, on page 331
Configuring BFD Support for OSPF for One or More Interfaces, on page 333
Monitoring and Troubleshooting BFD, on page 338
Configuring BFD Support for OSPF for All Interfaces, on page 331
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
327
Layer 2
Configuring BFD Support for BGP
Note Output from the show bfd neighbors details command shows the configured intervals. The output does not
show intervals that were changed because hardware-offloaded BFD sessions were configured with Tx and
Rx intervals that are not multiples of 50 ms.
SUMMARY STEPS
1. enable
2. configure terminal
3. router bgp as-tag
4. neighbor ip-address fall-over bfd
5. end
6. show bfd neighbors [details]
7. show ip bgp neighbor
DETAILED STEPS
Switch> enable
Step 3 router bgp as-tag Specifies a BGP process and enters router configuration
mode.
Example:
Step 4 neighbor ip-address fall-over bfd Enables BFD support for fallover.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
328
Layer 2
Configuring BFD Support for EIGRP
Switch(config-router)# end
Step 6 show bfd neighbors [details] (Optional) Verifies that the BFD neighbor is active and
displays the routing protocols that BFD has registered.
Example:
Step 7 show ip bgp neighbor (Optional) Displays information about BGP and TCP
connections to neighbors.
Example:
Related Topics
Configuring BFD Session Parameters on the Interface, on page 326
Monitoring and Troubleshooting BFD, on page 338
Configuring BFD Support for OSPF for All Interfaces, on page 331
SUMMARY STEPS
1. enable
2. configure terminal
3. router eigrp as-number
4. Do one of the following:
• bfd all-interfaces
• bfd interface type number
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
329
Layer 2
Configuring BFD Support for EIGRP
5. end
6. show bfd neighbors [details]
7. show ip eigrp interfaces [type number] [as-number] [detail]
DETAILED STEPS
Switch> enable
Step 3 router eigrp as-number Configures the EIGRP routing process and enters router
configuration mode.
Example:
Step 4 Do one of the following: Enables BFD globally on all interfaces associated with the
EIGRP routing process.
• bfd all-interfaces
• bfd interface type number or
Example: Enables BFD on a per-interface basis for one or more
interfaces associated with the EIGRP routing process.
Switch(config-router)# bfd all-interfaces
Example:
Step 5 end Exits router configuration mode and returns the router to
privileged EXEC mode.
Example:
Switch(config-router) end
Step 6 show bfd neighbors [details] (Optional) Verifies that the BFD neighbor is active and
displays the routing protocols that BFD has registered.
Example:
Step 7 show ip eigrp interfaces [type number] [as-number] (Optional) Displays the interfaces for which BFD support
[detail] for EIGRP has been enabled.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
330
Layer 2
Configuring BFD Support for OSPF
Related Topics
Configuring BFD Support for OSPF, on page 331
Configuring BFD Session Parameters on the Interface, on page 326
Monitoring and Troubleshooting BFD, on page 338
Configuring BFD Support for OSPF for All Interfaces, on page 331
See the following sections for tasks for configuring BFD support for OSPF:
Related Topics
Configuring BFD Support for EIGRP, on page 329
Configuring BFD Session Parameters on the Interface, on page 326
Monitoring and Troubleshooting BFD, on page 338
Configuring BFD Support for OSPF for All Interfaces, on page 331
SUMMARY STEPS
1. enable
2. configure terminal
3. switch ospf process-id
4. bfd all-interfaces
5. end
6. show bfd neighbors [details]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
331
Layer 2
Configuring BFD Support for OSPF for All Interfaces
7. show ip ospf
DETAILED STEPS
Switch> enable
Step 3 switch ospf process-id Specifies an OSPF process and enters router configuration
mode.
Example:
Step 4 bfd all-interfaces Enables BFD globally on all interfaces associated with the
OSPF routing process.
Example:
Step 5 end Exits interface configuration mode and returns the device
to privileged EXEC mode.
Example:
Switch(config-if)# end
Step 6 show bfd neighbors [details] (Optional) Displays information that can help verify if the
BFD neighbor is active and displays the routing protocols
Example:
that BFD has registered.
Switch# show bfd neighbors detail
Step 7 show ip ospf (Optional) Displays information that can help verify if BFD
for OSPF has been enabled.
Example:
Related Topics
Configuring BFD Support for OSPF, on page 331
Configuring BFD Session Parameters on the Interface, on page 326
Configuring BFD Support for EIGRP, on page 329
Configuring BFD Support for BGP, on page 327
Configuring BFD Support for OSPF for One or More Interfaces, on page 333
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
332
Layer 2
Configuring BFD Support for OSPF for One or More Interfaces
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip ospf bfd [disable]
5. end
6. show bfd neighbors [details]
7. show ip ospf
DETAILED STEPS
Switch> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
333
Layer 2
Configuring BFD Support for Static Routing
Switch(config-if)# end
Step 6 show bfd neighbors [details] (Optional) Displays information that can help verify if the
BFD neighbor is active and displays the routing protocols
Example:
that BFD has registered.
Switch# show bfd neighbors detail
Step 7 show ip ospf (Optional) Displays information that can help verify if BFD
for OSPF has been enabled.
Example:
Related Topics
Configuring BFD Session Parameters on the Interface, on page 326
Monitoring and Troubleshooting BFD, on page 338
Configuring BFD Support for OSPF for All Interfaces, on page 331
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. no switchport
5. ip address ip-address mask
6. bfd interval milliseconds min_rx milliseconds multiplier interval-multiplier
7. exit
8. ip route static bfd interface-type interface-number ip-address [group group-name [passive]]
9. ip route [vrf vrf-name] prefix mask {ip-address | interface-type interface-number [ip-address]} [dhcp]
[distance] [name next-hop-name] [permanent | track number] [tag tag]
10. exit
11. show ip static route
12. show ip static route bfd
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
334
Layer 2
Configuring BFD Support for Static Routing
Switch> enable
Step 3 interface type number Configures an interface and enters interface configuration
mode.
Example:
Step 6 bfd interval milliseconds min_rx milliseconds multiplier Enables BFD on the interface.
interval-multiplier
Example:
Switch(config-if)# exit
Step 8 ip route static bfd interface-type interface-number Specifies a static route BFD neighbor.
ip-address [group group-name [passive]]
• The interface-type, interface-number, and ip-address
Example: arguments are required because BFD support exists
only for directly connected neighbors.
Switch(config)# ip route static bfd serial 2/0
10.1.1.1 group group1 passive
Step 9 ip route [vrf vrf-name] prefix mask {ip-address | Specifies a static route BFD neighbor.
interface-type interface-number [ip-address]} [dhcp]
[distance] [name next-hop-name] [permanent | track
number] [tag tag]
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
335
Layer 2
Configuring BFD Echo Mode
Switch(config)# exit
Step 11 show ip static route (Optional) Displays static route database information.
Example:
Step 12 show ip static route bfd (Optional) Displays information about the static BFD
configuration from the configured BFD groups and
Example:
non-group entries.
Switch# show ip static route bfd
Prerequisites
BFD must be running on all participating switches.
Before using BFD echo mode, you must disable the sending of Internet Control Message Protocol (ICMP)
redirect messages by entering the no ip redirects command, in order to avoid high CPU utilization.
The baseline parameters for BFD sessions on the interfaces over which you want to run BFD sessions to BFD
neighbors must be configured. See the Configuring BFD Session Parameters on the Interface section for more
information.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
336
Layer 2
Restrictions
Restrictions
BFD echo mode, which is supported in BFD Version 1.
Note BFD echo mode does not work in conjunction with Unicast Reverse Path Forwarding (uRPF) configuration.
If BFD echo mode and uRPF configurations are enabled, then the sessions will flap.
SUMMARY STEPS
1. enable
2. configure terminal
3. bfd slow-timer milliseconds
DETAILED STEPS
Switch> enable
SUMMARY STEPS
1. enable
2. configure terminal
3. no bfd echo
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
337
Layer 2
Monitoring and Troubleshooting BFD
4. end
DETAILED STEPS
Switch> enable
Switch(config)# end
SUMMARY STEPS
1. enable
2. show bfd neighbors [details]
3. debug bfd [packet | event]
DETAILED STEPS
Switch> enable
Step 2 show bfd neighbors [details] (Optional) Displays the BFD adjacency database.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
338
Layer 2
Configuration Examples for Bidirectional Forwarding Detection
Step 3 debug bfd [packet | event] (Optional) Displays debugging information about BFD
packets.
Example:
Related Topics
Configuring BFD Session Parameters on the Interface, on page 326
Configuring BFD Support for EIGRP, on page 329
Configuring BFD Support for BGP, on page 327
BFD Operation, on page 322
Configuring BFD Support for OSPF, on page 331
Configuring BFD Support for OSPF for One or More Interfaces, on page 333
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
339
Layer 2
Example: Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default
The example, starting in global configuration mode, shows the configuration of BFD.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
340
Layer 2
Example: Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default
!
interface Fast Ethernet0/0
no shutdown
ip address 10.4.9.34 255.255.255.0
duplex auto
speed auto
!
interface Fast Ethernet1/0
ip address 172.16.1.2 255.255.255.0
bfd interval 50 min_rx 50 multiplier 3
no shtdown
duplex auto
speed auto
!
router eigrp 11
network 172.16.0.0
bfd all-interfaces
auto-summary
!
ip default-gateway 10.4.9.1
ip default-network 0.0.0.0
ip route 0.0.0.0 0.0.0.0 10.4.9.1
ip route 172.16.1.129 255.255.255.255 10.4.9.1
!
no ip http server
!
logging alarm informational
!
control-plane
!
line con 0
exec-timeout 30 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
!
!
end
!
!
interface Fast Ethernet0/0
no shutdown
ip address 10.4.9.34 255.255.255.0
duplex auto
speed auto
!
interface Fast Ethernet1/0
ip address 172.16.1.2 255.255.255.0
bfd interval 50 min_rx 50 multiplier 3
no shutdown
duplex auto
speed auto
!
router eigrp 11
network 172.16.0.0
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
341
Layer 2
Example: Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default
bfd all-interfaces
auto-summary
!
ip default-gateway 10.4.9.1
ip default-network 0.0.0.0
ip route 0.0.0.0 0.0.0.0 10.4.9.1
ip route 172.16.1.129 255.255.255.255 10.4.9.1
!
no ip http server
!
logging alarm informational
!
control-plane
!
line con 0
exec-timeout 30 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
!
!
end
The output from the show bfd neighbors details command from DeviceA verifies that BFD sessions are
created among all three devices and that EIGRP is registered for BFD support. The first group of output shows
that DeviceC with the IP address 172.16.1.3 runs BFD Version 0 and therefore does not use the echo mode.
The second group of output shows that DeviceB with the IP address 172.16.1.2 runs BFD Version 1, and the
50 millisecond BFD interval parameter had been adopted. The relevant command output is shown in bold in
the output.
OurAddr
NeighAddr
LD/RD RH/RS Holdown(mult) State Int
172.16.1.1 172.16.1.3
5/3 1(RH) 150 (3 ) Up Fa1/0
Session state is UP and not using echo function.
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 50000, MinRxInt: 50000, Multiplier: 3
Received MinRxInt: 50000, Received Multiplier: 3
Holdown (hits): 150(0), Hello (hits): 50(1364284)
Rx Count: 1351813, Rx Interval (ms) min/max/avg: 28/64/49 last: 4 ms ago
Tx Count: 1364289, Tx Interval (ms) min/max/avg: 40/68/49 last: 32 ms ago
Registered protocols: EIGRP
Uptime: 18:42:45
Last packet: Version: 0
- Diagnostic: 0
I Hear You bit: 1 - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 3 - Your Discr.: 5
Min tx interval: 50000 - Min rx interval: 50000
Min Echo interval: 0
OurAddr NeighAddr
LD/RD RH/RS Holdown(mult) State Int
172.16.1.1 172.16.1.2
6/1 Up 0 (3 ) Up Fa1/0
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
342
Layer 2
Example: Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default
- Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 1 - Your Discr.: 6
Min tx interval: 1000000 - Min rx interval: 1000000
Min Echo interval: 50000
The output from the show bfd neighbors details command on Device B verifies that BFD sessions have been
created and that EIGRP is registered for BFD support. As previously noted, DeviceA runs BFD Version 1,
therefore echo mode is running, and DeviceC runs BFD Version 0, so echo mode does not run. The relevant
command output is shown in bold in the output.
OurAddr NeighAddr
LD/RD RH/RS Holdown(mult) State Int
172.16.1.2 172.16.1.1
1/6 Up 0 (3 ) Up Fa1/0
Session state is UP and using echo function with 50 ms interval.
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 1000000, MinRxInt: 1000000, Multiplier: 3
Received MinRxInt: 1000000, Received Multiplier: 3
Holdown (hits): 3000(0), Hello (hits): 1000(337)
Rx Count: 341, Rx Interval (ms) min/max/avg: 1/1008/882 last: 364 ms ago
Tx Count: 339, Tx Interval (ms) min/max/avg: 1/1016/886 last: 632 ms ago
Registered protocols: EIGRP
Uptime: 00:05:00
Last packet: Version: 1
- Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 6 - Your Discr.: 1
Min tx interval: 1000000 - Min rx interval: 1000000
Min Echo interval: 50000
OurAddr NeighAddr
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
343
Layer 2
Example: Configuring BFD in an EIGRP Network with Echo Mode Enabled by Default
- Diagnostic: 0
I Hear You bit: 1 - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 6 - Your Discr.: 3
Min tx interval: 50000 - Min rx interval: 50000
Min Echo interval: 0
The figure below shows that Fast Ethernet interface 1/0 on DeviceB has failed. When Fast Ethernet interface
1/0 on DeviceB is shut down, the BFD statistics of the corresponding BFD sessions on DeviceA and DeviceB
are reduced.
When Fast Ethernet interface 1/0 on DeviceB fails, BFD will no longer detect Device B as a BFD neighbor
for DeviceA or for DeviceC. In this example, Fast Ethernet interface 1/0 has been administratively shut down
on DeviceB.
The following output from the show bfd neighbors command on DeviceA now shows only one BFD neighbor
for DeviceA in the EIGRP network. The relevant command output is shown in bold in the output.
The following output from the show bfd neighbors command on DeviceC also now shows only one BFD
neighbor for DeviceC in the EIGRP network. The relevant command output is shown in bold in the output.
OurAddr NeighAddr
Related Topics
BFD Version Interoperability, on page 324
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
344
Layer 2
Example: Configuring BFD in an OSPF Network
!
interface Fast Ethernet 0/1
ip address 172.16.10.1 255.255.255.0
bfd interval 50 min_rx 50 multiplier 3
!
interface Fast Ethernet 3/0.1
ip address 172.17.0.1 255.255.255.0
!
router ospf 123
log-adjacency-changes detail
network 172.16.0.0 0.0.0.255 area 0
network 172.17.0.0 0.0.0.255 area 0
bfd all-interfaces
!
interface Fast Ethernet 6/0
ip address 172.16.10.2 255.255.255.0
bfd interval 50 min_rx 50 multiplier 3
!
interface Fast Ethernet 6/1
ip address 172.18.0.1 255.255.255.0
!
router ospf 123
log-adjacency-changes detail
network 172.16.0.0 0.0.255.255 area 0
network 172.18.0.0 0.0.255.255 area 0
bfd all-interfaces
The output from the show bfd neighbors details command verifies that a BFD session has been created and
that OSPF is registered for BFD support.
Device A
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
345
Layer 2
Example: Configuring BFD in an OSPF Network
Uptime: 02:18:49
Last packet: Version: 0
- Diagnostic: 0
I Hear You bit: 1 - Demand bit: 0
Poll bit: 0 - Final bit: 0
Multiplier: 3 - Length: 24
My Discr.: 2 - Your Discr.: 1
Min tx interval: 50000 - Min rx interval: 1000
Min Echo interval: 0
The output from the show bfd neighbors details command from Device B verifies that a BFD session has
been created:
Device B
DeviceB# attach 6
Entering Console for 8 Port Fast Ethernet in Slot: 6
Type "exit" to end this session
Press RETURN to get started!
The output from the show ip ospf command verifies that BFD has been enabled for OSPF.
Device A
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
346
Layer 2
Example: Configuring BFD in an OSPF Network
Area BACKBONE(0)
Number of interfaces in this area is 2 (1 loopback)
Area has no authentication
SPF algorithm last executed 00:00:08.828 ago
SPF algorithm executed 9 times
Area ranges are
Number of LSA 3. Checksum Sum 0x028417
Number of opaque link LSA 0. Checksum Sum 0x000000
Number of DCbitless LSA 0
Number of indication LSA 0
Number of DoNotAge LSA 0
Flood list length 0
Device B
Area BACKBONE(0)
Number of interfaces in this area is 2 (1 loopback)
Area has no authentication
SPF algorithm last executed 02:07:30.932 ago
SPF algorithm executed 7 times
Area ranges are
Number of LSA 3. Checksum Sum 0x28417
Number of opaque link LSA 0. Checksum Sum 0x0
Number of DCbitless LSA 0
Number of indication LSA 0
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
347
Layer 2
Example: Configuring BFD Support for Static Routing
The output from the show ip ospf interface command verifies that BFD has been enabled for OSPF on the
interfaces connecting Device A and Device B.
Device A
Device B
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
348
Layer 2
Example: Configuring BFD Support for Static Routing
Device A
configure terminal
interface Serial 2/0
ip address 10.201.201.1 255.255.255.0
bfd interval 500 min_rx 500 multiplier 5
ip route static bfd Serial 2/0 10.201.201.2
ip route 10.0.0.0 255.0.0.0 Serial 2/0 10.201.201.2
Device B
configure terminal
interface Serial 2/0
ip address 10.201.201.2 255.255.255.0
bfd interval 500 min_rx 500 multiplier 5
ip route static bfd Serial 2/0 10.201.201.1
ip route 10.1.1.1 255.255.255.255 Serial 2/0 10.201.201.1
Note that the static route on Device B exists solely to enable the BFD session between 10.201.201.1 and
10.201.201.2. If there is no useful static route that needs to be configured, select a prefix that will not affect
packet forwarding, for example, the address of a locally configured loopback interface.
In the following example, there is an active static BFD configuration to reach 209.165.200.225 through
Ethernet interface 0/0 in the BFD group testgroup. As soon as the static route is configured that is tracked by
the configured static BFD, a single hop BFD session is initiated to 209.165.200.225 through Ethernet interface
0/0. The prefix 10.0.0.0/8 is added to the RIB if a BFD session is successfully established.
configure terminal
ip route static bfd Ethernet 0/0 209.165.200.225 group testgroup
ip route 10.0.0.0 255.255.255.224 Ethernet 0/0 209.165.200.225
In the following example, a BFD session to 209.165.200.226 through Ethernet interface 0/0.1001 is marked
to use the group testgroup. That is, this configuration is a passive static BFD. Though there are static routes
to be tracked by the second static BFD configuration, a BFD session is not triggered for 209.165.200.226
through Ethernet interface 0/0.1001. The existence of the prefixes 10.1.1.1/8 and 10.2.2.2/8 is controlled by
the active static BFD session (Ethernet interface 0/0 209.165.200.225).
configure terminal
ip route static bfd Ethernet 0/0 209.165.200.225 group testgroup
ip route 10.0.0.0 255.255.255.224 Ethernet 0/0 209.165.200.225
ip route static bfd Ethernet 0/0.1001 209.165.200.226 group testgroup passive
ip route 10.1.1.1 255.255.255.224 Ethernet 0/0.1001 209.165.200.226
ip route 10.2.2.2 255.255.255.224 Ethernet 0/0.1001 209.165.200.226
Related Topics
BFD Support for Static Routing, on page 325
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
349
Layer 2
Example: Configuring BFD Support for Static Routing
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
350
CHAPTER 18
Configuring EtherChannels
• Finding Feature Information, on page 351
• Restrictions for EtherChannels, on page 351
• Information About EtherChannels, on page 352
• How to Configure EtherChannels, on page 363
• Monitoring EtherChannel, PAgP, and LACP Status, on page 377
• Configuration Examples for Configuring EtherChannels, on page 378
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
351
Layer 2
Information About EtherChannels
The EtherChannel provides full-duplex bandwidth up to 8 Gb/s (Gigabit EtherChannel) or 80 Gb/s (10-Gigabit
EtherChannel) between your switch and another switch or host.
Each EtherChannel can consist of up to eight compatibly configured Ethernet ports.
The LAN Lite feature set supports up to six EtherChannels. The LAN Base feature set supports up to 24
EtherChannels.
EtherChannel Modes
You can configure an EtherChannel in one of these modes: Port Aggregation Protocol (PAgP), Link Aggregation
Control Protocol (LACP), or On. Configure both ends of the EtherChannel in the same mode:
• When you configure one end of an EtherChannel in either PAgP or LACP mode, the system negotiates
with the other end of the channel to determine which ports should become active. If the remote port
cannot negotiate an EtherChannel, the local port is put into an independent state and continues to carry
data traffic as would any other single link. The port configuration does not change, but the port does not
participate in the EtherChannel.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
352
Layer 2
EtherChannel on Switches
• When you configure an EtherChannel in the on mode, no negotiations take place. The switch forces all
compatible ports to become active in the EtherChannel. The other end of the channel (on the other switch)
must also be configured in the on mode; otherwise, packet loss can occur.
EtherChannel on Switches
You can create an EtherChannel on a switch, on a single switch in the stack, or on multiple switches in the
stack (known as cross-stack EtherChannel).
Figure 35: Single-Switch EtherChannel
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
353
Layer 2
Channel Groups and Port-Channel Interfaces
switch, the EtherChannel, and the failed link. Inbound broadcast and multicast packets on one link in an
EtherChannel are blocked from returning on any other link of the EtherChannel.
The channel-group command binds the physical port and the port-channel interface together. Each
EtherChannel has a port-channel logical interface numbered from 1 to 24. This port-channel interface number
corresponds to the one specified with the channel-group interface configuration command.
• With Layer 2 ports, use the channel-group interface configuration command to dynamically create the
port-channel interface.
You also can use the interface port-channel port-channel-number global configuration command to
manually create the port-channel interface, but then you must use the channel-group
channel-group-number command to bind the logical interface to a physical port. The
channel-group-number can be the same as the port-channel-number, or you can use a new number. If
you use a new number, the channel-group command dynamically creates a new port channel.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
354
Layer 2
PAgP Modes
PAgP Modes
PAgP modes specify whether a port can send PAgP packets, which start PAgP negotiations, or only respond
to PAgP packets received.
Mode Description
auto Places a port into a passive negotiating state, in which the port responds to PAgP packets
it receives but does not start PAgP packet negotiation. This setting minimizes the
transmission of PAgP packets.
This mode is not supported when the EtherChannel members are from different switches
in the switch stack (cross-stack EtherChannel).
desirable Places a port into an active negotiating state, in which the port starts negotiations with other
ports by sending PAgP packets. This mode is not supported when the EtherChannel members
are from different switches in the switch stack (cross-stack EtherChannel).
Switch ports exchange PAgP packets only with partner ports configured in the auto or desirable modes. Ports
configured in the on mode do not exchange PAgP packets.
Both the auto and desirable modes enable ports to negotiate with partner ports to form an EtherChannel based
on criteria such as port speed. and for Layer 2 EtherChannels, based on trunk state and VLAN numbers.
Ports can form an EtherChannel when they are in different PAgP modes as long as the modes are compatible.
For example:
• A port in the desirable mode can form an EtherChannel with another port that is in the desirable or auto
mode.
• A port in the auto mode can form an EtherChannel with another port in the desirable mode.
A port in the auto mode cannot form an EtherChannel with another port that is also in the auto mode because
neither port starts PAgP negotiation.
Silent Mode
If your switch is connected to a partner that is PAgP-capable, you can configure the switch port for nonsilent
operation by using the non-silent keyword. If you do not specify non-silent with the auto or desirable mode,
silent mode is assumed.
Use the silent mode when the switch is connected to a device that is not PAgP-capable and seldom, if ever,
sends packets. An example of a silent partner is a file server or a packet analyzer that is not generating traffic.
In this case, running PAgP on a physical port connected to a silent partner prevents that switch port from ever
becoming operational. However, the silent setting allows PAgP to operate, to attach the port to a channel
group, and to use the port for transmission.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
355
Layer 2
PAgP Interaction with Virtual Switches and Dual-Active Detection
When a device and its partner are both aggregate-port learners, they learn the address on the logical port-channel.
The device sends packets to the source by using any of the ports in the EtherChannel. With aggregate-port
learning, it is not important on which physical port the packet arrives.
PAgP cannot automatically detect when the partner device is a physical learner and when the local device is
an aggregate-port learner. Therefore, you must manually set the learning method on the local device to learn
addresses by physical ports. You also must set the load-distribution method to source-based distribution, so
that any given source MAC address is always sent on the same physical port.
You also can configure a single port within the group for all transmissions and use other ports for hot-standby.
The unused ports in the group can be swapped into operation in just a few seconds if the selected single port
loses hardware-signal detection. You can configure which port is always selected for packet transmission by
changing its priority with the pagp port-priority interface configuration command. The higher the priority,
the more likely that the port will be selected.
Note The switch supports address learning only on aggregate ports even though the physical-port keyword is
provided in the CLI. The pagp learn-method command and the pagp port-priority command have no effect
on the switch hardware, but they are required for PAgP interoperability with devices that only support address
learning by physical ports, such as the Catalyst 1900 switch.
When the link partner of the switch is a physical learner, we recommend that you configure the switch as a
physical-port learner by using the pagp learn-method physical-port interface configuration command. Set
the load-distribution method based on the source MAC address by using the port-channel load-balance
src-mac global configuration command. The switch then sends packets to the physcial learner using the same
port in the EtherChannel from which it learned the source address. Only use the pagp learn-method command
in this situation.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
356
Layer 2
Link Aggregation Control Protocol
PAgP sends and receives PAgP PDUs only from ports that are up and have PAgP enabled for the auto or
desirable mode.
LACP Modes
LACP modes specify whether a port can send LACP packets or only receive LACP packets.
Mode Description
active Places a port into an active negotiating state in which the port starts negotiations with
other ports by sending LACP packets.
passive Places a port into a passive negotiating state in which the port responds to LACP packets
that it receives, but does not start LACP packet negotiation. This setting minimizes the
transmission of LACP packets.
Both the active and passive LACP modes enable ports to negotiate with partner ports to an EtherChannel
based on criteria such as port speed, and for Layer 2 EtherChannels, based on trunk state and VLAN numbers.
Ports can form an EtherChannel when they are in different LACP modes as long as the modes are compatible.
For example:
• A port in the active mode can form an EtherChannel with another port that is in the active or passive
mode.
• A port in the passive mode cannot form an EtherChannel with another port that is also in the passive
mode because neither port starts LACP negotiation.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
357
Layer 2
EtherChannel On Mode
EtherChannel On Mode
EtherChannel on mode can be used to manually configure an EtherChannel. The on mode forces a port to
join an EtherChannel without negotiations. The on mode can be useful if the remote device does not support
PAgP or LACP. In the on mode, a usable EtherChannel exists only when the switches at both ends of the link
are configured in the on mode.
Ports that are configured in the on mode in the same channel group must have compatible port characteristics,
such as speed and duplex. Ports that are not compatible are suspended, even though they are configured in
the on mode.
Caution You should use care when using the on mode. This is a manual configuration, and ports on both ends of the
EtherChannel must have the same configuration. If the group is misconfigured, packet loss or spanning-tree
loops can occur.
IP Address Forwarding
With source-IP address-based forwarding, packets are distributed across the ports in the EtherChannel based
on the source-IP address of the incoming packet. To provide load balancing, packets from different IP addresses
use different ports in the channel, and packets from the same IP address use the same port in the channel.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
358
Layer 2
Load-Balancing Advantages
With destination-IP address-based forwarding, packets are distributed across the ports in the EtherChannel
based on the destination-IP address of the incoming packet. To provide load balancing, packets from the same
IP source address sent to different IP destination addresses could be sent on different ports in the channel.
Packets sent from different source IP addresses to the same destination IP address are always sent on the same
port in the channel.
With source-and-destination IP address-based forwarding, packets are distributed across the ports in the
EtherChannel based on both the source and destination IP addresses of the incoming packet. This forwarding
method, a combination of source-IP and destination-IP address-based forwarding, can be used if it is not clear
whether source-IP or destination-IP address-based forwarding is better suited on a particular switch. In this
method, packets sent from the IP address A to IP address B, from IP address A to IP address C, and from IP
address C to IP address B could all use different ports in the channel.
Load-Balancing Advantages
Different load-balancing methods have different advantages, and the choice of a particular load-balancing
method should be based on the position of the switch in the network and the kind of traffic that needs to be
load-distributed.
Figure 38: Load Distribution and Forwarding Methods
In the following figure, an EtherChannel of four workstations communicates with a router. Because the router
is a single MAC-address device, source-based forwarding on the switch EtherChannel ensures that the switch
uses all available bandwidth to the router. The router is configured for destination-based forwarding because
the large number of workstations ensures that the traffic is evenly distributed from the router EtherChannel.
Use the option that provides the greatest variety in your configuration. For example, if the traffic on a channel
is going only to a single MAC address, using the destination-MAC address always chooses the same link in
the channel. Using source addresses or IP addresses might result in better load-balancing.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
359
Layer 2
EtherChannel Load Deferral Overview
Note When you try to enable this feature on a stack member switch, the following message is displayed:
Load share deferral is supported only on stand-alone stack.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
360
Layer 2
EtherChannel Configuration Guidelines
LACP system ID LACP system priority and the switch or stack MAC address.
Load-balancing Load distribution on the switch is based on the source-MAC address of the
incoming packet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
361
Layer 2
Layer 2 EtherChannel Configuration Guidelines
• Do not configure an EtherChannel in both the PAgP and LACP modes. EtherChannel groups running
PAgP and LACP can coexist on the same switch or on different switches in the stack. Individual
EtherChannel groups can run either PAgP or LACP, but they cannot interoperate.
• Do not configure a secure port as part of an EtherChannel or the reverse.
• Do not configure a port that is an active or a not-yet-active member of an EtherChannel as an IEEE 802.1x
port. If you try to enable IEEE 802.1x on an EtherChannel port, an error message appears, and IEEE
802.1x is not enabled.
• If EtherChannels are configured on switch interfaces, remove the EtherChannel configuration from the
interfaces before globally enabling IEEE 802.1x on a switch by using the dot1x system-auth-control
global configuration command.
• For cross-stack EtherChannel configurations, ensure that all ports targeted for the EtherChannel are either
configured for LACP or are manually configured to be in the channel group using the channel-group
channel-group-number mode on interface configuration command. The PAgP protocol is not supported
on cross- stack EtherChannels.
Auto-LAG
The auto-LAG feature provides the ability to auto create EtherChannels on ports connected to a switch. By
default, auto-LAG is disabled globally and is enabled on all port interfaces. The auto-LAG applies to a switch
only when it is enabled globally.
On enabling auto-LAG globally, the following scenarios are possible:
• All port interfaces participate in creation of auto EtherChannels provided the partner port interfaces have
EtherChannel configured on them. For more information, see the "The supported auto-LAG configurations
between the actor and partner devices" table below.
• Ports that are already part of manual EtherChannels cannot participate in creation of auto EtherChannels.
• When auto-LAG is disabled on a port interface that is already a part of an auto created EtherChannel,
the port interface will unbundle from the auto EtherChannel.
The following table shows the supported auto-LAG configurations between the actor and partner devices:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
362
Layer 2
Auto-LAG Configuration Guidelines
Table 37: The supported auto-LAG configurations between the actor and partner devices
On disabling auto-LAG globally, all auto created Etherchannels become manual EtherChannels.
You cannot add any configurations in an existing auto created EtherChannel. To add, you should first convert
it into a manual EtherChannel by executing the port-channel<channel-number>persistent.
Note Auto-LAG uses the LACP protocol to create auto EtherChannel. Only one EtherChannel can be automatically
created with the unique partner devices.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
363
Layer 2
Configuring Layer 2 EtherChannels
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport mode {access | trunk}
4. switchport access vlan vlan-id
5. channel-group channel-group-number mode {auto [non-silent] | desirable [non-silent ] | on } | { active
| passive}
6. end
DETAILED STEPS
Step 2 interface interface-id Specifies a physical port, and enters interface configuration
mode.
Example:
Valid interfaces are physical ports.
SwitchDevice(config)# interface
gigabitethernet2/0/1 For a PAgP EtherChannel, you can configure up to eight
ports of the same type and speed for the same group.
For a LACP EtherChannel, you can configure up to 16
Ethernet ports of the same type. Up to eight ports can be
active, and up to eight ports can be in standby mode.
Step 3 switchport mode {access | trunk} Assigns all ports as static-access ports in the same VLAN,
or configure them as trunks.
Example:
If you configure the port as a static-access port, assign it to
SwitchDevice(config-if)# switchport mode access only one VLAN. The range is 1 to 4094.
Step 4 switchport access vlan vlan-id (Optional) If you configure the port as a static-access port,
assign it to only one VLAN. The range is 1 to 4094.
Example:
Step 5 channel-group channel-group-number mode {auto Assigns the port to a channel group, and specifies the PAgP
[non-silent] | desirable [non-silent ] | on } | { active | or the LACP mode.
passive}
For channel-group-number, the range is 1 to 24.
Example:
For mode, select one of these keywords:
SwitchDevice(config-if)# channel-group 5 mode auto • auto —Enables PAgP only if a PAgP device is detected.
It places the port into a passive negotiating state, in
which the port responds to PAgP packets it receives
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
364
Layer 2
Configuring EtherChannel Load-Balancing
SwitchDevice(config-if)# end
SUMMARY STEPS
1. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
365
Layer 2
Configuring Port Channel Load Deferral
DETAILED STEPS
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
366
Layer 2
Configuring Port Channel Load Deferral
DETAILED STEPS
Step 3 port-channel load-defer seconds Configures the port load share deferral interval for all port
channels.
Example:
Switch(config)# port-channel load-defer 60 • seconds—The time interval during which load sharing
is initially 0 for deferred port channels. The range is
1 to 1800 seconds; the default is 120 seconds
Step 4 interface type number Configures a port channel interface and enters interface
configuration mode.
Example:
Switch(config)# interface port-channel 10
Step 5 port-channel load-defer Enables port load share deferral on the port channel.
Example:
Switch(config-if)# port-channel load-defer
Example
The following is sample output from the show etherchannel channel-group port-channel command.
If the channel-group argument is not specified; the command displays information about all channel
groups are displayed.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
367
Layer 2
Configuring the PAgP Learn Method and Priority
Port-channel: Po1
------------
The following is sample output from the show platform pm group-masks command. Deferred ports
have the group mask of 0xFFFF, when the defer timer is running.
Switch# show platform pm group-masks
====================================================================
Etherchannel members and group masks table
Group #ports group frame-dist slot port mask interface index
--------------------------------------------------------------------
1 0 1 src-mac
2 0 2 src-mac
3 0 3 src-mac
4 0 4 src-mac
5 0 5 src-mac
6 0 6 src-mac
7 0 7 src-mac
8 0 8 src-mac
9 0 9 src-mac
10 3 10 src-mac
1 12 0000 Gi1/0/12 3
1 10 FFFF Gi1/0/10 6
1 11 FFFF Gi1/0/11 7
11 0 11 src-mac
12 0 12 src-mac
13 0 13 src-mac
14 0 14 src-mac
15 0 15 src-mac
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. pagp learn-method physical-port
4. pagp port-priority priority
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
368
Layer 2
Configuring LACP Hot-Standby Ports
DETAILED STEPS
Step 2 interface interface-id Specifies the port for transmission, and enters interface
configuration mode.
Example:
Step 4 pagp port-priority priority Assigns a priority so that the selected port is chosen for
packet transmission.
Example:
For priority, the range is 0 to 255. The default is 128. The
SwitchDevice(config-if)# pagp port-priority 200 higher the priority, the more likely that the port will be used
for PAgP transmission.
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
369
Layer 2
Configuring the LACP System Priority
If you configure more than eight links for an EtherChannel group, the software automatically decides which
of the hot-standby ports to make active based on the LACP priority. To every link between systems that
operate LACP, the software assigns a unique priority made up of these elements (in priority order):
• LACP system priority
• System ID (the switch MAC address)
• LACP port priority
• Port number
In priority comparisons, numerically lower values have higher priority. The priority decides which ports
should be put in standby mode when there is a hardware limitation that prevents all compatible ports from
aggregating.
Determining which ports are active and which are hot standby is a two-step procedure. First the system with
a numerically lower system priority and system ID is placed in charge of the decision. Next, that system
decides which ports are active and which are hot standby, based on its values for port priority and port number.
The port priority and port number values for the other system are not used.
You can change the default values of the LACP system priority and the LACP port priority to affect how the
software selects active and standby links.
SUMMARY STEPS
1. enable
2. configure terminal
3. lacp system-priority priority
4. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
370
Layer 2
Configuring the LACP Port Priority
SwitchDevice(config)# end
Note If LACP is not able to aggregate all the ports that are compatible (for example, the remote system might have
more restrictive hardware limitations), all the ports that cannot be actively included in the EtherChannel are
put in the hot-standby state and are used only if one of the channeled ports fails.
Follow these steps to configure the LACP port priority. This procedure is optional.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. lacp port-priority priority
5. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
371
Layer 2
Configuring the LACP Port Channel Min-Links Feature
Step 3 interface interface-id Specifies the port to be configured, and enters interface
configuration mode.
Example:
SwitchDevice(config-if)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface port-channel channel-number
4. port-channel min-links min-links-number
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
372
Layer 2
Configuring LACP Fast Rate Timer
DETAILED STEPS
SwitchDevice> enable
Step 3 interface port-channel channel-number Enters interface configuration mode for a port-channel.
Example: For channel-number, the range is 1 to 63.
Step 4 port-channel min-links min-links-number Specifies the minimum number of member ports that must
be in the link-up state and bundled in the EtherChannel for
Example:
the port channel interface to transition to the link-up state.
SwitchDevice(config-if)# port-channel min-links 3 For min-links-number , the range is 2 to 8.
SwitchDevice(config)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. interface {fastethernet | gigabitethernet | tengigabitethernet} slot/port
4. lacp rate {normal | fast}
5. end
6. show lacp internal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
373
Layer 2
Configuring Auto-LAG Globally
DETAILED STEPS
SwitchDevice> enable
Step 3 interface {fastethernet | gigabitethernet | Configures an interface and enters interface configuration
tengigabitethernet} slot/port mode.
Example:
Step 4 lacp rate {normal | fast} Configures the rate at which LACP control packets are
received by an LACP-supported interface.
Example:
• To reset the timeout rate to its default, use the no lacp
SwitchDevice(config-if)# lacp rate fast rate command.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
374
Layer 2
Configuring Auto-LAG on a Port Interface
DETAILED STEPS
SwitchDevice> enable
Step 3 [no] port-channel auto Enables the auto-LAG feature on a switch globally. Use the
no form of this command to disable the auto-LAG feature
Example:
on the switch globally.
SwitchDevice(config)# port-channel auto
Note By default, the auto-LAG feature is enabled on
the port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
375
Layer 2
Configuring Persistence with Auto-LAG
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the port interface to be enabled for auto-LAG,
and enters interface configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/0/1
Step 4 [no] channel-group auto (Optional) Enables auto-LAG feature on individual port
interface. Use the no form of this command to disable the
Example:
auto-LAG feature on individual port interface.
SwitchDevice(config-if)# channel-group auto
Note By default, the auto-LAG feature is enabled on
the port.
What to do next
SUMMARY STEPS
1. enable
2. port-channel channel-number persistent
3. show etherchannel summary
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
376
Layer 2
Monitoring EtherChannel, PAgP, and LACP Status
DETAILED STEPS
SwitchDevice> enable
Step 2 port-channel channel-number persistent Converts the auto created EtherChannel into a manual one
and allows you to add configuration on the EtherChannel.
Example:
SwitchDevice# port-channel 1 persistent
Table 38: Commands for Monitoring EtherChannel, PAgP, and LACP Status
Command Description
clear lacp { channel-group-number counters Clears LACP channel-group information and traffic
| counters } counters.
clear pagp { channel-group-number counters Clears PAgP channel-group information and traffic
| counters } counters.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
377
Layer 2
Configuration Examples for Configuring EtherChannels
Command Description
show etherchannel load-balance Displays the load balance or frame distribution scheme
among ports in the port channel.
This example shows how to configure an EtherChannel on a single switch in the stack. It assigns two ports
as static-access ports in VLAN 10 to channel 5 with the LACP mode active:
This example shows how to configure a cross-stack EtherChannel. It uses LACP passive mode and assigns
two ports on stack member 1 and one port on stack member 2 as static-access ports in VLAN 10 to channel
5:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
378
Layer 2
Example: Configuring Port Channel Load Deferral
The following example shows the summary of EtherChannel that was created automatically.
switch# show etherchannel auto
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
R - Layer3 S - Layer2
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
d - default port
A - formed by Auto LAG
The following example shows the summary of auto EtherChannel after executing the port-channel 1 persistent
command.
switch# port-channel 1 persistent
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
379
Layer 2
Configuring LACP Port Channel Min-Links: Examples
When the minimum links requirement is not met in standalone switches, the port-channel is flagged and
assigned SM/SN or RM/RN state.
switch# show etherchannel 25 summary
The following is sample output from the show lacp internal command:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
380
Layer 2
Example: Configuring LACP Fast Rate Timer
The following is sample output from the show lacp counters command:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
381
Layer 2
Example: Configuring LACP Fast Rate Timer
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
382
CHAPTER 19
Configuring Link-State Tracking
• Finding Feature Information, on page 383
• Restrictions for Configuring Link-State Tracking, on page 383
• Understanding Link-State Tracking, on page 384
• How to Configure Link-State Tracking , on page 386
• Monitoring Link-State Tracking, on page 387
• Configuring Link-State Tracking: Example, on page 387
Related Topics
Understanding Link-State Tracking, on page 384
How to Configure Link-State Tracking , on page 386
Monitoring Link-State Tracking Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
383
Layer 2
Understanding Link-State Tracking
Note An interface can be an aggregation of ports (an EtherChannel) or a single physical port in either access or
trunk mode .
The configuration in this figure ensures that the network traffic flow is balanced.
Figure 39: Typical Link-State Tracking Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
384
Layer 2
Understanding Link-State Tracking
• Switch A provides primary links to server 1 and server 2 through link-state group 1. Port 1 is
connected to server 1, and port 2 is connected to server 2. Port 1 and port 2 are the downstream
interfaces in link-state group 1.
• Port 5 and port 6 are connected to distribution switch 1 through link-state group 1. Port 5 and port
6 are the upstream interfaces in link-state group 1.
In a link-state group, the upstream ports can become unavailable or lose connectivity because the distribution
switch or router fails, the cables are disconnected, or the link is lost. These are the interactions between the
downstream and upstream interfaces when link-state tracking is enabled:
• If any of the upstream interfaces are in the link-up state, the downstream interfaces can change to or
remain in the link-up state.
• If all of the upstream interfaces become unavailable, link-state tracking automatically puts the downstream
interfaces in the error-disabled state. Connectivity to and from the servers is automatically changed from
the primary server interface to the secondary server interface. For example, in the previous figure, if the
upstream link for port 6 is lost, the link states of downstream ports 1 and 2 do not change. However, if
the link for upstream port 5 is also lost, the link state of the downstream ports changes to the link-down
state. Connectivity to server 1 and server 2 is then changed from link-state group1 to link-state group 2.
The downstream ports 3 and 4 do not change state because they are in link-group 2.
• If the link-state group is configured, link-state tracking is disabled, and the upstream interfaces lose
connectivity, the link states of the downstream interfaces remain unchanged. The server does not recognize
that upstream connectivity has been lost and does not failover to the secondary interface.
You can recover a downstream interface link-down condition by removing the failed downstream port from
the link-state group. To recover multiple downstream interfaces, disable the link-state group.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
385
Layer 2
How to Configure Link-State Tracking
Related Topics
How to Configure Link-State Tracking , on page 386
Monitoring Link-State Tracking Status
Configuring Link-State Tracking: Example, on page 387
Restrictions for Configuring Link-State Tracking, on page 383
SUMMARY STEPS
1. configure terminal
2. link state track number
3. interface interface-id
4. link state group [number]{upstream | downstream}
5. end
DETAILED STEPS
Step 2 link state track number Creates a link-state group and enables link-state tracking.
The group number can be 1 or 2; the default is 1.
Example:
Step 4 link state group [number]{upstream | downstream} Specifies a link-state group and configures the interface as
either an upstream or downstream interface in the group.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
386
Layer 2
Monitoring Link-State Tracking
SwitchDevice(config-if)# end
Related Topics
Understanding Link-State Tracking, on page 384
Configuring Link-State Tracking: Example, on page 387
Restrictions for Configuring Link-State Tracking, on page 383
Command Description
show link state group [number] [detail] Displays the link-state group information.
Related Topics
Understanding Link-State Tracking, on page 384
How to Configure Link-State Tracking , on page 386
Monitoring Link-State Tracking Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
387
Layer 2
Configuring Link-State Tracking: Example
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
388
CHAPTER 20
Configuring Resilient Ethernet Protocol
• Finding Feature Information, on page 389
• REP Overview, on page 389
• How to Configure REP, on page 394
• Monitoring REP, on page 402
• Configuring Examples for Configuring REP, on page 403
REP Overview
Resilient Ethernet Protocol (REP) is a Cisco proprietary protocol that provides an alternative to Spanning
Tree Protocol (STP) to control network loops, handle link failures, and improve convergence time. REP
controls a group of ports connected in a segment, ensures that the segment does not create any bridging loops,
and responds to link failures within the segment. REP provides a basis for constructing more complex networks
and supports VLAN load balancing.
Note REP is supported on Catalyst switches running IP Base, IP Services, or IP Lite licenses. REP is not supported
on the LAN Base license.
REP is supported only on Cisco Catalyst 3560-CX switches.
A REP segment is a chain of ports connected to each other and configured with a segment ID. Each segment
consists of standard (non-edge) segment ports and two user-configured edge ports. A router can have no more
than two ports that belong to the same segment, and each segment port can have only one external neighbor.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
389
Layer 2
REP Overview
A segment can go through a shared medium, but on any link only two ports can belong to the same segment.
REP is supported only on Trunk Ethernet Flow Point (EFP) interfaces.
The figure below shows an example of a segment consisting of six ports spread across four switches. Ports
E1 and E2 are configured as edge ports. When all ports are operational (as in the segment on the left), a single
port is blocked, shown by the diagonal line. When there is a failure in the network, the blocked port returns
to the forwarding state to minimize network disruption.
Figure 40: REP Open Segment
The segment shown in the figure above is an open segment; there is no connectivity between the two edge
ports. The REP segment cannot cause a bridging loop, and you can safely connect the segment edges to any
network. All hosts connected to routers inside the segment have two possible connections to the rest of the
network through the edge ports, but only one connection is accessible at any time. If a failure occurs on any
segment or on any port on a REP segment, REP unblocks all ports to ensure that connectivity is available
through the other gateway.
The segment shown in the figure below is a ring segment with both edge ports located on the same router.
With this configuration, you can create a redundant connection between any two routers in the segment.
Figure 41: REP Ring Segment
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
390
Layer 2
Link Integrity
You can construct almost any type of network based on REP segments. REP also supports VLAN load
balancing, which is controlled by the primary edge port occurring at any port in the segment.
In access ring topologies, the neighboring switch might not support REP as shown in the figure below. In this
case, you can configure the non-REP facing ports (E1 and E2) as edge no-neighbor ports. These ports inherit
all properties of edge ports, and you can configure them the same as any edge port, including configuring
them to send STP or REP topology change notices to the aggregation switch. In this case, the STP topology
change notice (TCN) that is sent is a multiple spanning-tree (MST) STP message.
Figure 42: Edge No-Neighbor Ports
Link Integrity
REP does not use an end-to-end polling function between edge ports to verify link integrity. It implements
local link failure detection. The REP Link Status Layer (LSL) detects its REP-aware neighbor and establishes
connectivity within the segment. All VLANs are blocked on an interface until it detects the neighbor. After
the neighbor is identified, REP determines which neighbor port should become the alternate port and which
ports should forward traffic.
Each port in a segment has a unique port ID. The port ID format is similar to that used by the spanning tree
algorithm: a port number (unique on the bridge), associated to a MAC address (unique in the network). When
a segment port is coming up, its LSL starts sending packets that include the segment ID and the port ID. The
port is declared as operational after it performs a three-way handshake with a neighbor in the same segment.
A segment port does not become operational if:
• No neighbor has the same segment ID.
• More than one neighbor has the same segment ID.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
391
Layer 2
Fast Convergence
Each port creates an adjacency with its immediate neighbor. Once the neighbor adjacencies are created, the
ports negotiate to determine one blocked port for the segment, the alternate port. All other ports become
unblocked. By default, REP packets are sent to a BPDU class MAC address. The packets can also be sent to
the Cisco multicast address, which is used only to send blocked port advertisement (BPA) messages when
there is a failure in the segment. The packets are dropped by devices not running REP.
Fast Convergence
REP runs on a physical link basis and not on a per-VLAN basis. Only one hello message is required for all
VLANs, and it reduces the load on the protocol. We recommend that you create VLANs consistently on all
switches in a given segment and configure the same allowed VLANs on the REP trunk ports. To avoid the
delay introduced by relaying messages in software, REP also allows some packets to be flooded to a regular
multicast address. These messages operate at the hardware flood layer (HFL) and are flooded to the whole
network, not just the REP segment. Switches that do not belong to the segment treat them as data traffic. You
can control flooding of these messages by configuring an administrative VLAN for the whole domain or for
a particular segment.
The estimated convergence recovery time on fiber interfaces is between 50 ms and 200 ms for the local
segment with 200 VLANs configured. Convergence for VLAN load balancing is 300 ms or less.
Note You configure offset numbers on the primary edge port by identifying a port’s downstream position from the
primary (or secondary) edge port. You would never enter an offset value of 1 because that is the offset number
of the primary edge port itself.
The figure below shows neighbor offset numbers for a segment where E1 is the primary edge port and E2 is
the secondary edge port. The red numbers inside the ring are numbers offset from the primary edge port; the
black numbers outside of the ring show the offset numbers from the secondary edge port. Note that you can
identify all ports (except the primary edge port) by either a positive offset number (downstream position from
the primary edge port) or a negative offset number (downstream position from the secondary edge port). If
E2 became the primary edge port, its offset number would then be 1 and E1 would be -1.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
392
Layer 2
VLAN Load Balancing
• By entering the preferred keyword to select the port that you previously configured as the preferred
alternate port with the rep segment segment-id preferred interface configuration command.
When the REP segment is complete, all VLANs are blocked. When you configure VLAN load balancing,you
must also configure triggers in one of two ways:
• Manually trigger VLAN load balancing at any time by entering the rep preempt segment segment-id
privileged EXEC command on the switch that has the primary edge port.
• Configure a preempt delay time by entering the rep preempt delay seconds interface configuration
command. After a link failure and recovery, VLAN load balancing begins after the configured preemption
time period elapses. Note that the delay timer restarts if another port fails before the time has elapsed.
Note When VLAN load balancing is configured, it does not start working until triggered by either manual intervention
or a link failure and recovery.
When VLAN load balancing is triggered, the primary edge port sends out a message to alert all interfaces in
the segment about the preemption. When the secondary port receives the message, it is reflected into the
network to notify the alternate port to block the set of VLANs specified in the message and to notify the
primary edge port to block the remaining VLANs.
You can also configure a particular port in the segment to block all VLANs. Only the primary edge port
initiates VLAN load balancing, which is not possible if the segment is not terminated by an edge port on each
end. The primary edge port determines the local VLAN load balancing configuration.
Reconfigure the primary edge port to reconfigure load balancing. When you change the load balancing
configuration, the primary edge port again waits for the rep preempt segment command or for the configured
preempt delay period after a port failure and recovery before executing the new configuration. If you change
an edge port to a regular segment port, the existing VLAN load balancing status does not change. Configuring
a new edge port might cause a new topology configuration.
Related Topics
Configuring REP Interfaces, on page 397
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
393
Layer 2
Spanning Tree Interaction
REP Ports
REP segments consists of Failed, Open, or Alternate ports.
• A port configured as a regular segment port starts as a failed port.
• After the neighbor adjacencies are determined, the port transitions to alternate port state, blocking all
VLANs on the interface. Blocked port negotiations occur and when the segment settles, one blocked
port remains in the alternate role and all other ports become open ports.
• When a failure occurs in a link, all ports move to the failed state. When the alternate port receives the
failure notification, it changes to the open state, forwarding all VLANs.
A regular segment port converted to an edge port, or an edge port converted to a regular segment port, does
not always result in a topology change. If you convert an edge port into a regular segment port, VLAN load
balancing is not implemented unless it has been configured. For VLAN load balancing, you must configure
two edge ports in the segment.
A segment port that is reconfigured as a spanning tree port restarts according the spanning tree configuration.
By default, this is a designated blocking port. If PortFast is configured or if STP is disabled, the port goes
into the forwarding state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
394
Layer 2
REP Configuration Guidelines
When REP is enabled, the sending of segment topology change notices (STCNs) is disabled, all VLANs are
blocked, and the administrative VLAN is VLAN 1.
When VLAN load balancing is enabled, the default is manual preemption with the delay timer disabled. If
VLAN load balancing is not configured, the default after manual preemption is to block all VLANs at the
primary edge port.
• REP interfaces come up in a blocked state and remain in a blocked state until they are safe to be unblocked.
You need to be aware of this status to avoid sudden connection losses.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
395
Layer 2
Configuring the REP Administrative VLAN
• REP sends all LSL PDUs in untagged frames on the native VLAN. The BPA message sent to the Cisco
multicast address is sent on the administration VLAN, which is VLAN 1 by default.
• You can configure how long a REP interface remains up without receiving a hello from a neighbor. You
can use therep lsl-age-timer value interface configuration command to set the time from 120 ms to
10000 ms. The LSL hello timer is then set to the age-timer value divided by 3. In normal operation, three
LSL hellos are sent before the age timer on the peer switch expires and checks forhello messages.
• EtherChannel port channel interfaces do not support LSL age-timer values less than 1000 ms. If
you try to configure a value less than 1000 ms on a port channel, you receive an error message and
the command is rejected.
To configure the REP administrative VLAN, follow these steps, beginning in privileged EXEC mode:
SUMMARY STEPS
1. configure terminal
2. rep admin vlan vlan-id segment segment-id
3. end
4. show interface [ interface-id] rep detail
5. copy running-config startup config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
396
Layer 2
Configuring REP Interfaces
DETAILED STEPS
Step 2 rep admin vlan vlan-id segment segment-id Specifies the administrative VLAN. The range is 2 to 4094.
The default is VLAN 1.
Example:
SwitchDevice(config)# rep admin vlan 2 segment 2 To specify the administrative VLAN per segment, enter the
rep admin vlan vlan-id segment segment-id command in
the global configuration mode.
To set the admin VLAN to 1, enter the no rep admin vlan
global configuration command.
Step 4 show interface [ interface-id] rep detail Verifies the configuration on one of the REP interfaces.
Example:
SwitchDevice# show interface gigabitethernet1/1
rep detail
Step 5 copy running-config startup config (Optional) Saves your entries in the switch startup
configuration file.
Example:
SwitchDevice# copy running-config startup config
Related Topics
Configuring the REP Administrative VLAN: Examples, on page 403
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport mode trunk
5. rep segment segment-id [edge [no-neighbor] [ [primary]] [preferred]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
397
Layer 2
Configuring REP Interfaces
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface, and enter interface configuration
mode. The interface can be a physical Layer 2 interface or
a port channel (logical interface). The port-channel range
is 1 to 48.
Step 4 switchport mode trunk Configures the interface as a Layer 2 trunk port.
Step 5 rep segment segment-id [edge [no-neighbor] [ Enables REP on the interface and identifies a segment
[primary]] [preferred] number. The segment ID range is from 1 to 1024. These
optional keywords are available:
Note You must configure two edge ports, including
one primary edge port for each segment.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
398
Layer 2
Configuring REP Interfaces
Step 6 rep stcn {interface interface id | segment id-list | stp} (Optional) Configures the edge port to send segment
topology change notices (STCNs).
• interface interface -id—designates a physical
interface or port channel to receive STCNs.
• segment id-list—identifies one or more segments to
receive STCNs. The range is from 1 to 1024.
• stp—sends STCNs to STP networks.
Step 7 rep block port {id port-id | neighbor-offset | preferred} (Optional) Configures VLAN load balancing on the
vlan {vlan-list | all} primary edge port, identifies the REP alternate port in one
of three ways, and configures the VLANs to be blocked
on the alternate port.
• idport-id—identifies the alternate port by port ID.
The port ID is automatically generated for each port
in the segment. You can view interface port IDs by
entering the show interface type number rep [detail]
privileged EXEC command.
• neighbor_offset—number to identify the alternate
port as a downstream neighbor from an edge port.
The range is from -256 to 256, with negative numbers
indicating the downstream neighbor from the
secondary edge port. A value of 0 is invalid. Enter -1
to identify the secondary edge port as the alternate
port. See Figure 43: Neighbor Offset Numbers in a
Segment, on page 393 for an example of neighbor
offset numbering.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
399
Layer 2
Configuring REP Interfaces
Step 8 rep preempt delay seconds (Optional) Configures a preempt time delay.
• Use this command if you want VLAN load balancing
to automatically trigger after a link failure and
recovery.
• The time delay range is between15 to 300 seconds.
The default is manual preemption with no time delay.
Step 9 rep lsl-age-timer value (Optional) Configures a time (in milliseconds) for which
the REP interface remains up without receiving a hello
from a neighbor.
The range is from 120 to 10000 ms in 40-ms increments.
The default is 5000 ms (5 seconds).
Note • EtherChannel port channel interfaces do
not support LSL age-timer values less than
1000 ms.
• Both ports on the link should have the
same LSL-age configured to avoid link
flaps.
Step 11 show interface [interface-id] rep [detail] (Optional) Displays the REP interface configuration.
Step 12 copy running-config startup-config (Optional) Saves your entries in the router startup
configuration file.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
400
Layer 2
Setting Manual Preemption for VLAN Load Balancing
Related Topics
VLAN Load Balancing, on page 392
SUMMARY STEPS
1. rep preempt segment segment-id
2. show rep topology segment-id
DETAILED STEPS
SUMMARY STEPS
1. configure terminal
2. snmp mib rep trap-rate value
3. end
4. show running-config
5. copy running-config startup-config
DETAILED STEPS
Step 2 snmp mib rep trap-rate value Enables the switch to send REP traps, and sets the number
of traps sent per second.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
401
Layer 2
Monitoring REP
Switch(config)# end
Step 4 show running-config (Optional) Displays the running configuration, which can
be used to verify the REP trap configuration.
Example:
Step 5 copy running-config startup-config (Optional) Saves your entries in the switch startup
configuration file.
Example:
Monitoring REP
SUMMARY STEPS
1. show interface [interface-id] rep [detail]
2. show rep topology [segment segment-_id] [archive ] [detail]
DETAILED STEPS
Step 2 show rep topology [segment segment-_id] [archive ] Displays REP topology information for a segment or for
[detail] all segments, including the primary and secondary edge
ports in the segment.
• (Optional) archive—displays the last stable topology.
Note An archive topology is not retained when
the switch reloads.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
402
Layer 2
Configuring Examples for Configuring REP
The following example shows how to create an administrative VLAN per segment. Here VLAN 2 is configured
as the administrative VLAN only for REP segment 2. All remaining segments that are not configured otherwise
will, by default, have VLAN 1 as the administrative VLAN.
SwitchDevice# configure terminal
SwitchDevice(config)# rep admin vlan 2 segment 2
SwitchDevice (config)# end
Related Topics
Configuring the REP Administrative VLAN, on page 396
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
403
Layer 2
Configuring REP Interfaces: Examples
This example shows how to configure the VLAN blocking configuration shown in the figure below. The
alternate port is the neighbor with neighbor offset number 4. After manual preemption, VLANs 100 to 200
are blocked at this port, and all other VLANs are blocked at the primary edge port E1 (Gigabit Ethernet port
1/1).
Switch# configure terminal
Switch (conf)# interface gigabitethernet1/1
Switch (conf-if)# rep segment 1 edge primary
Switch (conf-if)# rep block port 4 vlan 100-200
Switch (conf-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
404
CHAPTER 21
Configuring Flex Links and the MAC
Address-Table Move Update Feature
• Finding Feature Information, on page 405
• Restrictions for Configuring Flex Links and MAC Address-Table Move Update, on page 405
• Information About Flex Links and MAC Address-Table Move Update, on page 406
• How to Configure Flex Links and the MAC Address-Table Move Update Feature, on page 410
• Monitoring Flex Links, Multicast Fast Convergence, and MAC Address-Table Move Update, on page
415
• Configuration Examples for Flex Links, on page 416
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
405
Layer 2
Information About Flex Links and MAC Address-Table Move Update
• Neither of the links can be a port that belongs to an EtherChannel. However, you can configure two port
channels (EtherChannel logical interfaces) as Flex Links, and you can configure a port channel and a
physical interface as Flex Links, with either the port channel or the physical interface as the active link.
• A backup link does not have to be the same type (Gigabit Ethernet or port channel) as the active link.
However, you should configure both Flex Links with similar characteristics so that there are no loops or
changes in behavior if the standby link begins to forward traffic.
• STP is disabled on Flex Links ports. A Flex Links port does not participate in STP, even if the VLANs
present on the port are configured for STP. When STP is not enabled, be sure that there are no loops in
the configured topology.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
406
Layer 2
VLAN Flex Links Load Balancing and Support
If a primary (forwarding) link goes down, a trap notifies the network management stations. If the standby link
goes down, a trap notifies the users.
Flex Links are supported only on Layer 2 ports and port channels, not on VLANs or on Layer 3 ports.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
407
Layer 2
Generating IGMP Reports
The other Flex Links port is then learned as the mrouter port. After changeover, multicast traffic then flows
through the other Flex Links port. To achieve faster convergence of traffic, both Flex Links ports are learned
as mrouter ports whenever either Flex Links port is learned as the mrouter port. Both Flex Links ports are
always part of multicast groups.
Although both Flex Links ports are part of the groups in normal operation mode, all traffic on the backup port
is blocked. The normal multicast data flow is not affected by the addition of the backup port as an mrouter
port. When the changeover happens, the backup port is unblocked, allowing the traffic to flow. In this case,
the upstream multicast data flows as soon as the backup port is unblocked.
In the following figure, switch A is an access switch, and ports 1 and 2 on switch A are connected to uplink
switches B and D through a Flex Links pair. Port 1 is forwarding traffic, and port 2 is in the backup state.
Traffic from the PC to the server is forwarded from port 1 to port 3. The MAC address of the PC has been
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
408
Layer 2
MAC Address-Table Move Update
learned on port 3 of switch C. Traffic from the server to the PC is forwarded from port 3 to port 1.
If the MAC address-table move update feature is not configured and port 1 goes down, port 2 starts forwarding
traffic. However, for a short time, switch C keeps forwarding traffic from the server to the PC through port
3, and the PC does not get the traffic because port 1 is down. If switch C removes the MAC address of the
PC on port 3 and relearns it on port 4, traffic can then be forwarded from the server to the PC through port 2.
If the MAC address-table move update feature is configured and enabled on the switches, and port 1 goes
down, port 2 starts forwarding traffic from the PC to the server. The switch sends a MAC address-table move
update packet from port 2. Switch C gets this packet on port 4 and immediately learns the MAC address of
the PC on port 4, which reduces the reconvergence time.
You can configure the access switch, switch A, to send MAC address-table move update messages. You can
also configure the uplink switches B, C, and D to get and process the MAC address-table move update
messages. When switch C gets a MAC address-table move update message from switch A, switch C learns
the MAC address of the PC on port 4. Switch C updates the MAC address table, including the forwarding
table entry for the PC.
Switch A does not need to wait for the MAC address-table update. The switch detects a failure on port 1 and
immediately starts forwarding server traffic from port 2, the new forwarding port. This change occurs in less
than 100 milliseconds (ms). The PC is directly connected to switch A, and the connection status does not
change. Switch A does not need to update the PC entry in the MAC address table.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
409
Layer 2
Flex Links VLAN Load Balancing Configuration Guidelines
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
410
Layer 2
Configuring a Preemption Scheme for a Pair of Flex Links
Step 3 switchport backup interface interface-id Configures a physical Layer 2 interface (or port channel)
as part of a Flex Links pair with the interface. When one
Example:
link is forwarding traffic, the other interface is in standby
mode.
SwitchDevice(conf-if)# switchport backup interface
gigabitethernet1/0/2
SwitchDevice(conf-if)# end
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport backup interface interface-id
4. switchport backup interface interface-id preemption mode [forced | bandwidth | off]
5. switchport backup interface interface-id preemption delay delay-time
6. end
7. show interface [interface-id] switchport backup
8. copy running-config startup config
DETAILED STEPS
Step 2 interface interface-id Specifies the interface, and enters interface configuration
mode. The interface can be a physical Layer 2 interface or
Example:
a port channel (logical interface). The port-channel range
is 1 to 24.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
411
Layer 2
Configuring a Preemption Scheme for a Pair of Flex Links
Step 3 switchport backup interface interface-id Configures a physical Layer 2 interface (or port channel)
as part of a Flex Links pair with the interface. When one
Example:
link is forwarding traffic, the other interface is in standby
mode.
SwitchDevice(conf-if)# switchport backup interface
gigabitethernet1/0/2
Step 4 switchport backup interface interface-id preemption Configures a preemption mechanism and delay for a Flex
mode [forced | bandwidth | off] Links interface pair. You can configure the preemption as:
Example: • forced—(Optional) The active interface always
preempts the backup.
SwitchDevice(conf-if)# switchport backup interface
gigabitethernet1/0/2 preemption mode forced • bandwidth—(Optional) The interface with the higher
bandwidth always acts as the active interface.
• off—(Optional) No preemption occurs from active to
backup.
Step 5 switchport backup interface interface-id preemption Configures the time delay until a port preempts another
delay delay-time port.
Example: Note Setting a delay time only works with forced and
bandwidth modes.
SwitchDevice(conf-if)# switchport backup interface
gigabitethernet1/0/2 preemption delay 50
SwitchDevice(conf-if)# end
Step 8 copy running-config startup config (Optional) Saves your entries in the switch startup
configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
412
Layer 2
Configuring VLAN Load Balancing on Flex Links
DETAILED STEPS
Step 2 interface interface-id Specifies the interface, and enters interface configuration
mode. The interface can be a physical Layer 2 interface or
Example:
a port channel (logical interface). The port-channel range
is 1 to 24.
SwitchDevice (config)# interface
gigabitethernet2/0/6
Step 3 switchport backup interface interface-id prefer vlan Configures a physical Layer 2 interface (or port channel)
vlan-range as part of a Flex Links pair with the interface and specifies
the VLANs carried on the interface. The VLAN ID range
Example:
is 1 to 4094.
SwitchDevice (config-if)# switchport backup
interface
gigabitethernet2/0/8 prefer vlan 2
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
413
Layer 2
Configuring MAC Address-Table Move Update
DETAILED STEPS
Step 2 interface interface-id Specifies the interface, and enters interface configuration
mode. The interface can be a physical Layer 2 interface or
Example:
a port channel (logical interface). The port-channel range
is 1 to 24.
SwitchDevice#interface gigabitethernet1/0/1
Step 3 Use one of the following: Configures a physical Layer 2 interface (or port channel),
as part of a Flex Links pair with the interface. The MAC
• switchport backup interface interface-id
address-table move update VLAN is the lowest VLAN ID
• switchport backup interface interface-id mmu on the interface.
primary vlan vlan-id
Configure a physical Layer 2 interface (or port channel)
Example: and specifies the VLAN ID on the interface, which is used
for sending the MAC address-table move update.
SwitchDevice(config-if)# switchport backup
interface When one link is forwarding traffic, the other interface is
gigabitethernet0/2 mmu primary vlan 2 in standby mode.
SwitchDevice(config-if)# end
Step 5 mac address-table move update transmit Enables the access switch to send MAC address-table move
updates to other switches in the network if the primary link
Example:
goes down and the switch starts forwarding traffic through
the standby link.
SwitchDevice(config)#
mac address-table move update
transmit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
414
Layer 2
Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages
SwitchDevice(config)# end
Configuring a Switch to Obtain and Process MAC Address-Table Move Update Messages
SUMMARY STEPS
1. configure terminal
2. mac address-table move update receive
3. end
DETAILED STEPS
Step 2 mac address-table move update receive Enables the switch to obtain and processes the MAC
address-table move updates.
Example:
show interface [interface-id] switchport backup Displays the Flex Links backup interface configured
for an interface or all the configured Flex Links and
the state of each active and backup interface (up or
standby mode).
show ip igmp profile address-table move update Displays the specified IGMP profile or all the IGMP
profile-id profiles defined on the switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
415
Layer 2
Configuration Examples for Flex Links
Command Purpose
show mac address-table move update Displays the MAC address-table move update
information on the switch.
This example shows how to verify the configuration after you configure the preemption mode as forced for
a backup interface pair:
When both interfaces are up, Gi2/0/8 forwards traffic for VLANs 60 and 100 to 120 and Gi2/0/6 forwards
traffic for VLANs 1 to 50.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
416
Layer 2
Configuring the MAC Address-Table Move Update: Examples
------------------------------------------------------------------------
GigabitEthernet2/0/6 GigabitEthernet2/0/8 Active Up/Backup Standby
When a Flex Links interface goes down (LINK_DOWN), VLANs preferred on this interface are moved to
the peer interface of the Flex Links pair. In this example, if interface Gi2/0/6 goes down, Gi2/0/8 carries all
VLANs of the Flex Links pair.
When a Flex Links interface comes up, VLANs preferred on this interface are blocked on the peer interface
and moved to the forwarding state on the interface that has just come up. In this example, if interface Gi2/0/6
comes up, VLANs preferred on this interface are blocked on the peer interface Gi2/0/8 and forwarded on
Gi2/0/6.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
417
Layer 2
Configuring Multicast Fast Convergence with Flex Links Failover: Examples
Switch-ID : 010b.4630.1780
Dst mac-address : 0180.c200.0010
Vlans/Macs supported : 1023/8320
Default/Current settings: Rcv Off/On, Xmt Off/On
Max packets per min : Rcv 40, Xmt 60
Rcv packet count : 5
Rcv conforming packet count : 5
Rcv invalid packet count : 0
Rcv packet count this min : 0
Rcv threshold exceed count : 0
Rcv last sequence# this min : 0
Rcv last interface : Po2
Rcv last src-mac-address : 000b.462d.c502
Rcv last switch-ID : 0403.fd6a.8700
Xmt packet count : 0
Xmt packet count this min : 0
Xmt threshold exceed count : 0
Xmt pak buf unavail cnt : 0
Xmt last interface : None
This output shows a querier for VLANs 1 and 401, with their queries reaching the switch through
GigabitEthernet1/0/11:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
418
Layer 2
Configuring Multicast Fast Convergence with Flex Links Failover: Examples
This example is output for the show ip igmp snooping mrouter command for VLANs 1 and 401:
Vlan ports
---- -----
1 Gi1/0/11(dynamic), Gi1/0/12(dynamic)
401 Gi1/0/11(dynamic), Gi1/0/12(dynamic)
Similarly, both Flex Links ports are part of learned groups. In this example, GigabitEthernet2/0/11 is a
receiver/host in VLAN 1, which is interested in two multicast groups:
When a host responds to the general query, the switch forwards this report on all the mrouter ports. In this
example, when a host sends a report for the group 228.1.5.1, it is forwarded only on GigabitEthernet1/0/11,
because the backup port GigabitEthernet1/0/12 is blocked. When the active link, GigabitEthernet1/0/11, goes
down, the backup port, GigabitEthernet1/0/12, begins forwarding.
As soon as this port starts forwarding, the switch sends proxy reports for the groups 228.1.5.1 and 228.1.5.2
on behalf of the host. The upstream router learns the groups and starts forwarding multicast data. This is the
default behavior of Flex Links. This behavior changes when the user configures fast convergence using the
switchport backup interface gigabitEthernet 1/0/12 multicast fast-convergence command. This example
shows turning on this feature:
This output shows a querier for VLAN 1 and 401 with their queries reaching the switch through
GigabitEthernet1/0/11:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
419
Layer 2
Configuring Multicast Fast Convergence with Flex Links Failover: Examples
1 1.1.1.1 v2 Gi1/0/11
401 41.41.41.1 v2 Gi1/0/11
This is output for the show ip igmp snooping mrouter command for VLAN 1 and 401:
Vlan ports
---- -----
1 Gi1/0/11(dynamic), Gi1/0/12(dynamic)
401 Gi1/0/11(dynamic), Gi1/0/12(dynamic)
Similarly, both the Flex Links ports are a part of the learned groups. In this example, GigabitEthernet2/0/11
is a receiver/host in VLAN 1, which is interested in two multicast groups:
Whenever a host responds to the general query, the switch forwards this report on all the mrouter ports. When
you turn on this feature through the command-line port, and when a report is forwarded by the switch on
GigabitEthernet1/0/11, it is also leaked to the backup port GigabitEthernet1/0/12. The upstream router learns
the groups and starts forwarding multicast data, which is dropped at the ingress because GigabitEthernet1/0/12
is blocked. When the active link, GigabitEthernet1/0/11, goes down, the backup port, GigabitEthernet1/0/12,
begins forwarding. You do not need to send any proxy reports as the multicast data is already being forwarded
by the upstream router. By leaking reports to the backup port, a redundant multicast path has been set up, and
the time taken for the multicast traffic convergence is very minimal.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
420
CHAPTER 22
Configuring UniDirectional Link Detection
• Finding Feature Information, on page 421
• Restrictions for Configuring UDLD, on page 421
• Information About UDLD, on page 422
• How to Configure UDLD, on page 424
• Monitoring and Maintaining UDLD, on page 427
Caution Loop guard works only on point-to-point links. We recommend that each end of the link has a directly connected
device that is running STP.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
421
Layer 2
Information About UDLD
Modes of Operation
UDLD supports two modes of operation: normal (the default) and aggressive. In normal mode, UDLD can
detect unidirectional links due to misconnected ports on fiber-optic connections. In aggressive mode, UDLD
can also detect unidirectional links due to one-way traffic on fiber-optic and twisted-pair links and to
misconnected ports on fiber-optic links.
In normal and aggressive modes, UDLD works with the Layer 1 mechanisms to learn the physical status of
a link. At Layer 1, autonegotiation takes care of physical signaling and fault detection. UDLD performs tasks
that autonegotiation cannot perform, such as detecting the identities of neighbors and shutting down
misconnected ports. When you enable both autonegotiation and UDLD, the Layer 1 and Layer 2 detections
work together to prevent physical and logical unidirectional connections and the malfunctioning of other
protocols.
A unidirectional link occurs whenever traffic sent by a local device is received by its neighbor but traffic from
the neighbor is not received by the local device.
Normal Mode
In normal mode, UDLD detects a unidirectional link when fiber strands in a fiber-optic port are misconnected
and the Layer 1 mechanisms do not detect this misconnection. If the ports are connected correctly but the
traffic is one way, UDLD does not detect the unidirectional link because the Layer 1 mechanism, which is
supposed to detect this condition, does not do so. In this case, the logical link is considered undetermined,
and UDLD does not disable the port.
When UDLD is in normal mode, if one of the fiber strands in a pair is disconnected, as long as autonegotiation
is active, the link does not stay up because the Layer 1 mechanisms detects a physical problem with the link.
In this case, UDLD does not take any action and the logical link is considered undetermined.
Related Topics
Enabling UDLD Globally , on page 424
Enabling UDLD on an Interface , on page 426
Aggressive Mode
In aggressive mode, UDLD detects a unidirectional link by using the previous detection methods. UDLD in
aggressive mode can also detect a unidirectional link on a point-to-point link on which no failure between the
two devices is allowed. It can also detect a unidirectional link when one of these problems exists:
• On fiber-optic or twisted-pair links, one of the ports cannot send or receive traffic.
• On fiber-optic or twisted-pair links, one of the ports is down while the other is up.
• One of the fiber strands in the cable is disconnected.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
422
Layer 2
Methods to Detect Unidirectional Links
Related Topics
Enabling UDLD Globally , on page 424
Enabling UDLD on an Interface , on page 426
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
423
Layer 2
UDLD Reset Options
Related Topics
Enabling UDLD Globally , on page 424
Enabling UDLD on an Interface , on page 426
UDLD per-port enable state for fiber-optic media Disabled on all Ethernet fiber-optic ports
UDLD per-port enable state for twisted-pair (copper) Disabled on all Ethernet 10/100 and 1000BASE-TX
media ports
Related Topics
Enabling UDLD Globally , on page 424
Enabling UDLD on an Interface , on page 426
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
424
Layer 2
Enabling UDLD Globally
SUMMARY STEPS
1. configure terminal
2. udld {aggressive | enable | message time message-timer-interval}
3. end
DETAILED STEPS
Step 2 udld {aggressive | enable | message time Specifies the UDLD mode of operation:
message-timer-interval}
• aggressive—Enables UDLD in aggressive mode on
Example: all fiber-optic ports.
SwitchDevice(config)# end
Related Topics
Monitoring and Maintaing UDLD
Aggressive Mode, on page 422
Normal Mode, on page 422
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
425
Layer 2
Enabling UDLD on an Interface
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. udld port [aggressive]
4. end
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be enabled for UDLD, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet 1/0/1
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
426
Layer 2
Monitoring and Maintaining UDLD
Related Topics
Monitoring and Maintaing UDLD
Aggressive Mode, on page 422
Normal Mode, on page 422
Methods to Detect Unidirectional Links, on page 423
Event-Driven Detection and Echoing, on page 423
UDLD Reset Options, on page 424
Default UDLD Configuration, on page 424
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
427
Layer 2
Monitoring and Maintaining UDLD
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
428
PA R T IV
High Availability
• Configuring HSRP and VRRP, on page 431
• Configuring Service Level Agreements, on page 453
• Configuring Enhanced Object Tracking, on page 475
CHAPTER 23
Configuring HSRP and VRRP
• Configuring HSRP , on page 431
Configuring HSRP
This chapter describes how to use Hot Standby Router Protocol (HSRP) to provide routing redundancy for
routing IP traffic without being dependent on the availability of any single router.
You can also use a version of HSRP in Layer 2 mode to configure a redundant command switch to take over
cluster management if the cluster command switch fails.
Note HSRP and VRRP features are supported only on Cisco Catalyst 3560-CX switches.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
431
High Availability
HSRP Overview
the MAC address and IP network address of a virtual router. The virtual router does not exist; it represents
the common target for routers that are configured to provide backup to each other. One of the routers is selected
to be the active router and another to be the standby router, which assumes control of the group MAC address
and IP address should the designated active router fail.
Note Routers in an HSRP group can be any router interface that supports HSRP, including routed ports and switch
virtual interfaces (SVIs).
HSRP provides high network availability by providing redundancy for IP traffic from hosts on networks. In
a group of router interfaces, the active router is the router of choice for routing packets; the standby router is
the router that takes over the routing duties when an active router fails or when preset conditions are met.
HSRP is useful for hosts that do not support a router discovery protocol and cannot switch to a new router
when their selected router reloads or loses power. When HSRP is configured on a network segment, it provides
a virtual MAC address and an IP address that is shared among router interfaces in a group of router interfaces
running HSRP. The router selected by the protocol to be the active router receives and routes packets destined
for the group's MAC address. For n routers running HSRP, there are n +1 IP and MAC addresses assigned.
HSRP detects when the designated active router fails, and a selected standby router assumes control of the
Hot Standby group's MAC and IP addresses. A new standby router is also selected at that time. Devices
running HSRP send and receive multicast UDP-based hello packets to detect router failure and to designate
active and standby routers. When HSRP is configured on an interface, Internet Control Message Protocol
(ICMP) redirect messages are automatically enabled for the interface.
You can configure multiple Hot Standby groups among switches and switch stacks that are operating in Layer
3 to make more use of the redundant routers. To do so, specify a group number for each Hot Standby command
group you configure for an interface. For example, you might configure an interface on switch 1 as an active
router and one on switch 2 as a standby router and also configure another interface on switch 2 as an active
router with another interface on switch 1 as its standby router.
The following figure shows a segment of a network configured for HSRP. Each router is configured with the
MAC address and IP network address of the virtual router. Instead of configuring hosts on the network with
the IP address of Router A, you configure them with the IP address of the virtual router as their default router.
When Host C sends packets to Host B, it sends them to the MAC address of the virtual router. If for any
reason, Router A stops transferring packets, Router B responds to the virtual IP address and virtual MAC
address and becomes the active router, assuming the active router duties. Host C continues to use the IP address
of the virtual router to address packets destined for Host B, which Router B now receives and sends to Host
B. Until Router A resumes operation, HSRP allows Router B to provide uninterrupted service to users on
Host C's segment that need to communicate with users on Host B's segment and also continues to perform its
normal function of handling packets between the Host A segment and Host B.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
432
High Availability
HSRP Versions
You can configure multiple Hot Standby groups among switches and switch stacks that are operating in Layer
3 to make more use of the redundant routers. To do so, specify a group number for each Hot Standby command
group you configure for an interface. For example, you might configure an interface on switch 1 as an active
router and one on switch 2 as a standby router and also configure another interface on switch 2 as an active
router with another interface on switch 1 as its standby router.
HSRP Versions
Cisco IOS XE Release 3.3SE and later support these Hot Standby Router Protocol (HSRP) versions:
The switch supports these HSRP versions:
• HSRPv1- Version 1 of the HSRP, the default version of HSRP. It has these features:
• The HSRP group number can be from 0 to 255.
• HSRPv1 uses the multicast address 224.0.0.2 to send hello packets, which can conflict with Cisco
Group Management Protocol (CGMP) leave processing. You cannot enable HSRPv1 and CGMP
at the same time; they are mutually exclusive.
• HSRPv2- Version 2 of the HSRP has these features:
• HSRPv2 uses the multicast address 224.0.0.102 to send hello packets. HSRPv2 and CGMP leave
processing are no longer mutually exclusive, and both can be enabled at the same time.
• HSRPv2 has a different packet format than HRSPv1.
A switch running HSRPv1 cannot identify the physical router that sent a hello packet because the source MAC
address of the router is the virtual MAC address.
HSRPv2 has a different packet format than HSRPv1. A HSRPv2 packet uses the type-length-value (TLV)
format and has a 6-byte identifier field with the MAC address of the physical router that sent the packet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
433
High Availability
Multiple HSRP
If an interface running HSRPv1 gets an HSRPv2 packet, the type field is ignored.
Multiple HSRP
The switch supports Multiple HSRP (MHSRP), an extension of HSRP that allows load sharing between two
or more HSRP groups. You can configure MHSRP to achieve load-balancing and to use two or more standby
groups (and paths) from a host network to a server network.
In the figure below, half the clients are configured for Router A, and half the clients are configured for Router
B. Together, the configuration for Routers A and B establishes two HSRP groups. For group 1, Router A is
the default active router because it has the assigned highest priority, and Router B is the standby router. For
group 2, Router B is the default active router because it has the assigned highest priority, and Router A is the
standby router. During normal operation, the two routers share the IP traffic load. When either router becomes
unavailable, the other router becomes active and assumes the packet-transfer functions of the router that is
unavailable.
Note For MHSRP, you need to enter the standby preempt interface configuration command on the HSRP interfaces
so that if a router fails and then comes back up, preemption restores load sharing.
Related Topics
Configuring MHSRP, on page 440
SSO HSRP
SSO HSRP alters the behavior of HSRP when a device with redundant Route Processors (RPs) is configured
for stateful switchover (SSO) redundancy mode. When an RP is active and the other RP is standby, SSO
enables the standby RP to take over if the active RP fails.
With this functionality, HSRP SSO information is synchronized to the standby RP, allowing traffic that is
sent using the HSRP virtual IP address to be continuously forwarded during a switchover without a loss of
data or a path change. Additionally, if both RPs fail on the active HSRP device, then the standby HSRP device
takes over as the active HSRP device.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
434
High Availability
How to Configure HSRP
The feature is enabled by default when the redundancy mode of operation is set to SSO.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
435
High Availability
Enabling HSRP
Enabling HSRP
The standby ip interface configuration command activates HSRP on the configured interface. If an IP address
is specified, that address is used as the designated address for the Hot Standby group. If no IP address is
specified, the address is learned through the standby function. You must configure at least one Layer 3 port
on the LAN with the designated address. Configuring an IP address always overrides another designated
address currently in use.
When the standby ip command is enabled on an interface and proxy ARP is enabled, if the interface's Hot
Standby state is active, proxy ARP requests are answered using the Hot Standby group MAC address. If the
interface is in a different state, proxy ARP responses are suppressed.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. standby version { 1 | 2 }
4. standby [group-number] ip [ip-address [secondary]]
5. end
6. show standby [interface-id [group]]
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Enters interface configuration mode, and enter the Layer 3
interface on which you want to enable HSRP.
Example:
Switch(config)# interface gigabitethernet1/0/1
Step 3 standby version { 1 | 2 } (Optional) Configures the HSRP version on the interface.
Example: • 1- Selects HSRPv1.
Switch(config-if)# standby version 1 • 2- Selects HSRPv2.
If you do not enter this command or do not specify a
keyword, the interface runs the default HSRP version, HSRP
v1.
Step 4 standby [group-number] ip [ip-address [secondary]] Creates (or enable) the HSRP group using its number and
virtual IP address.
Example:
Switch(config-if)# standby 1 ip • Optional) group-number- The group number on the
interface for which HSRP is being enabled. The range
is 0 to 255; the default is 0. If there is only one HSRP
group, you do not need to enter a group number.
• (Optional on all but one interface) ip-address- The
virtual IP address of the hot standby router interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
436
High Availability
Configuring HSRP Priority
Switch(config-if)# end
Step 6 show standby [interface-id [group]] Verifies the configuration of the standby groups.
Example:
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Enabling HSRP: Example, on page 449
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
437
High Availability
Configuring HSRP Priority
device. For each interface configured for hot standby, you can configure a separate list of interfaces to
be tracked
• The standby track interface-priority interface configuration command specifies how much to decrement
the hot standby priority when a tracked interface goes down. When the interface comes back up, the
priority is incremented by the same amount.
• When multiple tracked interfaces are down and interface-priority values have been configured, the
configured priority decrements are cumulative. If tracked interfaces that were not configured with priority
values fail, the default decrement is 10, and it is noncumulative.
• When routing is first enabled for the interface, it does not have a complete routing table. If it is configured
to preempt, it becomes the active router, even though it is unable to provide adequate routing services.
To solve this problem, configure a delay time to allow the router to update its routing table.
Beginning in privileged EXEC mode, use one or more of these steps to configure HSRP priority characteristics
on an interface:
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. standby [group-number] prioritypriority
4. standby [group-number] preempt [delay [minimumseconds] [reloadseconds] [syncseconds]]
5. standby [group-number] track type number [interface-priority]
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Enters interface configuration mode, and enter the HSRP
interface on which you want to set priority.
Example:
Switch(config)# interface gigabitethernet1/0/1
Step 3 standby [group-number] prioritypriority Sets a priority value used in choosing the active router.
The range is 1 to 255; the default priority is 100. The highest
Example:
number represents the highest priority.
Switch(config-if)# standby 120 priority 50
• (Optional) group-number—The group number to which
the command applies.
Use the no form of the command to restore the default
values.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
438
High Availability
Configuring HSRP Priority
Step 5 standby [group-number] track type number Configures an interface to track other interfaces so that if
[interface-priority] one of the other interfaces goes down, the device's Hot
Standby priority is lowered.
Example:
Switch(config-if)# standby track interface • (Optional) group-number- The group number to which
gigabitethernet1/1/1 the command applies.
• type- Enter the interface type (combined with interface
number) that is tracked.
• number- Enter the interface number (combined with
interface type) that is tracked.
• (Optional) interface-priority- Enter the amount by
which the hot standby priority for the router is
decremented or incremented when the interface goes
down or comes back up. The default value is 10.
Switch(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
439
High Availability
Configuring MHSRP
Related Topics
Configuring HSRP Priority: Example, on page 449
Configuring MHSRP
To enable MHSRP and load-balancing, you configure two routers as active routers for their groups, with
virtual routers as standby routers as shown in the MHSRP Load Sharing figure in the Multiple HSRP section.
You need to enter the standby preempt interface configuration command on each HSRP interface so that if
a router fails and comes back up, the preemption occurs and restores load-balancing.
Router A is configured as the active router for group 1, and Router B is configured as the active router for
group 2. The HSRP interface for Router A has an IP address of 10.0.0.1 with a group 1 standby priority of
110 (the default is 100). The HSRP interface for Router B has an IP address of 10.0.0.2 with a group 2 standby
priority of 110.
Group 1 uses a virtual IP address of 10.0.0.3 and group 2 uses a virtual IP address of 10.0.0.4.
Related Topics
Multiple HSRP, on page 434
Configuring Router A
SUMMARY STEPS
1. configure terminal
2. interface type number
3. no switchport
4. ip address ip-address mask
5. standby [group-number] ip [ip-address [secondary]]
6. standby [group-number] priority priority
7. standby [group-number] preempt [delay [minimum seconds] [reload seconds] [sync seconds]]
8. standby [group-number] ip [ip-address [secondary]]
9. standby [group-number] preempt [delay [minimum seconds] [reload seconds] [sync seconds]]
10. end
11. show running-config
12. copy running-config startup-config
DETAILED STEPS
Step 2 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Switch (config)# interface gigabitethernet1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
440
High Availability
Configuring Router A
Step 5 standby [group-number] ip [ip-address [secondary]] Creates the HSRP group using its number and virtual IP
address.
Example:
Switch (config-if)# standby 1 ip 10.0.0.3 • (Optional) group-number- The group number on the
interface for which HSRP is being enabled. The range
is 0 to 255; the default is 0. If there is only one HSRP
group, you do not need to enter a group number.
• (Optional on all but one interface) ip-address- The
virtual IP address of the hot standby router interface.
You must enter the virtual IP address for at least one
of the interfaces; it can be learned on the other
interfaces.
• (Optional) secondary- The IP address is a secondary
hot standby router interface. If neither router is
designated as a secondary or standby router and no
priorities are set, the primary IP addresses are
compared and the higher IP address is the active
router, with the next highest as the standby router.
Step 6 standby [group-number] priority priority Sets a priority value used in choosing the active router.
The range is 1 to 255; the default priority is 100. The
Example:
highest number represents the highest priority.
Switch(config-if)# standby 1 priority 110
• (Optional) group-number—The group number to
which the command applies.
Use the no form of the command to restore the default
values.
Step 7 standby [group-number] preempt [delay [minimum Configures the router to preempt, which means that when
seconds] [reload seconds] [sync seconds]] the local router has a higher priority than the active router,
it becomes the active router.
Example:
Switch(config-if)# standby 1 preempt delay 300 • (Optional) group-number-The group number to which
the command applies.
• (Optional) delay minimum—Set to cause the local
router to postpone taking over the active role for the
number of seconds shown. The range is 0 to 3600
seconds (1 hour); the default is 0 (no delay before
taking over).
• (Optional) delay reload—Set to cause the local router
to postpone taking over the active role after a reload
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
441
High Availability
Configuring Router A
Step 8 standby [group-number] ip [ip-address [secondary]] Creates the HSRP group using its number and virtual IP
address.
Example:
Switch (config-if)# standby 2 ip 10.0.0.4 • (Optional) group-number- The group number on the
interface for which HSRP is being enabled. The range
is 0 to 255; the default is 0. If there is only one HSRP
group, you do not need to enter a group number.
• (Optional on all but one interface) ip-address- The
virtual IP address of the hot standby router interface.
You must enter the virtual IP address for at least one
of the interfaces; it can be learned on the other
interfaces.
• (Optional) secondary- The IP address is a secondary
hot standby router interface. If neither router is
designated as a secondary or standby router and no
priorities are set, the primary IP addresses are
compared and the higher IP address is the active
router, with the next highest as the standby router.
Step 9 standby [group-number] preempt [delay [minimum Configures the router to preempt, which means that when
seconds] [reload seconds] [sync seconds]] the local router has a higher priority than the active router,
it becomes the active router.
Example:
Switch(config-if)# standby 2 preempt delay 300 • (Optional) group-number-The group number to which
the command applies.
• (Optional) delay minimum—Set to cause the local
router to postpone taking over the active role for the
number of seconds shown. The range is 0 to 3600
seconds (1 hour); the default is 0 (no delay before
taking over).
• (Optional) delay reload—Set to cause the local router
to postpone taking over the active role after a reload
for the number of seconds shown. The range is 0 to
3600 seconds (1 hour); the default is 0 (no delay
before taking over after a reload).
• (Optional) delay sync—Set to cause the local router
to postpone taking over the active role so that IP
redundancy clients can reply (either with an ok or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
442
High Availability
Configuring Router B
Related Topics
Configuring MHSRP: Example, on page 449
Configuring Router B
SUMMARY STEPS
1. configure terminal
2. interface type number
3. no switchport
4. ip address ip-address mask
5. standby [group-number] ip [ip-address [secondary]]
6. standby [group-number] priority priority
7. standby [group-number] preempt [delay [minimum seconds] [reload seconds] [sync seconds]]
8. standby [group-number] ip [ip-address [secondary]]
9. standby [group-number] preempt [delay [minimum seconds] [reload seconds] [sync seconds]]
10. end
11. show running-config
12. copy running-config startup-config
DETAILED STEPS
Step 2 interface type number Configures an interface type and enters interface
configuration mode.
Example:
Switch (config)# interface gigabitethernet1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
443
High Availability
Configuring Router B
Step 5 standby [group-number] ip [ip-address [secondary]] Creates the HSRP group using its number and virtual IP
address.
Example:
Switch (config-if)# standby 1 ip 10.0.0.3 • (Optional) group-number- The group number on the
interface for which HSRP is being enabled. The range
is 0 to 255; the default is 0. If there is only one HSRP
group, you do not need to enter a group number.
• (Optional on all but one interface) ip-address- The
virtual IP address of the hot standby router interface.
You must enter the virtual IP address for at least one
of the interfaces; it can be learned on the other
interfaces.
• (Optional) secondary- The IP address is a secondary
hot standby router interface. If neither router is
designated as a secondary or standby router and no
priorities are set, the primary IP addresses are
compared and the higher IP address is the active
router, with the next highest as the standby router.
Step 6 standby [group-number] priority priority Sets a priority value used in choosing the active router.
The range is 1 to 255; the default priority is 100. The
Example:
highest number represents the highest priority.
Switch(config-if)# standby 1 priority 110
• (Optional) group-number—The group number to
which the command applies.
Use the no form of the command to restore the default
values.
Step 7 standby [group-number] preempt [delay [minimum Configures the router to preempt, which means that when
seconds] [reload seconds] [sync seconds]] the local router has a higher priority than the active router,
it becomes the active router.
Example:
Switch(config-if)# standby 1 preempt delay 300 • (Optional) group-number-The group number to which
the command applies.
• (Optional) delay minimum—Set to cause the local
router to postpone taking over the active role for the
number of seconds shown. The range is 0 to 3600
seconds (1 hour); the default is 0 (no delay before
taking over).
• (Optional) delay reload—Set to cause the local router
to postpone taking over the active role after a reload
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
444
High Availability
Configuring Router B
Step 8 standby [group-number] ip [ip-address [secondary]] Creates the HSRP group using its number and virtual IP
address.
Example:
Switch (config-if)# standby 2 ip 10.0.0.4 • (Optional) group-number- The group number on the
interface for which HSRP is being enabled. The range
is 0 to 255; the default is 0. If there is only one HSRP
group, you do not need to enter a group number.
• (Optional on all but one interface) ip-address- The
virtual IP address of the hot standby router interface.
You must enter the virtual IP address for at least one
of the interfaces; it can be learned on the other
interfaces.
• (Optional) secondary- The IP address is a secondary
hot standby router interface. If neither router is
designated as a secondary or standby router and no
priorities are set, the primary IP addresses are
compared and the higher IP address is the active
router, with the next highest as the standby router.
Step 9 standby [group-number] preempt [delay [minimum Configures the router to preempt, which means that when
seconds] [reload seconds] [sync seconds]] the local router has a higher priority than the active router,
it becomes the active router.
Example:
Switch(config-if)# standby 2 preempt delay 300 • (Optional) group-number-The group number to which
the command applies.
• (Optional) delay minimum—Set to cause the local
router to postpone taking over the active role for the
number of seconds shown. The range is 0 to 3600
seconds (1 hour); the default is 0 (no delay before
taking over).
• (Optional) delay reload—Set to cause the local router
to postpone taking over the active role after a reload
for the number of seconds shown. The range is 0 to
3600 seconds (1 hour); the default is 0 (no delay
before taking over after a reload).
• (Optional) delay sync—Set to cause the local router
to postpone taking over the active role so that IP
redundancy clients can reply (either with an ok or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
445
High Availability
Configuring HSRP Authentication and Timers
Related Topics
Configuring MHSRP: Example, on page 449
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. standby [group-number] authentication string
4. standby [group-number] timers hellotime holdtime
5. end
6. show running-config
7. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
446
High Availability
Enabling HSRP Support for ICMP Redirect Messages
DETAILED STEPS
Step 2 interface interface-id Enters interface configuration mode, and enter the HSRP
interface on which you want to set priority.
Example:
Switch(config) # interface gigabitethernet1/0/1
Step 4 standby [group-number] timers hellotime holdtime (Optional) Configure the time between hello packets and
the time before other routers declare the active router to be
Example:
down.
Switch(config-if) # standby 1 timers 5 15
• group-number—The group number to which the
command applies.
• hellotime —Set to cause the local router to postpone
taking over the active role for the number of seconds
shown. The range is 0 to 3600 seconds (1 hour); the
default is 0 (no delay before taking over).
• holdtime—Set to cause the local router to postpone
taking over the active role after a reload for the number
of seconds shown. The range is 0 to 3600 seconds (1
hour); the default is 0 (no delay before taking over
after a reload).
Switch(config-if) # end
Related Topics
Configuring HSRP Authentication and Timer: Example, on page 450
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
447
High Availability
Configuring HSRP Groups and Clustering
processing. ICMP provides diagnostic functions, such as sending and directing error packets to the host. This
feature filters outgoing ICMP redirect messages through HSRP, in which the next hop IP address might be
changed to an HSRP virtual IP address. For more information, see the Cisco IOS IP Configuration Guide,
Release 12.4.
Troubleshooting HSRP
If one of the situations as shown in the following table occurs, this message appears:
%FHRP group not consistent with already configured groups on the switch stack - virtual MAC
reservation failed
Situation Action
You configure more than 32 HSRP group Remove HSRP groups so that up to 32 group instances
instances. are configured.
Verifying HSRP
Verifying HSRP Configurations
From privileged EXEC mode, use this command to display HSRP settings:
show standby [interface-id [group]] [brief] [detail]
You can display HSRP information for the whole switch, for a specific interface, for an HSRP group, or for
an HSRP group on an interface. You can also specify whether to display a concise overview of HSRP
information or detailed HSRP information. The default display is detail. If there are a large number of HSRP
groups, using the show standby command without qualifiers can result in an unwieldy display.
Example
Switch #show standby
VLAN1 - Group 1
Local state is Standby, priority 105, may preempt
Hellotime 3 holdtime 10
Next hello sent in 00:00:02.182
Hot standby IP address is 172.20.128.3 configured
Active router is 172.20.128.1 expires in 00:00:09
Standby router is local
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
448
High Availability
Configuration Examples for Configuring HSRP
Note This procedure is the minimum number of steps required to enable HSRP. Other configurations are optional.
Related Topics
Enabling HSRP, on page 436
Related Topics
Configuring HSRP Priority, on page 437
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
449
High Availability
Configuring HSRP Authentication and Timer: Example
Router A Configuration
Switch # configure terminal
Switch(config) # interface gigabitethernet1/0/1
Switch(config-if)# no switchport
Switch(config-if)# ip address 10.0.0.1 255.255.255.0
Switch(config-if)# standby ip 10.0.0.3
Switch(config-if)# standby 1 priority 110
Switch(config-if)# standby 1 preempt
Switch(config-if)# standby 2 ip 10.0.0.4
Switch(config-if)# standby 2 preempt
Switch(config-if)# end
Router B Configuration
Switch # configure terminal
Switch(config) # interface gigabitethernet1/0/1
Switch(config-if)# no switchport
Switch(config-if)# ip address 10.0.0.2 255.255.255.0
Switch(config-if)# standby ip 10.0.0.3
Switch(config-if)# standby 1 preempt
Switch(config-if)# standby 2 ip 10.0.0.4
Switch(config-if)# standby 1 priority 110
Switch(config-if)# standby 2 preempt
Switch(config-if)# end
Related Topics
Configuring Router A, on page 440
Configuring Router B, on page 443
This example shows how to set the timers on standby group 1 with the time between hello packets at 5 seconds
and the time after which a router is considered down to be 15 seconds:
Related Topics
Configuring HSRP Authentication and Timers, on page 446
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
450
High Availability
Configuring HSRP Groups and Clustering: Example
Related Topics
Configuring HSRP Groups and Clustering , on page 448
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
451
High Availability
Restrictions for VRRP
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
452
CHAPTER 24
Configuring Service Level Agreements
This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch.
Unless otherwise noted, the term switch refers to a standalone switch or a switch stack.
• Finding Feature Information, on page 453
• Restrictions on SLAs, on page 453
• Information About SLAs, on page 454
• How to Configure IP SLAs Operations, on page 459
• Monitoring IP SLA Operations, on page 472
• Monitoring IP SLA Operation Examples, on page 473
Restrictions on SLAs
This section lists the restrictions on SLAs.
The following are restrictions on IP SLAs network performance measurement:
• The switch does not support VoIP service levels using the gatekeeper registration delay operations
measurements.
• Only a Cisco IOS device can be a source for a destination IP SLAs responder.
• You cannot configure the IP SLAs responder on non-Cisco devices and Cisco IOS IP SLAs can send
operational packets only to services native to those devices.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
453
High Availability
Information About SLAs
Related Topics
Implementing IP SLA Network Performance Measurement, on page 461
Network Performance Measurement with Cisco IOS IP SLAs, on page 455
IP SLA Responder and IP SLA Control Protocol, on page 455
Because Cisco IOS IP SLAs is SNMP-accessible, it can also be used by performance-monitoring applications
like Cisco Prime Internetwork Performance Monitor (IPM) and other third-party Cisco partner performance
management products.
Using IP SLAs can provide the following benefits:
• Service-level agreement monitoring, measurement, and verification.
• Network performance monitoring
• Measurement of jitter, latency, or packet loss in the network.
• Continuous, reliable, and predictable measurements.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
454
High Availability
Network Performance Measurement with Cisco IOS IP SLAs
• IP service network health assessment to verify that the existing QoS is sufficient for new IP services.
• Edge-to-edge network availability monitoring for proactive verification and connectivity testing of
network resources (for example, shows the network availability of an NFS server used to store business
critical data from a remote site).
• Network operation troubleshooting by providing consistent, reliable measurement that immediately
identifies problems and saves troubleshooting time.
• Multiprotocol Label Switching (MPLS) performance monitoring and network verification (if the switch
supports MPLS).
The following figure shows how IP SLAs begin when the source device sends a generated packet to the
destination device. After the destination device receives the packet, depending on the type of IP SLAs operation,
it responds with time-stamp information for the source to make the calculation on performance metrics. An
IP SLAs operation performs a network measurement from the source device to a destination in the network
using a specific protocol such as UDP.
Related Topics
Implementing IP SLA Network Performance Measurement, on page 461
Restrictions on SLAs, on page 453
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
455
High Availability
Response Time Computation for IP SLAs
Note The IP SLA responder can be a Cisco IOS Layer 2, responder-configurable switch. The responder does not
need to support full IP SLA functionality.
The following figure shows where the Cisco IOS IP SLA responder fits in the IP network. The responder
listens on a specific port for control protocol messages sent by an IP SLA operation. Upon receipt of the
control message, it enables the specified UDP or TCP port for the specified duration. During this time, the
responder accepts the requests and responds to them. It disables the port after it responds to the IP SLA packet,
or when the specified time expires. MD5 authentication for control messages is available for added security.
Figure 51: Cisco IOS IP SLAs Operation
You do not need to enable the responder on the destination device for all IP SLA operations. For example, a
responder is not required for services that are already provided by the destination router (such as Telnet or
HTTP).
Related Topics
Restrictions on SLAs, on page 453
The following figure demonstrates how the responder works. Four time stamps are taken to make the calculation
for round-trip time. At the target router, with the responder functionality enabled, time stamp 2 (TS2) is
subtracted from time stamp 3 (TS3) to produce the time spent processing the test packet as represented by
delta. This delta value is then subtracted from the overall round-trip time. Notice that the same principle is
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
456
High Availability
IP SLAs Operation Scheduling
applied by IP SLAs on the source router where the incoming time stamp 4 (TS4) is also taken at the interrupt
leveltoallowforgreateraccuracy.
An additional benefit of the two time stamps at the target device is the ability to track one-way delay, jitter,
and directional packet loss. Because much network behavior is asynchronous, it is critical to have these
statistics. However, to capture one-way delay measurements, you must configure both the source router and
target router with Network Time Protocol (NTP) so that the source and target are synchronized to the same
clock source. One-way jitter measurements do not require clock synchronization.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
457
High Availability
UDP Jitter
An IP SLA threshold violation can also trigger another IP SLA operation for further analysis. For example,
the frequency could be increased or an Internet Control Message Protocol (ICMP) path echo or ICMP path
jitter operation could be initiated for troubleshooting.
ICMP Echo
The ICMP echo operation measures the end-to-end response time between a Cisco device and any other device
that uses IP. The response time is computed by measuring the time it takes to send an ICMP echo request
message to a destination and receive an ICMP echo reply. Many customers use IP SLA ICMP-based operations,
in-house ping testing, or ping-based dedicated probes to measure this response time. The IP SLA ICMP echo
operation conforms to the same specifications as ICMP ping testing, and both methods result in the same
response times.
Related Topics
Analyzing IP Service Levels by Using the ICMP Echo Operation, on page 469
UDP Jitter
Jitter is a simple term that describes interpacket delay variance. When multiple packets are sent consecutively
at an interval of 10 ms from source to destination, the destination should receive them 10 ms apart (if the
network is behaving correctly). However, if there are delays in the network (such as queuing, arriving through
alternate routes, and so on), the time interval between packet arrivals might be more or less than 10 ms. A
positive jitter value indicates that the packets arrived more than 10 ms apart. A negative jitter value indicates
that the packets arrived less than 10 ms apart. If the packets arrive 12 ms apart, the positive jitter is 2 ms; if
the packets arrive 8 ms apart, the negative jitter is 2 ms. For delay-sensitive networks, positive jitter values
are undesirable, and a jitter value of 0 is ideal.
In addition to monitoring jitter, the IP SLA UDP jitter operation can be used as a multipurpose data gathering
operation. The packets generated by IP SLAs carry sequence information and time stamps from the source
and operational target that include packet sending and receiving data. Based on this data, UDP jitter operations
measure the following:
• Per-direction jitter (source to destination and destination to source)
• Per-direction packet-loss
• Per-direction delay (one-way delay)
• Round-trip delay (average round-trip time)
Because the paths for the sending and receiving of data can be different (asymmetric), you can use the
per-direction data to more readily identify where congestion or other problems are occurring in the network.
The UDP jitter operation generates synthetic (simulated) UDP traffic and sends a number of UDP packets,
each of a specified size, sent a specified number of milliseconds apart, from a source router to a target router,
at a given frequency. By default, ten packet-frames, each with a payload size of 10 bytes are generated every
10 ms, and the operation is repeated every 60 seconds. You can configure each of these parameters to best
simulate the IP service you want to provide.
To provide accurate one-way delay (latency) measurements, time synchronization (as provided by NTP) is
required between the source and the target device. Time synchronization is not required for the one-way jitter
and packet loss measurements. If the time is not synchronized between the source and target devices, one-way
jitter and packet loss data is returned, but values of 0 are returned for the one-way delay measurements provided
by the UDP jitter operation.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
458
High Availability
How to Configure IP SLAs Operations
Related Topics
Analyzing IP Service Levels by Using the UDP Jitter Operation, on page 465
Default Configuration
No IP SLAs operations are configured.
Configuration Guidelines
For information on the IP SLA commands, see the Cisco IOS IP SLAs Command Reference, Release 12.4T
command reference.
For detailed descriptions and configuration procedures, see the Cisco IOS IP SLAs Configuration Guide,
Release 12.4TL.
Not all of the IP SLA commands or operations described in the referenced guide are supported on the switch.
The switch supports IP service level analysis by using UDP jitter, UDP echo, HTTP, TCP connect, ICMP
echo, ICMP path echo, ICMP path jitter, FTP, DNS, and DHCP, as well as multiple operation scheduling and
proactive threshold monitoring. It does not support VoIP service levels using the gatekeeper registration delay
operations measurements.
Before configuring any IP SLAs application, you can use the show ip sla application privileged EXEC
command to verify that the operation type is supported on your software image. This is an example of the
output from the command:
Supported Features:
IPSLAs Event Publisher
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
459
High Availability
Configuring the IP SLA Responder
Time of last change in whole IP SLAs: *13:04:37.668 UTC Wed Dec 19 2012
SUMMARY STEPS
1. enable
2. configure terminal
3. ip sla responder {tcp-connect | udp-echo} ipaddress ip-address port port-number
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip sla responder {tcp-connect | udp-echo} ipaddress Configures the switch as an IP SLA responder.
ip-address port port-number
The keywords have these meanings:
Example:
• tcp-connect—Enables the responder for TCP connect
operations.
SwitchDevice(config)# ip sla responder udp-echo
172.29.139.134 5000 • udp-echo—Enables the responder for User Datagram
Protocol (UDP) echo or jitter operations.
• ipaddress ip-address—Enter the destination IP
address.
• port port-number—Enter the destination port number.
Note The IP address and port number must match
those configured on the source device for
the IP SLA operation.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
460
High Availability
Implementing IP SLA Network Performance Measurement
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip sla operation-number
4. udp-jitter {destination-ip-address | destination-hostname} destination-port [source-ip {ip-address |
hostname}] [source-port port-number] [control {enable | disable}] [num-packets number-of-packets]
[interval interpacket-interval]
5. frequency seconds
6. threshold milliseconds
7. exit
8. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day
month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring]
9. end
10. show running-config
11. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
461
High Availability
Implementing IP SLA Network Performance Measurement
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# ip sla 10
Step 4 udp-jitter {destination-ip-address | destination-hostname} Configures the IP SLA operation as the operation type of
destination-port [source-ip {ip-address | hostname}] your choice (a UDP jitter operation is used in the example),
[source-port port-number] [control {enable | disable}] and enters its configuration mode (UDP jitter configuration
[num-packets number-of-packets] [interval mode is used in the example).
interpacket-interval]
• destination-ip-address |
Example: destination-hostname—Specifies the destination IP
address or hostname.
SwitchDevice(config-ip-sla)# udp-jitter
172.29.139.134 5000 • destination-port—Specifies the destination port
number in the range from 1 to 65535.
• (Optional) source-ip {ip-address |
hostname}—Specifies the source IP address or
hostname. When a source IP address or hostname is
not specified, IP SLA chooses the IP address nearest
to the destination
• (Optional) source-port port-number—Specifies the
source port number in the range from 1 to 65535.
When a port number is not specified, IP SLA chooses
an available port.
• (Optional) control—Enables or disables sending of
IP SLA control messages to the IP SLA responder.
By default, IP SLA control messages are sent to the
destination device to establish a connection with the
IP SLA responder
• (Optional) num-packets number-of-packets—Enters
the number of packets to be generated. The range is
1 to 6000; the default is 10.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
462
High Availability
Implementing IP SLA Network Performance Measurement
Step 5 frequency seconds (Optional) Configures options for the SLA operation. This
example sets the rate at which a specified IP SLA operation
Example:
repeats. The range is from 1 to 604800 seconds; the default
is 60 seconds.
SwitchDevice(config-ip-sla-jitter)# frequency 45
Step 7 exit Exits the SLA operation configuration mode (UDP jitter
configuration mode in this example), and returns to global
Example:
configuration mode.
SwitchDevice(config-ip-sla-jitter)# exit
Step 8 ip sla schedule operation-number [life {forever | Configures the scheduling parameters for an individual IP
seconds}] [start-time {hh:mm [:ss] [month day | day SLA operation.
month] | pending | now | after hh:mm:ss] [ageout seconds]
• operation-number—Enter the RTR entry number.
[recurring]
Example: • (Optional) life—Sets the operation to run indefinitely
(forever) or for a specific number of seconds. The
SwitchDevice(config)# ip sla schedule 10
range is from 0 to 2147483647. The default is 3600
start-time now life forever seconds (1 hour).
• (Optional) start-time—Enters the time for the
operation to begin collecting information:
To start at a specific time, enter the hour, minute,
second (in 24-hour notation), and day of the month.
If no month is entered, the default is the current
month.
Enter pending to select no information collection
until a start time is selected.
Enter now to start the operation immediately.
Enter after hh:mm:ss to show that the operation
should start after the entered time has elapsed.
• (Optional) ageout seconds—Enter the number of
seconds to keep the operation in memory when it is
not actively collecting information. The range is 0 to
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
463
High Availability
Implementing IP SLA Network Performance Measurement
SwitchDevice(config)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice(config)# ip sla 10
SwitchDevice(config-ip-sla)# udp-jitter 172.29.139.134 5000
SwitchDevice(config-ip-sla-jitter)# frequency 30
SwitchDevice(config-ip-sla-jitter)# exit
SwitchDevice(config)# ip sla schedule 5 start-time now life forever
SwitchDevice(config)# end
SwitchDevice# show ip sla configuration 10
IP SLAs, Infrastructure Engine-II.
Entry number: 10
Owner:
Tag:
Type of operation to perform: udp-jitter
Target address/Source address: 1.1.1.1/0.0.0.0
Target port/Source port: 2/0
Request size (ARR data portion): 32
Operation timeout (milliseconds): 5000
Packet Interval (milliseconds)/Number of packets: 20/10
Type Of Service parameters: 0x0
Verify data: No
Vrf Name:
Control Packets: enabled
Schedule:
Operation frequency (seconds): 30
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
464
High Availability
Analyzing IP Service Levels by Using the UDP Jitter Operation
Related Topics
Network Performance Measurement with Cisco IOS IP SLAs, on page 455
Restrictions on SLAs, on page 453
SUMMARY STEPS
1. enable
2. configure terminal
3. ip sla operation-number
4. udp-jitter {destination-ip-address | destination-hostname} destination-port [source-ip {ip-address |
hostname}] [source-port port-number] [control {enable | disable}] [num-packets number-of-packets]
[interval interpacket-interval]
5. frequency seconds
6. exit
7. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day
month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring]
8. end
9. show running-config
10. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
465
High Availability
Analyzing IP Service Levels by Using the UDP Jitter Operation
SwitchDevice> enable
SwitchDevice(config)# ip sla 10
Step 4 udp-jitter {destination-ip-address | destination-hostname} Configures the IP SLA operation as a UDP jitter operation,
destination-port [source-ip {ip-address | hostname}] and enters UDP jitter configuration mode.
[source-port port-number] [control {enable | disable}]
• destination-ip-address |
[num-packets number-of-packets] [interval
destination-hostname—Specifies the destination IP
interpacket-interval]
address or hostname.
Example:
• destination-port—Specifies the destination port
SwitchDevice(config-ip-sla)# udp-jitter
number in the range from 1 to 65535.
172.29.139.134 5000
• (Optional) source-ip {ip-address |
hostname}—Specifies the source IP address or
hostname. When a source IP address or hostname is
not specified, IP SLA chooses the IP address nearest
to the destination.
• (Optional) source-port port-number—Specifies the
source port number in the range from 1 to 65535.
When a port number is not specified, IP SLA chooses
an available port.
• (Optional) control—Enables or disables sending of
IP SLA control messages to the IP SLA responder.
By default, IP SLA control messages are sent to the
destination device to establish a connection with the
IP SLA responder.
• (Optional) num-packets number-of-packets—Enters
the number of packets to be generated. The range is
1 to 6000; the default is 10.
• (Optional) interval inter-packet-interval—Enters the
interval between sending packets in milliseconds. The
range is 1 to 6000; the default value is 20 ms.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
466
High Availability
Analyzing IP Service Levels by Using the UDP Jitter Operation
Step 6 exit Exits UDP jitter configuration mode, and returns to global
configuration mode.
Example:
SwitchDevice(config-ip-sla-jitter)# exit
Step 7 ip sla schedule operation-number [life {forever | Configures the scheduling parameters for an individual IP
seconds}] [start-time {hh:mm [:ss] [month day | day SLA operation.
month] | pending | now | after hh:mm:ss] [ageout seconds]
• operation-number—Enter the RTR entry number.
[recurring]
Example: • (Optional) life—Sets the operation to run indefinitely
(forever) or for a specific number of seconds. The
SwitchDevice(config)# ip sla schedule 10
range is from 0 to 2147483647. The default is 3600
start-time now life forever seconds (1 hour).
• (Optional) start-time—Enters the time for the
operation to begin collecting information:
To start at a specific time, enter the hour, minute,
second (in 24-hour notation), and day of the month.
If no month is entered, the default is the current
month.
Enter pending to select no information collection
until a start time is selected.
Enter now to start the operation immediately.
Enter after hh:mm:ss to show that the operation
should start after the entered time has elapsed.
• (Optional) ageout seconds—Enter the number of
seconds to keep the operation in memory when it is
not actively collecting information. The range is 0 to
2073600 seconds, the default is 0 seconds (never ages
out).
• (Optional) recurring—Set the operation to
automatically run every day.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
467
High Availability
Analyzing IP Service Levels by Using the UDP Jitter Operation
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice(config)# ip sla 10
SwitchDevice(config-ip-sla)# udp-jitter 172.29.139.134 5000
SwitchDevice(config-ip-sla-jitter)# frequency 30
SwitchDevice(config-ip-sla-jitter)# exit
SwitchDevice(config)# ip sla schedule 5 start-time now life forever
SwitchDevice(config)# end
SwitchDevice# show ip sla configuration 10
IP SLAs, Infrastructure Engine-II.
Entry number: 10
Owner:
Tag:
Type of operation to perform: udp-jitter
Target address/Source address: 1.1.1.1/0.0.0.0
Target port/Source port: 2/0
Request size (ARR data portion): 32
Operation timeout (milliseconds): 5000
Packet Interval (milliseconds)/Number of packets: 20/10
Type Of Service parameters: 0x0
Verify data: No
Vrf Name:
Control Packets: enabled
Schedule:
Operation frequency (seconds): 30
Next Scheduled Start Time: Pending trigger
Group Scheduled : FALSE
Randomly Scheduled : FALSE
Life (seconds): 3600
Entry Ageout (seconds): never
Recurring (Starting Everyday): FALSE
Status of entry (SNMP RowStatus): notInService
Threshold (milliseconds): 5000
Distribution Statistics:
Number of statistic hours kept: 2
Number of statistic distribution buckets kept: 1
Statistic distribution interval (milliseconds): 20
Enhanced History:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
468
High Availability
Analyzing IP Service Levels by Using the ICMP Echo Operation
Related Topics
UDP Jitter, on page 458
SUMMARY STEPS
1. enable
2. configure terminal
3. ip sla operation-number
4. icmp-echo {destination-ip-address | destination-hostname} [source-ip {ip-address | hostname} |
source-interface interface-id]
5. frequency seconds
6. exit
7. ip sla schedule operation-number [life {forever | seconds}] [start-time {hh:mm [:ss] [month day | day
month] | pending | now | after hh:mm:ss] [ageout seconds] [recurring]
8. end
9. show running-config
10. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# ip sla 10
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
469
High Availability
Analyzing IP Service Levels by Using the ICMP Echo Operation
Step 5 frequency seconds (Optional) Sets the rate at which a specified IP SLA
operation repeats. The range is from 1 to 604800 seconds;
Example:
the default is 60 seconds.
SwitchDevice(config-ip-sla-echo)# frequency 30
Step 6 exit Exits UDP echo configuration mode, and returns to global
configuration mode.
Example:
SwitchDevice(config-ip-sla-echo)# exit
Step 7 ip sla schedule operation-number [life {forever | Configures the scheduling parameters for an individual IP
seconds}] [start-time {hh:mm [:ss] [month day | day SLA operation.
month] | pending | now | after hh:mm:ss] [ageout seconds]
• operation-number—Enter the RTR entry number.
[recurring]
Example: • (Optional) life—Sets the operation to run indefinitely
(forever) or for a specific number of seconds. The
SwitchDevice(config)# ip sla schedule 5 start-time
range is from 0 to 2147483647. The default is 3600
now life forever seconds (1 hour)
• (Optional) start-time—Enter the time for the
operation to begin collecting information:
To start at a specific time, enter the hour, minute,
second (in 24-hour notation), and day of the month.
If no month is entered, the default is the current
month.
Enter pending to select no information collection
until a start time is selected.
Enter now to start the operation immediately.
Enter after hh:mm:ss to indicate that the operation
should start after the entered time has elapsed.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
470
High Availability
Analyzing IP Service Levels by Using the ICMP Echo Operation
SwitchDevice(config)# end
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice(config)# ip sla 12
SwitchDevice(config-ip-sla)# icmp-echo 172.29.139.134
SwitchDevice(config-ip-sla-echo)# frequency 30
SwitchDevice(config-ip-sla-echo)# exit
SwitchDevice(config)# ip sla schedule 5 start-time now life forever
SwitchDevice(config)# end
SwitchDevice# show ip sla configuration 22
IP SLAs, Infrastructure Engine-II.
Entry number: 12
Owner:
Tag:
Type of operation to perform: echo
Target address: 2.2.2.2
Source address: 0.0.0.0
Request size (ARR data portion): 28
Operation timeout (milliseconds): 5000
Type Of Service parameters: 0x0
Verify data: No
Vrf Name:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
471
High Availability
Monitoring IP SLA Operations
Schedule:
Operation frequency (seconds): 60
Next Scheduled Start Time: Pending trigger
Group Scheduled : FALSE
Randomly Scheduled : FALSE
Life (seconds): 3600
Entry Ageout (seconds): never
Recurring (Starting Everyday): FALSE
Status of entry (SNMP RowStatus): notInService
Threshold (milliseconds): 5000
Distribution Statistics:
Number of statistic hours kept: 2
Number of statistic distribution buckets kept: 1
Statistic distribution interval (milliseconds): 20
History Statistics:
Number of history Lives kept: 0
Number of history Buckets kept: 15
History Filter Type: None
Enhanced History:
Related Topics
IP SLA Operation Threshold Monitoring, on page 457
show ip sla application Displays global information about Cisco IOS IP SLAs.
show ip sla configuration [entry-number] Displays configuration values including all defaults
for all IP SLA operations or a specific operation.
show ip sla enhanced-history {collection-statistics Displays enhanced history statistics for collected
| distribution statistics} [entry-number] history buckets or distribution statistics for all IP SLA
operations or a specific operation.
show ip sla group schedule [schedule-entry-number] Displays IP SLA group scheduling configuration and
details.
show ip sla history [entry-number | full | tabular] Displays history collected for all IP SLA operations.
show ip sla mpls-lsp-monitor {collection-statistics Displays MPLS label switched path (LSP) Health
| configuration | ldp operational-state | scan-queue Monitor operations.
| summary [entry-number] | neighbors}
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
472
High Availability
Monitoring IP SLA Operation Examples
show ip sla reaction-trigger [entry-number] Displays the reaction trigger information for all IP
SLA operations or a specific operation.
show ip sla statistics [entry-number | aggregated | Displays current or aggregated operational status and
details] statistics.
Supported Features:
IPSLAs Event Publisher
Entry Int BucI StartT Pth Hop Comps OvrTh SumCmp SumCmp2L SumCmp2H T
Max TMin
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
473
High Availability
Monitoring IP SLA Operation Examples
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
474
CHAPTER 25
Configuring Enhanced Object Tracking
• Finding Feature Information, on page 475
• Information About Enhanced Object Tracking, on page 475
• How to Configure Enhanced Object Tracking, on page 478
• Monitoring Enhanced Object Tracking, on page 491
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
475
High Availability
Tracking Interface Line-Protocol or IP Routing State
Note Enhanced Object Tracking is not supported on switches running the LAN Base image.
Enhanced Object Tracking is supported only on Cisco Catalyst 3560-CX switches.
Each tracked object has a unique number that is specified in the tracking command-line interface (CLI). Client
processes use this number to track a specific object. The tracking process periodically polls the tracked object
for value changes and sends any changes (as up or down values) to interested client processes, either
immediately or after a specified delay. Several clients can track the same object, and can take different actions
when the object changes state.
You can also track a combination of objects in a list by using either a weight threshold or a percentage threshold
to measure the state of the list. You can combine objects using Boolean logic. A tracked list with a Boolean
“AND” function requires that each object in the list be in an up state for the tracked object to be up. A tracked
list with a Boolean “OR” function needs only one object in the list to be in the up state for the tracked object
to be up.
If all three of these conditions are not met, the IP routing state is down.
Related Topics
Configuring Tracking for Line State Protocol or IP Routing State on an Interface, on page 478
Tracked Lists
You can configure a tracked list of objects with a Boolean expression, a weight threshold, or a percentage
threshold. A tracked list contains one or more objects. An object must exist before it can be added to the
tracked list.
• You configure a Boolean expression to specify calculation by using either “AND” or “OR” operators.
• When you measure the tracked list state by a weight threshold, you assign a weight number to each object
in the tracked list. The state of the tracked list is determined by whether or not the threshold was met.
The state of each object is determined by comparing the total weight of all objects against a threshold
weight for each object.
• When you measure the tracked list by a percentage threshold, you assign a percentage threshold to all
objects in the tracked list. The state of each object is determined by comparing the assigned percentages
of each object to the list.
Related Topics
Configuring a Tracked List with a Boolean Expression
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
476
High Availability
Tracking Other Characteristics
Use the show track privileged EXEC command to verify enhanced object tracking configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
477
High Availability
How to Configure Enhanced Object Tracking
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-numberinterface interface-idline-protocol
4. delay { object-numberupseconds[downseconds]|[upseconds]downseconds}
5. exit
6. track object-numberinterface interface-idip routing
7. delay { object-numberupseconds[downseconds]|[upseconds]downseconds}
8. end
9. show trackobject-number
DETAILED STEPS
SwitchDevice> enable
Step 3 track object-numberinterface interface-idline-protocol (Optional) Creates a tracking list to track the line-protocol
state of an interface and enter tracking configuration mode.
Example:
SwitchDevice(config)# track 33 interface • The object-number identifies the tracked object and
gigabitethernet 1/0/1 line-protocol can be from 1 to 500.
• Theinterface interface-id is the interface being
tracked.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
478
High Availability
Configuring Tracked Lists
Step 9 show trackobject-number Verifies that the specified objects are being tracked.
Related Topics
Tracking Interface Line-Protocol or IP Routing State, on page 476
SUMMARY STEPS
1. enable
2. configure terminal
3. track track-numberlist threshold {weight}
4. object object-number[weightweight-number]
5. threshold weight {upnumber|[downnumber]}
6. delay { upseconds[downseconds]|[upseconds]downseconds}
7. end
8. show trackobject-number
9. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
479
High Availability
Configuring a Tracked List with a Weight Threshold
DETAILED STEPS
SwitchDevice> enable
Step 3 track track-numberlist threshold {weight} Configures a tracked list object, and enters tracking
configuration mode. The track-number can be from 1 to
Example:
500.
SwitchDevice(config)# track 4 list threshold weight
• threshold—Specifies the state of the tracked list based
on a threshold.
• weight— Specifies that the threshold is based on
weight.
Step 4 object object-number[weightweight-number] Specifies the object to be tracked. The range is from 1 to
500. The optionalweightweight-number specifies the
Example:
threshold weight for the object. The range is from 1 to 255.
SwitchDevice(config)# object 2 weight 15
Note An object must exist before you can add it to a
tracked list.
Step 8 show trackobject-number Verify that the specified objects are being tracked.
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
480
High Availability
Configuring a Tracked List with a Percentage Threshold
Related Topics
Tracked Lists, on page 476
SUMMARY STEPS
1. enable
2. configure terminal
3. track track-numberlist threshold {percentage}
4. object object-number
5. threshold percentage {upnumber|[downnumber]}
6. delay { upseconds[downseconds]|[upseconds]downseconds}
7. end
8. show trackobject-number
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 track track-numberlist threshold {percentage} Configures a tracked list object, and enters tracking
configuration mode. The track-number can be from 1 to
Example:
500.
SwitchDevice(config)# track 4 list threshold
percentage • threshold—Specifies the state of the tracked list based
on a threshold.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
481
High Availability
Configuring HSRP Object Tracking
Step 4 object object-number Specifies the object to be tracked. The range is from 1 to
500.
Example:
SwitchDevice(config)# object 1 Note An object must exist before you can add it to a
tracked list.
Step 8 show trackobject-number Verify that the specified objects are being tracked.
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Tracked Lists, on page 476
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-number{interface interface-id{line-protocol|ip routing}|ip routeip
address/prefix-length{metric
threshold|reachability}list{boolean{and|or}}|{threshold{weight|percentage}}}
4. exit
5. interface { interface-id
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
482
High Availability
Configuring HSRP Object Tracking
6. standby[group-number]ip[ip-addresssecondary]]
7. standby[group-number]track[object-number[decrement priority-decrement]]
8. end
9. show standby
10. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 track object-number{interface (Optional) Create a tracking list to track the configured
interface-id{line-protocol|ip routing}|ip routeip state and enter tracking configuration mode.
address/prefix-length{metric
• The object-number identifies the tracked object and
threshold|reachability}list{boolean{and|or}}|{threshold{weight|percentage}}}
can be from 1 to 500.
• Enterinterface interface-id to select an interface to
track.
• Enterline-protocol to track the interface line protocol
state or enter ip routing to track the interface IP
routing state .
• Enterip routeip-address/prefix-length to track the
state of an IP route.
• Entermetric threshold to track the threshold metric
or enter reachability to track if the route is reachable.
The default up threshold is 254 and the default down
threshold is 255.
• Enter list to track objects grouped in a list.
Note Repeat this step for each interface to be
tracked.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
483
High Availability
Configuring HSRP Object Tracking
Step 7 standby[group-number]track[object-number[decrement Configures HSRP to track an object and change the hot
priority-decrement]] standby priority based on the state of the object.
• (Optional) group-number—Enters the group number
to which the tracking applies.
• object-number—Enters a number representing the
object to be tracked. The range is from 1 to 500; the
default is 1.
• (Optional) secondary—Specifies that the IP address
is a secondary hot standby router interface. If this
keyword is omitted, the configured address is the
primary IP address.
• (Optional)decrementpriority-decrement—Specifies
the amount by which the hot standby priority for the
router is decremented (or incremented) when the
tracked object goes down (or comes back up). The
range is from 1 to 255; the default is 10.
Step 9 show standby Verifies the standby router IP address and tracking states.
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
484
High Availability
Configuring IP SLAs Object Tracking
SUMMARY STEPS
1. enable
2. configure terminal
3. track object-numberrtr operation-numberstate
4. delay { upseconds[downseconds]|[upseconds]downseconds}
5. exit
6. track object-numberrtr operation-numberstate
7. end
8. show trackobject-number
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 track object-numberrtr operation-numberstate Enters tracking configuration mode to track the state of an
IP SLAs operation.
Example:
SwitchDevice(config)# track 2 200 state • object-number range is from 1 to 500.
• operation-number range is from 1 to 2147483647.
Step 6 track object-numberrtr operation-numberstate Enters tracking configuration mode to track the state of an
IP SLAs operation.
• object-number range is from 1 to 500.
• operation-number range is from 1 to 2147483647.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
485
High Availability
Configuring Static Route Object Tracking
Step 8 show trackobject-number Verifies that the specified objects are being tracked.
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IP SLAs Object Tracking, on page 477
SUMMARY STEPS
1. enable
2. configure terminal
3. interfaceinterface-id
4. descriptionstring
5. ip addressip-address mask[secondary]
6. exit
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
486
High Availability
Configuring a Primary Interface for DHCP
Related Topics
Static Route Object Tracking, on page 477
SUMMARY STEPS
1. enable
2. configure terminal
3. interfaceinterface-id
4. descriptionstring
5. ip dhcp client route tracknumber
6. exit
DETAILED STEPS
SwitchDevice> enable
Step 5 ip dhcp client route tracknumber Configures the DCHP client to associate any added routes
with the specified track number. Valid numbers are from 1
to 500.
Related Topics
Static Route Object Tracking, on page 477
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
487
High Availability
Configuring IP SLAs Monitoring Agent
SUMMARY STEPS
1. enable
2. configure terminal
3. ip slaoperation number
4. icmp-echo{ destination ip-address|destination hostname[source -
ipaddr{ip-address|hostnamesource-interfaceinterface-id]
5. timeoutmilliseconds
6. frequencyseconds
7. thresholdmilliseconds
8. exit
9. ip sla schedule operation-number[life
{forever|seconds}]start-timetime|pending|now|aftertime]ageoutseconds][recurring]
10. track object-numberrtr operation-numberstatereachability
11. end
12. show trackobject-number
13. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip slaoperation number Begins configuring a Cisco IP SLAs operation and enters
IP SLA configuration mode.
Step 4 icmp-echo{ destination ip-address|destination Configures a Cisco IP SLAs end-to-end ICMP echo
hostname[source - response time operation and enter IP SLAs ICMP echo
ipaddr{ip-address|hostnamesource-interfaceinterface-id] configuration mode.
Step 5 timeoutmilliseconds Sets the amount of time for which the operation waits for
a response from its request packet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
488
High Availability
Configuring a Routing Policy and a Default Route
Step 9 ip sla schedule operation-number[life Configures the scheduling parameters for a single IP SLAs
{forever|seconds}]start-timetime|pending|now|aftertime]ageoutseconds][recurring] operation.
Example: • object-number range is from 1 to 500.
SwitchDevice(config)# track 2 200 state
• operation-number range is from 1 to 2147483647.
Step 10 track object-numberrtr Tracks the state of a Cisco IOS IP SLAs operation and
operation-numberstatereachability enter tracking configuration mode.
Step 12 show trackobject-number Verifies that the specified objects are being tracked.
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Static Route Object Tracking, on page 477
SUMMARY STEPS
1. enable
2. configure terminal
3. access-listaccess-list-number
4. route-mapmap tag[permit|deny][sequence-number]
5. match ip address{access-list number[permit|deny][sequence-number]
6. set ip next-hop dynamic dhcp
7. set interfaceinterface-id
8. exit
9. ip local policy route-mapmap tag
10. ip routeprefix mask{ip address|interface-id[ip
address]}[distance][name][permanent|tracktrack-number][tag tag]
11. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
489
High Availability
Configuring a Routing Policy and a Default Route
DETAILED STEPS
SwitchDevice> enable
Step 4 route-mapmap tag[permit|deny][sequence-number] Enters route-map configuration mode and define conditions
for redistributing routes from one routing protocol to
another.
Step 5 match ip address{access-list Distribute any routes that have a destination network
number[permit|deny][sequence-number] number address that is permitted by a standard or extended
access list or performs policy routing on packets. You can
enter multiple numbers or names.
Step 6 set ip next-hop dynamic dhcp For DHCP networks only. Sets the next hop to the gateway
that was most recently learned by the DHCP client.
Step 7 set interfaceinterface-id For static routing networks only. Indicates where to send
output packets that pass a match clause of a route map for
policy routing.
Step 9 ip local policy route-mapmap tag Identifies a route map to use for local policy routing.
Step 10 ip routeprefix mask{ip address|interface-id[ip For static routing networks only. Establishes static routes.
address]}[distance][name][permanent|tracktrack-number][tag Entering tracktrack-number specifies that the static route
tag] is installed only if the configured track object is up.
Step 12 show ip route track table Displays information about the IP route track table.
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
490
High Availability
Monitoring Enhanced Object Tracking
Related Topics
Static Route Object Tracking, on page 477
Command Purpose
show ip route track table Displays information about the IP route track table.
show track [object-number] Displays information about the all tracking lists or the
specified list.
show track brief Displays VTP status and configuration for all
interfaces or the specified interface.
show track interface [brief] Displays information about tracked interface objects.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
491
High Availability
Monitoring Enhanced Object Tracking
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
492
PA R T V
Network Management
• Configuring Cisco IOS Configuration Engine, on page 495
• Configuring the Cisco Discovery Protocol, on page 515
• Configuring Simple Network Management Protocol, on page 525
• Configuring SPAN and RSPAN, on page 549
• Configuring RMON, on page 591
• Configuring Embedded Event Manager, on page 599
• Configuring NetFlow Lite, on page 607
• Configuring Cache Services Using the Web Cache Communication Protocol, on page 631
CHAPTER 26
Configuring Cisco IOS Configuration Engine
• Finding Feature Information, on page 495
• Prerequisites for Configuring the Configuration Engine, on page 495
• Restrictions for Configuring the Configuration Engine, on page 496
• Information About Configuring the Configuration Engine, on page 496
• How to Configure the Configuration Engine, on page 502
• Monitoring CNS Configurations, on page 514
Related Topics
Cisco Networking Services IDs and Device Hostnames, on page 498
DeviceID, on page 498
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
495
Network Management
Restrictions for Configuring the Configuration Engine
Related Topics
Cisco Networking Services IDs and Device Hostnames, on page 498
In standalone mode, the Cisco Configuration Engine supports an embedded directory service. In this mode,
no external directory or other data store is required. In server mode, the Cisco Configuration Engine supports
the use of a user-defined external directory.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
496
Network Management
Configuration Service
Configuration Service
The Configuration Service is the core component of the Cisco Configuration Engine. It consists of a
Configuration Server that works with Cisco IOS CNS agents on the switch. The Configuration Service delivers
device and service configurations to the switch for initial configuration and mass reconfiguration by logical
groups. Switches receive their initial configuration from the Configuration Service when they start up on the
network for the first time.
The Configuration Service uses the CNS Event Service to send and receive configuration change events and
to send success and failure notifications.
The Configuration Server is a web server that uses configuration templates and the device-specific configuration
information stored in the embedded (standalone mode) or remote (server mode) directory.
Configuration templates are text files containing static configuration information in the form of CLI commands.
In the templates, variables are specified by using Lightweight Directory Access Protocol (LDAP) URLs that
reference the device-specific configuration information stored in a directory.
The Cisco IOS agent can perform a syntax check on received configuration files and publish events to show
the success or failure of the syntax check. The configuration agent can either apply configurations immediately
or delay the application until receipt of a synchronization event from the configuration server.
Event Service
The Cisco Configuration Engine uses the Event Service for receipt and generation of configuration events.
The Event Service consists of an event agent and an event gateway. The event agent is on the switch and
facilitates the communication between the switch and the event gateway on the Cisco Configuration Engine.
The Event Service is a highly capable publish-and-subscribe communication method. The Event Service uses
subject-based addressing to send messages to their destinations. Subject-based addressing conventions define
a simple, uniform namespace for messages and their destinations.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
497
Network Management
NameSpace Mapper
Related Topics
Enabling the CNS Event Agent, on page 502
NameSpace Mapper
The Cisco Configuration Engine includes the NameSpace Mapper (NSM) that provides a lookup service for
managing logical groups of devices based on application, device or group ID, and event.
Cisco IOS devices recognize only event subject-names that match those configured in Cisco IOS software;
for example, cisco.cns.config.load. You can use the namespace mapping service to designate events by using
any desired naming convention. When you have populated your data store with your subject names, NSM
changes your event subject-name strings to those known by Cisco IOS.
For a subscriber, when given a unique device ID and event, the namespace mapping service returns a set of
events to which to subscribe. Similarly, for a publisher, when given a unique group ID, device ID, and event,
the mapping service returns a set of events on which to publish.
ConfigID
Each configured switch has a unique ConfigID, which serves as the key into the Cisco Configuration Engine
directory for the corresponding set of switch CLI attributes. The ConfigID defined on the switch must match
the ConfigID for the corresponding switch definition on the Cisco Configuration Engine.
The ConfigID is fixed at startup time and cannot be changed until the device restarts, even if the switch
hostname is reconfigured.
DeviceID
Each configured switch participating on the event bus has a unique DeviceID, which is analogous to the switch
source address so that the switch can be targeted as a specific destination on the bus.
The origin of the DeviceID is defined by the Cisco IOS hostname of the switch. However, the DeviceID
variable and its usage reside within the event gateway adjacent to the switch.
The logical Cisco IOS termination point on the event bus is embedded in the event gateway, which in turn
functions as a proxy on behalf of the switch. The event gateway represents the switch and its corresponding
DeviceID to the event bus.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
498
Network Management
Hostname and DeviceID
The switch declares its hostname to the event gateway immediately after the successful connection to the
event gateway. The event gateway couples the DeviceID value to the Cisco IOS hostname each time this
connection is established. The event gateway retains this DeviceID value for the duration of its connection to
the switch.
Related Topics
Prerequisites for Configuring the Configuration Engine, on page 495
Caution When using the Cisco Configuration Engine user interface, you must first set the DeviceID field to the hostname
value that the switch acquires after, not before, and you must reinitialize the configuration for your Cisco IOS
CNS agent. Otherwise, subsequent partial configuration command operations may malfunction.
Related Topics
Refreshing DeviceIDs, on page 510
Initial Configuration
When the switch first comes up, it attempts to get an IP address by broadcasting a Dynamic Host Configuration
Protocol (DHCP) request on the network. Assuming there is no DHCP server on the subnet, the distribution
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
499
Network Management
Incremental (Partial) Configuration
switch acts as a DHCP relay agent and forwards the request to the DHCP server. Upon receiving the request,
the DHCP server assigns an IP address to the new switch and includes the Trivial File Transfer Protocol
(TFTP) server Internet Protocol (IP) address, the path to the bootstrap configuration file, and the default
gateway IP address in a unicast reply to the DHCP relay agent. The DHCP relay agent forwards the reply to
the switch.
The switch automatically configures the assigned IP address on interface VLAN 1 (the default) and downloads
the bootstrap configuration file from the TFTP server. Upon successful download of the bootstrap configuration
file, the switch loads the file in its running configuration.
The Cisco IOS CNS agents initiate communication with the Configuration Engine by using the appropriate
ConfigID and EventID. The Configuration Engine maps the Config ID to a template and downloads the full
configuration file to the switch.
The following figure shows a sample network configuration for retrieving the initial bootstrap configuration
file by using DHCP-based autoconfiguration.
Figure 54: Initial Configuration
Related Topics
Enabling an Initial Configuration for Cisco IOS CNS Agent, on page 505
Monitoring CNS Configurations, on page 514
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
500
Network Management
Synchronized Configuration
Synchronized Configuration
When the switch receives a configuration, it can defer application of the configuration upon receipt of a
write-signal event. The write-signal event tells the switch not to save the updated configuration into its
NVRAM. The switch uses the updated configuration as its running configuration. This ensures that the switch
configuration is synchronized with other network activities before saving the configuration in NVRAM for
use at the next reboot.
TFTP server • A bootstrap configuration file that includes the CNS configuration
commands that enable the switch to communicate with the Configuration
Engine
• The switch configured to use either the switch MAC address or the serial
number (instead of the default hostname) to generate the ConfigID and
EventID
• The CNS event agent configured to push the configuration file to the switch
CNS Configuration Engine One or more templates for each type of device, with the ConfigID of the device
mapped to the template.
1
A DHCP Relay is needed only when the DHCP Server is on a different subnet from the client.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
501
Network Management
How to Configure the Configuration Engine
Note You must enable the CNS event agent on the switch before you enable the CNS configuration agent.
Follow these steps to enable the CNS event agent on the switch.
SUMMARY STEPS
1. enable
2. configure terminal
3. cns event {hostname | ip-address} [port-number] [ [keepalive seconds retry-count] [failover-time
seconds ] [reconnect-time time] | backup]
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 cns event {hostname | ip-address} [port-number] [ Enables the event agent, and enters the gateway parameters.
[keepalive seconds retry-count] [failover-time seconds ]
• For {hostname | ip-address}, enter either the hostname
[reconnect-time time] | backup]
or the IP address of the event gateway.
Example:
• (Optional) For port number, enter the port number for
SwitchDevice(config)# cns event 10.180.1.27
the event gateway. The default port number is 11011.
keepalive 120 10
• (Optional) For keepalive seconds, enter how often the
switch sends keepalive messages. For retry-count,
enter the number of unanswered keepalive messages
that the switch sends before the connection is
terminated. The default for each is 0.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
502
Network Management
Enabling the Cisco IOS CNS Agent
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To verify information about the event agent, use the show cns event connections command in privileged
EXEC mode.
To disable the CNS event agent, use the no cns event { ip-address | hostname } global configuration command.
Related Topics
Event Service, on page 497
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
503
Network Management
Enabling the Cisco IOS CNS Agent
SUMMARY STEPS
1. enable
2. configure terminal
3. cns config initial {hostname | ip-address} [port-number]
4. cns config partial {hostname | ip-address} [port-number]
5. end
6. show running-config
7. copy running-config startup-config
8. Start the Cisco IOS CNS agent on the switch.
DETAILED STEPS
SwitchDevice> enable
Step 3 cns config initial {hostname | ip-address} [port-number] Enables the Cisco IOS CNS agent, and enters the
configuration server parameters.
Example:
• For {hostname | ip-address}, enter either the hostname
SwitchDevice(config)# cns config initial or the IP address of the configuration server.
10.180.1.27 10
• (Optional) For port number, enter the port number for
the configuration server.
Step 4 cns config partial {hostname | ip-address} [port-number] Enables the Cisco IOS CNS agent, and enters the
configuration server parameters.
Example:
• For {hostname | ip-address}, enter either the hostname
SwitchDevice(config)# cns config partial or the IP address of the configuration server.
10.180.1.27 10
• (Optional) For port number, enter the port number for
the configuration server.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
504
Network Management
Enabling an Initial Configuration for Cisco IOS CNS Agent
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
You can now use the Cisco Configuration Engine to remotely send incremental configurations to the switch.
Related Topics
Cisco IOS CNS Agents, on page 499
SUMMARY STEPS
1. enable
2. configure terminal
3. cns template connect name
4. cli config-text
5. Repeat Steps 3 to 4 to configure another CNS connect template.
6. exit
7. cns connect name [retries number] [retry-interval seconds] [sleep seconds] [timeout seconds]
8. discover {controller controller-type | dlci [subinterface subinterface-number] | interface [interface-type]
| line line-type}
9. template name [... name]
10. Repeat Steps 8 to 9 to specify more interface parameters and CNS connect templates in the CNS connect
profile.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
505
Network Management
Enabling an Initial Configuration for Cisco IOS CNS Agent
11. exit
12. hostname name
13. ip route network-number
14. cns id interface num {dns-reverse | ipaddress | mac-address} [event] [image]
15. cns id {hardware-serial | hostname | string string | udi} [event] [image]
16. cns config initial {hostname | ip-address} [port-number] [event] [no-persist] [page page] [source
ip-address] [syntax-check]
17. end
18. show running-config
19. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 cns template connect name Enters CNS template connect configuration mode, and
specifies the name of the CNS connect template.
Example:
Step 4 cli config-text Enters a command line for the CNS connect template.
Repeat this step for each command line in the template.
Example:
SwitchDevice(config)# exit
Step 7 cns connect name [retries number] [retry-interval Enters CNS connect configuration mode, specifies the
seconds] [sleep seconds] [timeout seconds] name of the CNS connect profile, and defines the profile
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
506
Network Management
Enabling an Initial Configuration for Cisco IOS CNS Agent
Step 8 discover {controller controller-type | dlci [subinterface Specifies the interface parameters in the CNS connect
subinterface-number] | interface [interface-type] | line profile.
line-type}
• For controller controller-type, enter the controller
Example: type.
Step 9 template name [... name] Specifies the list of CNS connect templates in the CNS
connect profile to be applied to the switch configuration.
Example:
You can specify more than one template.
SwitchDevice(config-cns-conn)# template
template-dhcp
SwitchDevice(config-cns-conn)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
507
Network Management
Enabling an Initial Configuration for Cisco IOS CNS Agent
Step 14 cns id interface num {dns-reverse | ipaddress | (Optional) Sets the unique EventID or ConfigID used by
mac-address} [event] [image] the Configuration Engine. If you enter this command, do
not enter the cns id {hardware-serial | hostname | string
Example:
string | udi} [event] [image] command.
RemoteSwitchDevice(config)# cns id • For interface num, enter the type of interface. For
GigabitEthernet1/0/1 ipaddress example, ethernet, group-async, loopback, or
virtual-template. This setting specifies from which
interface the IP or MAC address should be retrieved
to define the unique ID.
• For {dns-reverse | ipaddress | mac-address}, enter
dns-reverse to retrieve the hostname and assign it as
the unique ID, enter ipaddress to use the IP address,
or enter mac-address to use the MAC address as
the unique ID.
• (Optional) Enter event to set the ID to be the event-id
value used to identify the switch.
• (Optional) Enter image to set the ID to be the
image-id value used to identify the switch.
Step 15 cns id {hardware-serial | hostname | string string | udi} (Optional) Sets the unique EventID or ConfigID used by
[event] [image] the Configuration Engine. If you enter this command, do
not enter the cns id interface num {dns-reverse | ipaddress
Example:
| mac-address} [event] [image] command.
RemoteSwitchDevice(config)# cns id hostname • For { hardware-serial | hostname | string string
| udi }, enter hardware-serial to set the switch
serial number as the unique ID, enter hostname (the
default) to select the switch hostname as the unique
ID, enter an arbitrary text string for string string as
the unique ID, or enter udi to set the unique device
identifier (UDI) as the unique ID.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
508
Network Management
Enabling an Initial Configuration for Cisco IOS CNS Agent
SwitchDevice(config)# end
Step 19 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
509
Network Management
Refreshing DeviceIDs
What to do next
To verify information about the configuration agent, use the show cns config connections command in
privileged EXEC mode.
To disable the CNS Cisco IOS agent, use the no cns config initial { ip-address | hostname } global configuration
command.
Related Topics
Initial Configuration, on page 499
Monitoring CNS Configurations, on page 514
Refreshing DeviceIDs
Follow these steps to refresh a DeviceID when changing the hostname on the switch.
SUMMARY STEPS
1. enable
2. show cns config connections
3. Make sure that the CNS event agent is properly connected to the event gateway.
4. show cns event connections
5. Record from the output of Step 4 the information for the currently connected connection listed below.
You will be using the IP address and port number in subsequent steps of these instructions.
6. configure terminal
7. no cns event ip-address port-number
8. cns event ip-address port-number
9. end
10. Make sure that you have reestablished the connection between the switch and the event connection by
examining the output from show cns event connections.
11. show running-config
12. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
510
Network Management
Refreshing DeviceIDs
Step 3 Make sure that the CNS event agent is properly connected Examine the output of show cns config connections for
to the event gateway. the following:
• Connection is active.
• Connection is using the currently configured switch
hostname. The DeviceID will be refreshed to
correspond to the new hostname configuration using
these instructions.
Step 4 show cns event connections Displays the event connection information for your switch.
Example:
Step 5 Record from the output of Step 4 the information for the
currently connected connection listed below. You will be
using the IP address and port number in subsequent steps
of these instructions.
Step 6 configure terminal Enters global configuration mode.
Example:
Step 7 no cns event ip-address port-number Specifies the IP address and port number that you recorded
in Step 5 in this command.
Example:
SwitchDevice(config)# no cns event 172.28.129.22 This command breaks the connection between the switch
2012 and the event gateway. It is necessary to first break, then
reestablish, this connection to refresh the DeviceID.
Step 8 cns event ip-address port-number Specifies the IP address and port number that you recorded
in Step 5 in this command.
Example:
SwitchDevice(config)# cns event 172.28.129.22 2012 This command reestablishes the connection between the
switch and the event gateway.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
511
Network Management
Enabling a Partial Configuration for Cisco IOS CNS Agent
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Hostname and DeviceID, on page 499
SUMMARY STEPS
1. enable
2. configure terminal
3. cns config partial {ip-address | hostname} [port-number] [source ip-address]
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
512
Network Management
Enabling a Partial Configuration for Cisco IOS CNS Agent
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To verify information about the configuration agent, use either the show cns config stats or the show cns
config outstanding command in privileged EXEC mode.
To disable the Cisco IOS agent, use the no cns config partial { ip-address | hostname } global configuration
command. To cancel a partial configuration, use the cns config cancel global configuration command.
Related Topics
Incremental (Partial) Configuration, on page 500
Monitoring CNS Configurations, on page 514
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
513
Network Management
Monitoring CNS Configurations
Command Purpose
show cns config connections Displays the status of the CNS Cisco IOS CNS agent
connections.
SwitchDevice# show cns config connections
show cns config outstanding Displays information about incremental (partial) CNS
configurations that have started but are not yet completed.
SwitchDevice# show cns config outstanding
show cns config stats Displays statistics about the Cisco IOS CNS agent.
show cns event connections Displays the status of the CNS event agent connections.
show cns event gateway Displays the event gateway information for your switch.
show cns event stats Displays statistics about the CNS event agent.
show cns event subject Displays a list of event agent subjects that are subscribed
to by applications.
SwitchDevice# show cns event subject
Related Topics
Enabling a Partial Configuration for Cisco IOS CNS Agent, on page 512
Incremental (Partial) Configuration, on page 500
Enabling an Initial Configuration for Cisco IOS CNS Agent, on page 505
Initial Configuration, on page 499
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
514
CHAPTER 27
Configuring the Cisco Discovery Protocol
• Finding Feature Information, on page 515
• Information About CDP, on page 515
• How to Configure CDP, on page 516
• Monitoring and Maintaining CDP, on page 524
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
515
Network Management
Default CDP Configuration
On the switch, CDP enables Network Assistant to display a graphical view of the network. The switch uses
CDP to find cluster candidates and maintain information about cluster members and other devices up to three
cluster-enabled devices away from the command switch by default.
Related Topics
Configuring CDP Characteristics, on page 516
Monitoring and Maintaining CDP, on page 524
Related Topics
Enabling CDP, on page 519
Disabling CDP, on page 518
Enabling CDP on an Interface, on page 522
Disabling CDP on an Interface, on page 521
Note Steps 3 through 5 are all optional and can be performed in any order.
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
516
Network Management
Configuring CDP Characteristics
2. configure terminal
3. cdp timer seconds
4. cdp holdtime seconds
5. cdp advertise-v2
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 cdp timer seconds (Optional) Sets the transmission frequency of CDP updates
in seconds.
Example:
The range is 5 to 254; the default is 60 seconds.
SwitchDevice(config)# cdp timer 20
Step 4 cdp holdtime seconds (Optional) Specifies the amount of time a receiving device
should hold the information sent by your device before
Example:
discarding it.
SwitchDevice(config)# cdp holdtime 60 The range is 10 to 255 seconds; the default is 180 seconds.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
517
Network Management
Disabling CDP
What to do next
Use the no form of the CDP commands to return to the default settings.
Related Topics
CDP Overview, on page 515
Monitoring and Maintaining CDP, on page 524
Disabling CDP
CDP is enabled by default.
Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling
CDP can interrupt cluster discovery and device connectivity.
SUMMARY STEPS
1. enable
2. configure terminal
3. no cdp run
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
518
Network Management
Enabling CDP
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
You must reenable CDP to use it.
Related Topics
Enabling CDP, on page 519
Default CDP Configuration, on page 516
Enabling CDP
CDP is enabled by default.
Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling
CDP can interrupt cluster discovery and device connectivity.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
519
Network Management
Enabling CDP
SUMMARY STEPS
1. enable
2. configure terminal
3. cdp run
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
520
Network Management
Disabling CDP on an Interface
What to do next
Use the show run all command to show that CDP has been enabled. If you enter only show run, the enabling
of CDP may not be displayed.
Related Topics
Default CDP Configuration, on page 516
Disabling CDP, on page 518
Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling
CDP can interrupt cluster discovery and device connectivity.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. no cdp enable
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you are disabling CDP,
and enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
521
Network Management
Enabling CDP on an Interface
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Enabling CDP on an Interface, on page 522
Default CDP Configuration, on page 516
Note Switch clusters and other Cisco devices (such as Cisco IP Phones) regularly exchange CDP messages. Disabling
CDP can interrupt cluster discovery and device connectivity.
Follow these steps to enable CDP on a port on which it has been disabled.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. cdp enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
522
Network Management
Enabling CDP on an Interface
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you are enabling CDP, and
enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Default CDP Configuration, on page 516
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
523
Network Management
Monitoring and Maintaining CDP
Command Description
clear cdp counters Resets the traffic counters to zero.
clear cdp table Deletes the CDP table of information about neighbors.
show cdp entry entry-name [version] [protocol] Displays information about a specific neighbor.
You can enter an asterisk (*) to display all CDP
neighbors, or you can enter the name of the neighbor
about which you want information.
You can also limit the display to information about
the protocols enabled on the specified neighbor or
information about the version of software running on
the device.
show cdp interface [interface-id] Displays information about interfaces where CDP is
enabled.
You can limit the display to the interface about which
you want information.
show cdp neighbors [interface-id] [detail] Displays information about neighbors, including
device type, interface type and number, holdtime
settings, capabilities, platform, and port ID.
You can limit the display to neighbors of a specific
interface or expand the display to provide more
detailed information.
Related Topics
Configuring CDP Characteristics, on page 516
CDP Overview, on page 515
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
524
CHAPTER 28
Configuring Simple Network Management
Protocol
• Finding Feature Information, on page 525
• Prerequisites for SNMP, on page 525
• Restrictions for SNMP, on page 527
• Information About SNMP, on page 528
• How to Configure SNMP, on page 532
• Monitoring SNMP Status, on page 546
• SNMP Examples, on page 547
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
525
Network Management
Prerequisites for SNMP
Both SNMPv1 and SNMPv2C use a community-based form of security. The community of managers able to
access the agent’s MIB is defined by an IP address access control list and password.
SNMPv2C includes a bulk retrieval function and more detailed error message reporting to management
stations. The bulk retrieval function retrieves tables and large quantities of information, minimizing the number
of round-trips required. The SNMPv2C improved error-handling includes expanded error codes that distinguish
different kinds of error conditions; these conditions are reported through a single error code in SNMPv1. Error
return codes in SNMPv2C report the error type.
SNMPv3 provides for both security models and security levels. A security model is an authentication strategy
set up for a user and the group within which the user resides. A security level is the permitted level of security
within a security model. A combination of the security level and the security model determine which security
method is used when handling an SNMP packet. Available security models are SNMPv1, SNMPv2C, and
SNMPv3.
The following table identifies characteristics and compares different combinations of security models and
levels:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
526
Network Management
Restrictions for SNMP
You must configure the SNMP agent to use the SNMP version supported by the management station. Because
an agent can communicate with multiple managers, you can configure the software to support communications
using SNMPv1, SNMPv2C, or SNMPv3.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
527
Network Management
Information About SNMP
Operation Description
get-request Retrieves a value from a specific variable.
get-next-request Retrieves a value from a variable within a table.2
get-bulk-request3 Retrieves large blocks of data, such as multiple rows in a table, that would otherwise require
the transmission of many small blocks of data.
get-response Replies to a get-request, get-next-request, and set-request sent by an NMS.
set-request Stores a value in a specific variable.
trap An unsolicited message sent by an SNMP agent to an SNMP manager when some event
has occurred.
2
With this operation, an SNMP manager does not need to know the exact variable name. A sequential
search is performed to find the needed variable from within a table.
3
The get-bulk command only works with SNMPv2 or later.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
528
Network Management
SNMP Community Strings
• Set a MIB variable—The SNMP agent begins this function in response to a message from the NMS. The
SNMP agent changes the value of the MIB variable to the value requested by the NMS.
The SNMP agent also sends unsolicited trap messages to notify an NMS that a significant event has occurred
on the agent. Examples of trap conditions include, but are not limited to, when a port or module goes up or
down, when spanning-tree topology changes occur, and when authentication failures occur.
Related Topics
Disabling the SNMP Agent, on page 532
Monitoring SNMP Status, on page 546
Setting the Agent Contact and Location Information, on page 544
Related Topics
Configuring Community Strings, on page 533
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
529
Network Management
SNMP Notifications
SNMP Notifications
SNMP allows the switch to send notifications to SNMP managers when particular events occur. SNMP
notifications can be sent as traps or inform requests. In command syntax, unless there is an option in the
command to select either traps or informs, the keyword traps refers to either traps or informs, or both. Use
the snmp-server host command to specify whether to send SNMP notifications as traps or informs.
Traps are unreliable because the receiver does not send an acknowledgment when it receives a trap, and the
sender cannot determine if the trap was received. When an SNMP manager receives an inform request, it
acknowledges the message with an SNMP response protocol data unit (PDU). If the sender does not receive
a response, the inform request can be sent again. Because they can be resent, informs are more likely than
traps to reach their intended destination.
The characteristics that make informs more reliable than traps also consume more resources in the switch and
in the network. Unlike a trap, which is discarded as soon as it is sent, an inform request is held in memory
until a response is received or the request times out. Traps are sent only once, but an inform might be resent
or retried several times. The retries increase traffic and contribute to a higher overhead on the network.
Therefore, traps and informs require a trade-off between reliability and resources. If it is important that the
SNMP manager receive every notification, use inform requests. If traffic on the network or memory in the
switch is a concern and notification is not required, use traps.
Related Topics
Configuring SNMP Notifications, on page 539
Monitoring SNMP Status, on page 546
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
530
Network Management
Default SNMP Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
531
Network Management
How to Configure SNMP
• When configuring SNMP informs, you need to configure the SNMP engine ID for the remote agent in
the SNMP database before you can send proxy requests or informs to it.
• If a local user is not associated with a remote host, the switch does not send informs for the auth
(authNoPriv) and the priv (authPriv) authentication levels.
• Changing the value of the SNMP engine ID has significant results. A user's password (entered on the
command line) is converted to an MD5 or SHA security digest based on the password and the local
engine ID. The command-line password is then destroyed, as required by RFC 2274. Because of this
deletion, if the value of the engine ID changes, the security digests of SNMPv3 users become invalid,
and you need to reconfigure SNMP users by using the snmp-server user username global configuration
command. Similar restrictions require the reconfiguration of community strings when the engine ID
changes.
Related Topics
Configuring SNMP Groups and Users, on page 536
Monitoring SNMP Status, on page 546
SUMMARY STEPS
1. enable
2. configure terminal
3. no snmp-server
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
532
Network Management
Configuring Community Strings
SwitchDevice> enable
SwitchDevice(config)# no snmp-server
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
SNMP Agent Functions, on page 528
Monitoring SNMP Status, on page 546
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
533
Network Management
Configuring Community Strings
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server community string [view view-name] [ro | rw] [access-list-number]
4. access-list access-list-number {deny | permit} source [source-wildcard]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 snmp-server community string [view view-name] [ro Configures the community string.
| rw] [access-list-number]
Note The @ symbol is used for delimiting the context
Example: information. Avoid using the @ symbol as part
of the SNMP community string when
SwitchDevice(config)# snmp-server community configuring this command.
comaccess ro 4
• For string, specify a string that acts like a password
and permits access to the SNMP protocol. You can
configure one or more community strings of any
length.
• (Optional) For view, specify the view record accessible
to the community.
• (Optional) Specify either read-only (ro) if you want
authorized management stations to retrieve MIB
objects, or specify read-write (rw) if you want
authorized management stations to retrieve and modify
MIB objects. By default, the community string permits
read-only access to all objects.
• (Optional) For access-list-number, enter an IP standard
access list numbered from 1 to 99 and 1300 to 1999.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
534
Network Management
Configuring Community Strings
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To disable access for an SNMP community, set the community string for that community to the null string
(do not enter a value for the community string).
To remove a specific community string, use the no snmp-server community string global configuration
command.
You can specify an identification name (engine ID) for the local or remote SNMP server engine on the switch.
You can configure an SNMP server group that maps SNMP users to SNMP views, and you can add new users
to the SNMP group.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
535
Network Management
Configuring SNMP Groups and Users
Related Topics
SNMP Community Strings, on page 529
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server engineID {local engineid-string | remote ip-address [udp-port port-number]
engineid-string}
4. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write
writeview] [notify notifyview] [access access-list]
5. snmp-server user username group-name {remote host [ udp-port port]} {v1 [access access-list] |
v2c [access access-list] | v3 [encrypted] [access access-list] [auth {md5 | sha} auth-password]
} [priv {des | 3des | aes {128 | 192 | 256}} priv-password]
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 snmp-server engineID {local engineid-string | remote Configures a name for either the local or remote copy of
ip-address [udp-port port-number] engineid-string} SNMP.
Example: • The engineid-string is a 24-character ID string with
the name of the copy of SNMP. You need not specify
SwitchDevice(config)# snmp-server engineID local the entire 24-character engine ID if it has trailing zeros.
1234 Specify only the portion of the engine ID up to the
point where only zeros remain in the value. The Step
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
536
Network Management
Configuring SNMP Groups and Users
Step 4 snmp-server group group-name {v1 | v2c | v3 {auth | Configures a new SNMP group on the remote device.
noauth | priv}} [read readview] [write writeview]
For group-name, specify the name of the group.
[notify notifyview] [access access-list]
Specify one of the following security models:
Example:
• v1 is the least secure of the possible security models.
SwitchDevice(config)# snmp-server group public v2c
access lmnop • v2c is the second least secure model. It allows
transmission of informs and integers twice the normal
width.
• v3, the most secure, requires you to select one of the
following authentication levels:
auth—Enables the Message Digest 5 (MD5) and the
Secure Hash Algorithm (SHA) packet authentication.
noauth—Enables the noAuthNoPriv security level.
This is the default if no keyword is specified.
priv—Enables Data Encryption Standard (DES) packet
encryption (also called privacy).
Step 5 snmp-server user username group-name {remote host [ Adds a new user for an SNMP group.
udp-port port]} {v1 [access access-list] | v2c [access
The username is the name of the user on the host that
access-list] | v3 [encrypted] [access access-list] [auth
connects to the agent.
{md5 | sha} auth-password] } [priv {des | 3des | aes
{128 | 192 | 256}} priv-password] The group-name is the name of the group to which the user
is associated.
Example:
Enter remote to specify a remote SNMP entity to which
the user belongs and the hostname or IP address of that
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
537
Network Management
Configuring SNMP Groups and Users
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
SNMP Configuration Guidelines, on page 531
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
538
Network Management
Configuring SNMP Notifications
Note Many commands use the word traps in the command syntax. Unless there is an option in the command to
select either traps or informs, the keyword traps refers to traps, informs, or both. Use the snmp-server host
global configuration command to specify whether to send SNMP notifications as traps or informs.
You can use the snmp-server host global configuration command for a specific host to receive the notification
types listed in the following table. You can enable any or all of these traps and configure a trap manager to
receive them.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
539
Network Management
Configuring SNMP Notifications
ipsla Generates a trap for the SNMP IP Service Level Agreements (SLAs).
snmp Generates a trap for SNMP-type notifications for authentication,
cold start, warm start, link up or link down.
storm-control Generates a trap for SNMP storm-control. You can also set a
maximum trap rate per minute. The range is from 0 to 1000; the
default is 0 (no limit is imposed; a trap is sent at every occurrence).
stpx Generates SNMP STP Extended MIB traps.
syslog Generates SNMP syslog traps.
tty Generates a trap for TCP connections. This trap is enabled by default.
vlan-membership Generates a trap for SNMP VLAN membership changes.
vlancreate Generates SNMP VLAN created traps.
vlandelete Generates SNMP VLAN deleted traps.
vtp Generates a trap for VLAN Trunking Protocol (VTP) changes.
Follow these steps to configure the switch to send traps or informs to a host.
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server engineID remote ip-address engineid-string
4. snmp-server user username group-name {remote host [ udp-port port]} {v1 [access access-list]
| v2c [access access-list] | v3 [encrypted] [access access-list] [auth {md5 | sha} auth-password]
}
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
540
Network Management
Configuring SNMP Notifications
5. snmp-server group group-name {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write
writeview] [notify notifyview] [access access-list]
6. snmp-server host host-addr [informs | traps] [version {1 | 2c | 3 {auth | noauth | priv}}]
community-string [notification-type]
7. snmp-server enable traps notification-types
8. snmp-server trap-source interface-id
9. snmp-server queue-length length
10. snmp-server trap-timeout seconds
11. end
12. show running-config
13. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 snmp-server engineID remote ip-address engineid-string Specifies the engine ID for the remote host.
Example:
SwitchDevice(config)# snmp-server engineID remote
192.180.1.27 00000063000100a1c0b4011b
Step 4 snmp-server user username group-name {remote host Configures an SNMP user to be associated with the remote
[ udp-port port]} {v1 [access access-list] | v2c host created in Step 3.
[access access-list] | v3 [encrypted] [access
Note You cannot configure a remote user for an
access-list] [auth {md5 | sha} auth-password] }
address without first configuring the engine ID
Example: for the remote host. Otherwise, you receive an
SwitchDevice(config)# snmp-server user Pat public error message, and the command is not
v2c executed.
Step 5 snmp-server group group-name {v1 | v2c | v3 {auth Configures an SNMP group.
| noauth | priv}} [read readview] [write writeview]
[notify notifyview] [access access-list]
Example:
SwitchDevice(config)# snmp-server group public
v2c access lmnop
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
541
Network Management
Configuring SNMP Notifications
Step 7 snmp-server enable traps notification-types Enables the switch to send traps or informs and specifies
the type of notifications to be sent. For a list of notification
Example:
types, see the table above, or enter snmp-server enable
SwitchDevice(config)# snmp-server enable traps traps ?
snmp
To enable multiple types of traps, you must enter a separate
snmp-server enable traps command for each trap type.
Note When you configure a trap by using the
notification type port-security, configure the
port security trap first, and then configure the
port security trap rate:
1. snmp-server enable traps port-security
2. snmp-server enable traps port-security
trap-rate rate
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
542
Network Management
Configuring SNMP Notifications
Step 9 snmp-server queue-length length (Optional) Establishes the message queue length for each
trap host. The range is 1 to 5000; the default is 10.
Example:
SwitchDevice(config)# snmp-server queue-length 20
Step 10 snmp-server trap-timeout seconds (Optional) Defines how often to resend trap messages. The
range is 1 to 1000; the default is 30 seconds.
Example:
SwitchDevice(config)# snmp-server trap-timeout 60
SwitchDevice(config)# end
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
The snmp-server host command specifies which hosts receive the notifications. The snmp-server enable
traps command globally enables the method for the specified notification (for traps and informs). To enable
a host to receive an inform, you must configure an snmp-server host informs command for the host and
globally enable informs by using the snmp-server enable traps command.
To remove the specified host from receiving traps, use the no snmp-server host host global configuration
command. The no snmp-server host command with no keywords disables traps, but not informs, to the host.
To disable informs, use the no snmp-server host informs global configuration command. To disable a specific
trap type, use the no snmp-server enable traps notification-types global configuration command.
Related Topics
SNMP Notifications, on page 530
Monitoring SNMP Status, on page 546
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
543
Network Management
Setting the Agent Contact and Location Information
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server contact text
4. snmp-server location text
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
544
Network Management
Limiting TFTP Servers Used Through SNMP
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
SNMP Agent Functions, on page 528
SUMMARY STEPS
1. enable
2. configure terminal
3. snmp-server tftp-server-list access-list-number
4. access-list access-list-number {deny | permit} source [source-wildcard]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 snmp-server tftp-server-list access-list-number Limits the TFTP servers used for configuration file copies
through SNMP to the servers in the access list.
Example:
SwitchDevice(config)# snmp-server tftp-server-list For access-list-number, enter an IP standard access list
44 numbered from 1 to 99 and 1300 to 1999.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
545
Network Management
Monitoring SNMP Status
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show snmp Displays SNMP statistics.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
546
Network Management
SNMP Examples
Command Purpose
Displays information on the local SNMP engine and
all remote engines that have been configured on the
device.
show snmp user Displays information on each SNMP user name in the
SNMP users table.
Note You must use this command to display
SNMPv3 configuration information for
auth | noauth | priv mode. This
information is not displayed in the show
running-config output.
Related Topics
Disabling the SNMP Agent, on page 532
SNMP Agent Functions, on page 528
Configuring SNMP Groups and Users, on page 536
SNMP Configuration Guidelines, on page 531
Configuring SNMP Notifications, on page 539
SNMP Notifications, on page 530
SNMP Examples
This example shows how to enable all versions of SNMP. The configuration permits any SNMP manager to
access all objects with read-only permissions using the community string public. This configuration does not
cause the switch to send any traps.
SwitchDevice(config)# snmp-server community public
This example shows how to permit any SNMP manager to access all objects with read-only permission using
the community string public. The switch also sends VTP traps to the hosts 192.180.1.111 and 192.180.1.33
using SNMPv1 and to the host 192.180.1.27 using SNMPv2C. The community string public is sent with the
traps.
SwitchDevice(config)# snmp-server community public
SwitchDevice(config)# snmp-server enable traps vtp
SwitchDevice(config)# snmp-server host 192.180.1.27 version 2c public
SwitchDevice(config)# snmp-server host 192.180.1.111 version 1 public
SwitchDevice(config)# snmp-server host 192.180.1.33 public
This example shows how to allow read-only access for all objects to members of access list 4 that use the
comaccess community string. No other SNMP managers have access to any objects. SNMP Authentication
Failure traps are sent by SNMPv2C to the host cisco.com using the community string public.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
547
Network Management
SNMP Examples
This example shows how to send Entity MIB traps to the host cisco.com. The community string is restricted.
The first line enables the switch to send Entity MIB traps in addition to any traps previously enabled. The
second line specifies the destination of these traps and overwrites any previous snmp-server host commands
for the host cisco.com.
SwitchDevice(config)# snmp-server enable traps entity
SwitchDevice(config)# snmp-server host cisco.com restricted entity
This example shows how to enable the switch to send all traps to the host myhost.cisco.com using the community
string public:
SwitchDevice(config)# snmp-server enable traps
SwitchDevice(config)# snmp-server host myhost.cisco.com public
This example shows how to associate a user with a remote host and to send auth (authNoPriv)
authentication-level informs when the user enters global configuration mode:
SwitchDevice(config)# snmp-server engineID remote 192.180.1.27 00000063000100a1c0b4011b
SwitchDevice(config)# snmp-server group authgroup v3 auth
SwitchDevice(config)# snmp-server user authuser authgroup remote 192.180.1.27 v3 auth md5
mypassword
SwitchDevice(config)# snmp-server user authuser authgroup v3 auth md5 mypassword
SwitchDevice(config)# snmp-server host 192.180.1.27 informs version 3 auth authuser config
SwitchDevice(config)# snmp-server enable traps
SwitchDevice(config)# snmp-server inform retries 0
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
548
CHAPTER 29
Configuring SPAN and RSPAN
• Finding Feature Information, on page 549
• Prerequisites for SPAN and RSPAN, on page 549
• Restrictions for SPAN and RSPAN, on page 550
• Information About SPAN and RSPAN, on page 551
• How to Configure SPAN and RSPAN, on page 563
• Monitoring SPAN and RSPAN Operations, on page 586
• SPAN and RSPAN Configuration Examples, on page 586
RSPAN
• We recommend that you configure an RSPAN VLAN before you configure an RSPAN source or a
destination session.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
549
Network Management
Restrictions for SPAN and RSPAN
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
550
Network Management
Information About SPAN and RSPAN
• When SPAN or RSPAN is enabled, each packet being monitored is sent twice, once as normal traffic
and once as a monitored packet. Monitoring a large number of ports or VLANs could potentially generate
large amounts of network traffic.
• You can configure SPAN sessions on disabled ports; however, a SPAN session does not become active
unless you enable the destination port and at least one source port or VLAN for that session.
• The switch does not support a combination of local SPAN and RSPAN in a single session.
• An RSPAN source session cannot have a local destination port.
• An RSPAN destination session cannot have a local source port.
• An RSPAN destination session and an RSPAN source session that are using the same RSPAN
VLAN cannot run on the same switch or switch stack.
RSPAN
The restrictions for RSPAN are as follows:
• RSPAN does not support BPDU packet monitoring or other Layer 2 switch protocols.
• The RSPAN VLAN is configured only on trunk ports and not on access ports. To avoid unwanted traffic
in RSPAN VLANs, make sure that the VLAN remote-span feature is supported in all the participating
switches.
• RSPAN VLANs are included as sources for port-based RSPAN sessions when source trunk ports have
active RSPAN VLANs. RSPAN VLANs can also be sources in SPAN sessions. However, since the
switch does not monitor spanned traffic, it does not support egress spanning of packets on any RSPAN
VLAN identified as the destination of an RSPAN source session on the switch.
• CDP packets are not forwarded in RSPAN configured VLAN due to limitation in hardware. The
workaround is to disable CDP on all the interfaces carrying RSPAN VLAN on the devices connected to
the switch.
• If you enable VTP and VTP pruning, RSPAN traffic is pruned in the trunks to prevent the unwanted
flooding of RSPAN traffic across the network for VLAN IDs that are lower than 1005.
• To use RSPAN, the switch must be running the LAN Base image.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
551
Network Management
Local SPAN
Only traffic that enters or leaves source ports or traffic that enters or leaves source VLANs can be monitored
by using SPAN; traffic routed to a source VLAN cannot be monitored. For example, if incoming traffic is
being monitored, traffic that gets routed from another VLAN to the source VLAN cannot be monitored;
however, traffic that is received on the source VLAN and routed to another VLAN can be monitored.
You can use the SPAN or RSPAN destination port to inject traffic from a network security device. For example,
if you connect a Cisco Intrusion Detection System (IDS) sensor appliance to a destination port, the IDS device
can send TCP reset packets to close down the TCP session of a suspected attacker.
Local SPAN
Local SPAN supports a SPAN session entirely within one switch; all source ports or source VLANs and
destination ports are in the same switch or switch stack. Local SPAN copies traffic from one or more source
ports in any VLAN or from one or more VLANs to a destination port for analysis.
Figure 56: Example of Local SPAN Configuration on a Single Device
All traffic on port 5 (the source port) is mirrored to port 10 (the destination port). A network analyzer on port
10 receives all network traffic from port 5 without being physically attached to port
5.
Figure 57: Example of Local SPAN Configuration on a Device Stack
This is an example of a local SPAN in a switch stack, where the source and destination ports reside on different
stack members.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
552
Network Management
Remote SPAN
Related Topics
Creating a Local SPAN Session, on page 563
Creating a Local SPAN Session and Configuring Incoming Traffic, on page 566
Example: Configuring Local SPAN, on page 586
Remote SPAN
RSPAN supports source ports, source VLANs, and destination ports on different switches (or different switch
stacks), enabling remote monitoring of multiple switches across your network.
Figure 58: Example of RSPAN Configuration
The figure below shows source ports on Switch A and Switch B. The traffic for each RSPAN session is carried
over a user-specified RSPAN VLAN that is dedicated for that RSPAN session in all participating switches.
The RSPAN traffic from the source ports or VLANs is copied into the RSPAN VLAN and forwarded over
trunk ports carrying the RSPAN VLAN to a destination session monitoring the RSPAN VLAN. Each RSPAN
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
553
Network Management
SPAN and RSPAN Concepts and Terminology
source switch must have either ports or VLANs as RSPAN sources. The destination is always a physical port,
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
554
Network Management
SPAN Sessions
SPAN Sessions
SPAN sessions (local or remote) allow you to monitor traffic on one or more ports, or one or more VLANs,
and send the monitored traffic to one or more destination ports.
A local SPAN session is an association of a destination port with source ports or source VLANs, all on a
single network device. Local SPAN does not have separate source and destination sessions. Local SPAN
sessions gather a set of ingress and egress packets specified by the user and form them into a stream of SPAN
data, which is directed to the destination port.
RSPAN consists of at least one RSPAN source session, an RSPAN VLAN, and at least one RSPAN destination
session. You separately configure RSPAN source sessions and RSPAN destination sessions on different
network devices. To configure an RSPAN source session on a device, you associate a set of source ports or
source VLANs with an RSPAN VLAN. The output of this session is the stream of SPAN packets that are
sent to the RSPAN VLAN. To configure an RSPAN destination session on another device, you associate the
destination port with the RSPAN VLAN. The destination session collects all RSPAN VLAN traffic and sends
it out the RSPAN destination port.
An RSPAN source session is very similar to a local SPAN session, except for where the packet stream is
directed. In an RSPAN source session, SPAN packets are relabeled with the RSPAN VLAN ID and directed
over normal trunk ports to the destination switch.
An RSPAN destination session takes all packets received on the RSPAN VLAN, strips off the VLAN tagging,
and presents them on the destination port. The session presents a copy of all RSPAN VLAN packets (except
Layer 2 control packets) to the user for analysis.
More than one source session and more than one destination session can be active in the same RSPAN VLAN.
Intermediate switches also can separate the RSPAN source and destination sessions. These switches are unable
to run RSPAN, but they must respond to the requirements of the RSPAN VLAN.
Traffic monitoring in a SPAN session has these restrictions:
• Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the same session.
• You can run both a local SPAN and an RSPAN source session in the same switch or switch stack. The
switch or switch stack supports a total of 64 source and RSPAN destination sessions.
• You can configure two separate SPAN or RSPAN source sessions with separate or overlapping sets of
SPAN source ports and VLANs. Both switched and routed ports can be configured as SPAN sources
and destinations.
• You can have multiple destination ports in a SPAN session, but no more than 64 destination ports per
switch stack.
• SPAN sessions do not interfere with the normal operation of the switch. However, an oversubscribed
SPAN destination, for example, a 10-Mb/s port monitoring a 100-Mb/s port, can result in dropped or
lost packets.
• When SPAN or RSPAN is enabled, each packet being monitored is sent twice, once as normal traffic
and once as a monitored packet. Therefore monitoring a large number of ports or VLANs could potentially
generate large amounts of network traffic.
• You can configure SPAN sessions on disabled ports; however, a SPAN session does not become active
unless you enable the destination port and at least one source port or VLAN for that session.
• The switch does not support a combination of local SPAN and RSPAN in a single session.
• An RSPAN source session cannot have a local destination port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
555
Network Management
Monitored Traffic
Related Topics
Creating a Local SPAN Session, on page 563
Creating a Local SPAN Session and Configuring Incoming Traffic, on page 566
Example: Configuring Local SPAN, on page 586
Monitored Traffic
SPAN sessions can monitor these traffic types:
• Receive (Rx) SPAN—Receive (or ingress) SPAN monitors as much as possible all of the packets received
by the source interface or VLAN before any modification or processing is performed by the switch. A
copy of each packet received by the source is sent to the destination port for that SPAN session.
Packets that are modified because of routing or Quality of Service (QoS)—for example, modified
Differentiated Services Code Point (DSCP)—are copied before modification.
Features that can cause a packet to be dropped during receive processing have no effect on ingress SPAN;
the destination port receives a copy of the packet even if the actual incoming packet is dropped. These
features include IP standard and extended input Access Control Lists (ACLs), ingress QoS policing,
VLAN ACLs, and egress QoS policing.
• Transmit (Tx) SPAN—Transmit (or egress) SPAN monitors as much as possible all of the packets sent
by the source interface after all modification and processing is performed by the switch. A copy of each
packet sent by the source is sent to the destination port for that SPAN session. The copy is provided after
the packet is modified.
Packets that are modified because of routing (for example, with modified time-to-live (TTL), MAC
address, or QoS values) are duplicated (with the modifications) at the destination port.
Features that can cause a packet to be dropped during transmit processing also affect the duplicated copy
for SPAN. These features include IP standard and extended output ACLs and egress QoS policing.
• Both—In a SPAN session, you can also monitor a port or VLAN for both received and sent packets.
This is the default.
The default configuration for local SPAN session ports is to send all packets untagged. SPAN also does not
normally monitor bridge protocol data unit (BPDU) packets and Layer 2 protocols, such as Cisco Discovery
Protocol (CDP), VLAN Trunk Protocol (VTP), Dynamic Trunking Protocol (DTP), Spanning Tree Protocol
(STP), and Port Aggregation Protocol (PAgP). However, when you enter the encapsulation replicate keywords
when configuring a destination port, these changes occur:
• Packets are sent on the destination port with the same encapsulation (untagged or IEEE 802.1Q) that
they had on the source port.
• Packets of all types, including BPDU and Layer 2 protocol packets, are monitored.
Therefore, a local SPAN session with encapsulation replicate enabled can have a mixture of untagged and
IEEE 802.1Q tagged packets appear on the destination port.
Switch congestion can cause packets to be dropped at ingress source ports, egress source ports, or SPAN
destination ports. In general, these characteristics are independent of one another. For example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
556
Network Management
Source Ports
• A packet might be forwarded normally but dropped from monitoring due to an oversubscribed SPAN
destination port.
• An ingress packet might be dropped from normal forwarding, but still appear on the SPAN destination
port.
• An egress packet dropped because of switch congestion is also dropped from egress SPAN.
In some SPAN configurations, multiple copies of the same source packet are sent to the SPAN destination
port. For example, a bidirectional (both Rx and Tx) SPAN session is configured for the Rx monitor on port
A and Tx monitor on port B. If a packet enters the switch through port A and is switched to port B, both
incoming and outgoing packets are sent to the destination port. Both packets are the same unless a Layer 3
rewrite occurs, in which case the packets are different because of the packet modification.
Source Ports
A source port (also called a monitored port) is a switched or routed port that you monitor for network traffic
analysis. In a local SPAN session or RSPAN source session, you can monitor source ports or VLANs for
traffic in one or both directions. The switch supports any number of source ports (up to the maximum number
of available ports on the switch) and any number of source VLANs (up to the maximum number of VLANs
supported). However, the switch supports a maximum of four sessions (two sessions if switch is in a stack
with Catalyst 2960-S switches) (local or RSPAN) with source ports or VLANs. You cannot mix ports and
VLANs in a single session.
A source port has these characteristics:
• It can be monitored in multiple SPAN sessions.
• Each source port can be configured with a direction (ingress, egress, or both) to monitor.
• It can be any port type (for example, EtherChannel, Gigabit Ethernet, and so forth).
• For EtherChannel sources, you can monitor traffic for the entire EtherChannel or individually on a
physical port as it participates in the port channel.
• It can be an access port, trunk port, routed port, or voice VLAN port.
• It cannot be a destination port.
• Source ports can be in the same or different VLANs.
• You can monitor multiple source ports in a single session.
Source VLANs
VLAN-based SPAN (VSPAN) is the monitoring of the network traffic in one or more VLANs. The SPAN
or RSPAN source interface in VSPAN is a VLAN ID, and traffic is monitored on all the ports for that VLAN.
VSPAN has these characteristics:
• All active ports in the source VLAN are included as source ports and can be monitored in either or both
directions.
• On a given port, only traffic on the monitored VLAN is sent to the destination port.
• If a destination port belongs to a source VLAN, it is excluded from the source list and is not monitored.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
557
Network Management
VLAN Filtering
• If ports are added to or removed from the source VLANs, the traffic on the source VLAN received by
those ports is added to or removed from the sources being monitored.
• You cannot use filter VLANs in the same session with VLAN sources.
• You can monitor only Ethernet VLANs.
VLAN Filtering
When you monitor a trunk port as a source port, by default, all VLANs active on the trunk are monitored.
You can limit SPAN traffic monitoring on trunk source ports to specific VLANs by using VLAN filtering.
• VLAN filtering applies only to trunk ports or to voice VLAN ports.
• VLAN filtering applies only to port-based sessions and is not allowed in sessions with VLAN sources.
• When a VLAN filter list is specified, only those VLANs in the list are monitored on trunk ports or on
voice VLAN access ports.
• SPAN traffic coming from other port types is not affected by VLAN filtering; that is, all VLANs are
allowed on other ports.
• VLAN filtering affects only traffic forwarded to the destination SPAN port and does not affect the
switching of normal traffic.
Destination Port
Each local SPAN session or RSPAN destination session must have a destination port (also called a monitoring
port) that receives a copy of traffic from the source ports or VLANs and sends the SPAN packets to the user,
usually a network analyzer.
A destination port has these characteristics:
• For a local SPAN session, the destination port must reside on the same switch or switch stack as the
source port. For an RSPAN session, it is located on the switch containing the RSPAN destination session.
There is no destination port on a switch or switch stack running only an RSPAN source session.
• When a port is configured as a SPAN destination port, the configuration overwrites the original port
configuration. When the SPAN destination configuration is removed, the port reverts to its previous
configuration. If a configuration change is made to the port while it is acting as a SPAN destination port,
the change does not take effect until the SPAN destination configuration had been removed.
Note When QoS is configured on the SPAN destination port, QoS takes effect
immediately.
• If the port was in an EtherChannel group, it is removed from the group while it is a destination port. If
it was a routed port, it is no longer a routed port.
• It can be any Ethernet physical port.
• It cannot be a secure port.
• It cannot be a source port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
558
Network Management
RSPAN VLAN
• It can participate in only one SPAN session at a time (a destination port in one SPAN session cannot be
a destination port for a second SPAN session).
• When it is active, incoming traffic is disabled. The port does not transmit any traffic except that required
for the SPAN session. Incoming traffic is never learned or forwarded on a destination port.
• If ingress traffic forwarding is enabled for a network security device, the destination port forwards traffic
at Layer 2.
• It does not participate in any of the Layer 2 protocols (STP, VTP, CDP, DTP, PagP).
• A destination port that belongs to a source VLAN of any SPAN session is excluded from the source list
and is not monitored.
• The maximum number of destination ports in a switch or switch stack is 64.
Local SPAN and RSPAN destination ports function differently with VLAN tagging and encapsulation:
• For local SPAN, if the encapsulation replicate keywords are specified for the destination port, these
packets appear with the original encapsulation (untagged, ISL, or IEEE 802.1Q). If these keywords are
not specified, packets appear in the untagged format. Therefore, the output of a local SPAN session with
encapsulation replicate enabled can contain a mixture of untagged, ISL, or IEEE 802.1Q-tagged packets.
• For RSPAN, the original VLAN ID is lost because it is overwritten by the RSPAN VLAN identification.
Therefore, all packets appear on the destination port as untagged.
RSPAN VLAN
The RSPAN VLAN carries SPAN traffic between RSPAN source and destination sessions. RSPAN VLAN
has these special characteristics:
• All traffic in the RSPAN VLAN is always flooded.
• No MAC address learning occurs on the RSPAN VLAN.
• RSPAN VLAN traffic only flows on trunk ports.
• RSPAN VLANs must be configured in VLAN configuration mode by using the remote-span VLAN
configuration mode command.
• STP can run on RSPAN VLAN trunks but not on SPAN destination ports.
• An RSPAN VLAN cannot be a private-VLAN primary or secondary VLAN.
For VLANs 1 to 1005 that are visible to VLAN Trunking Protocol (VTP), the VLAN ID and its associated
RSPAN characteristic are propagated by VTP. If you assign an RSPAN VLAN ID in the extended VLAN
range (1006 to 4094), you must manually configure all intermediate switches.
It is normal to have multiple RSPAN VLANs in a network at the same time with each RSPAN VLAN defining
a network-wide RSPAN session. That is, multiple RSPAN source sessions anywhere in the network can
contribute packets to the RSPAN session. It is also possible to have multiple RSPAN destination sessions
throughout the network, monitoring the same RSPAN VLAN and presenting traffic to the user. The RSPAN
VLAN ID separates the sessions.
Related Topics
Creating an RSPAN Source Session, on page 572
Creating an RSPAN Destination Session, on page 576
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
559
Network Management
SPAN and RSPAN Interaction with Other Features
Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 578
Examples: Creating an RSPAN VLAN, on page 588
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
560
Network Management
Flow-Based SPAN
• An IEEE 802.1x port can be a SPAN source port. You can enable IEEE 802.1x on a port that is a SPAN
destination port; however, IEEE 802.1x is disabled until the port is removed as a SPAN destination.
For SPAN sessions, do not enable IEEE 802.1x on ports with monitored egress when ingress forwarding
is enabled on the destination port. For RSPAN source sessions, do not enable IEEE 802.1x on any ports
that are egress monitored.
Flow-Based SPAN
You can control the type of network traffic to be monitored in SPAN or RSPAN sessions by using flow-based
SPAN (FSPAN) or flow-based RSPAN (FRSPAN), which apply access control lists (ACLs) to the monitored
traffic on the source ports. The FSPAN ACLs can be configured to filter IPv4, IPv6, and non-IP monitored
traffic.
You apply an ACL to a SPAN session through the interface. It is applied to all the traffic that is monitored
on all interfaces in the SPAN session.The packets that are permitted by this ACL are copied to the SPAN
destination port. No other packets are copied to the SPAN destination port.
The original traffic continues to be forwarded, and any port, VLAN, and router ACLs attached are applied.
The FSPAN ACL does not have any effect on the forwarding decisions. Similarly, the port, VLAN, and router
ACLs do not have any effect on the traffic monitoring. If a security input ACL denies a packet and it is not
forwarded, the packet is still copied to the SPAN destination ports if the FSPAN ACL permits it. But if the
security output ACL denies a packet and it is not sent, it is not copied to the SPAN destination ports. However,
if the security output ACL permits the packet to go out, it is only copied to the SPAN destination ports if the
FSPAN ACL permits it. This is also true for an RSPAN session.
You can attach three types of FSPAN ACLs to the SPAN session:
• IPv4 FSPAN ACL— Filters only IPv4 packets.
• IPv6 FSPAN ACL— Filters only IPv6 packets.
• MAC FSPAN ACL— Filters only non-IP packets.
The security ACLs have higher priority than the FSPAN ACLs on a switch. If FSPAN ACLs are applied, and
you later add more security ACLs that cannot fit in the hardware memory, the FSPAN ACLs that you applied
are removed from memory to allow space for the security ACLs. A system message notifies you of this action,
which is called unloading. When there is again space for the FSPAN ACLs to reside in memory, they are
added to the hardware memory on the switch. A system message notifies you of this action, which is called
reloading. The IPv4, IPv6 and MAC FSPAN ACLs can be unloaded or reloaded independently.
If a VLAN-based FSPAN session configured on a stack cannot fit in the hardware memory on one or more
switches, it is treated as unloaded on those switches, and traffic meant for the FSPAN ACL and sourcing on
that switch is not copied to the SPAN destination ports. The FSPAN ACL continues to be correctly applied,
and traffic is copied to the SPAN destination ports on the switches where the FSPAN ACL fits in the hardware
memory.
When an empty FSPAN ACL is attached, some hardware functions copy all traffic to the SPAN destination
ports for that ACL. If sufficient hardware resources are not available, even an empty FSPAN ACL can be
unloaded.
IPv4 and MAC FSPAN ACLs are supported on all feature sets. IPv6 FSPAN ACLs are supported only in the
advanced IP Services feature set.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
561
Network Management
Default SPAN and RSPAN Configuration
Related Topics
Configuring an FSPAN Session, on page 580
Configuring an FRSPAN Session, on page 583
Source port traffic to monitor Both received and sent traffic (both).
Configuration Guidelines
SPAN Configuration Guidelines
• To remove a source or destination port or VLAN from the SPAN session, use the no monitor session
session_number source {interface interface-id | vlan vlan-id} global configuration command or the no
monitor session session_number destination interface interface-id global configuration command. For
destination interfaces, the encapsulation options are ignored with the no form of the command.
• To monitor all VLANs on the trunk port, use the no monitor session session_number filter global
configuration command.
Related Topics
Creating a Local SPAN Session, on page 563
Creating a Local SPAN Session and Configuring Incoming Traffic, on page 566
Example: Configuring Local SPAN, on page 586
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
562
Network Management
FSPAN and FRSPAN Configuration Guidelines
• For RSPAN configuration, you can distribute the source ports and the destination ports across multiple
switches in your network.
• Access ports (including voice VLAN ports) on the RSPAN VLAN are put in the inactive state.
• You can configure any VLAN as an RSPAN VLAN as long as these conditions are met:
• The same RSPAN VLAN is used for an RSPAN session in all the switches.
• All participating switches support RSPAN.
Related Topics
Creating an RSPAN Source Session, on page 572
Creating an RSPAN Destination Session, on page 576
Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 578
Examples: Creating an RSPAN VLAN, on page 588
Related Topics
Configuring an FSPAN Session, on page 580
Configuring an FRSPAN Session, on page 583
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
5. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]}
6. end
7. show running-config
8. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
563
Network Management
Creating a Local SPAN Session
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Step 4 monitor session session_number source {interface Specifies the SPAN session and the source port (monitored
interface-id | vlan vlan-id} [, | -] [both | rx | tx] port).
Example: • For session_number, the range is 1 to 66.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
564
Network Management
Creating a Local SPAN Session
Step 5 monitor session session_number destination {interface Specifies the SPAN session and the destination port
interface-id [, | -] [encapsulation replicate]} (monitoring port).
Example: Note For local SPAN, you must use the same session
number for the source and destination interfaces.
SwitchDevice(config)# monitor session 1 destination
interface gigabitethernet1/0/2 encapsulation • For session_number, specify the session number
replicate
entered in step 4.
• For interface-id, specify the destination port. The
destination interface must be a physical port; it cannot
be an EtherChannel, and it cannot be a VLAN.
• (Optional) [, | -] Specifies a series or range of
interfaces. Enter a space before and after the comma;
enter a space before and after the hyphen.
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
565
Network Management
Creating a Local SPAN Session and Configuring Incoming Traffic
Related Topics
Local SPAN, on page 552
SPAN Sessions, on page 555
SPAN Configuration Guidelines, on page 562
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
5. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]
[ingress {dot1q vlan vlan-id | untagged vlan vlan-id | vlan vlan-id}]}
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
566
Network Management
Creating a Local SPAN Session and Configuring Incoming Traffic
Step 4 monitor session session_number source {interface Specifies the SPAN session and the source port (monitored
interface-id | vlan vlan-id} [, | -] [both | rx | tx] port).
Example:
Step 5 monitor session session_number destination {interface Specifies the SPAN session, the destination port, the packet
interface-id [, | -] [encapsulation replicate] [ingress {dot1q encapsulation, and the ingress VLAN and encapsulation.
vlan vlan-id | untagged vlan vlan-id | vlan vlan-id}]}
• For session_number, specify the session number
Example: entered in Step 4.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
567
Network Management
Specifying VLANs to Filter
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Local SPAN, on page 552
SPAN Sessions, on page 555
SPAN Configuration Guidelines, on page 562
Example: Configuring Local SPAN, on page 586
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source interface interface-id
5. monitor session session_number filter vlan vlan-id [, | -]
6. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]}
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
568
Network Management
Specifying VLANs to Filter
Step 4 monitor session session_number source interface Specifies the characteristics of the source port (monitored
interface-id port) and SPAN session.
Example: • For session_number, the range is 1 to 66.
Step 5 monitor session session_number filter vlan vlan-id [, | -] Limits the SPAN source traffic to specific VLANs.
Example: • For session_number, enter the session number
specified in Step 4.
SwitchDevice(config)# monitor session 2 filter vlan
1 - 5 , 9 • For vlan-id, the range is 1 to 4094.
• (Optional) Use a comma (,) to specify a series of
VLANs, or use a hyphen (-) to specify a range of
VLANs. Enter a space before and after the comma;
enter a space before and after the hyphen.
Step 6 monitor session session_number destination {interface Specifies the SPAN session and the destination port
interface-id [, | -] [encapsulation replicate]} (monitoring port).
Example: • For session_number, specify the session number
entered in Step 4.
SwitchDevice(config)# monitor session 2 destination
interface gigabitethernet1/0/1 • For interface-id, specify the destination port. The
destination interface must be a physical port; it cannot
be an EtherChannel, and it cannot be a VLAN.
• (Optional) [, | -] Specifies a series or range of
interfaces. Enter a space before and after the comma;
enter a space before and after the hyphen.
• (Optional) encapsulation replicate specifies that the
destination interface replicates the source interface
encapsulation method. If not selected, the default is to
send packets in native form (untagged).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
569
Network Management
Configuring a VLAN as an RSPAN VLAN
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. vlan vlan-id
4. remote-span
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
570
Network Management
Configuring a VLAN as an RSPAN VLAN
SwitchDevice(config-vlan)# remote-span
SwitchDevice(config-vlan)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
You must create the RSPAN VLAN in all switches that will participate in RSPAN. If the RSPAN VLAN-ID
is in the normal range (lower than 1005) and VTP is enabled in the network, you can create the RSPAN VLAN
in one switch, and VTP propagates it to the other switches in the VTP domain. For extended-range VLANs
(greater than 1005), you must configure RSPAN VLAN on both source and destination switches and any
intermediate switches.
Use VTP pruning to get an efficient flow of RSPAN traffic, or manually delete the RSPAN VLAN from all
trunks that do not need to carry the RSPAN traffic.
To remove the remote SPAN characteristic from a VLAN and convert it back to a normal VLAN, use the no
remote-span VLAN configuration command.
To remove a source port or VLAN from the SPAN session, use the no monitor session session_number
source {interface interface-id | vlan vlan-id} global configuration command. To remove the RSPAN VLAN
from the session, use the no monitor session session_number destination remote vlan vlan-id.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
571
Network Management
Creating an RSPAN Source Session
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
5. monitor session session_number destination remote vlan vlan-id
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Step 4 monitor session session_number source {interface Specifies the RSPAN session and the source port (monitored
interface-id | vlan vlan-id} [, | -] [both | rx | tx] port).
Example: • For session_number, the range is 1 to 66.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
572
Network Management
Creating an RSPAN Source Session
Step 5 monitor session session_number destination remote vlan Specifies the RSPAN session, the destination RSPAN
vlan-id VLAN, and the destination-port group.
Example: • For session_number, enter the number defined in Step
4.
SwitchDevice(config)# monitor session 1 destination
remote vlan 100 • For vlan-id, specify the source RSPAN VLAN to
monitor.
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
573
Network Management
Specifying VLANs to Filter
Related Topics
Remote SPAN, on page 553
RSPAN VLAN, on page 559
RSPAN Configuration Guidelines, on page 562
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source interface interface-id
5. monitor session session_number filter vlan vlan-id [, | -]
6. monitor session session_number destination remote vlan vlan-id
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
574
Network Management
Specifying VLANs to Filter
Step 5 monitor session session_number filter vlan vlan-id [, | -] Limits the SPAN source traffic to specific VLANs.
Example: • For session_number, enter the session number
specified in step 4.
SwitchDevice(config)# monitor session 2 filter vlan
1 - 5 , 9 • For vlan-id, the range is 1 to 4094.
• (Optional) , | - Use a comma (,) to specify a series of
VLANs or use a hyphen (-) to specify a range of
VLANs. Enter a space before and after the comma;
enter a space before and after the hyphen.
Step 6 monitor session session_number destination remote vlan Specifies the RSPAN session and the destination remote
vlan-id VLAN (RSPAN VLAN).
Example: • For session_number, enter the session number
specified in Step 4.
SwitchDevice(config)# monitor session 2 destination
remote vlan 902 • For vlan-id, specify the RSPAN VLAN to carry the
monitored traffic to the destination port.
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
575
Network Management
Creating an RSPAN Destination Session
SUMMARY STEPS
1. enable
2. configure terminal
3. vlan vlan-id
4. remote-span
5. exit
6. no monitor session {session_number | all | local | remote}
7. monitor session session_number source remote vlan vlan-id
8. monitor session session_number destination interface interface-id
9. end
10. show running-config
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 vlan vlan-id Specifies the VLAN ID of the RSPAN VLAN created
from the source switch, and enters VLAN configuration
Example:
mode.
SwitchDevice(config)# vlan 901 If both switches are participating in VTP and the RSPAN
VLAN ID is from 2 to 1005, Steps 3 through 5 are not
required because the RSPAN VLAN ID is propagated
through the VTP network.
SwitchDevice(config-vlan)# remote-span
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
576
Network Management
Creating an RSPAN Destination Session
SwitchDevice(config-vlan)# exit
Step 6 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Step 7 monitor session session_number source remote vlan Specifies the RSPAN session and the source RSPAN
vlan-id VLAN.
Example: • For session_number, the range is 1 to 66.
Step 8 monitor session session_number destination interface Specifies the RSPAN session and the destination interface.
interface-id
• For session_number, enter the number defined in Step
Example: 7.
In an RSPAN destination session, you must use the
SwitchDevice(config)# monitor session 1
destination interface gigabitethernet2/0/1 same session number for the source RSPAN VLAN
and the destination port.
• For interface-id, specify the destination interface. The
destination interface must be a physical interface.
• Though visible in the command-line help string,
encapsulation replicate is not supported for RSPAN.
The original VLAN ID is overwritten by the RSPAN
VLAN ID, and all packets appear on the destination
port as untagged.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
577
Network Management
Creating an RSPAN Destination Session and Configuring Incoming Traffic
Related Topics
Remote SPAN, on page 553
RSPAN VLAN, on page 559
RSPAN Configuration Guidelines, on page 562
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source remote vlan vlan-id
5. monitor session session_number destination {interface interface-id [, | -] [ingress {dot1q vlan vlan-id
| untagged vlan vlan-id | vlan vlan-id}]}
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
578
Network Management
Creating an RSPAN Destination Session and Configuring Incoming Traffic
Step 4 monitor session session_number source remote vlan Specifies the RSPAN session and the source RSPAN
vlan-id VLAN.
Example: • For session_number, the range is 1 to 66.
Step 5 monitor session session_number destination {interface Specifies the SPAN session, the destination port, the packet
interface-id [, | -] [ingress {dot1q vlan vlan-id | untagged encapsulation, and the incoming VLAN and encapsulation.
vlan vlan-id | vlan vlan-id}]}
• For session_number, enter the number defined in Step
Example: 5.
In an RSPAN destination session, you must use the
SwitchDevice(config)# monitor session 2 destination
interface gigabitethernet1/0/2 ingress vlan 6
same session number for the source RSPAN VLAN
and the destination port.
• For interface-id, specify the destination interface. The
destination interface must be a physical interface.
• Though visible in the command-line help string,
encapsulation replicate is not supported for RSPAN.
The original VLAN ID is overwritten by the RSPAN
VLAN ID, and all packets appear on the destination
port as untagged.
• (Optional) [, | -] Specifies a series or range of
interfaces. Enter a space before and after the comma;
enter a space before and after the hyphen.
• Enter ingress with additional keywords to enable
forwarding of incoming traffic on the destination port
and to specify the encapsulation type:
• dot1q vlan vlan-id—Forwards incoming packets
with IEEE 802.1Q encapsulation with the
specified VLAN as the default VLAN.
• untagged vlan vlan-id or vlan vlan-id—Forwards
incoming packets with untagged encapsulation
type with the specified VLAN as the default
VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
579
Network Management
Configuring an FSPAN Session
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Remote SPAN, on page 553
RSPAN VLAN, on page 559
RSPAN Configuration Guidelines, on page 562
Examples: Creating an RSPAN VLAN, on page 588
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
5. monitor session session_number destination {interface interface-id [, | -] [encapsulation replicate]}
6. monitor session session_number filter {ip | ipv6 | mac} access-group {access-list-number | name}
7. end
8. show running-config
9. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
580
Network Management
Configuring an FSPAN Session
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Step 4 monitor session session_number source {interface Specifies the SPAN session and the source port (monitored
interface-id | vlan vlan-id} [, | -] [both | rx | tx] port).
Example: • For session_number, the range is 1 to 66.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
581
Network Management
Configuring an FSPAN Session
Step 5 monitor session session_number destination {interface Specifies the SPAN session and the destination port
interface-id [, | -] [encapsulation replicate]} (monitoring port).
Example: • For session_number, specify the session number
entered in Step 4.
SwitchDevice(config)# monitor session 2 destination
interface gigabitethernet1/0/2 encapsulation • For destination, specify the following parameters:
replicate
• For interface-id, specify the destination port. The
destination interface must be a physical port; it
cannot be an EtherChannel, and it cannot be a
VLAN.
• (Optional) [, | -] Specifies a series or range of
interfaces. Enter a space before and after the
comma; enter a space before and after the hyphen.
• (Optional) encapsulation replicate specifies that
the destination interface replicates the source
interface encapsulation method. If not selected,
the default is to send packets in native form
(untagged).
Note For local SPAN, you must use the same session
number for the source and destination interfaces.
You can use monitor session session_number
destination command multiple times to
configure multiple destination ports.
Step 6 monitor session session_number filter {ip | ipv6 | mac} Specifies the SPAN session, the types of packets to filter,
access-group {access-list-number | name} and the ACLs to use in an FSPAN session.
Example: • For session_number, specify the session number
entered in Step 4.
SwitchDevice(config)# monitor session 2 filter ipv6
access-group 4 • For access-list-number, specify the ACL number that
you want to use to filter traffic.
• For name, specify the ACL name that you want to use
to filter traffic.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
582
Network Management
Configuring an FRSPAN Session
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Flow-Based SPAN, on page 561
FSPAN and FRSPAN Configuration Guidelines, on page 563
SUMMARY STEPS
1. enable
2. configure terminal
3. no monitor session {session_number | all | local | remote}
4. monitor session session_number source {interface interface-id | vlan vlan-id} [, | -] [both | rx | tx]
5. monitor session session_number destination remote vlan vlan-id
6. vlan vlan-id
7. remote-span
8. exit
9. monitor session session_number filter {ip | ipv6 | mac} access-group {access-list-number | name}
10. end
11. show running-config
12. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
583
Network Management
Configuring an FRSPAN Session
DETAILED STEPS
SwitchDevice> enable
Step 3 no monitor session {session_number | all | local | remote} Removes any existing SPAN configuration for the session.
Example: • For session_number, the range is 1 to 66.
Step 4 monitor session session_number source {interface Specifies the SPAN session and the source port (monitored
interface-id | vlan vlan-id} [, | -] [both | rx | tx] port).
Example: • For session_number, the range is 1 to 66.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
584
Network Management
Configuring an FRSPAN Session
Step 5 monitor session session_number destination remote vlan Specifies the RSPAN session and the destination RSPAN
vlan-id VLAN.
Example: • For session_number, enter the number defined in Step
4.
SwitchDevice(config)# monitor session 2
destination remote vlan 5 • For vlan-id, specify the destination RSPAN VLAN
to monitor.
Step 6 vlan vlan-id Enters the VLAN configuration mode. For vlan-id, specify
the source RSPAN VLAN to monitor.
Example:
SwitchDevice(config)# vlan 10
Step 7 remote-span Specifies that the VLAN you specified in Step 5 is part of
the RSPAN VLAN.
Example:
SwitchDevice(config-vlan)# remote-span
SwitchDevice(config-vlan)# exit
Step 9 monitor session session_number filter {ip | ipv6 | mac} Specifies the RSPAN session, the types of packets to filter,
access-group {access-list-number | name} and the ACLs to use in an FRSPAN session.
Example: • For session_number, specify the session number
entered in Step 4.
SwitchDevice(config)# monitor session 2 filter ip
access-group 7 • For access-list-number, specify the ACL number that
you want to use to filter traffic.
• For name, specify the ACL name that you want to
use to filter traffic.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
585
Network Management
Monitoring SPAN and RSPAN Operations
SwitchDevice(config)# end
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Flow-Based SPAN, on page 561
FSPAN and FRSPAN Configuration Guidelines, on page 563
Command Purpose
show monitor Displays the current SPAN, RSPAN, FSPAN, or
FRSPAN configuration.
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 1
SwitchDevice(config)# monitor session 1 source interface gigabitethernet1/0/1
SwitchDevice(config)# monitor session 1 destination interface gigabitethernet1/0/2
encapsulation replicate
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
586
Network Management
Example: Configuring Local SPAN
This example shows how to remove port 1 as a SPAN source for SPAN session 1:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 1 source interface gigabitethernet1/0/1
SwitchDevice(config)# end
This example shows how to disable received traffic monitoring on port 1, which was configured for bidirectional
monitoring:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 1 source interface gigabitethernet1/0/1 rx
The monitoring of traffic received on port 1 is disabled, but traffic sent from this port continues to be monitored.
This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session
2 to monitor received traffic on all ports belonging to VLANs 1 through 3, and send it to destination Gigabit
Ethernet port 2. The configuration is then modified to also monitor all traffic on all ports belonging to VLAN
10.
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 2
SwitchDevice(config)# monitor session 2 source vlan 1 - 3 rx
SwitchDevice(config)# monitor session 2 destination interface gigabitethernet1/0/2
SwitchDevice(config)# monitor session 2 source vlan 10
SwitchDevice(config)# end
This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session
2 to monitor received traffic on Gigabit Ethernet source port 1, and send it to destination Gigabit Ethernet
port 2 with the same egress encapsulation type as the source port, and to enable ingress forwarding with IEEE
802.1Q encapsulation and VLAN 6 as the default ingress VLAN:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 2
SwitchDevice(config)# monitor session 2 source gigabitethernet1/0/1 rx
SwitchDevice(config)# monitor session 2 destination interface gigabitethernet1/0/2
encapsulation replicate ingress dot1q vlan 6
SwitchDevice(config)# end
This example shows how to remove any existing configuration on SPAN session 2, configure SPAN session
2 to monitor traffic received on Gigabit Ethernet trunk port 2, and send traffic for only VLANs 1 through 5
and VLAN 9 to destination Gigabit Ethernet port 1:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 2
SwitchDevice(config)# monitor session 2 source interface gigabitethernet1/0/2 rx
SwitchDevice(config)# monitor session 2 filter vlan 1 - 5 , 9
SwitchDevice(config)# monitor session 2 destination interface gigabitethernet1/0/1
SwitchDevice(config)# end
Related Topics
Creating a Local SPAN Session and Configuring Incoming Traffic, on page 566
Local SPAN, on page 552
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
587
Network Management
Examples: Creating an RSPAN VLAN
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# vlan 901
SwitchDevice(config-vlan)# remote span
SwitchDevice(config-vlan)# end
This example shows how to remove any existing RSPAN configuration for session 1, configure RSPAN
session 1 to monitor multiple source interfaces, and configure the destination as RSPAN VLAN 901:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 1
SwitchDevice(config)# monitor session 1 source interface gigabitethernet1/0/1 tx
SwitchDevice(config)# monitor session 1 source interface gigabitethernet1/0/2 rx
SwitchDevice(config)# monitor session 1 source interface port-channel 2
SwitchDevice(config)# monitor session 1 destination remote vlan 901
SwitchDevice(config)# end
This example shows how to remove any existing configuration on RSPAN session 2, configure RSPAN
session 2 to monitor traffic received on trunk port 2, and send traffic for only VLANs 1 through 5 and 9 to
destination RSPAN VLAN 902:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# no monitor session 2
SwitchDevice(config)# monitor session 2 source interface gigabitethernet1/0/2 rx
SwitchDevice(config)# monitor session 2 filter vlan 1 - 5 , 9
SwitchDevice(config)# monitor session 2 destination remote vlan 902
SwitchDevice(config)# end
This example shows how to configure VLAN 901 as the source remote VLAN and port 1 as the destination
interface:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# monitor session 1 source remote vlan 901
SwitchDevice(config)# monitor session 1 destination interface gigabitethernet2/0/1
SwitchDevice(config)# end
This example shows how to configure VLAN 901 as the source remote VLAN in RSPAN session 2, to
configure Gigabit Ethernet source port 2 as the destination interface, and to enable forwarding of incoming
traffic on the interface with VLAN 6 as the default receiving VLAN:
SwitchDevice> enable
SwitchDevice# configure terminal
SwitchDevice(config)# monitor session 2 source remote vlan 901
SwitchDevice(config)# monitor session 2 destination interface gigabitethernet1/0/2 ingress
vlan 6
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
588
Network Management
Examples: Creating an RSPAN VLAN
Related Topics
Creating an RSPAN Destination Session and Configuring Incoming Traffic, on page 578
Remote SPAN, on page 553
RSPAN VLAN, on page 559
RSPAN Configuration Guidelines, on page 562
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
589
Network Management
Examples: Creating an RSPAN VLAN
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
590
CHAPTER 30
Configuring RMON
• Finding Feature Information, on page 591
• Information About RMON, on page 591
• How to Configure RMON, on page 593
• Monitoring RMON Status, on page 598
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
591
Network Management
Understanding RMON
Related Topics
Configuring RMON Alarms and Events, on page 593
Monitoring RMON Status, on page 598
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
592
Network Management
How to Configure RMON
SUMMARY STEPS
1. enable
2. configure terminal
3. rmon alarm {number variable interval absolute | delta } rising-thresholdvalue [event-number]
falling-threshold value [event-number] [ownerstring ]
4. rmon event number [description string] [log] [owner string] [trap community]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
593
Network Management
Configuring RMON Alarms and Events
Step 3 rmon alarm {number variable interval absolute | delta } Sets an alarm on a MIB object.
rising-thresholdvalue [event-number] falling-threshold
For number, specify the alarm number. The range is 1 to
value [event-number] [ownerstring ]
65535.
Example:
For variable, specify the MIB object to monitor
Switch(config)# rmon alarm 10 ifEntry.20.1 20 delta
rising-threshold 15 1 falling-threshold 0 owner For interval, specify the time in seconds the alarm monitors
jjohnson the MIB variable. The range is 1 to 4294967295 seconds.
Specify the absolute keyword to test each MIB variable
directly. Specify the delta keyword to test the change
between samples of a MIB variable.
For value, specify a number at which the alarm is triggered
and one for when the alarm is reset. The range for the rising
threshold and falling threshold values is -2147483648 to
2147483647.
(Optional) For event-number, specify the event number to
trigger when the rising or falling threshold exceeds its limit.
(Optional) For owner string, specify the owner of the alarm.
Step 4 rmon event number [description string] [log] [owner Adds an event in the RMON event table that is associated
string] [trap community] with an RMON event number.
Example: For number, assign an event number. The range is 1 to
SwitchDevice(config)# rmon event 1 log trap 65535.
eventtrap description "High ifOutErrors" owner
jjones
(Optional) For description string, specify a description of
the event.
(Optional) Use the log keyword to generate an RMON log
entry when the event is triggered.
(Optional) For owner string, specify the owner of this event.
(Optional) For trap community, enter the SNMP community
string used for this trap.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
594
Network Management
Collecting Group History Statistics on an Interface
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To disable an alarm, use the no rmon alarm number global configuration command on each alarm you
configured. You cannot disable at once all the alarms that you configured. To disable an event, use the no
rmon event number global configuration command.
Related Topics
Understanding RMON, on page 591
Default RMON Configuration, on page 593
Monitoring RMON Status, on page 598
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. rmon collection history index [buckets bucket-number] [interval seconds] [owner ownername]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
595
Network Management
Collecting Group History Statistics on an Interface
Step 3 interface interface-id Specifies the interface on which to collect history, and enter
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 4 rmon collection history index [buckets bucket-number] Enables history collection for the specified number of
[interval seconds] [owner ownername] buckets and time period.
Example: For index, identify the RMON group of statistics The range
is 1 to 65535.
(Optional) For buckets bucket-number, specify the
maximum number of buckets desired for the RMON
collection history group of statistics. The range is 1 to
65535. The default is 50 buckets.
(Optional) For interval seconds, specify the number of
seconds in each polling cycle. The range is 1 to 3600. The
default is 1800 seconds.
(Optional) For owner ownername, enter the name of the
owner of the RMON group of statistics.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To disable history collection, use the no rmon collection history index interface configuration command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
596
Network Management
Collecting Group Ethernet Statistics on an Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. rmon collection stats index [owner ownername]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which to collect statistics, and
enter interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 4 rmon collection stats index [owner ownername] Enables RMON statistic collection on the interface.
Example: For index, specify the RMON group of statistics. The range
SwitchDevice(config-if)# rmon collection stats 2 is from 1 to 65535.
owner root
(Optional) For owner ownername, enter the name of the
owner of the RMON group of statistics.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
597
Network Management
Monitoring RMON Status
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To disable the collection of group Ethernet statistics, use the no rmon collection stats index interface
configuration command.
Command Purpose
show rmon Displays general RMON statistics.
show rmon alarms Displays the RMON alarm table.
show rmon events Displays the RMON event table.
show rmon history Displays the RMON history table.
show rmon statistics Displays the RMON statistics table.
Related Topics
Configuring RMON Alarms and Events, on page 593
Understanding RMON, on page 591
Default RMON Configuration, on page 593
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
598
CHAPTER 31
Configuring Embedded Event Manager
• Information about Embedded Event Manager, on page 599
• How to Configure Embedded Event Manager, on page 602
• Monitoring Embedded Event Manager, on page 605
• Configuration Examples for Embedded Event Manager, on page 605
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
599
Network Management
Embedded Event Manager Actions
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
600
Network Management
Embedded Event Manager Environment Variables
when that event occurs. Scripts are defined on the networking device by using an ASCII editor. The script,
which can be a bytecode (.tbc) and text (.tcl) script, is then copied to the networking device and registered
with EEM. You can also register multiple events in a .tcl file.
You use EEM to write and implement your own policies using the EEM policy tool command language (TCL)
script. When you configure a TCL script on the master switch and the file is automatically sent to the member
switches. The user-defined TCL scripts must be available in the member switches so that if the master switch
changes, the TCL scripts policies continue to work.
Cisco enhancements to TCL in the form of keyword extensions facilitate the development of EEM policies.
These keywords identify the detected event, the subsequent action, utility information, counter values, and
system information.
Related Topics
Registering and Defining an Embedded Event Manager Applet, on page 602
Example: Generating SNMP Notifications, on page 605
Example: Responding to EEM Events, on page 605
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
601
Network Management
How to Configure Embedded Event Manager
Note The Mac-Address-Table event detector is supported only on switch platforms and can be used only on Layer
2 interfaces where MAC addresses are learned. Layer 3 interfaces do not learn addresses,and routers do not
usually support the MAC address-table infrastructure needed to notify EEM of a learned MAC address.
EEM 3.2 also introduces CLI commands to support the applets to work with the new event detectors.
Note Only one event applet command is allowed in an EEM applet. Multiple action applet commands are permitted.
If you do not specify the no event and no action commands, the applet is removed when you exit configuration
mode.
SUMMARY STEPS
1. configure terminal
2. event manager appletapplet-name
3. event snmp oid oid-value get-type {exact|next} entry-op { eq|ge|gt|le|lt|ne} entry-val entry-val
[exit-comb {or|and}] [exit-op{eq|ge|gt|le|lt|nc}] [exit-val exit-val] [exit-time exit-time-val] poll interval
poll-int-val
4. action label syslog [priority priority-level] msg msg-text
5. end
DETAILED STEPS
Step 2 event manager appletapplet-name Register the applet with EEM and enter applet configuration
mode.
Step 3 event snmp oid oid-value get-type {exact|next} entry-op Specify the event criteria that causes the EEM applet to run.
{ eq|ge|gt|le|lt|ne} entry-val entry-val [exit-comb
(Optional) Exit criteria. If exit criteria are not specified,
{or|and}] [exit-op{eq|ge|gt|le|lt|nc}] [exit-val exit-val]
event monitoring is re-enabled immediately.
[exit-time exit-time-val] poll interval poll-int-val
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
602
Network Management
Registering and Defining an Embedded Event Manager TCL Script
Example
This example shows the output for EEM when one of the fields specified by an SNMP object ID
crosses a defined threshold:
SwitchDevice(config-applet)# event snmp oid 1.3.6.1.4.1.9.9.48.1.1.1.6.1 get-type exact
entry-op lt entry-val 5120000 poll-interval 10
These examples show actions that are taken in response to an EEM event:
SwitchDevice(config-applet)# action 1.0 syslog priority critical msg "Memory exhausted;
current available memory is $_snmp_oid_val bytes"
SwitchDevice (config-applet)# action 2.0 force-switchover
Related Topics
Embedded Event Manager Policies, on page 600
Example: Generating SNMP Notifications, on page 605
Example: Responding to EEM Events, on page 605
SUMMARY STEPS
1. configure terminal
2. show event manager environment [all | variable-name]
3. configure terminal
4. event manager environment variable-name string
5. event manager policy policy-file-name [type system] [trap]
6. exit
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
603
Network Management
Registering and Defining an Embedded Event Manager TCL Script
Step 4 event manager environment variable-name string Configures the value of the specified EEM environment
variable. Repeat this step for all the required environment
variables.
Step 5 event manager policy policy-file-name [type system] Registers the EEM policy to be run when the specified event
[trap] defined within the policy occurs.
Step 6 exit Exits the global configuration mode and return to the
privileged EXEC mode.
Example
This example shows the sample output for the show event manager environment command:
SwitchDevice# show event manager environment all
No. Name Value
1 _cron_entry 0-59/2 0-23/1 * * 0-6
2 _show_cmd show ver
3 _syslog_pattern .*UPDOWN.*Ethernet1/0.*
This example shows a CRON timer environment variable, which is assigned by the software, to be
set to every second minute, every hour of every day:
SwitchDevice (config)# event manager environment_cron_entry 0-59/2 0-23/1 * * 0-6
This example shows the sample EEM policy named tm_cli_cmd.tcl registered as a system policy.
The system policies are part of the Cisco IOS image. User-defined TCL scripts must first be copied
to flash memory.
SwitchDevice (config)# event manager policy tm_cli_cmd.tcl type system
Related Topics
Example: Displaying EEM Environment Variables, on page 605
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
604
Network Management
Monitoring Embedded Event Manager
Command Purpose
show event manager environment[all| Displays the name and value of the EEM environment
variable-name] variables.
To display information about EEM, including EEM registered policies and EEM history data, see the Cisco
IOS Network Management Command Reference.
Related Topics
Embedded Event Manager Policies, on page 600
Registering and Defining an Embedded Event Manager Applet, on page 602
Related Topics
Embedded Event Manager Policies, on page 600
Registering and Defining an Embedded Event Manager Applet, on page 602
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
605
Network Management
Example: Displaying EEM Environment Variables
This example shows a CRON timer environment variable, which is assigned by the software, to be set to every
second minute, every hour of every day:
SwitchDevice(config)# event manager environment_cron_entry 0-59/2 0-23/1 * * 0-6
This example shows the sample EEM policy named tm_cli_cmd.tcl registered as a system policy. The system
policies are part of the Cisco IOS image. User-defined TCL scripts must first be copied to flash memory.
SwitchDevice(config)# event manager policy tm_cli_cmd.tcl type system
Related Topics
Registering and Defining an Embedded Event Manager TCL Script, on page 603
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
606
CHAPTER 32
Configuring NetFlow Lite
• Finding Feature Information, on page 607
• Prerequisites for NetFlow Lite, on page 607
• Restrictions for NetFlow Lite, on page 607
• Information About NetFlow Lite, on page 609
• How to Configure NetFlow Lite, on page 616
• Monitoring Flexible NetFlow, on page 629
• Configuration Examples for NetFlow Lite, on page 629
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
607
Network Management
Restrictions for NetFlow Lite
• One monitor per interface is supported, although multiple exporters per interface are supported.
• Only permanent and normal cache is supported for the monitor; immediate cache is not supported.
• Changing any monitor parameter will not be supported when it is applied on any of the interfaces
or VLANs.
• When both the port and VLANs have monitors attached, then VLAN monitor will overwrite the
port monitor for traffic coming on the port.
• Flow monitor type and traffic type (type means IPv4, IPv6, and data link) should be same for the
flows to be created.
• You cannot attach an IP and port-based monitor to an interface at the same time on the switch. A
48-port switch supports a maximum of 48 monitors (IP or port-based) and for 256 SVIs, you can
configure up to 256 monitors (IP or port-based).
• When running the show flow monitor flow_name cache command, the switch displays cache
information from an earlier switch software version (Catalyst 2960-S) with all fields entered as zero.
Ignore these fields, as they are inapplicable to the switch.
• Sampler restrictions:
• Only sampled NetFlow is supported.
• For both port and VLANS, a total of only 4 samplers (random or deterministic) are supported on
the switch.
• The sampling minimum rate for both modes is 1 out of 32 flows, and the sampling maximum rate
for both modes is 1 out of 1022 flows.
• You must associate a sampler with a monitor while attaching it to an interface. Otherwise, the
command will be rejected. Use the ip flow monitor monitor_name sampler sampler_name input
interface configuration command to perform this task.
• When you attach a monitor using a deterministic sampler, every attachment with the same sampler
uses one new free sampler from the switch (hardware) out of 4 available samplers. You are not
allowed to attach a monitor with any sampler, beyond 4 attachments.
When you attach a monitor using a random sampler, only the first attachment uses a new sampler
from the switch (hardware). The remainder of all of the attachments using the same sampler, share
the same sampler.
Because of this behavior, when using a deterministic sampler, you can always make sure that the
correct number of flows are sampled by comparing the sampling rate and what the switch sends. If
the same random sampler is used with multiple interfaces, flows from any interface can always be
sampled, and flows from other interfaces can always be skipped.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
608
Network Management
Information About NetFlow Lite
Flow Records
In Flexible NetFlow a combination of key and nonkey fields is called a record. Flexible NetFlow records are
assigned to Flexible NetFlow flow monitors to define the cache that is used for storing flow data.
A flow record defines the keys that Flexible NetFlow uses to identify packets in the flow, as well as other
fields of interest that Flexible NetFlow gathers for the flow. You can define a flow record with any combination
of keys and fields of interest. The switch supports a rich set of keys. A flow record also defines the types of
counters gathered per flow. You can configure 64-bit packet or byte counters. The switch enables the following
match fields as the defaults when you create a flow record:
• match datalink—Layer 2 attributes
• match ipv4—IPv4 attributes
• match ipv6—IPv6 attributes
• match transport—Transport layer fields
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
609
Network Management
NetFlow Predefined Records
Related Topics
Creating a Flow Record, on page 617
Example: Configuring a Flow, on page 629
User-Defined Records
Flexible NetFlow enables you to define your own records for a Flexible NetFlow flow monitor cache by
specifying the key and nonkey fields to customize the data collection to your specific requirements. When
you define your own records for a Flexible NetFlow flow monitor cache, they are referred to as user-defined
records. The values in nonkey fields are added to flows to provide additional information about the traffic in
the flows. A change in the value of a nonkey field does not create a new flow. In most cases the values for
nonkey fields are taken from only the first packet in the flow. Flexible NetFlow enables you to capture counter
values such as the number of bytes and packets in a flow as nonkey fields.
Flexible NetFlow adds a new Version 9 export format field type for the header and packet section types.
Flexible NetFlow will communicate to the NetFlow collector the configured section sizes in the corresponding
Version 9 export template fields. The payload sections will have a corresponding length field that can be used
to collect the actual size of the collected section.
The following table describes NetFlow Lite match parameters. You must configure at least one of the following
match parameters for the flow records.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
610
Network Management
NetFlow Lite Match Parameters
Command Purpose
match datalink {ethertype | mac {destination Specifies a match to datalink or Layer 2 fields. The
address input | source address input}} following command options are available:
• ethertype—Matches to the ethertype of the
packet.
• mac—Matches the source or destination MAC
address from packets at input.
match ipv4 {destination {address} | protocol | Specifies a match to the IPv4 fields. The following
source {address} | tos} command options are available:
• destination—Matches to the IPv4 destination
address-based fields.
• protocol—Matches to the IPv4 protocols.
• source—Matches to the IPv4 source address
based fields.
• tos—Matches to the IPv4 Type of Service fields.
match ipv6 {destination {address} | flow-label | Specifies a match to the IPv6 fields. The following
protocol | source {address} | traffic-class} command options are available:
• destination—Matches to the IPv6 destination
address-based fields.
• flow-label—Matches to the IPv6 flow-label
fields.
• protocol—Matches to the IPv6 payload protocol
fields.
• source—Matches to the IPv6 source address
based fields.
• traffic-class—Matches to the IPv6 traffic class.
match transport {destination-port | source-port} Specifies a match to the Transport Layer fields. The
following command options are available:
• destination-port—Matches to the transport
destination port.
• source-port—Matches to the transport source
port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
611
Network Management
NetFlow Lite Collect Parameters
Command Purpose
Command Purpose
collect counter {bytes {long | permanent } | packets Collects the counter fields total bytes and total
{ long | permanent}} packets.
collect interface {input} Collects the fields from the input interface.
collect timestamp sys-uptime {first | last} Collects the fields for the time the first packet was
seen or the time the most recent packet was last seen
(in milliseconds).
collect transport tcp flags Collects the following transport TCP flags:
• ack—TCP acknowledgement flag
• cwr—TCP congestion window reduced flag
• ece—TCP ECN echo flag
• fin—TCP finish flag
• psh—TCP push flag
• rst—TCP reset flag
• syn—TCP synchronize flag
• urg—TCP urgent flag
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
612
Network Management
Flow Exporters
Command Purpose
Flow Exporters
Flow exporters export the data in the flow monitor cache to a remote system, such as a server running NetFlow
collector, for analysis and storage. Flow exporters are created as separate entities in the configuration. Flow
exporters are assigned to flow monitors to provide data export capability for the flow monitors. You can create
several flow exporters and assign them to one or more flow monitors to provide several export destinations.
You can create one flow exporter and apply it to several flow monitors.
The Version 9 export format consists of a packet header followed by one or more template flow or data flow
sets. A template flow set provides a description of the fields that will be present in future data flow sets. These
data flow sets may occur later within the same export packet or in subsequent export packets. Template flow
and data flow sets can be intermingled within a single export packet, as illustrated in the figure below.
Figure 61: Version 9 Export Packet
NetFlow Version 9 will periodically export the template data so the NetFlow collector will understand what
data is to be sent and also export the data flow set for the template. The key advantage to Flexible NetFlow
is that the user configures a flow record, which is effectively converted to a Version 9 template and then
forwarded to the collector. The figure below is a detailed example of the NetFlow Version 9 export format,
including the header, template flow, and data flow sets.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
613
Network Management
Flow Monitors
For more information on the Version 9 export format, refer to the white paper titled Cisco IOS NetFlow
Version 9 Flow-Record Format, available at this URL:
http://www.cisco.com/en/US/tech/tk648/tk362/technologies_white_paper09186a00800a3db9.shtml.
Flow Monitors
Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic
monitoring.
Flow data is collected from the network traffic and added to the flow monitor cache during the monitoring
process based on the key and nonkey fields in the flow record.
Flexible NetFlow can be used to perform different types of analysis on the same traffic. In the figure below,
packet 1 is analyzed using a record designed for standard traffic analysis on the input interface and a record
designed for security analysis on the output interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
614
Network Management
Flow Monitors
Figure 63: Example of Using Two Flow Monitors to Analyze the Same Traffic
The figure below shows a more complex example of how you can apply different types of flow monitors with
custom records.
Figure 64: Complex Example of Using Multiple Types of Flow Monitors with Custom Records
Normal
The default cache type is “normal”. In this mode, the entries in the cache are aged out according to the timeout
active and timeout inactive settings. When a cache entry is aged out, it is removed from the cache and exported
via any exporters configured.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
615
Network Management
Flow Samplers
Flow Samplers
Flow samplers are created as separate components in a router’s configuration. Flow samplers are used to
reduce the load on the device that is running NetFlow Lite by limiting the number of packets that are selected
for analysis.
Samplers use random sampling techniques (modes); that is, a randomly selected sampling position is used
each time a sample is taken.
Flow sampling exchanges monitoring accuracy for router performance. When you apply a sampler to a flow
monitor, the overhead load on the router of running the flow monitor is reduced because the number of packets
that the flow monitor must analyze is reduced. The reduction in the number of packets that are analyzed by
the flow monitor causes a corresponding reduction in the accuracy of the information stored in the flow
monitor’s cache.
Samplers are combined with flow monitors when they are applied to an interface with the ip flow monitor
command.
Default Settings
The following table lists the NetFlow Lite default settings for the switch.
Setting Default
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
616
Network Management
Creating a Flow Record
SUMMARY STEPS
1. configure terminal
2. flow record name
3. description string
4. match type
5. collect type
6. end
7. show flow record [name record-name]
8. copy running-config startup-config
DETAILED STEPS
Step 2 flow record name Creates a flow record and enters flow record configuration
mode.
Example:
SwitchDevice(config-flow-record)# description
Ipv4Flow
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
617
Network Management
Creating a Flow Record
SwitchDevice(config-flow-record)# end
Step 7 show flow record [name record-name] (Optional) Displays information about NetFlow flow
records.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
618
Network Management
Creating a Flow Exporter
What to do next
Define an optional flow exporter by specifying the export format, protocol, destination, and other parameters.
Related Topics
Flow Records, on page 609
Example: Configuring a Flow, on page 629
Note Each flow exporter supports only one destination. If you want to export the data to multiple destinations, you
must configure multiple flow exporters and assign them to the flow monitor.
You can export to a destination using IPv4 address.
SUMMARY STEPS
1. configure terminal
2. flow exporter name
3. description string
4. destination {ipv4-address} [ vrf vrf-name]
5. dscp value
6. source { source type }
7. transport udp number
8. ttl seconds
9. export-protocol {netflow-v9}
10. end
11. show flow exporter [name record-name]
12. copy running-config startup-config
DETAILED STEPS
Step 2 flow exporter name Creates a flow exporter and enters flow exporter
configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
619
Network Management
Creating a Flow Exporter
SwitchDevice(config-flow-exporter)# description
ExportV9
Step 4 destination {ipv4-address} [ vrf vrf-name] Sets the IPv4 destination address or hostname for this
exporter.
Example:
SwitchDevice(config-flow-exporter)# destination
192.0.2.1 (IPv4 destination)
SwitchDevice(config-flow-exporter)# dscp 0
Step 6 source { source type } (Optional) Specifies the interface to use to reach the
NetFlow collector at the configured destination. The
Example:
following interfaces can be configured as source:
SwitchDevice(config-flow-exporter)# source
gigabitEthernet1/0/1
Step 7 transport udp number (Optional) Specifies the UDP port to use to reach the
NetFlow collector. The range is from 1 to 65536
Example:
Step 8 ttl seconds (Optional) Configures the time-to-live (TTL) value for
datagrams sent by the exporter. The range is from 1 to 255
Example:
seconds. The default is 255.
SwitchDevice(config-flow-exporter)# ttl 210
Step 9 export-protocol {netflow-v9} Specifies the version of the NetFlow export protocol used
by the exporter.
Example:
SwitchDevice(config-flow-exporter)#
export-protocol netflow-v9
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
620
Network Management
Creating a Flow Monitor
SwitchDevice(config-flow-record)# end
Step 11 show flow exporter [name record-name] (Optional) Displays information about NetFlow flow
exporters.
Example:
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
Define a flow monitor based on the flow record and flow exporter.
Related Topics
Exporters
Example: Configuring a Flow, on page 629
SUMMARY STEPS
1. configure terminal
2. flow monitor name
3. description string
4. exporter name
5. record name
6. cache { timeout {active | inactive} seconds | type normal }
7. end
8. show flow monitor [name record-name]
9. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
621
Network Management
Creating a Flow Monitor
Step 2 flow monitor name Creates a flow monitor and enters flow monitor
configuration mode.
Example:
SwitchDevice(config-flow-monitor)# description
Ipv4Monitor
Step 4 exporter name Associates a flow exporter with this flow monitor.
Example:
SwitchDevice(config-flow-monitor)# exporter
ExportTest
Step 5 record name Associates a flow record with the specified flow monitor.
Example:
Step 6 cache { timeout {active | inactive} seconds | type normal Associates a flow cache with the specified flow monitor.
}
Example:
SwitchDevice(config-flow-monitor)# end
Step 8 show flow monitor [name record-name] (Optional) Displays information about NetFlow flow
monitors.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
622
Network Management
Creating a Sampler
What to do next
Apply the flow monitor to a Layer 2 interface, Layer 3 interface, or VLAN.
Related Topics
Monitors
Example: Configuring a Flow, on page 629
Creating a Sampler
You can create a sampler to define the NetFlow sampling rate for a flow.
SUMMARY STEPS
1. configure terminal
2. sampler name
3. description string
4. mode { deterministic { m - n } | random { m - n }}
5. end
6. show sampler [name]
7. copy running-config startup-config
DETAILED STEPS
Step 2 sampler name Creates a sampler and enters flow sampler configuration
mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
623
Network Management
Creating a Sampler
SwitchDevice(config-flow-sampler)# description
samples
SwitchDevice(config-flow-sampler)# end
Step 6 show sampler [name] (Optional) Displays information about NetFlow samplers.
Example:
SwitchDevice show sample SampleTest
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
624
Network Management
Applying a Flow to an Interface
What to do next
Apply the flow monitor to a source interface or a VLAN.
SUMMARY STEPS
1. configure terminal
2. interface type
3. {ip flow monitor | ipv6 flow monitor}name [|sampler name] { input |output }
4. end
5. show flow interface [interface-type number]
6. copy running-config startup-config
DETAILED STEPS
Step 3 {ip flow monitor | ipv6 flow monitor}name [|sampler Associate an IPv4 or an IPv6 flow monitor, and an optional
name] { input |output } sampler to the interface for input or output packets.
Example: To monitor datalink L2 traffic flows, you would use
datalink flow monitor name sampler sampler-name
SwitchDevice(config-if)# ip flow monitor {input} interface command. This specific command
MonitorTest input associates a datalink L2 flow monitor and required sampler
to the interface for input packets. When a datalink flow
monitor is assigned to an interface or VLAN record, it only
creates flows for non-IPv6 or non-IPv4 traffic.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
625
Network Management
Configuring a Bridged NetFlow on a VLAN
SwitchDevice(config-flow-monitor)# end
Step 5 show flow interface [interface-type number] (Optional) Displays information about NetFlow on an
interface.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. configure terminal
2. vlan [configuration] vlan-id
3. interface {vlan} vlan-id
4. ip flow monitor monitor name [sampler sampler name] {input |output}
5. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
626
Network Management
Configuring Layer 2 NetFlow
Step 3 interface {vlan} vlan-id Specifies the SVI for the configuration.
Example:
Step 4 ip flow monitor monitor name [sampler sampler name] Associates a flow monitor and an optional sampler to the
{input |output} VLAN for input or output packets.
Example:
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. configure terminal
2. flow record name
3. match datalink { ethertype | mac { destination { address input } | source { address input } } }
4. match { ipv4 {destination | protocol | source | tos } | ipv6 {destination | flow-label| protocol| source|
traffic-class } | transport {destination-port | source-port} }
5. end
6. show flow record [name ]
7. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
627
Network Management
Configuring Layer 2 NetFlow
Step 3 match datalink { ethertype | mac { destination { address Specifies the Layer 2 attribute as a key. In this example,
input } | source { address input } } } the keys are the source and destination MAC addresses from
the packet at input.
Example:
Note When a datalink flow monitor is assigned to an
SwitchDevice(config-flow-record)# match datalink interface or VLAN record, it only creates flows
mac source address input for non-IPv4 or non-IPv6 traffic.
SwitchDevice(config-flow-record)# match datalink
mac destination address input
Step 4 match { ipv4 {destination | protocol | source | tos } | ipv6 Specifies additional Layer 2 attributes as a key. In this
{destination | flow-label| protocol| source| traffic-class example, the keys are IPv4 protocol and ToS.
} | transport {destination-port | source-port} }
Example:
SwitchDevice(config-flow-record)# end
Step 6 show flow record [name ] (Optional) Displays information about NetFlow on an
interface.
Example:
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
628
Network Management
Monitoring Flexible NetFlow
Command Purpose
show flow exporter [broker | export-ids | name | Displays information about NetFlow flow exporters
name | statistics | templates] and statistics.
show flow exporter [ name exporter-name] Displays information about NetFlow flow exporters
and statistics.
show flow monitor [ name exporter-name] Displays information about NetFlow flow monitors
and statistics.
show flow monitor statistics Displays the statistics for the flow monitor
show flow monitor cache format {table | record | Displays the contents of the cache for the flow
csv} monitor, in the format specified.
show flow record [ name record-name] Displays information about NetFlow flow records.
show sampler [broker | name | name] Displays information about NetFlow samplers.
Note When configuring a flow, you need to have the protocol, source port, destination port, first and last timestamps,
and packet and bytes counters defined in the flow record. Otherwise, you will get the following error message:
"Warning: Cannot set protocol distribution with this Flow Record. Require protocol, source and destination
ports, first and last timestamps and packet and bytes counters."
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
629
Network Management
Example: Configuring a Flow
Related Topics
Creating a Flow Record, on page 617
Flow Records, on page 609
Creating a Flow Exporter, on page 619
Exporters
Creating a Flow Monitor, on page 621
Monitors
Creating a Sampler
Samplers
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
630
CHAPTER 33
Configuring Cache Services Using the Web
Cache Communication Protocol
• Finding Feature Information, on page 631
• Prerequisites for WCCP, on page 631
• Restrictions for WCCP, on page 632
• Information About WCCP, on page 633
• How to Configure WCCP, on page 636
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
631
Network Management
Restrictions for WCCP
• When TCAM entries are not available to add WCCP entries, packets are not redirected and are forwarded
by using the standard routing tables.
• The number of available policy-based routing (PBR) labels are reduced as more interfaces are enabled
for WCCP ingress redirection. For every interface that supports service groups, one label is consumed.
The WCCP labels are taken from the PBR labels. You need to monitor and manage the labels that are
available between PBR and WCCP. When labels are not available, the switch cannot add service groups.
However, if another interface has the same sequence of service groups, a new label is not needed, and
the group can be added to the interface.
• The routing maximum transmission unit (MTU) size configured on the stack member switches should
be larger than the client MTU size. The MAC-layer MTU size configured on ports connected to application
engines should consider the GRE tunnel header bytes.
General Restrictions
• Maximum number of service groups: eight ingress and eight egress.
• You cannot configure WCCP and VPN routing/forwarding (VRF) on the same switch interface.
• You cannot configure WCCP and PBR on the same switch interface.
• You cannot configure WCCP and a private VLAN (PVLAN) on the same switch interface.
• The ip wccp redirect exclude in command allows you to exclude ingress packets from egress WCCP
methods. It is not needed on the interface to CE.
• When no cache engine is available, matching packets are dropped. This is closed group support. There
is no VRF-aware WCCP support and no IPv6 WCCP.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
632
Network Management
Information About WCCP
• When the device is configured with the ip wccp check services all command, if the redirect ACL fails
to match on packet, it will be checked against the next priority service group.
Note To use this feature, the device must be running the IP Services feature set.
WCCP is supported only on Cisco Catalyst 3560-CX switches.
WCCP is a Cisco-developed content-routing technology that you can use to integrate wide-area application
engines (referred to as application engines) into your network infrastructure. The application engines
transparently store frequently accessed content and then fulfill successive requests for the same content,
eliminating repetitive transmissions of identical content from servers. Application engines accelerate content
delivery and ensure maximum scalability and availability of content. In a service-provider network, you can
deploy the WCCP and application engine solution at the points of presence (POPs). In an enterprise network,
you can deploy the WCCP and application engine solution at a regional site or small branch office.
The WCCP and Cisco cache engines (or other application engines running WCCP) localize traffic patterns
in the network, enabling content requests to be fulfilled locally.
WCCP enables supported Cisco routers and switches to transparently redirect content requests. With transparent
redirection, users do not have to configure their browsers to use a web proxy. Instead, they can use the target
URL to request content, and their requests are automatically redirected to an application engine. The word
transparent means that the end user does not know that a requested file (such as a web page) came from the
application engine instead of from the originally specified server.
When an application engine receives a request, it attempts to service it from its own local cache. If the requested
information is not present, the application engine sends a separate request to the end server to retrieve the
requested information. After receiving the requested information, the application engine forwards it to the
requesting client and also caches it to fulfill future requests.
With WCCP, the application-engine cluster (a series of application engines) can service multiple routers or
switches.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
633
Network Management
WCCP Negotiation
3. When a stable view is established, the application engine in the cluster with the lowest IP address is elected
as the designated application engine.
WCCP Negotiation
In the exchange of WCCP protocol messages, the designated application engine and the WCCP-enabled switch
negotiate these items:
• Forwarding method (the method by which the switch forwards packets to the application engine). The
switch rewrites the Layer 2 header by replacing the packet destination MAC address with the target
application engine MAC address. It then forwards the packet to the application engine. This forwarding
method requires the target application engine to be directly connected to the switch at Layer 2.
• Assignment method (the method by which packets are distributed among the application engines in the
cluster). The switch uses some bits of the destination IP address, the source IP address, the destination
Layer 4 port, and the source Layer 4 port to determine which application engine receives the redirected
packets.
• Packet-return method (the method by which packets are returned from the application engine to the
switch for normal forwarding). These are the typical reasons why an application engine rejects packets
and starts the packet-return feature:
• The application engine is overloaded and has no room to service the packets.
• The application engine receives an error message (such as a protocol or authentication error) from
the server and uses the dynamic client bypass feature. The bypass enables clients to bypass the
application engines and to connect directly to the server.
The application engine returns a packet to the WCCP-enabled switch to forward to the server as if the application
engine is not present. The application engine does not intercept the reconnection attempt. In this way, the
application engine effectively cancels the redirection of a packet to the application engine and creates a bypass
flow. If the return method is Layer 2 rewrite, the packets are forwarded in hardware to the target server. When
the server responds with the information, the switch uses normal Layer 3 forwarding to return the information
to the requesting client.
MD5 Security
WCCP provides an optional security component in each protocol message to enable the switch to use MD5
authentication on messages between the switch and the application engine. Messages that do not authenticate
by MD5 (when authentication of the switch is enabled) are discarded by the switch. The password string is
combined with the MD5 value to create security for the connection between the switch and the application
engine. You must configure the same password on each application engine.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
634
Network Management
Packet Redirection and Service Groups
WCCP allows dynamic service groups, where the classification criteria are provided dynamically by a
participating application engine.
You can configure up to 8 service groups on a switch or switch stack and up to 32 cache engines per service
group. WCCP maintains the priority of the service group in the group definition. WCCP uses the priority to
configure the service groups in the switch hardware. For example, if service group 1 has a priority of 100 and
looks for destination port 80, and service group 2 has a priority of 50 and looks for source port 80, the incoming
packet with source and destination port 80 is forwarded by using service group 1 because it has the higher
priority.
WCCP supports a cluster of application engines for every service group. Redirected traffic can be sent to any
one of the application engines. The switch supports the mask assignment method of load balancing the traffic
among the application engines in the cluster for a service group.
After WCCP is configured on the switch, the switch forwards all service group packets received from clients
to the application engines. However, the following packets are not redirected:
• Packets originating from the application engine and targeted to the server.
• Packets originating from the application engine and targeted to the client.
• Packets returned or rejected by the application engine. These packets are sent to the server.
You can configure a single multicast address per service group for sending and receiving protocol messages.
When there is a single multicast address, the application engine sends a notification to one address, which
provides coverage for all routers in the service group, for example, 225.0.0.0. If you add and remove routers
dynamically, using a single multicast address provides easier configuration because you do not need to
specifically enter the addresses of all devices in the WCCP network.
You can use a router group list to validate the protocol packets received from the application engine. Packets
matching the address in the group list are processed, packets not matching the group list address are dropped.
To disable caching for specific clients, servers, or client/server pairs, you can use a WCCP redirect access
control list (ACL). Packets that do not match the redirect ACL bypass the cache and are forwarded normally.
Before WCCP packets are redirected, the switch examines ACLs associated with all inbound features configured
on the interface and permits or denies packet forwarding based on how the packet matches the entries in the
ACL.
Note Both permit and deny ACL entries are supported in WCCP redirect lists.
When packets are redirected, the output ACLs associated with the redirected interface are applied to the
packets. Any ACLs associated with the original port are not applied unless you specifically configure the
required output ACLs on the redirected interfaces.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
635
Network Management
How to Configure WCCP
Related Topics
Enabling the Cache Service, on page 636
SUMMARY STEPS
1. enable
2. configure terminal
3. ip wccp {web-cache | service-number} [group-address groupaddress] [group-list
access-list] [redirect-list access-list] [password encryption-number password]
4. interface interface-id
5. no switchport
6. ip address ip-address subnet-mask
7. no shutdown
8. exit
9. interface interface-id
10. no switchport
11. ip address ip-address subnet-mask
12. no shutdown
13. ip wccp {web-cache | service-number} redirect in
14. ip wccp {web-cache | service-number} group-listen
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
636
Network Management
Enabling the Cache Service
15. exit
16. end
17. show running-config
18. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip wccp {web-cache | service-number} Enables the cache service, and specifies the service number
[group-address groupaddress] [group-list that corresponds to a dynamic service that is defined by
access-list] [redirect-list access-list] [password the application engine. By default, this feature is disabled.
encryption-number password]
(Optional) For group-address groupaddress, specifies
Example: the multicast group address used by the switches and the
application engines to participate in the service group.
SwitchDevice(config)# ip wccp web-cache
(Optional) For group-list access-list, if a multicast group
address is not used, specify a list of valid IP addresses that
correspond to the application engines that are participating
in the service group.
(Optional) For redirect-list access-list, specify the redirect
service for specific hosts or specific packets from hosts.
(Optional) For password encryption-number password,
specify an encryption number. The range is 0 to 7. Use 0
for not encrypted, and use 7 for proprietary. Specify a
password name up to seven characters in length. The switch
combines the password with the MD5 authentication value
to create security for the connection between the switch
and the application engine. By default, no password is
configured, and no authentication is performed.
You must configure the same password on each application
engine.
When authentication is enabled, the switch discards
messages that are not authenticated.
Step 4 interface interface-id Specifies the interface connected to the application engine
or the server, and enters interface configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
637
Network Management
Enabling the Cache Service
SwitchDevice(config)# interface
gigabitethernet1/0/1
SwitchDevice(config-if)# no switchport
Step 6 ip address ip-address subnet-mask Configures the IP address and subnet mask.
Example:
SwitchDevice(config-if)# no shutdown
SwitchDevice(config-if)# exit
Step 9 interface interface-id Specifies the interface connected to the client, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
SwitchDevice(config-if)# no switchport
Step 11 ip address ip-address subnet-mask Configures the IP address and subnet mask.
Example:
SwitchDevice(config-if)# no shutdown
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
638
Network Management
Enabling the Cache Service
Step 14 ip wccp {web-cache | service-number} group-listen (Optional) When using a multicast group address, the
group-listen keyword enables the interface to listen for
Example:
the multicast address. Enable this on the interface
connected to the application engine.
SwitchDevice(config-if)# ip wccp web-cache
group-listen
SwitchDevice(config-if)# exit
SwitchDevice(config)# end
Step 18 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Configuration Examples
This example shows how to configure routed interfaces and to enable the cache service with a
multicast group address and a redirect access list. Gigabit Ethernet port 1 is connected to the
application engine, is configured as a routed port with an IP address of 172.20.10.30, and is reenabled.
Gigabit Ethernet port 2 is connected through the Internet to the server, is configured as a routed port
with an IP address of 175.20.20.10, and is reenabled. Gigabit Ethernet ports 3 to 6 are connected to
the clients and are configured as routed ports with IP addresses 175.20.30.20, 175.20.40.30,
175.20.50.40, and 175.20.60.50. The switch listens for multicast traffic and redirects packets received
from the client interfaces to the application engine.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
639
Network Management
Enabling the Cache Service
This example shows how to configure SVIs and how to enable the cache service with a multicast
group list. VLAN 299 is created and configured with an IP address of 175.20.20.10. Gigabit Ethernet
port 1 is connected through the Internet to the server and is configured as an access port in VLAN
299. VLAN 300 is created and configured with an IP address of 172.20.10.30. Gigabit Ethernet port
2 is connected to the application engine and is configured as an access port in VLAN 300. VLAN
301 is created and configured with an IP address of 175.20.30.50. Fast Ethernet ports 3 to 6, which
are connected to the clients, are configured as access ports in VLAN 301. The switch redirects packets
received from the client interfaces to the application engine.
Note Both permit and deny ACL entries are supported in WCCP redirect lists.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
640
Network Management
Enabling the Cache Service
What to do next
To disable the cache service, use the no ip wccp web-cache global configuration command. To disable
inbound packet redirection, use the no ip wccp web-cache redirect in interface configuration command.
After completing this procedure, configure the application engines in the network.
Related Topics
Default WCCP Configuration, on page 636
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
641
Network Management
Enabling the Cache Service
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
642
PA R T VI
QoS
• Configuring QoS, on page 645
• Configuring Auto-QoS, on page 745
CHAPTER 34
Configuring QoS
• Finding Feature Information, on page 645
• Prerequisites for QoS, on page 645
• Restrictions for QoS, on page 647
• Information About QoS, on page 648
• How to Configure QoS, on page 675
• Monitoring Standard QoS, on page 732
• Configuration Examples for QoS, on page 733
• Where to Go Next, on page 744
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
645
QoS
Policing Guidelines
• It is not possible to match IP fragments against configured IP extended ACLs to enforce QoS. IP fragments
are sent as best-effort. IP fragments are denoted by fields in the IP header.
• Only one ACL per class map and only one match class-map configuration command per class map are
supported. The ACL can have multiple ACEs, which match fields against the contents of the packet.
• A trust statement in a policy map requires multiple hardware entries per ACL line. If an input service
policy map contains a trust statement in an ACL, the access list might be too large to fit into the available
QoS hardware memory, and an error can occur when you apply the policy map to a port. Whenever
possible, you should minimize the number of lines is a QoS ACL.
Related Topics
Creating an IP Standard ACL for IPv4 Traffic, on page 687
Creating an IP Extended ACL for IPv4 Traffic, on page 688
Creating an IPv6 ACL for IPv6 Traffic, on page 690
Creating a Layer 2 MAC ACL for Non-IP Traffic, on page 692
Policing Guidelines
• The port ASIC device, which controls more than one physical port, supports 256 policers (255
user-configurable policers plus 1 policer reserved for system internal use). The maximum number of
user-configurable policers supported per port is 63. Policers are allocated on demand by the software
and are constrained by the hardware and ASIC boundaries.
You cannot reserve policers per port; there is no guarantee that a port will be assigned to any policer.
• Only one policer is applied to a packet on an ingress port. Only the average rate and committed burst
parameters are configurable.
• On a port configured for QoS, all traffic received through the port is classified, policed, and marked
according to the policy map attached to the port. On a trunk port configured for QoS, traffic in all VLANs
received through the port is classified, policed, and marked according to the policy map attached to the
port.
• If you have EtherChannel ports configured on your switch, you must configure QoS classification,
policing, mapping, and queueing on the individual physical ports that comprise the EtherChannel. You
must decide whether the QoS configuration should match on all ports in the EtherChannel.
• If you need to modify a policy map of an existing QoS policy, first remove the policy map from all
interfaces, and then modify or copy the policy map. After you finish the modification, apply the modified
policy map to the interfaces. If you do not first remove the policy map from all interfaces, high CPU
usage can occur, which, in turn, can cause the console to pause for a very long time.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
646
QoS
Restrictions for QoS
• You are likely to lose data when you change queue settings; therefore, try to make changes when traffic
is at a minimum.
• The switch supports homogeneous stacking and mixed stacking. Mixed stacking is supported only with
the Catalyst 2960-S switches. A homogenous stack can have up to eight stack members, while a mixed
stack can have up to four stack members. All switches in a switch stack must be running the LAN Base
image.
Running these features with 8 egress queue enabled in a single configuration is not supported on the
switch.
• You can configure QoS only on physical ports. VLAN-based QoS is not supported. You configure the
QoS settings, such as classification, queueing, and scheduling, and apply the policy map to a port. When
configuring QoS on a physical port, you apply a nonhierarchical policy map to a port.
• If the switch is running the LAN Lite image you can:
• Configure ACLs, but you cannot attach them to physical interfaces. You can attach them to VLAN
interfaces to filter traffic to the CPU.
• Enable only cos trust at interface level.
• Enable SRR shaping and sharing at interface level.
• Enable Priority queueing at interface level.
• Enable or disable mls qos rewrite ip dscp.
• The switch must be running the LAN Base image to use the following QoS features:
• Policy maps
• Policing and marking
• Mapping tables
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
647
QoS
Information About QoS
• WTD
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
648
QoS
Layer 2 Frame Prioritization Bits
The special bits in the Layer 2 frame or a Layer 3 packet are shown in the following
figure:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
649
QoS
End-to-End QoS Solution Using Classification
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
650
QoS
Actions at Egress Port
• Marking evaluates the policer and configuration information for the action to be taken when a packet is
out of profile and determines what to do with the packet (pass through a packet without modification,
marking down the QoS label in the packet, or dropping the packet).
Note Queueing and scheduling are only supported at egress and not at ingress on the switch.
Classification Overview
Classification is the process of distinguishing one kind of traffic from another by examining the fields in the
packet. Classification is enabled only if QoS is globally enabled on the switch. By default, QoS is globally
disabled, so no classification occurs.
During classification, the switch performs a lookup and assigns a QoS label to the packet. The QoS label
identifies all QoS actions to be performed on the packet and from which queue the packet is sent.
The QoS label is based on the DSCP or the CoS value in the packet and decides the queueing and scheduling
actions to perform on the packet. The label is mapped according to the trust setting and the packet type as
shown in Classification Flowchart, on page 654.
You specify which fields in the frame or packet that you want to use to classify incoming traffic.
Related Topics
Ingress Port Activity
Egress Port Activity
Configuring a QoS Policy, on page 686
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
651
QoS
Non-IP Traffic Classification
Trust the CoS value Trust the CoS value in the incoming frame (configure the
port to trust CoS), and then use the configurable
CoS-to-DSCP map to generate a DSCP value for the packet.
Layer 2 ISL frame headers carry the CoS value in the 3
least-significant bits of the 1-byte User field.
Layer 2 802.1Q frame headers carry the CoS value in the 3
most-significant bits of the Tag Control Information field.
CoS values range from 0 for low priority to 7 for high
priority.
Trust the DSCP or trust IP precedence value Trust the DSCP or trust IP precedence value in the incoming
frame. These configurations are meaningless for non-IP
traffic. If you configure a port with either of these options
and non-IP traffic is received, the switch assigns a CoS value
and generates an internal DSCP value from the CoS-to-DSCP
map. The switch uses the internal DSCP value to generate
a CoS value representing the priority of the traffic.
Perform classification based on configured Perform the classification based on a configured Layer 2
Layer 2 MAC ACL MAC access control list (ACL), which can examine the MAC
source address, the MAC destination address, and other
fields. If no ACL is configured, the packet is assigned 0 as
the DSCP and CoS values, which means best-effort traffic.
Otherwise, the policy-map action specifies a DSCP or CoS
value to assign to the incoming frame.
After classification, the packet is sent to the policing and marking stages.
IP Traffic Classification
The following table describes the IP traffic classification options for your QoS configuration.
Trust the DSCP value Trust the DSCP value in the incoming packet (configure the port to trust
DSCP), and assign the same DSCP value to the packet. The IETF defines
the 6 most-significant bits of the 1-byte ToS field as the DSCP. The priority
represented by a particular DSCP value is configurable. DSCP values range
from 0 to 63.
You can also classify IP traffic based on IPv6 DSCP.
For ports that are on the boundary between two QoS administrative domains,
you can modify the DSCP to another value by using the configurable
DSCP-to-DSCP-mutation map.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
652
QoS
IP Traffic Classification
Trust the IP precedence value Trust the IP precedence value in the incoming packet (configure the port
to trust IP precedence), and generate a DSCP value for the packet by using
the configurable IP-precedence-to-DSCP map. The IP Version 4
specification defines the 3 most-significant bits of the 1-byte ToS field as
the IP precedence. IP precedence values range from 0 for low priority to
7 for high priority.
You can also classify IP traffic based on IPv6 precedence.
Trust the CoS value Trust the CoS value (if present) in the incoming packet, and generate a
DSCP value for the packet by using the CoS-to-DSCP map. If the CoS
value is not present, use the default port CoS value.
IP standard or an extended ACL Perform the classification based on a configured IP standard or an extended
ACL, which examines various fields in the IP header. If no ACL is
configured, the packet is assigned 0 as the DSCP and CoS values, which
means best-effort traffic. Otherwise, the policy-map action specifies a
DSCP or CoS value to assign to the incoming frame.
Override configured CoS Override the configured CoS of incoming packets, and apply the default
port CoS value to them. For IPv6 packets, the DSCP value is rewritten by
using the CoS-to-DSCP map and by using the default CoS of the port. You
can do this for both IPv4 and IPv6 traffic.
After classification, the packet is sent to the policing and marking stages.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
653
QoS
Classification Flowchart
Classification Flowchart
Figure 67: Classification Flowchart
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
654
QoS
Classification Based on Class Maps and Policy Maps
• If a match with a permit action is encountered (first-match principle), the specified QoS-related action
is taken.
• If a match with a deny action is encountered, the ACL being processed is skipped, and the next ACL is
processed.
• If no match with a permit action is encountered and all the ACEs have been examined, no QoS processing
occurs on the packet, and the switch offers best-effort service to the packet.
• If multiple ACLs are configured on a port, the lookup stops after the packet matches the first ACL with
a permit action, and QoS processing begins.
Note When creating an access list, note that by default the end of the access list contains
an implicit deny statement for everything if it did not find a match before reaching
the end.
After a traffic class has been defined with the ACL, you can attach a policy to it. A policy might contain
multiple classes with actions specified for each one of them. A policy might include commands to classify
the class as a particular aggregate (for example, assign a DSCP) or rate-limit the class. This policy is then
attached to a particular port on which it becomes effective.
You implement IP ACLs to classify IP traffic by using the access-list global configuration command; you
implement Layer 2 MAC ACLs to classify non-IP traffic by using the mac access-list extended global
configuration command.
Related Topics
Creating an IP Standard ACL for IPv4 Traffic, on page 687
Creating an IP Extended ACL for IPv4 Traffic, on page 688
Creating an IPv6 ACL for IPv6 Traffic, on page 690
Creating a Layer 2 MAC ACL for Non-IP Traffic, on page 692
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
655
QoS
Policing and Marking Overview
You can configure a default class by using the class class-default policy-map configuration command.
Unclassified traffic (traffic specified in the other traffic classes configured on the policy-map) is treated as
default traffic.
You create and name a policy map by using the policy-map global configuration command. When you enter
this command, the switch enters the policy-map configuration mode. In this mode, you specify the actions to
take on a specific traffic class by using the class, trust, or set policy-map configuration and policy-map class
configuration commands.
The policy map can contain the police and police aggregate policy-map class configuration commands, which
define the policer, the bandwidth limitations of the traffic, and the action to take if the limits are exceeded.
To enable the policy map, you attach it to a port by using the service-policy interface configuration command.
Note All traffic, regardless of whether it is bridged or routed, is subjected to a policer, if one is configured. As a
result, bridged packets might be dropped or might have their DSCP or CoS fields modified when they are
policed and marked.
You can configure policing on a physical port. After you configure the policy map and policing actions, attach
the policy to a port by using the service-policy interface configuration command.
Related Topics
Ingress Port Activity
Class Maps
Policy Maps
Configuring a QoS Policy, on page 686
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, on page 699
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps
Classifying, Policing, and Marking Traffic by Using Aggregate Policers, on page 704
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
656
QoS
Physical Port Policing
• Aggregate—QoS applies the bandwidth limits specified in an aggregate policer cumulatively to all
matched traffic flows. You configure this type of policer by specifying the aggregate policer name within
a policy map by using the police aggregate policy-map class configuration command. You specify the
bandwidth limits of the policer by using the mls qos aggregate-policer global configuration command.
In this way, the aggregate policer is shared by multiple classes of traffic within a policy map.
Policing uses a token-bucket algorithm. As each frame is received by the switch, a token is added to the bucket.
The bucket has a hole in it and leaks at a rate that you specify as the average traffic rate in bits per second.
Each time a token is added to the bucket, the switch verifies that there is enough room in the bucket. If there
is not enough room, the packet is marked as nonconforming, and the specified policer action is taken (dropped
or marked down).
How quickly the bucket fills is a function of the bucket depth (burst-byte), the rate at which the tokens are
removed (rate-bps), and the duration of the burst above the average rate. The size of the bucket imposes an
upper limit on the burst length and limits the number of frames that can be transmitted back-to-back. If the
burst is short, the bucket does not overflow, and no action is taken against the traffic flow. However, if a burst
is long and at a higher rate, the bucket overflows, and the policing actions are taken against the frames in that
burst.
You configure the bucket depth (the maximum burst that is tolerated before the bucket overflows) by using
the burst-byte option of the police policy-map class configuration command or the mls qos aggregate-policer
global configuration command. You configure how fast (the average rate) that the tokens are removed from
the bucket by using the rate-bps option of the police policy-map class configuration command or the mls qos
aggregate-policer global configuration command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
657
QoS
Mapping Tables Overview
Related Topics
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, on page 699
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
658
QoS
Queueing and Scheduling Overview
Classification During the classification stage, QoS uses configurable mapping tables to derive a
corresponding DSCP or CoS value from a received CoS, DSCP, or IP precedence
value. These maps include the CoS-to-DSCP map and the IP-precedence-to-DSCP
map.
You configure these maps by using the mls qos map cos-dscp and the mls qos map
ip-prec-dscp global configuration commands.
On an ingress port configured in the DSCP-trusted state, if the DSCP values are
different between the QoS domains, you can apply the configurable
DSCP-to-DSCP-mutation map to the port that is on the boundary between the two
QoS domains.
You configure this map by using the mls qos map dscp-mutation global configuration
command.
Policing During policing stage, QoS can assign another DSCP value to an IP or a non-IP packet
(if the packet is out of profile and the policer specifies a marked-down value). This
configurable map is called the policed-DSCP map.
You configure this map by using the mls qos map policed-dscp global configuration
command.
Pre-scheduling Before the traffic reaches the scheduling stage, QoS stores the packet in an egress
queue according to the QoS label. The QoS label is based on the DSCP or the CoS
value in the packet and selects the queue through the DSCP output queue threshold
maps or through the CoS output queue threshold maps. In addition to an egress queue,
the QOS label also identifies the WTD threshold value.
You configure these maps by using the mls qos srr-queue { output} dscp-map and
the mls qos srr-queue { output} cos-map global configuration commands.
The CoS-to-DSCP, DSCP-to-CoS, and the IP-precedence-to-DSCP maps have default values that might or
might not be appropriate for your network.
The default DSCP-to-DSCP-mutation map and the default policed-DSCP map are null maps; they map an
incoming DSCP value to the same DSCP value. The DSCP-to-DSCP-mutation map is the only map you apply
to a specific port. All other maps apply to the entire switch.
Related Topics
Configuring DSCP Maps, on page 706
Queueing and Scheduling on Ingress Queues
Queueing and Scheduling on Egress Queues
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
659
QoS
Weighted Tail Drop
Note The switch supports 4 egress queues by default and there is an option to enable a total of 8 egress queues. The
8 egress queue configuration is only supported on a standalone switch.
The following figure shows an example of WTD operating on a queue whose size is 1000 frames. Three drop
percentages are configured: 40 percent (400 frames), 60 percent (600 frames), and 100 percent (1000 frames).
These percentages indicate that up to 400 frames can be queued at the 40-percent threshold, up to 600 frames
at the 60-percent threshold, and up to 1000 frames at the 100-percent
threshold.
In the example, CoS values 6 and 7 have a greater importance than the other CoS values, and they are assigned
to the 100-percent drop threshold (queue-full state). CoS values 4 and 5 are assigned to the 60-percent threshold,
and CoS values 0 to 3 are assigned to the 40-percent threshold.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
660
QoS
SRR Shaping and Sharing
Suppose the queue is already filled with 600 frames, and a new frame arrives. It contains CoS values 4 and
5 and is subjected to the 60-percent threshold. If this frame is added to the queue, the threshold will be exceeded,
so the switch drops it.
Related Topics
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds, on page 713
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set, on page 720
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID, on page 724
WTD Thresholds, on page 663
Queues and WTD Thresholds, on page 667
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
661
QoS
Configurable Ingress Queue Types
Figure 71: Queueing and Scheduling Flowchart for Ingress Ports on the Switch
Note SRR services the priority queue for its configured share before servicing the other queue.
Note The switch also uses two nonconfigurable queues for traffic that are essential for proper network and stack
operation.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
662
QoS
WTD Thresholds
You assign each packet that flows through the switch to a queue and to a threshold. Specifically, you map
DSCP or CoS values to an ingress queue and map DSCP or CoS values to a threshold ID. You use the mls
qos srr-queue input dscp-map queue queue-id {dscp1...dscp8 | threshold threshold-id dscp1...dscp8} or
the mls qos srr-queue input cos-map queue queue-id {cos1...cos8 | threshold threshold-id cos1...cos8}
global configuration command. You can display the DSCP input queue threshold map and the CoS input
queue threshold map by using the show mls qos maps privileged EXEC command.
WTD Thresholds
The queues use WTD to support distinct drop percentages for different traffic classes. Each queue has three
drop thresholds: two configurable (explicit) WTD thresholds and one nonconfigurable (implicit) threshold
preset to the queue-full state.
You assign the two explicit WTD threshold percentages for threshold ID 1 and ID 2 to the ingress queues by
using the mls qos srr-queue input threshold queue-id threshold-percentage1 threshold-percentage2 global
configuration command. Each threshold value is a percentage of the total number of allocated buffers for the
queue. The drop threshold for threshold ID 3 is preset to the queue-full state, and you cannot modify it.
Related Topics
Weighted Tail Drop, on page 660
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
663
QoS
Priority Queueing
mls qos srr-queue input bandwidth weight1 weight2 global configuration command. The ratio of the weights
is the ratio of the frequency in which the SRR scheduler sends packets from each queue.
Priority Queueing
You can configure one ingress queue as the priority queue by using the mls qos srr-queue input priority-queue
queue-id bandwidth weight global configuration command. The priority queue should be used for traffic
(such as voice) that requires guaranteed delivery because this queue is guaranteed part of the bandwidth
regardless of the load on the stack or internal ring.
SRR services the priority queue for its configured weight as specified by the bandwidth keyword in the mls
qos srr-queue input priority-queue queue-id bandwidth weight global configuration command. Then, SRR
shares the remaining bandwidth with both ingress queues and services them as specified by the weights
configured with the mls qos srr-queue input bandwidth weight1 weight2 global configuration command.
You can combine the above commands to prioritize traffic by placing packets with particular DSCPs or CoSs
into certain queues, by allocating a large queue size or by servicing the queue more frequently, and by adjusting
queue thresholds so that packets with lower priorities are dropped.
Related Topics
Configuring Ingress Queue Characteristics, on page 713
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
664
QoS
Egress Expedite Queue
Figure 72: Queueing and Scheduling Flowchart for Egress Ports on the Switch
Note If the expedite queue is enabled, SRR services it until it is empty before servicing the other three queues.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
665
QoS
Egress Queue Buffer Allocation
Note If the expedite queue is enabled, SRR services it until it is empty before servicing the other three queues.
The buffer space is divided between the common pool and the reserved pool. The switch uses a buffer allocation
scheme to reserve a minimum amount of buffers for each egress queue, to prevent any queue or port from
consuming all the buffers and depriving other queues, and to control whether to grant buffer space to a
requesting queue. The switch detects whether the target queue has not consumed more buffers than its reserved
amount (under-limit), whether it has consumed all of its maximum buffers (over limit), and whether the
common pool is empty (no free buffers) or not empty (free buffers). If the queue is not over-limit, the switch
can allocate buffer space from the reserved pool or from the common pool (if it is not empty). If there are no
free buffers in the common pool or if the queue is over-limit, the switch drops the
frame.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
666
QoS
Queues and WTD Thresholds
Note The switch supports 4 egress queues by default, although there is an option to enable a total of 8 egress queues.
Use the mls qos srr-queue output queues 8 global configuration command to enable all 8 egress queues.
Once 8 egress queues are enabled, you are able to configure thresholds and buffers for all 8 queues. The 8
egress queue configuration is only supported on a standalone switch.
Note The switch supports 4 egress queues by default, although there is an option to enable a total of 8 egress queues.
Use the mls qos srr-queue output queues 8 global configuration command to enable all 8 egress queues.
Once 8 egress queues are enabled, you are able to configure thresholds and buffers for all 8 queues. The 8
egress queue configuration is only supported on a standalone switch.
Related Topics
Weighted Tail Drop, on page 660
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
667
QoS
Packet Modification
Note The egress queue default settings are suitable for most situations. You should change them only when you
have a thorough understanding of the egress queues and if these settings do not meet your QoS solution.
Note The switch supports 4 egress queues by default, although there is an option to enable a total of 8 egress queues.
Use the mls qos srr-queue output queues 8 global configuration command to enable all 8 egress queues.
Once 8 egress queues are enabled, you are able to configure thresholds, buffers, bandwidth share weights,
and bandwidth shape weights for all 8 queues. The 8 egress queue configuration is only supported on a
standalone switch.
Related Topics
Configuring Egress Queue Characteristics, on page 720
SRR Shaping and Sharing, on page 661
Packet Modification
A packet is classified, policed, and queued to provide QoS. The following packet modifications can occur
during the process to provide QoS:
• For IP and non-IP packets, classification involves assigning a QoS label to a packet based on the DSCP
or CoS of the received packet. However, the packet is not modified at this stage; only an indication of
the assigned DSCP or CoS value is carried along.
• During policing, IP and non-IP packets can have another DSCP assigned to them (if they are out of profile
and the policer specifies a markdown DSCP). Once again, the DSCP in the packet is not modified, but
an indication of the marked-down value is carried along. For IP packets, the packet modification occurs
at a later stage; for non-IP packets the DSCP is converted to CoS and used for queueing and scheduling
decisions.
• Depending on the QoS label assigned to a frame and the mutation chosen, the DSCP and CoS values of
the frame are rewritten. If you do not configure a table map and if you configure the port to trust the
DSCP of the incoming frame, the DSCP value in the frame is not changed, but the CoS is rewritten
according to the DSCP-to-CoS map. If you configure the port to trust the CoS of the incoming frame
and it is an IP packet, the CoS value in the frame is not changed, but the DSCP might be changed according
to the CoS-to-DSCP map.
The input mutation causes the DSCP to be rewritten depending on the new value of DSCP chosen. The
set action in a policy map also causes the DSCP to be rewritten.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
668
QoS
Default Ingress Queue Configuration
When QoS is enabled using the mls qos global configuration command and all other QoS settings are at their
defaults, traffic is classified as best effort (the DSCP and CoS value is set to 0) without any policing. No
policy maps are configured. The default port trust state on all ports is untrusted.
Note Starting Cisco IOS Release 15.2(1)E, IPv6 QoS is supported on switches running the LAN base license with
lanbase-routing template.
Related Topics
Enabling QoS Globally, on page 675
Default Egress Queue Configuration, on page 670
Default Ingress Queue Configuration, on page 669
Bandwidth allocation 4 4
The following table shows the default CoS input queue threshold map when QoS is enabled.
0–4 1–1
5 2–1
6, 7 1–1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
669
QoS
Default Egress Queue Configuration
The following table shows the default DSCP input queue threshold map when QoS is enabled.
0–39 1–1
40–47 2–1
48–63 1–1
Related Topics
Enabling QoS Globally, on page 675
Standard QoS Default Configuration, on page 668
Note The switch supports 4 egress queues by default, although there is an option to enable a total of 8 egress queues.
Use the mls qos srr-queue output queues 8 global configuration command to enable all 8 egress queues.
Once 8 egress queues are enabled, you are able to configure thresholds and buffers for all 8 queues. The 8
egress queue configuration is only supported on a standalone switch.
The following table shows the default egress queue configuration for each queue-set when QoS is enabled.
All ports are mapped to queue-set 1. The port bandwidth limit is set to 100 percent and rate unlimited. Note
that for the SRR shaped weights (absolute) feature, a shaped weight of zero indicates that the queue is operating
in shared mode. Note that for the SRR shared weights feature, one quarter of the bandwidth is allocated to
each queue.
WTD drop threshold 100 percent 200 percent 100 percent 100 percent
1
WTD drop threshold 100 percent 200 percent 100 percent 100 percent
2
Maximum threshold 400 percent 400 percent 400 percent 400 percent
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
670
QoS
Default Egress Queue Configuration
The following table shows the default CoS output queue threshold map when QoS is enabled.
0, 1 2–1
2, 3 3–1
4 4–1
5 1–1
6, 7 4–1
The following table shows the default DSCP output queue threshold map when QoS is enabled.
0–15 2–1
16–31 3–1
32–39 4–1
40–47 1–1
48–63 4–1
The following table displays the default egress queue configuration when the 8 egress queue configuration is
enabled using the mls qos srr-queue output queues 8 command.
Buffer 10 30 10 10 10 10 10 10
allocation
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
671
QoS
Default Egress Queue Configuration
SRR 25 0 0 0 0 0 0 0
shaped
weights
SRR 25 25 25 25 25 25 25 25
shared
weights
The following table displays the default CoS output queue threshold map when QoS is enabled and the 8
egress queue configuration is enabled using the mls qos srr-queue output queues 8 command.
0 2 1 2
1 3 1 2
2 4 1 3
3 5 1 3
4 6 1 4
5 1 1 1
6 7 1 4
7 8 1 4
The following table displays the default DSCP output queue threshold map when QoS is enabled and the 8
egress queue configuration is enabled using the mls qos srr-queue output queues 8 command.
0-7 2 1 2
8-15 3 1 2
16-23 4 1 3
24-31 5 1 3
32-39 6 1 4
40-47 1 1 1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
672
QoS
Default Mapping Table Configuration
48-55 7 1 4
56-63 8 1 4
Related Topics
Enabling QoS Globally, on page 675
Standard QoS Default Configuration, on page 668
DSCP Maps
Default CoS-to-DSCP Map
You use the CoS-to-DSCP map to map CoS values in incoming packets to a DSCP value that QoS uses
internally to represent the priority of the traffic. The following table shows the default CoS-to-DSCP map. If
these values are not appropriate for your network, you need to modify them.
0 0
1 8
2 16
3 24
4 32
5 40
6 48
7 56
Related Topics
Default Mapping Table Configuration, on page 673
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
673
QoS
Default IP-Precedence-to-DSCP Map
0 0
1 8
2 16
3 24
4 32
5 40
6 48
7 56
Related Topics
Default Mapping Table Configuration, on page 673
Configuring the IP-Precedence-to-DSCP Map, on page 707
Configuring the Policed-DSCP Map, on page 709
0–7 0
8–15 1
16–23 2
24–31 3
32–39 4
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
674
QoS
How to Configure QoS
40–47 5
48–55 6
56–63 7
Related Topics
Default Mapping Table Configuration, on page 673
Configuring the DSCP-to-CoS Map, on page 710
Configuring the Policed-DSCP Map, on page 709
SUMMARY STEPS
1. configure terminal
2. mls qos
3. end
4. show mls qos
5. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
675
QoS
Configuring Classification Using Port Trust States
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Standard QoS Default Configuration, on page 668
Default Egress Queue Configuration, on page 670
Default Ingress Queue Configuration, on page 669
Note Depending on your network configuration, you must perform one or more of these tasks in this module or
one or more of the tasks in the Configuring a QoS Policy.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
676
QoS
Configuring the Trust State on Ports Within the QoS Domain
Figure 74: Port Trusted States on Ports Within the QoS Domain
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. mls qos trust [cos | dscp | ip-precedence]
4. end
5. show mls qos interface
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be trusted, and enters interface
configuration mode. Valid interfaces are physical ports.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
677
QoS
Configuring the Trust State on Ports Within the QoS Domain
SwitchDevice(config)# interface
gigabitethernet 1/0/2
Step 3 mls qos trust [cos | dscp | ip-precedence] Configures the port trust state.
Example: By default, the port is not trusted. If no keyword is specified,
the default is dscp.
SwitchDevice(config-if)# mls qos trust cos
The keywords have these meanings:
• cos—Classifies an ingress packet by using the packet
CoS value. For an untagged packet, the port default
CoS value is used. The default port CoS value is 0.
• dscp—Classifies an ingress packet by using the packet
DSCP value. For a non-IP packet, the packet CoS value
is used if the packet is tagged; for an untagged packet,
the default port CoS is used. Internally, the switch
maps the CoS value to a DSCP value by using the
CoS-to-DSCP map.
• ip-precedence—Classifies an ingress packet by using
the packet IP-precedence value. For a non-IP packet,
the packet CoS value is used if the packet is tagged;
for an untagged packet, the default port CoS is used.
Internally, the switch maps the CoS value to a DSCP
value by using the CoS-to-DSCP map.
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
678
QoS
Configuring the CoS Value for an Interface
Related Topics
Configuring the CoS Value for an Interface, on page 679
Configuring the CoS-to-DSCP Map, on page 706
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. mls qos cos {default-cos | override}
4. end
5. show mls qos interface
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enters interface
configuration mode.
Example:
Valid interfaces include physical ports.
SwitchDevice(config)# interface
gigabitethernet 1/1/1
Step 3 mls qos cos {default-cos | override} Configures the default CoS value for the port.
Example: • For default-cos, specify a default CoS value to be
assigned to a port. If the packet is untagged, the default
SwitchDevice(config-if)# mls qos CoS value becomes the packet CoS value. The CoS
override range is 0 to 7. The default is 0.
• Use the override keyword to override the previously
configured trust state of the incoming packet and to
apply the default port CoS value to the port on all
incoming packets. By default, CoS override is disabled.
Use the override keyword when all incoming packets
on specified ports deserve higher or lower priority than
packets entering from other ports. Even if a port was
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
679
QoS
Configuring a Trusted Boundary to Ensure Port Security
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Configuring the Trust State on Ports Within the QoS Domain, on page 676
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
680
QoS
Configuring a Trusted Boundary to Ensure Port Security
With the trusted setting, you also can use the trusted boundary feature to prevent misuse of a high-priority
queue if a user bypasses the telephone and connects the PC directly to the switch. Without trusted boundary,
the CoS labels generated by the PC are trusted by the switch (because of the trusted CoS setting). By contrast,
trusted boundary uses CDP to detect the presence of a Cisco IP Phone (such as the Cisco IP Phone 7910,
7935, 7940, and 7960) on a switch port. If the telephone is not detected, the trusted boundary feature disables
the trusted setting on the switch port and prevents misuse of a high-priority queue. Note that the trusted
boundary feature is not effective if the PC and Cisco IP Phone are connected to a hub that is connected to the
switch.
In some situations, you can prevent a PC connected to the Cisco IP Phone from taking advantage of a
high-priority data queue. You can use the switchport priority extend cos interface configuration command
to configure the telephone through the switch CLI to override the priority of the traffic received from the PC.
SUMMARY STEPS
1. configure terminal
2. cdp run
3. interface interface-id
4. cdp enable
5. Use one of the following:
• mls qos trust cos
• mls qos trust dscp
6. mls qos trust device cisco-phone
7. end
8. show mls qos interface
9. copy running-config startup-config
DETAILED STEPS
Step 3 interface interface-id Specifies the port connected to the Cisco IP Phone, and
enters interface configuration mode.
Example:
Valid interfaces include physical ports.
SwitchDevice(config)# interface
gigabitethernet 2/1/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
681
QoS
Enabling DSCP Transparency Mode
Step 5 Use one of the following: Configures the switch port to trust the CoS value in traffic
received from the Cisco IP Phone.
• mls qos trust cos
• mls qos trust dscp or
Example: Configures the routed port to trust the DSCP value in traffic
received from the Cisco IP Phone.
SwitchDevice(config-if)# mls qos trust cos
By default, the port is not trusted.
Step 6 mls qos trust device cisco-phone Specifies that the Cisco IP Phone is a trusted device.
Example: You cannot enable both trusted boundary and auto-QoS
(auto qos voip interface configuration command) at the
SwitchDevice(config-if)# mls qos trust same time; they are mutually exclusive.
device cisco-phone
Note To disable the trusted boundary feature, use the
no mls qos trust device interface configuration
command.
SwitchDevice(config-if)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
682
QoS
Enabling DSCP Transparency Mode
If DSCP transparency is enabled by using the no mls qos rewrite ip dscp command, the switch does not
modify the DSCP field in the incoming packet, and the DSCP field in the outgoing packet is the same as that
in the incoming packet.
Regardless of the DSCP transparency configuration, the switch modifies the internal DSCP value of the packet,
which the switch uses to generate a class of service (CoS) value that represents the priority of the traffic. The
switch also uses the internal DSCP value to select an egress queue and threshold.
SUMMARY STEPS
1. configure terminal
2. mls qos
3. no mls qos rewrite ip dscp
4. end
5. show mls qos interface [interface-id]
6. copy running-config startup-config
DETAILED STEPS
Step 3 no mls qos rewrite ip dscp Enables DSCP transparency. The switch is configured to
not modify the DSCP field of the IP packet.
Example:
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
683
QoS
DSCP Transparency Mode
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain
If you are administering two separate QoS domains between which you want to implement QoS features for
IP traffic, you can configure the switch ports bordering the domains to a DSCP-trusted state. The receiving
port accepts the DSCP-trusted value and avoids the classification stage of QoS. If the two domains use different
DSCP values, you can configure the DSCP-to-DSCP-mutation map to translate a set of DSCP values to match
the definition in the other domain.
Figure 75: DSCP-Trusted State on a Port Bordering Another QoS Domain
Beginning in privileged EXEC mode, follow these steps to configure the DSCP-trusted state on a port and
modify the DSCP-to-DSCP-mutation map. To ensure a consistent mapping strategy across both QoS domains,
you must perform this procedure on the ports in both domains.
SUMMARY STEPS
1. configure terminal
2. mls qos map dscp-mutation dscp-mutation-name in-dscp to out-dscp
3. interface interface-id
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
684
QoS
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain
DETAILED STEPS
Step 2 mls qos map dscp-mutation dscp-mutation-name in-dscp Modifies the DSCP-to-DSCP-mutation map.
to out-dscp
The default DSCP-to-DSCP-mutation map is a null map,
Example: which maps an incoming DSCP value to the same DSCP
value.
SwitchDevice(config)# mls qos map
dscp-mutation • For dscp-mutation-name, enter the mutation map name.
gigabitethernet1/0/2-mutation You can create more than one map by specifying a
10 11 12 13 to 30 new name.
• For in-dscp, enter up to eight DSCP values separated
by spaces. Then enter the to keyword.
• For out-dscp, enter a single DSCP value.
Step 3 interface interface-id Specifies the port to be trusted, and enter interface
configuration mode.
Example:
Valid interfaces include physical ports.
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 4 mls qos trust dscp Configures the ingress port as a DSCP-trusted port. By
default, the port is not trusted.
Example:
Note To return a port to its non-trusted state, use the
SwitchDevice(config-if)# mls qos trust dscp no mls qos trust interface configuration
command.
Step 5 mls qos dscp-mutation dscp-mutation-name Applies the map to the specified ingress DSCP-trusted port.
Example: For dscp-mutation-name, specify the mutation map name
created in Step 2.
SwitchDevice(config-if)# mls qos dscp-mutation
gigabitethernet1/0/2-mutation You can configure multiple DSCP-to-DSCP-mutation maps
on an ingress port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
685
QoS
Configuring a QoS Policy
SwitchDevice(config-if)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: Note To return a port to its non-trusted state, use the
no mls qos trust interface configuration
SwitchDevice# copy-running-config command. To return to the default
startup-config DSCP-to-DSCP-mutation map values, use the
no mls qos map dscp-mutation
dscp-mutation-name global configuration
command.
Related Topics
Example: Configuring Port to the DSCP-Trusted State and Modifying the DSCP-to-DSCP-Mutation
Map, on page 733
These sections describe how to classify, police, and mark traffic. Depending on your network configuration,
you must perform one or more of the modules in this section.
Related Topics
Policing and Marking Overview, on page 656
Classification Overview, on page 651
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
686
QoS
Classifying Traffic by Using ACLs
SUMMARY STEPS
1. configure terminal
2. access-list access-list-number {deny | permit} source [source-wildcard]
3. end
4. show access-lists
5. copy running-config startup-config
DETAILED STEPS
Step 2 access-list access-list-number {deny | permit} source Creates an IP standard ACL, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, enter the access list number.
The range is 1 to 99 and 1300 to 1999.
SwitchDevice(config)# access-list 1
permit 192.2.255.0 1.1.1.255 • Use the permit keyword to permit a certain type of
traffic if the conditions are matched. Use the deny
keyword to deny a certain type of traffic if conditions
are matched.
• For source, enter the network or host from which the
packet is being sent. You can use the any keyword as
an abbreviation for 0.0.0.0 255.255.255.255.
• (Optional) For source-wildcard, enter the wildcard
bits in dotted decimal notation to be applied to the
source. Place ones in the bit positions that you want
to ignore.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
687
QoS
Creating an IP Extended ACL for IPv4 Traffic
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Access Control Lists, on page 654
QoS ACL Guidelines, on page 645
Examples: Classifying Traffic by Using ACLs, on page 733
SUMMARY STEPS
1. configure terminal
2. access-list access-list-number {deny | permit} protocol source source-wildcard destination
destination-wildcard
3. end
4. show access-lists
5. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
688
QoS
Creating an IP Extended ACL for IPv4 Traffic
Step 2 access-list access-list-number {deny | permit} protocol Creates an IP extended ACL, repeating the command as
source source-wildcard destination destination-wildcard many times as necessary.
Example: • For access-list-number, enter the access list number.
The range is 100 to 199 and 2000 to 2699.
SwitchDevice(config)# access-list 100 permit ip
any any dscp 32 • Use the permit keyword to permit a certain type of
traffic if the conditions are matched. Use the deny
keyword to deny a certain type of traffic if conditions
are matched.
• For protocol, enter the name or number of an IP
protocol. Use the question mark (?) to see a list of
available protocol keywords.
• For source, enter the network or host from which the
packet is being sent. You specify this by using dotted
decimal notation, by using the any keyword as an
abbreviation for source 0.0.0.0 source-wildcard
255.255.255.255, or by using the host keyword for
source 0.0.0.0.
• For source-wildcard, enter the wildcard bits by placing
ones in the bit positions that you want to ignore. You
specify the wildcard by using dotted decimal notation,
by using the any keyword as an abbreviation for source
0.0.0.0 source-wildcard 255.255.255.255, or by using
the host keyword for source 0.0.0.0.
• For destination, enter the network or host to which the
packet is being sent. You have the same options for
specifying the destination and destination-wildcard
as those described by source and source-wildcard.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
689
QoS
Creating an IPv6 ACL for IPv6 Traffic
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Access Control Lists, on page 654
QoS ACL Guidelines, on page 645
Examples: Classifying Traffic by Using ACLs, on page 733
SUMMARY STEPS
1. configure terminal
2. ipv6 access-list access-list-name
3. {deny | permit} protocol {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator
[port-number]] {destination-ipv6-prefix/ prefix-length | any | host destination-ipv6-address} [operator
[port-number]] [dscp value] [fragments] [log] [log-input] [routing] [sequence value] [time-range name]
4. end
5. show ipv6 access-list
6. copy running-config startup-config
DETAILED STEPS
Step 2 ipv6 access-list access-list-name Creates an IPv6 ACL and enters IPv6 access-list
configuration mode.
Example:
Accesses list names cannot contain a space or quotation
SwitchDevice(config)# ipv6 mark or begin with a numeric.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
690
QoS
Creating an IPv6 ACL for IPv6 Traffic
Step 3 {deny | permit} protocol {source-ipv6-prefix/prefix-length Enters deny or permit to specify whether to deny or permit
| any | host source-ipv6-address} [operator [port-number]] the packet if conditions are matched. These are the
{destination-ipv6-prefix/ prefix-length | any | host conditions:
destination-ipv6-address} [operator [port-number]] [dscp
For protocol, enter the name or number of an Internet
value] [fragments] [log] [log-input] [routing] [sequence
protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or udp, or
value] [time-range name]
an integer in the range 0 to 255 representing an IPv6
Example: protocol number.
• The source-ipv6-prefix/prefix-length or
SwitchDevice(config-ipv6-acl)#
permit ip host 10::1 host
destination-ipv6-prefix/ prefix-length is the source or
11::2 host destination IPv6 network or class of networks for
which to set deny or permit conditions, specified in
hexadecimal and using 16-bit values between colons
(see RFC 2373).
• Enter any as an abbreviation for the IPv6 prefix ::/0.
• For host source-ipv6-address or
destination-ipv6-address, enter the source or
destination IPv6 host address for which to set deny or
permit conditions, specified in hexadecimal using
16-bit values between colons.
• (Optional) For operator, specify an operand that
compares the source or destination ports of the
specified protocol. Operands are lt (less than), gt
(greater than), eq (equal), neq (not equal), and range.
If the operator follows the
source-ipv6-prefix/prefix-length argument, it must
match the source port. If the operator follows the
destination-ipv6- prefix/prefix-length argument, it must
match the destination port.
• (Optional) The port-number is a decimal number from
0 to 65535 or the name of a TCP or UDP port. You
can use TCP port names only when filtering TCP. You
can use UDP port names only when filtering UDP.
• (Optional) Enter dscp value to match a differentiated
services code point value against the traffic class value
in the Traffic Class field of each IPv6 packet header.
The acceptable range is from 0 to 63.
• (Optional) Enter fragments to check noninitial
fragments. This keyword is visible only if the protocol
is IPv6.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
691
QoS
Creating a Layer 2 MAC ACL for Non-IP Traffic
SwitchDevice(config-ipv6-acl)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Access Control Lists, on page 654
QoS ACL Guidelines, on page 645
Examples: Classifying Traffic by Using ACLs, on page 733
QoS ACL IPv6 Guidelines
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
692
QoS
Creating a Layer 2 MAC ACL for Non-IP Traffic
SUMMARY STEPS
1. configure terminal
2. mac access-list extended name
3. {permit | deny} {host src-MAC-addr mask | any | host dst-MAC-addr | dst-MAC-addr mask} [type mask]
4. end
5. show access-lists [access-list-number | access-list-name]
6. copy running-config startup-config
DETAILED STEPS
Step 2 mac access-list extended name Creates a Layer 2 MAC ACL by specifying the name of
the list.
Example:
After entering this command, the mode changes to extended
SwitchDevice(config)# mac access-list MAC ACL configuration.
extended maclist1
Note To delete an access list, use the no mac
access-list extended access-list-name global
configuration command.
Step 3 {permit | deny} {host src-MAC-addr mask | any | host Specifies the type of traffic to permit or deny if the
dst-MAC-addr | dst-MAC-addr mask} [type mask] conditions are matched, entering the command as many
times as necessary.
Example:
• For src-MAC-addr, enter the MAC address of the host
SwitchDevice(config-ext-mac1) # permit from which the packet is being sent. You specify this
0001.0000.0001 by using the hexadecimal format (H.H.H), by using
0.0.0 0002.0000.0001 0.0.0
the any keyword as an abbreviation for source 0.0.0,
source-wildcard ffff.ffff.ffff, or by using the host
keyword for source 0.0.0.
SwitchDevice(config-ext-mac1) # permit
0001.0000.0002 • For mask, enter the wildcard bits by placing ones in
0.0.0 0002.0000.0002 0.0.0 xns-idp
the bit positions that you want to ignore.
• For dst-MAC-addr, enter the MAC address of the host
to which the packet is being sent. You specify this by
using the hexadecimal format (H.H.H), by using the
any keyword as an abbreviation for source 0.0.0,
source-wildcard ffff.ffff.ffff, or by using the host
keyword for source 0.0.0.
• (Optional) For type mask, specify the Ethertype number
of a packet with Ethernet II or SNAP encapsulation to
identify the protocol of the packet. For type, the range
is from 0 to 65535, typically specified in hexadecimal.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
693
QoS
Classifying Traffic by Using Class Maps
SwitchDevice(config-ext-mac1)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Access Control Lists, on page 654
QoS ACL Guidelines, on page 645
Examples: Classifying Traffic by Using ACLs, on page 733
Note You can also create class maps during policy map creation by using the class policy-map configuration
command.
SUMMARY STEPS
1. configure terminal
2. Use one of the following:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
694
QoS
Classifying Traffic by Using Class Maps
DETAILED STEPS
Step 2 Use one of the following: Creates an IP standard or extended ACL, an IPv6 ACL for
IP traffic, or a Layer 2 MAC ACL for non-IP traffic,
• access-list access-list-number {deny | permit} source
repeating the command as many times as necessary.
[source-wildcard]
• access-list access-list-number {deny | permit} When creating an access list, remember that, by default, the
protocol source [source-wildcard] destination end of the access list contains an implicit deny statement
[destination-wildcard] for everything if it did not find a match before reaching the
• ipv6 access-list access-list-name {deny | permit} end.
protocol {source-ipv6-prefix/prefix-length | any | host
source-ipv6-address} [operator [port-number]]
{destination-ipv6-prefix/ prefix-length | any | host
destination-ipv6-address} [operator [port-number]]
[dscp value] [fragments] [log] [log-input] [routing]
[sequence value] [time-range name]
• mac access-list extended name {permit | deny} {host
src-MAC-addr mask | any | host dst-MAC-addr |
dst-MAC-addr mask} [type mask]
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
695
QoS
Classifying Traffic by Using Class Maps
Step 4 match {access-group acl-index-or-name | ip dscp dscp-list Defines the match criterion to classify traffic.
| ip precedence ip-precedence-list}
By default, no match criterion is defined.
Example:
Only one match criterion per class map is supported, and
only one ACL per class map is supported.
SwitchDevice(config-cmap)# match ip dscp 10 11 12
• For access-group acl-index-or-name, specify the
number or name of the ACL created in Step 2.
• To filter IPv6 traffic with the match access-group
command, create an IPv6 ACL, as described in Step 2.
• For ip dscp dscp-list, enter a list of up to eight IP
DSCP values to match against incoming packets.
Separate each value with a space. The range is 0 to 63.
• For ip precedence ip-precedence-list, enter a list of
up to eight IP-precedence values to match against
incoming packets. Separate each value with a space.
The range is 0 to 7.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
696
QoS
Classifying Traffic by Using Class Maps and Filtering IPv6 Traffic
SwitchDevice(config-cmap)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, on page 699
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps
Examples: Classifying Traffic by Using Class Maps, on page 735
SUMMARY STEPS
1. configure terminal
2. class-map {match-all} class-map-name
3. match protocol [ip | ipv6]
4. match {ip dscp dscp-list | ip precedence ip-precedence-list}
5. end
6. show class-map
7. copy running-config startup-config
DETAILED STEPS
Step 2 class-map {match-all} class-map-name Creates a class map, and enters class-map configuration
mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
697
QoS
Classifying Traffic by Using Class Maps and Filtering IPv6 Traffic
Step 3 match protocol [ip | ipv6] (Optional) Specifies the IP protocol to which the class map
applies:
Example:
• Use the argument ip to specify IPv4 traffic and ipv6
SwitchDevice(config-cmap)# match protocol ip to specify IPv6 traffic.
• When you use the match protocol command, only the
match-all keyword is supported for the class-map
command.
Step 4 match {ip dscp dscp-list | ip precedence Defines the match criterion to classify traffic.
ip-precedence-list}
By default, no match criterion is defined.
Example:
• For ip dscp dscp-list, enter a list of up to eight IP
DSCP values to match against incoming packets.
SwitchDevice(config-cmap)# match ip dscp 10
Separate each value with a space. The range is 0 to 63.
• For ip precedence ip-precedence-list, enter a list of
up to eight IP-precedence values to match against
incoming packets. Separate each value with a space.
The range is 0 to 7.
SwitchDevice(config-cmap)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
698
QoS
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Examples: Classifying Traffic by Using Class Maps, on page 735
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
You can configure a policy map on a physical port that specifies which traffic class to act on. Actions can
include trusting the CoS, DSCP, or IP precedence values in the traffic class; setting a specific DSCP or IP
precedence value in the traffic class; and specifying the traffic bandwidth limitations for each matched traffic
class (policer) and the action to take when the traffic is out of profile (marking).
A policy map also has these characteristics:
• A policy map can contain multiple class statements, each with different match criteria and policers.
• A policy map can contain a predefined default traffic class explicitly placed at the end of the map.
• A separate policy-map class can exist for each type of traffic received through a port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
699
QoS
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
SUMMARY STEPS
1. configure terminal
2. class-map [match-all | match-any] class-map-name
3. policy-map policy-map-name
4. class [class-map-name | class-default]
5. trust [cos | dscp | ip-precedence]
6. set {dscp new-dscp | ip precedence new-precedence}
7. police rate-bps burst-byte [exceed-action {drop | policed-dscp-transmit}]
8. exit
9. exit
10. interface interface-id
11. service-policy input policy-map-name
12. end
13. show policy-map [policy-map-name [class class-map-name]]
14. copy running-config startup-config
DETAILED STEPS
Step 2 class-map [match-all | match-any] class-map-name Creates a class map, and enters class-map configuration
mode.
Example:
By default, no class maps are defined.
SwitchDevice(config)# class-map ipclass1
• (Optional) Use the match-all keyword to perform a
logical-AND of all matching statements under this
class map. All match criteria in the class map must
be matched.
• (Optional) Use the match-any keyword to perform
a logical-OR of all matching statements under this
class map. One or more match criteria must be
matched.
• For class-map-name, specify the name of the class
map.
Step 3 policy-map policy-map-name Creates a policy map by entering the policy map name,
and enters policy-map configuration mode.
Example:
By default, no policy maps are defined.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
700
QoS
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
Step 4 class [class-map-name | class-default] Defines a traffic classification, and enters policy-map class
configuration mode.
Example:
By default, no policy map class-maps are defined.
SwitchDevice(config-pmap)# class ipclass1
If a traffic class has already been defined by using the
class-map global configuration command, specify its name
for class-map-name in this command.
A class-default traffic class is pre-defined and can be
added to any policy. It is always placed at the end of a
policy map. With an implied match any included in the
class-default class, all packets that have not already
matched the other traffic classes will match class-default.
Note To delete an existing class map, use the no class
class-map-name policy-map configuration
command.
Step 5 trust [cos | dscp | ip-precedence] Configures the trust state, which QoS uses to generate a
CoS-based or DSCP-based QoS label.
Example:
This command is mutually exclusive with the set command
SwitchDevice(config-pmap-c)# trust dscp within the same policy map. If you enter the trust
command, go to Step 6.
By default, the port is not trusted. If no keyword is
specified when the command is entered, the default is dscp.
The keywords have these meanings:
• cos—QoS derives the DSCP value by using the
received or default port CoS value and the
CoS-to-DSCP map.
• dscp—QoS derives the DSCP value by using the
DSCP value from the ingress packet. For non-IP
packets that are tagged, QoS derives the DSCP value
by using the received CoS value; for non-IP packets
that are untagged, QoS derives the DSCP value by
using the default port CoS value. In either case, the
DSCP value is derived from the CoS-to-DSCP map.
• ip-precedence—QoS derives the DSCP value by
using the IP precedence value from the ingress packet
and the IP-precedence-to-DSCP map. For non-IP
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
701
QoS
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
Step 6 set {dscp new-dscp | ip precedence new-precedence} Classifies IP traffic by setting a new value in the packet.
Example: • For dscp new-dscp, enter a new DSCP value to be
assigned to the classified traffic. The range is 0 to 63.
SwitchDevice(config-pmap-c)# set dscp 45
• For ip precedence new-precedence, enter a new
IP-precedence value to be assigned to the classified
traffic. The range is 0 to 7.
Step 7 police rate-bps burst-byte [exceed-action {drop | Defines a policer for the classified traffic.
policed-dscp-transmit}]
By default, no policer is defined.
Example:
• For rate-bps, specify average traffic rate in bits per
second (b/s). The range is 8000 to 10000000000.
SwitchDevice(config-pmap-c)# police 100000
80000 drop • For burst-byte, specify the normal burst size in bytes.
The range is 8000 to 1000000.
• (Optional) Specifies the action to take when the rates
are exceeded. Use the exceed-action drop keywords
to drop the packet. Use the exceed-action
policed-dscp-transmit keywords to mark down the
DSCP value (by using the policed-DSCP map) and
to send the packet.
SwitchDevice(config-pmap-c)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
702
QoS
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps
SwitchDevice(config-pmap)# exit
Step 10 interface interface-id Specifies the port to attach to the policy map, and enters
interface configuration mode.
Example:
Valid interfaces include physical ports.
SwitchDevice(config)# interface
gigabitethernet 2/0/1
Step 11 service-policy input policy-map-name Specifies the policy-map name, and applies it to an ingress
port.
Example:
Only one policy map per ingress port is supported.
SwitchDevice(config-if)# service-policy
input flowit
Note To remove the policy map and port association,
use the no service-policy input
policy-map-name interface configuration
command.
SwitchDevice(config-if)# end
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Policing and Marking Overview, on page 656
Physical Port Policing, on page 656
Classifying Traffic by Using Class Maps, on page 694
Policy Map on Physical Port
Examples: Classifying, Policing, and Marking Traffic on Physical Ports Using Policy Maps, on page 736
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
703
QoS
Classifying, Policing, and Marking Traffic by Using Aggregate Policers
SUMMARY STEPS
1. configure terminal
2. mls qos aggregate-policer aggregate-policer-name rate-bps burst-byte exceed-action {drop |
policed-dscp-transmit}
3. class-map [match-all | match-any] class-map-name
4. policy-map policy-map-name
5. class [class-map-name | class-default]
6. police aggregate aggregate-policer-name
7. exit
8. interface interface-id
9. service-policy input policy-map-name
10. end
11. show mls qos aggregate-policer [aggregate-policer-name]
12. copy running-config startup-config
DETAILED STEPS
Step 2 mls qos aggregate-policer aggregate-policer-name Defines the policer parameters that can be applied to
rate-bps burst-byte exceed-action {drop | multiple traffic classes within the same policy map.
policed-dscp-transmit}
By default, no aggregate policer is defined.
Example:
• For aggregate-policer-name, specify the name of the
aggregate policer.
SwitchDevice(config)# mls qos aggregate-police
transmit1 48000 8000 exceed-action • For rate-bps, specify average traffic rate in bits per
policed-dscp-transmit
second (b/s). The range is 8000 to 10000000000.
• For burst-byte, specify the normal burst size in bytes.
The range is 8000 to 1000000.
• Specifies the action to take when the rates are
exceeded. Use the exceed-action drop keywords to
drop the packet. Use the exceed-action
policed-dscp-transmit keywords to mark down the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
704
QoS
Classifying, Policing, and Marking Traffic by Using Aggregate Policers
Step 3 class-map [match-all | match-any] class-map-name Creates a class map to classify traffic as necessary.
Example:
Step 4 policy-map policy-map-name Creates a policy map by entering the policy map name,
and enters policy-map configuration mode.
Example:
Step 5 class [class-map-name | class-default] Defines a traffic classification, and enters policy-map class
configuration mode.
Example:
Step 6 police aggregate aggregate-policer-name Applies an aggregate policer to multiple classes in the
same policy map.
Example:
For aggregate-policer-name, enter the name specified in
SwitchDevice(configure-cmap-p)# police aggregate Step 2.
transmit1
To remove the specified aggregate policer from a policy
map, use the no police aggregate aggregate-policer-name
policy map configuration command. To delete an aggregate
policer and its parameters, use the no mls qos
aggregate-policer aggregate-policer-name global
configuration command.
SwitchDevice(configure-cmap-p)# exit
Step 8 interface interface-id Specifies the port to attach to the policy map, and enters
interface configuration mode.
Example:
Valid interfaces include physical ports.
SwitchDevice(config)# interface gigabitethernet
2/0/1
Step 9 service-policy input policy-map-name Specifies the policy-map name, and applies it to an ingress
port.
Example:
Only one policy map per ingress port is supported.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
705
QoS
Configuring DSCP Maps
SwitchDevice(configure-if)# end
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Policing and Marking Overview, on page 656
Examples: Classifying, Policing, and Marking Traffic by Using Aggregate Policers, on page 739
SUMMARY STEPS
1. configure terminal
2. mls qos map cos-dscp dscp1...dscp8
3. end
4. show mls qos maps cos-dscp
5. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
706
QoS
Configuring the IP-Precedence-to-DSCP Map
DETAILED STEPS
Step 2 mls qos map cos-dscp dscp1...dscp8 Modifies the CoS-to-DSCP map.
Example: For dscp1...dscp8, enter eight DSCP values that correspond
to CoS values 0 to 7. Separate each DSCP value with a
SwitchDevice(config)# mls qos map space.
cos-dscp 10 15 20 25 30 35 40 45
The DSCP range is 0 to 63.
Note To return to the default map, use the no mls qos
cos-dscp global configuration command.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Default CoS-to-DSCP Map, on page 673
Configuring the Trust State on Ports Within the QoS Domain, on page 676
Examples: Configuring DSCP Maps, on page 740
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
707
QoS
Configuring the IP-Precedence-to-DSCP Map
SUMMARY STEPS
1. configure terminal
2. mls qos map ip-prec-dscp dscp1...dscp8
3. end
4. show mls qos maps ip-prec-dscp
5. copy running-config startup-config
DETAILED STEPS
Step 2 mls qos map ip-prec-dscp dscp1...dscp8 Modifies the IP-precedence-to-DSCP map.
Example: For dscp1...dscp8, enter eight DSCP values that correspond
to the IP precedence values 0 to 7. Separate each DSCP
SwitchDevice(config)# mls qos map value with a space.
ip-prec-dscp 10 15 20 25 30 35 40
45 The DSCP range is 0 to 63.
Note To return to the default map, use the no mls qos
ip-prec-dscp global configuration command.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Default IP-Precedence-to-DSCP Map, on page 674
Examples: Configuring DSCP Maps, on page 740
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
708
QoS
Configuring the Policed-DSCP Map
SUMMARY STEPS
1. configure terminal
2. mls qos map policed-dscp dscp-list to mark-down-dscp
3. end
4. show mls qos maps policed-dscp
5. copy running-config startup-config
DETAILED STEPS
Step 2 mls qos map policed-dscp dscp-list to mark-down-dscp Modifies the policed-DSCP map.
Example: • For dscp-list, enter up to eight DSCP values separated
by spaces. Then enter the to keyword.
SwitchDevice(config)# mls qos map
policed-dscp 50 51 52 53 54 55 56 • For mark-down-dscp, enter the corresponding policed
57 to 0 (marked down) DSCP value.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
709
QoS
Configuring the DSCP-to-CoS Map
SwitchDevice#
Related Topics
Default CoS-to-DSCP Map, on page 673
Default IP-Precedence-to-DSCP Map, on page 674
Default DSCP-to-CoS Map, on page 674
Examples: Configuring DSCP Maps, on page 740
SUMMARY STEPS
1. configure terminal
2. mls qos map dscp-cos dscp-list to cos
3. end
4. show mls qos maps dscp-to-cos
5. copy running-config startup-config
DETAILED STEPS
Step 2 mls qos map dscp-cos dscp-list to cos Modifies the DSCP-to-CoS map.
Example: • For dscp-list, enter up to eight DSCP values separated
by spaces. Then enter the to keyword.
SwitchDevice# mls qos map dscp-cos 0 8
16 24 32 40 48 50 to 0 • For cos, enter the CoS value to which the DSCP values
correspond.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
710
QoS
Configuring the DSCP-to-DSCP-Mutation Map
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice# copy-running-config
startup-config
Related Topics
Default DSCP-to-CoS Map, on page 674
Examples: Configuring DSCP Maps, on page 740
SUMMARY STEPS
1. configure terminal
2. mls qos map dscp-mutation dscp-mutation-name in-dscp to out-dscp
3. interface interface-id
4. mls qos trust dscp
5. mls qos dscp-mutation dscp-mutation-name
6. end
7. show mls qos maps dscp-mutation
8. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
711
QoS
Configuring the DSCP-to-DSCP-Mutation Map
DETAILED STEPS
Step 2 mls qos map dscp-mutation dscp-mutation-name in-dscp Modifies the DSCP-to-DSCP-mutation map.
to out-dscp
• For dscp-mutation-name, enter the mutation map name.
Example: You can create more than one map by specifying a
new name.
SwitchDevice(config)# mls qos map dscp-mutation
mutation1 1 2 3 4 5 6 7 to 0 • For in-dscp, enter up to eight DSCP values separated
by spaces. Then enter the to keyword.
• For out-dscp, enter a single DSCP value.
Step 3 interface interface-id Specifies the port to which to attach the map, and enters
interface configuration mode.
Example:
Valid interfaces include physical ports.
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 mls qos trust dscp Configures the ingress port as a DSCP-trusted port. By
default, the port is not trusted.
Example:
Step 5 mls qos dscp-mutation dscp-mutation-name Applies the map to the specified ingress DSCP-trusted port.
Example: For dscp-mutation-name, enter the mutation map name
specified in Step 2.
SwitchDevice(config-if)# mls qos dscp-mutation
mutation1
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
712
QoS
Configuring Ingress Queue Characteristics
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Examples: Configuring DSCP Maps, on page 740
Related Topics
Priority Queueing, on page 664
Ingress Port Activity
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds
You can prioritize traffic by placing packets with particular DSCPs or CoSs into certain queues and adjusting
the queue thresholds so that packets with lower priorities are dropped.
Beginning in privileged EXEC mode, follow these steps to map DSCP or CoS values to an ingress queue and
to set WTD thresholds. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. Use one of the following:
• mls qos srr-queue input dscp-map queue queue-id threshold threshold-id dscp1...dscp8
• mls qos srr-queue input cos-map queue queue-id threshold threshold-id cos1...cos8
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
713
QoS
Mapping DSCP or CoS Values to an Ingress Queue and Setting WTD Thresholds
DETAILED STEPS
Step 2 Use one of the following: Maps DSCP or CoS values to an ingress queue and to a
threshold ID.
• mls qos srr-queue input dscp-map queue queue-id
threshold threshold-id dscp1...dscp8 By default, DSCP values 0–39 and 48–63 are mapped to
• mls qos srr-queue input cos-map queue queue-id queue 1 and threshold 1. DSCP values 40–47 are mapped
threshold threshold-id cos1...cos8 to queue 2 and threshold 1.
Example: By default, CoS values 0–4, 6, and 7 are mapped to queue
1 and threshold 1. CoS value 5 is mapped to queue 2 and
SwitchDevice(config)# mls qos srr-queue input threshold 1.
dscp-map queue 1 threshold 2 20 21 22 23 24 25 26
• For queue-id, the range is 1 to 2.
• For threshold-id, the range is 1 to 3. The
drop-threshold percentage for threshold 3 is predefined.
It is set to the queue-full state.
• For dscp1...dscp8, enter up to eight values, and
separate each value with a space. The range is 0 to 63.
• For cos1...cos8, enter up to eight values, and separate
each value with a space. The range is 0 to 7.
Step 3 mls qos srr-queue input threshold queue-id Assigns the two WTD threshold percentages for (threshold
threshold-percentage1 threshold-percentage2 1 and 2) to an ingress queue. The default, both thresholds
are set to 100 percent.
Example:
• For queue-id, the range is 1 to 2.
SwitchDevice(config)# mls qos srr-queue
input threshold 1 50 70 • For threshold-percentage1 threshold-percentage2, the
range is 1 to 100. Separate each value with a space.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
714
QoS
Allocating Buffer Space Between the Ingress Queues
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default CoS input queue threshold map or
the default DSCP input queue threshold map, use the no
SwitchDevice# copy running-config mls qos srr-queue input cos-map or the no mls qos
startup-config srr-queue input dscp-map global configuration command.
To return to the default WTD threshold percentages, use
the no mls qos srr-queue input threshold queue-id global
configuration command
Related Topics
Queueing and Scheduling on Ingress Queues
Weighted Tail Drop, on page 660
SUMMARY STEPS
1. configure terminal
2. mls qos srr-queue input buffers percentage1 percentage2
3. end
4. Use one of the following:
• show mls qos interface buffer
• show mls qos input-queue
5. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
715
QoS
Allocating Buffer Space Between the Ingress Queues
DETAILED STEPS
Step 2 mls qos srr-queue input buffers percentage1 percentage2 Allocates the buffers between the ingress queues
Example: By default 90 percent of the buffers are allocated to queue
1, and 10 percent of the buffers are allocated to queue 2.
SwitchDevice(config)# mls qos srr-queue input
buffers 60 40 For percentage1 percentage2, the range is 0 to 100. Separate
each value with a space.
You should allocate the buffers so that the queues can
handle any incoming bursty traffic.
SwitchDevice(config)# end
or
SwitchDevice# show mls qos input-queue
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no mls qos
srr-queue input buffers global configuration command.
SwitchDevice# copy-running-config startup-config
Related Topics
Queueing and Scheduling on Ingress Queues
Examples: Configuring Ingress Queue Characteristics, on page 742
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
716
QoS
Allocating Bandwidth Between the Ingress Queues
SUMMARY STEPS
1. configure terminal
2. mls qos srr-queue input bandwidth weight1 weight2
3. end
4. Use one of the following:
• show mls qos interface queueing
• show mls qos input-queue
5. copy running-config startup-config
DETAILED STEPS
Step 2 mls qos srr-queue input bandwidth weight1 weight2 Assigns shared round robin weights to the ingress queues.
Example: The default setting for weight1 and weight2 is 4 (1/2 of the
bandwidth is equally shared between the two queues).
SwitchDevice(config)# mls qos srr-queue input
bandwidth 25 75 For weight1 and weight2, the range is 1 to 100. Separate
each value with a space.
SRR services the priority queue for its configured weight
as specified by the bandwidth keyword in the mls qos
srr-queue input priority-queue queue-id bandwidth
weight global configuration command. Then, SRR shares
the remaining bandwidth with both ingress queues and
services them as specified by the weights configured with
the mls qos srr-queue input bandwidth weight1 weight2
global configuration command.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
717
QoS
Configuring the Ingress Priority Queue
or
SwitchDevice# show mls qos input-queue
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no mls qos
srr-queue input bandwidth global configuration command.
SwitchDevice# copy running-config startup-config
Related Topics
Queueing and Scheduling on Ingress Queues
Examples: Configuring Ingress Queue Characteristics, on page 742
SRR Shaping and Sharing, on page 661
SUMMARY STEPS
1. configure terminal
2. mls qos srr-queue input priority-queue queue-id bandwidth weight
3. end
4. Use one of the following:
• show mls qos interface queueing
• show mls qos input-queue
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
718
QoS
Configuring the Ingress Priority Queue
DETAILED STEPS
Step 2 mls qos srr-queue input priority-queue queue-id Assigns a queue as the priority queue and guarantee
bandwidth weight bandwidth on the stack or internal ring if the ring is
congested.
Example:
By default, the priority queue is queue 2, and 10 percent of
SwitchDevice(config)# mls qos srr-queue the bandwidth is allocated to it.
input priority-queue 1 bandwidth 10
• For queue-id, the range is 1 to 2.
• For bandwidth weight, assign the bandwidth
percentage of the stack or internal ring. The range is
0 to 40. The amount of bandwidth that can be
guaranteed is restricted because a large value affects
the entire ring and can degrade the switch or stack
performance.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no mls qos
srr-queue input priority-queue queue-id global
SwitchDevice# copy-running-config configuration command. To disable priority queueing, set
startup-config the bandwidth weight to 0, for example, mls qos srr-queue
input priority-queue queue-id bandwidth 0.
Related Topics
Queueing and Scheduling on Ingress Queues
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
719
QoS
Configuring Egress Queue Characteristics
Related Topics
Shaped or Shared Mode, on page 667
Configuration Guidelines
Follow these guidelines when the expedite queue is enabled or the egress queues are serviced based on their
SRR weights:
• If the egress expedite queue is enabled, it overrides the SRR shaped and shared weights for queue 1.
• If the egress expedite queue is disabled and the SRR shaped and shared weights are configured, the
shaped mode overrides the shared mode for queue 1, and SRR services this queue in shaped mode.
• If the egress expedite queue is disabled and the SRR shaped weights are not configured, SRR services
this queue in shared mode.
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
You can guarantee the availability of buffers, set WTD thresholds, and configure the maximum allocation for
a queue-set by using the mls qos queue-set output qset-id threshold queue-id drop-threshold1 drop-threshold2
reserved-threshold maximum-threshold global configuration command.
Each threshold value is a percentage of the queue’s allocated buffers, which you specify by using the mls qos
queue-set output qset-id buffers allocation1 ... allocation4 global configuration command. The queues use
WTD to support distinct drop percentages for different traffic classes.
Note The switch supports 4 egress queues by default, although there is an option to enable a total of 8 egress queues.
Use the mls qos srr-queue output queues 8 global configuration command to enable all 8 egress queues.
Once 8 egress queues are enabled, you are able to configure thresholds, buffers, bandwidth share weights,
and bandwidth shape weights for all 8 queues. The 8 egress queue configuration is only supported on a
standalone switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
720
QoS
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
Note The egress queue default settings are suitable for most situations. You should change them only when you
have a thorough understanding of the egress queues and if these settings do not meet your QoS solution.
Beginning in privileged EXEC mode, follow these steps to configure the memory allocation and to drop
thresholds for a queue-set. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. mls qos srr-queue output queues 8
3. mls qos queue-set output qset-id buffers allocation1 ... allocation8
4. mls qos queue-set output qset-id threshold queue-id drop-threshold1 drop-threshold2 reserved-threshold
maximum-threshold
5. interface interface-id
6. queue-set qset-id
7. end
8. show mls qos interface [interface-id] buffers
9. copy running-config startup-config
DETAILED STEPS
Step 2 mls qos srr-queue output queues 8 (Optional) The switch supports 4 egress queues by default,
although you can enable a total of 8 egress queues. Use the
Example:
optional mls qos srr-queue output queues 8 command to
enable the additional 4 egress queues.
SwitchDevice(config)# mls qos srr-queue output
queues 8 Once 8 queue support is enabled, you can then proceed to
configure the additional 4 queues. Any existing egress queue
configuration commands are then modified to support the
additional queue parameters.
Note The option to enable 8 queues is only available
on a standalone switch.
Step 3 mls qos queue-set output qset-id buffers allocation1 ... Allocates buffers to a queue set.
allocation8
By default, all allocation values are equally mapped among
Example: the four queues (25, 25, 25, 25). Each queue has 1/4 of the
buffer space. When eight egress queues are configured, then
SwitchDevice(config)# mls qos queue-set output 2 by default 30 percent of the total buffer space is allocated
buffers 40 20 20 20 10 10 10 10
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
721
QoS
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
Step 4 mls qos queue-set output qset-id threshold queue-id Configures the WTD thresholds, guarantee the availability
drop-threshold1 drop-threshold2 reserved-threshold of buffers, and configure the maximum memory allocation
maximum-threshold for the queue-set (four egress queues per port).
Example: By default, the WTD thresholds for queues 1, 3, and 4 are
set to 100 percent. The thresholds for queue 2 are set to 200
SwitchDevice(config)# mls qos queue-set output 2 percent. The reserved thresholds for queues 1, 2, 3, and 4
threshold 2 40 60 100 200 are set to 50 percent. The maximum thresholds for all
queues are set to 400 percent by default.
If you enabled 8 egress queues as described in Step 2 above,
then the following applies:
• For qset-id, enter the ID of the queue-set specified in
Step 2. The range is 1 to 2.
• For queue-id, enter the specific queue in the queue set
on which the command is performed. The queue-id
range is 1-4 by default and 1-8 when 8 queues are
enabled.
• For drop-threshold1 drop-threshold2, specify the two
WTD thresholds expressed as a percentage of the
queue’s allocated memory. The range is 1 to 3200
percent.
• For reserved-threshold, enter the amount of memory
to be guaranteed (reserved) for the queue expressed
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
722
QoS
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set
Step 5 interface interface-id Specifies the port of the outbound traffic, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
SwitchDevice(config-id)# end
Step 8 show mls qos interface [interface-id] buffers Verifies your entries.
Example:
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no mls qos
queue-set output qset-id buffers global configuration
SwitchDevice# copy-running-config startup-config command. To return to the default WTD threshold
percentages, use the no mls qos queue-set output qset-id
threshold [queue-id] global configuration command.
Related Topics
Queueing and Scheduling on Egress Queues
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
723
QoS
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID
Note The egress queue default settings are suitable for most situations. You should change them only when you
have a thorough understanding of egress queues and if these settings do not meet your QoS solution.
Beginning in privileged EXEC mode, follow these steps to map DSCP or CoS values to an egress queue and
to a threshold ID. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. Use one of the following:
• mls qos srr-queue output dscp-map queue queue-id threshold threshold-id dscp1...dscp8
• mls qos srr-queue output cos-map queue queue-id threshold threshold-id cos1...cos8
3. end
4. show mls qos maps
5. copy running-config startup-config
DETAILED STEPS
Step 2 Use one of the following: Maps DSCP or CoS values to an egress queue and to a
threshold ID.
• mls qos srr-queue output dscp-map queue queue-id
threshold threshold-id dscp1...dscp8 By default, DSCP values 0–15 are mapped to queue 2 and
• mls qos srr-queue output cos-map queue queue-id threshold 1. DSCP values 16–31 are mapped to queue 3
threshold threshold-id cos1...cos8 and threshold 1. DSCP values 32–39 and 48–63 are mapped
to queue 4 and threshold 1. DSCP values 40–47 are mapped
Example: to queue 1 and threshold 1.
SwitchDevice(config)# mls qos srr-queue output By default, CoS values 0 and 1 are mapped to queue 2 and
dscp-map queue 1 threshold 2 10 11 threshold 1. CoS values 2 and 3 are mapped to queue 3 and
threshold 1. CoS values 4, 6, and 7 are mapped to queue 4
and threshold 1. CoS value 5 is mapped to queue 1 and
threshold 1.
• For queue-id, the range is 1 to 4.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
724
QoS
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default DSCP output queue threshold map
or the default CoS output queue threshold map, use the no
SwitchDevice# copy-running-config mls qos srr-queue output dscp-map or the no mls qos
startup-config srr-queue output cos-map global configuration command.
Related Topics
Queueing and Scheduling on Egress Queues
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
725
QoS
Configuring SRR Shaped Weights on Egress Queues
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. srr-queue bandwidth shape weight1 weight2 weight3 weight4
4. end
5. show mls qos interface interface-id queueing
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port of the outbound traffic, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 3 srr-queue bandwidth shape weight1 weight2 weight3 Assigns SRR weights to the egress queues. By default,
weight4 weight1 is set to 25; weight2, weight3, and weight4 are set
to 0, and these queues are in shared mode.
Example:
For weight1 weight2 weight3 weight4, enter the weights to
SwitchDevice(config-if)# srr-queue control the percentage of the port that is shaped. The inverse
bandwidth shape 8 0 0 0 ratio (1/weight) controls the shaping bandwidth for this
queue. Separate each value with a space. The range is 0 to
65535.
If you configure a weight of 0, the corresponding queue
operates in shared mode. The weight specified with the
srr-queue bandwidth shape command is ignored, and the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
726
QoS
Configuring SRR Shared Weights on Egress Queues
SwitchDevice(config-if)# end
Step 5 show mls qos interface interface-id queueing Verifies your entries.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no srr-queue
bandwidth shape interface configuration command.
SwitchDevice# copy running-config
startup-config
Related Topics
Queueing and Scheduling on Egress Queues
Examples: Configuring Egress Queue Characteristics, on page 743
SRR Shaping and Sharing, on page 661
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
727
QoS
Configuring SRR Shared Weights on Egress Queues
Note The egress queue default settings are suitable for most situations. You should change them only when you
have a thorough understanding of the egress queues and if these settings do not meet your QoS solution.
Beginning in privileged EXEC mode, follow these steps to assign the shared weights and to enable bandwidth
sharing on the four egress queues mapped to a port. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. srr-queue bandwidth share weight1 weight2 weight3 weight4
4. end
5. show mls qos interface interface-id queueing
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port of the outbound traffic, and enters
interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 3 srr-queue bandwidth share weight1 weight2 weight3 Assigns SRR weights to the egress queues. By default, all
weight4 four weights are 25 (1/4 of the bandwidth is allocated to
each queue).
Example:
For weight1 weight2 weight3 weight4, enter the weights to
SwitchDevice(config-id)# srr-queue control the ratio of the frequency in which the SRR
bandwidth share 1 2 3 4 scheduler sends packets. Separate each value with a space.
The range is 1 to 255.
To return to the default setting, use the no srr-queue
bandwidth share interface configuration command.
Note If you enabled 8 egress queues using the mls qos
srr-queue output queues 8 global configuration
command, then you would be able to assign SRR
weights to a total of 8 queues.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
728
QoS
Configuring the Egress Expedite Queue
SwitchDevice(config-id)# end
Step 5 show mls qos interface interface-id queueing Verifies your entries.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no srr-queue
bandwidth share interface configuration command.
SwitchDevice# copy-running-config
startup-config
Related Topics
Queueing and Scheduling on Egress Queues
Examples: Configuring Egress Queue Characteristics, on page 743
SRR Shaping and Sharing, on page 661
SUMMARY STEPS
1. configure terminal
2. mls qos
3. interface interface-id
4. priority-queue out
5. end
6. show running-config
7. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
729
QoS
Configuring the Egress Expedite Queue
DETAILED STEPS
Step 3 interface interface-id Specifies the egress port, and enters interface configuration
mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 priority-queue out Enables the egress expedite queue, which is disabled by
default.
Example:
When you configure this command, the SRR weight and
SwitchDevice(config-if)# priority-queue out queue size ratios are affected because there is one fewer
queue participating in SRR. This means that weight1 in the
srr-queue bandwidth shape or the srr-queue bandwidth
share command is ignored (not used in the ratio
calculation).
Note To disable the egress expedite queue, use the no
priority-queue out interface configuration
command.
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To disable the egress expedite queue, use the no
priority-queue out interface configuration command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
730
QoS
Limiting the Bandwidth on an Egress Interface
Related Topics
Queueing and Scheduling on Egress Queues
Examples: Configuring Egress Queue Characteristics, on page 743
Note The egress queue default settings are suitable for most situations. You should change them only when you
have a thorough understanding of the egress queues and if these settings do not meet your QoS solution.
Beginning in privileged EXEC mode, follow these steps to limit the bandwidth on an egress port. This procedure
is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. srr-queue bandwidth limit weight1
4. end
5. show mls qos interface [interface-id] queueing
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be rate-limited, and enters interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
731
QoS
Monitoring Standard QoS
SwitchDevice(config-if)# end
Step 5 show mls qos interface [interface-id] queueing Verifies your entries.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: To return to the default setting, use the no srr-queue
bandwidth limit interface configuration command.
SwitchDevice# copy-running-config
startup-config
Related Topics
Queueing and Scheduling on Egress Queues
Examples: Configuring Egress Queue Characteristics, on page 743
Command Description
show class-map [class-map-name] Displays QoS class maps, which define the match
criteria to classify traffic.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
732
QoS
Configuration Examples for QoS
Command Description
show mls qos interface [interface-id] [buffers | Displays QoS information at the port level, including
policers | queueing | statistics] the buffer allocation, which ports have configured
policers, the queueing strategy, and the ingress and
egress statistics.
show mls qos maps [cos-dscp | |cos-output-q | Displays QoS mapping information.
dscp-cos | |dscp-mutation dscp-mutation-name |
dscp-output-q | ip-prec-dscp | policed-dscp]
show mls qos queue-set [qset-id] Displays QoS settings for the egress queues.
show policy-map [policy-map-name [class Displays QoS policy maps, which define classification
class-map-name]] criteria for incoming traffic.
Do not use the show policy-map interface privileged
EXEC command to display classification information
for incoming traffic. The control-plane and interface
keywords are not supported, and the statistics shown
in the display should be ignored.
Related Topics
Configuring the DSCP Trust State on a Port Bordering Another QoS Domain, on page 684
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
733
QoS
Examples: Classifying Traffic by Using ACLs
This example shows how to create an ACL that permits IP traffic from any source to any destination that has
the DSCP value set to 32:
This example shows how to create an ACL that permits IP traffic from a source host at 10.1.1.1 to a destination
host at 10.1.1.2 with a precedence value of 5:
This example shows how to create an ACL that permits PIM traffic from any source to a destination group
address of 224.0.0.2 with a DSCP set to 32:
This example shows how to create an ACL that permits IPv6 traffic from any source to any destination that
has the DSCP value set to 32:
This example shows how to create an ACL that permits IPv6 traffic from a source host at 10.1.1.1 to a
destination host at 10.1.1.2 with a precedence value of 5:
This example shows how to create a Layer 2 MAC ACL with two permit statements. The first statement
allows traffic from the host with MAC address 0001.0000.0001 to the host with MAC address 0002.0000.0001.
The second statement allows only Ethertype XNS-IDP traffic from the host with MAC address 0001.0000.0002
to the host with MAC address 0002.0000.0002.
Related Topics
Creating an IP Standard ACL for IPv4 Traffic, on page 687
Creating an IP Extended ACL for IPv4 Traffic, on page 688
Creating an IPv6 ACL for IPv6 Traffic, on page 690
Creating a Layer 2 MAC ACL for Non-IP Traffic, on page 692
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
734
QoS
Examples: Classifying Traffic by Using Class Maps
This example shows how to create a class map called class2, which matches incoming traffic with DSCP
values of 10, 11, and 12.
This example shows how to create a class map called class3, which matches incoming traffic with IP-precedence
values of 5, 6, and 7:
This example shows how to configure a class map to match IP DSCP and IPv6:
This example shows how to configure a class map that applies to both IPv4 and IPv6 traffic:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
735
QoS
Examples: Classifying, Policing, and Marking Traffic on Physical Ports Using Policy Maps
Related Topics
Classifying Traffic by Using Class Maps, on page 694
Classifying Traffic by Using Class Maps and Filtering IPv6 Traffic, on page 697
This example shows how to create a Layer 2 MAC ACL with two permit statements and attach it to an ingress
port. The first permit statement allows traffic from the host with MAC address 0001.0000.0001 destined for
the host with MAC address 0002.0000.0001. The second permit statement allows only Ethertype XNS-IDP
traffic from the host with MAC address 0001.0000.0002 destined for the host with MAC address
0002.0000.0002.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
736
QoS
Examples: Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps
This example shows how to create a class map that applies to both IPv4 and IPv6 traffic with the default class
applied to unclassified traffic:
Related Topics
Classifying, Policing, and Marking Traffic on Physical Ports by Using Policy Maps, on page 699
Policy Map on Physical Port
Switch> enable
SwitchDevice# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
SwitchDevice(config)# access-list 101 permit ip any any
SwitchDevice(config)# class-map cm-1
SwitchDevice(config-cmap)# match access 101
SwitchDevice(config-cmap)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
737
QoS
Examples: Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps
SwitchDevice(config)# exit
SwitchDevice#
SwitchDevice#
This example shows that when a child-level policy map is attached below a class, an action must be specified
for the class:
This example shows how to configure a class map to match IP DSCP and IPv6:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
738
QoS
Examples: Classifying, Policing, and Marking Traffic by Using Aggregate Policers
This example shows how to configure default traffic class to a policy map:
This example shows how the default traffic class is automatically placed at the end of policy-map pm3 even
though class-default was configured first:
Related Topics
Classifying, Policing, and Marking Traffic on SVIs by Using Hierarchical Policy Maps
Hierarchical Policy Maps on SVI Guidelines
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
739
QoS
Examples: Configuring DSCP Maps
11.3.1.1, the DSCP in the packet is changed to 56. The traffic rate from the 10.1.0.0 network and from host
11.3.1.1 is policed. If the traffic exceeds an average rate of 48000 b/s and a normal burst size of 8000 bytes,
its DSCP is marked down (based on the policed-DSCP map) and sent. The policy map is attached to an ingress
port.
Related Topics
Classifying, Policing, and Marking Traffic by Using Aggregate Policers, on page 704
Cos-dscp map:
cos: 0 1 2 3 4 5 6 7
--------------------------------
dscp: 10 15 20 25 30 35 40 45
This example shows how to modify and display the IP-precedence-to-DSCP map:
IpPrecedence-dscp map:
ipprec: 0 1 2 3 4 5 6 7
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
740
QoS
Examples: Configuring DSCP Maps
--------------------------------
dscp: 10 15 20 25 30 35 40 45
Note In this policed-DSCP map, the marked-down DSCP values are shown in the body of the matrix. The d1 column
specifies the most-significant digit of the original DSCP; the d2 row specifies the least-significant digit of the
original DSCP. The intersection of the d1 and d2 values provides the marked-down value. For example, an
original DSCP value of 53 corresponds to a marked-down DSCP value of 0.
This example shows how to map DSCP values 0, 8, 16, 24, 32, 40, 48, and 50 to CoS value 0 and to display
the map:
Note In the above DSCP-to-CoS map, the CoS values are shown in the body of the matrix. The d1 column specifies
the most-significant digit of the DSCP; the d2 row specifies the least-significant digit of the DSCP. The
intersection of the d1 and d2 values provides the CoS value. For example, in the DSCP-to-CoS map, a DSCP
value of 08 corresponds to a CoS value of 0.
This example shows how to define the DSCP-to-DSCP-mutation map. All the entries that are not explicitly
configured are not modified (remains as specified in the null map):
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
741
QoS
Examples: Configuring Ingress Queue Characteristics
Note In the above DSCP-to-DSCP-mutation map, the mutated values are shown in the body of the matrix. The d1
column specifies the most-significant digit of the original DSCP; the d2 row specifies the least-significant
digit of the original DSCP. The intersection of the d1 and d2 values provides the mutated value. For example,
a DSCP value of 12 corresponds to a mutated value of 10.
Related Topics
Configuring the CoS-to-DSCP Map, on page 706
Configuring the IP-Precedence-to-DSCP Map, on page 707
Configuring the Policed-DSCP Map, on page 709
Configuring the DSCP-to-CoS Map, on page 710
Configuring the DSCP-to-DSCP-Mutation Map, on page 711
In this example, the DSCP values (0 to 6) are assigned the WTD threshold of 50 percent and will be dropped
sooner than the DSCP values (20 to 26) assigned to the WTD threshold of 70 percent.
This example shows how to allocate 60 percent of the buffer space to ingress queue 1 and 40 percent of the
buffer space to ingress queue 2:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
742
QoS
Examples: Configuring Egress Queue Characteristics
This example shows how to assign the ingress bandwidth to the queues. Priority queueing is disabled, and
the shared bandwidth ratio allocated to queue 1 is 25/(25+75) and to queue 2 is 75/(25+75):
This example shows how to assign the ingress bandwidths to the queues. Queue 1 is the priority queue with
10 percent of the bandwidth allocated to it. The bandwidth ratios allocated to queues 1 and 2 is 4/(4+4). SRR
services queue 1 (the priority queue) first for its configured 10 percent bandwidth. Then SRR equally shares
the remaining 90 percent of the bandwidth between queues 1 and 2 by allocating 45 percent to each queue:
Related Topics
Allocating Buffer Space Between the Ingress Queues, on page 715
Queueing and Scheduling on Ingress Queues
Allocating Bandwidth Between the Ingress Queues, on page 717
Configuring the Ingress Priority Queue, on page 718
This example shows how to map DSCP values 10 and 11 to egress queue 1 and to threshold 2:
This example shows how to configure bandwidth shaping on queue 1. Because the weight ratios for queues
2, 3, and 4 are set to 0, these queues operate in shared mode. The bandwidth weight for queue 1 is 1/8, which
is 12.5 percent:
This example shows how to configure the weight ratio of the SRR scheduler running on an egress port. Four
queues are used, and the bandwidth ratio allocated for each queue in shared mode is 1/(1+2+3+4), 2/(1+2+3+4),
3/(1+2+3+4), and 4/(1+2+3+4), which is 10 percent, 20 percent, 30 percent, and 40 percent for queues 1, 2,
3, and 4. This means that queue 4 has four times the bandwidth of queue 1, twice the bandwidth of queue 2,
and one-and-a-third times the bandwidth of queue 3.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
743
QoS
Where to Go Next
This example shows how to enable the egress expedite queue when the SRR weights are configured. The
egress expedite queue overrides the configured SRR weights.
When you configure this command to 80 percent, the port is idle 20 percent of the time. The line rate drops
to 80 percent of the connected speed, which is 800 Mb/s. These values are not exact because the hardware
adjusts the line rate in increments of six.
Related Topics
Allocating Buffer Space to and Setting WTD Thresholds for an Egress Queue-Set, on page 720
Queueing and Scheduling on Egress Queues
Mapping DSCP or CoS Values to an Egress Queue and to a Threshold ID, on page 724
Configuring SRR Shaped Weights on Egress Queues, on page 726
Configuring SRR Shared Weights on Egress Queues, on page 727
Configuring the Egress Expedite Queue, on page 729
Limiting the Bandwidth on an Egress Interface, on page 731
Where to Go Next
Review the auto-QoS documentation to see if you can use these automated capabilities for your QoS
configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
744
CHAPTER 35
Configuring Auto-QoS
• Finding Feature Information, on page 745
• Prerequisites for Auto-QoS, on page 745
• Information about Configuring Auto-QoS, on page 746
• How to Configure Auto-QoS, on page 750
• Monitoring Auto-QoS, on page 752
• Configuration Examples for Auto-Qos, on page 753
• Where to Go Next for Auto-QoS, on page 763
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
745
QoS
Information about Configuring Auto-QoS
You also use the auto-QoS commands to identify ports that receive trusted traffic through an uplink. Auto-QoS
then performs these functions:
• Detects the presence or absence of auto-QoS devices through conditional trusted interfaces.
• Configures QoS classification
• Configures egress queues
Related Topics
QoS Overview
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
746
QoS
VoIP Device Specifics
VoIP Data VoIP Routing STP BPDU Real-Time All Other Traffic
Traffic Control Protocol Traffic Video
Traffic Traffic Traffic
CoS value 5 3 6 7 3 –
The switch configures ingress queues on the port according to the settings in the following table. This table
shows the generated auto-QoS configuration for the ingress queues.
Ingress Queue Queue Number CoS-to-Queue Map Queue Weight Queue (Buffer) Size
(Bandwidth)
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
747
QoS
Enhanced Auto-QoS for Video, Trust, and Classification
The switch configures egress queues on the port according to the settings in the following table. This table
shows the generated auto-QoS configuration for the egress queues.
Egress Queue Egress Queue Queue Number Queue Weight Queue (Buffer) Queue (Buffer)
(Bandwidth) Size for Size for 10/100
Gigabit-Capable Ethernet Ports
Ports
• When you enable auto-QoS by using the auto qos voip cisco-phone, the auto qos voip cisco-softphone,
or the auto qos voip trust interface configuration command, the switch automatically generates a QoS
configuration based on the traffic type and ingress packet label and applies the commands listed in
Examples: Global Auto-QoS Configuration, on page 753 to the port.
• Auto-QoS migration happens after a new device is connected when the auto qos srnd4 global
configuration command is enabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
748
QoS
Auto-QoS Configuration Guidelines
Note If an interface previously configured with legacy auto-QoS migrates to enhanced auto-QoS, voice commands
and configuration are updated to match the new global QoS commands.
Auto-QoS configuration migration from enhanced auto-QoS to legacy auto-QoS can occur only when you
disable all existing auto-QoS configurations from the interface.
• When enabling auto-QoS with a Cisco IP Phone on a routed port, you must assign a static IP address to
the IP phone.
• This release supports only Cisco IP SoftPhone Version 1.3(3) or later.
• Connected devices must use Cisco Call Manager Version 4 or later.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
749
QoS
Effects of Auto-QoS on Running Configuration
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. Use one of the following:
• auto qos voip {cisco-phone | cisco-softphone | trust}
• auto qos video {cts | ip-camera | media-player}
• auto qos classify [police]
• auto qos trust {cos | dscp}
4. exit
5. interface interface-id
6. auto qos trust
7. end
8. show auto qos interface interface-id
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
750
QoS
Enabling Auto-QoS
SwitchDevice(config-if)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
751
QoS
Troubleshooting Auto-QoS
SwitchDevice(config)# interface
gigabitethernet 2/0/1
Step 6 auto qos trust Enables auto-QoS on the port, and specifies that the port is
connected to a trusted router or switch.
Example:
SwitchDevice(config-if)# end
Troubleshooting Auto-QoS
To troubleshoot auto-QoS, use the debug auto qos privileged EXEC command. For more information, see
the debug auto qos command in the command reference for this release.
To disable auto-QoS on a port, use the no form of the auto qos command interface configuration command,
such as no auto qos voip. Only the auto-QoS-generated interface configuration commands for this port are
removed. If this is the last port on which auto-QoS is enabled and you enter the no auto qos voip command,
auto-QoS is considered disabled even though the auto-QoS-generated global configuration commands remain
(to avoid disrupting traffic on other ports affected by the global configuration).
Monitoring Auto-QoS
Table 81: Commands for Monitoring Auto-QoS
Command Description
show auto qos [interface [interface-type]] Displays the initial auto-QoS configuration.
You can compare the show auto qos and the show
running-config command output to identify the
user-defined QoS settings.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
752
QoS
Configuration Examples for Auto-Qos
Command Description
show mls qos [ aggregate policer | interface | maps Displays information about the QoS configuration
| queue-set | stack-port | stack-qset ] that might be affected by auto-QoS.
show mls qos aggregate policer policer_name Displays information about the QoS aggregate policer
configuration that might be affected by auto-QoS.
show mls qos interface [interface-type | buffers | Displays information about the QoS interface
policers | queueing | statistics ] configuration that might be affected by auto-QoS.
show mls qos maps [cos-dscp | cos-output-q | Displays information about the QoS maps
dscp-cos | dscp-mutation | dscp-output-q | configuration that might be affected by auto-QoS.
ip-prec-dscp | policed-dscp ]
show mls qos queue-set queue-set ID Displays information about the QoS queue-set
configuration that might be affected by auto-QoS.
show mls qos stack-port buffers Displays information about the QoS stack port buffer
configuration that might be affected by auto-QoS.
show mls qos stack-qset Displays information about the QoS stack queue set
configuration that might be affected by auto-QoS.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
753
QoS
Examples: Global Auto-QoS Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
754
QoS
Examples: Global Auto-QoS Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
755
QoS
Examples: Global Auto-QoS Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
756
QoS
Examples: Auto-QoS Generated Configuration for VoIP Devices
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
757
QoS
Examples: Auto-QoS Generated Configuration for VoIP Devices
If you entered the auto qos voip cisco-phone command, the switch automatically enables the trusted boundary
feature, which uses the CDP to detect the presence or absence of a Cisco IP Phone (as shown below).
If you entered the auto qos voip cisco-softphone command, the switch automatically creates class maps and
policy maps (as shown below).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
758
QoS
Examples: Auto-QoS Generated Configuration for VoIP Devices
After creating the class maps and policy maps, the switch automatically applies the policy map called
AutoQoS-Police-SoftPhone to an ingress interface on which auto-QoS with the Cisco SoftPhone feature is
enabled (as shown below).
If you entered the auto qos voip cisco-softphone command, the switch automatically creates class maps and
policy maps.
After creating the class maps and policy maps, the switch automatically applies the policy map called
AutoQoS-Police-SoftPhone to an ingress interface on which auto-QoS with the Cisco SoftPhone feature is
enabled.
If you entered the auto qos voip cisco-phone command, the switch automatically creates class maps and
policy maps.
If you entered the auto qos voip cisco-softphone command, the switch automatically creates class maps and
policy maps.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
759
QoS
Examples: Auto-QoS Generated Configuration For Enhanced Video, Trust, and Classify Devices
After creating the class maps and policy maps, the switch automatically applies the policy map called
AutoQoS-Police-SoftPhone to an ingress interface on which auto-QoS with the Cisco SoftPhone feature is
enabled.
If you entered the auto qos classify command, the switch automatically creates class maps and policy maps
(as shown below).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
760
QoS
Examples: Auto-QoS Generated Configuration For Enhanced Video, Trust, and Classify Devices
If you entered the auto qos classify police command, the switch automatically creates class maps and policy
maps (as shown below).
This is the enhanced configuration for the auto qos voip cisco-phone command:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
761
QoS
Examples: Auto-QoS Generated Configuration For Enhanced Video, Trust, and Classify Devices
This is the enhanced configuration for the auto qos voip cisco-softphone command:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
762
QoS
Where to Go Next for Auto-QoS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
763
QoS
Where to Go Next for Auto-QoS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
764
PA R T VII
Routing
• Configuring IP Unicast Routing, on page 767
• Configuring Fallback Bridging, on page 917
CHAPTER 36
Configuring IP Unicast Routing
• Finding Feature Information, on page 767
• Information About Configuring IP Unicast Routing, on page 768
• Information About IP Routing, on page 768
• How to Configure IP Routing, on page 769
• How to Configure IP Addressing, on page 770
• Monitoring and Maintaining IP Addressing, on page 791
• How to Configure IP Unicast Routing, on page 792
• Information About RIP, on page 793
• How to Configure RIP, on page 794
• Information About OSPF, on page 802
• Monitoring OSPF, on page 816
• Information About EIGRP, on page 817
• How to Configure EIGRP, on page 818
• Monitoring and Maintaining EIGRP, on page 827
• Information About BGP, on page 827
• How to Configure BGP, on page 829
• Monitoring and Maintaining BGP, on page 857
• Information About ISO CLNS Routing, on page 858
• How to Configure ISO CLNS Routing, on page 859
• Monitoring and Maintaining ISO IGRP and IS-IS, on page 871
• Information About Multi-VRF CE, on page 872
• How to Configure Multi-VRF CE, on page 875
• Configuring Unicast Reverse Path Forwarding, on page 893
• Protocol-Independent Features, on page 894
• Monitoring and Maintaining the IP Network, on page 916
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
767
Routing
Information About Configuring IP Unicast Routing
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not
required.
Note In addition to IPv4 traffic, you can also enable IP Version 6 (IPv6) unicast routing and configure interfaces
to forward IPv6 traffic.
This figure shows a basic routing topology. Switch A is in VLAN 10, and Switch B is in VLAN 20. The router
Types of Routing
Routers and Layer 3 switches can route packets in these ways:
• By using default routing
• By using preprogrammed static routes for the traffic
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
768
Routing
How to Configure IP Routing
The switch supports static routes and default routes, It does not support routing protocols.
Note The switch does not support tunnel interfaces for unicast routed traffic.
All Layer 3 interfaces on which routing will occur must have IP addresses assigned to them.
Note A Layer 3 switch can have an IP address assigned to each routed port and SVI.
Related Topics
Assigning IP Addresses to Network Interfaces, on page 771
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
769
Routing
How to Configure IP Addressing
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
770
Routing
Assigning IP Addresses to Network Interfaces
IP host Disabled.
IRDP Disabled.
Defaults when enabled:
• Broadcast IRDP advertisements.
• Maximum interval between advertisements: 600
seconds.
• Minimum interval between advertisements: 0.75
times max interval
• Preference: 0.
IP routing Disabled.
IP subnet-zero Disabled.
Procedure
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
771
Routing
Assigning IP Addresses to Network Interfaces
Step 3 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
SwitchDevice(config-if)# no switchport
Step 5 ip address ip-address subnet-mask Configures the IP address and IP subnet mask.
Example:
SwitchDevice(config-if)# no shutdown
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
772
Routing
Using Subnet Zero
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
How to Configure IP Routing, on page 769
Procedure
SwitchDevice> enable
Step 3 ip subnet-zero Enables the use of subnet zero for interface addresses and
routing updates.
Example:
SwitchDevice(config)# ip subnet-zero
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
773
Routing
Classless Routing
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Classless Routing
By default, classless routing behavior is enabled on the Switch when it is configured to route. With classless
routing, if a router receives packets for a subnet of a network with no default route, the router forwards the
packet to the best supernet route. A supernet consists of contiguous blocks of Class C address spaces used to
simulate a single, larger address space and is designed to relieve the pressure on the rapidly depleting Class
B address space.
In the figure, classless routing is enabled. When the host sends a packet to 120.20.4.1, instead of discarding
the packet, the router forwards it to the best supernet route. If you disable classless routing and a router receives
packets destined for a subnet of a network with no network default route, the router discards the packet.
Figure 77: IP Classless Routing
In the figure , the router in network 128.20.0.0 is connected to subnets 128.20.1.0, 128.20.2.0, and 128.20.3.0.
If the host sends a packet to 120.20.4.1, because there is no network default route, the router discards the
packet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
774
Routing
Disabling Classless Routing
To prevent the Switch from forwarding packets destined for unrecognized subnets to the best supernet route
possible, you can disable classless routing behavior.
Procedure
SwitchDevice> enable
SwitchDevice(config)#no ip classless
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
775
Routing
Configuring Address Resolution Methods
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Address Resolution
You can control interface-specific handling of IP by using address resolution. A device using IP can have
both a local address or MAC address, which uniquely defines the device on its local segment or LAN, and a
network address, which identifies the network to which the device belongs.
Note In a switch stack, network communication uses a single MAC address and the IP address of the stack.
The local address or MAC address is known as a data link address because it is contained in the data link
layer (Layer 2) section of the packet header and is read by data link (Layer 2) devices. To communicate with
a device on Ethernet, the software must learn the MAC address of the device. The process of learning the
MAC address from an IP address is called address resolution. The process of learning the IP address from
the MAC address is called reverse address resolution.
The Switch can use these forms of address resolution:
• Address Resolution Protocol (ARP) is used to associate IP address with MAC addresses. Taking an IP
address as input, ARP learns the associated MAC address and then stores the IP address/MAC address
association in an ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer
frame and sent over the network. Encapsulation of IP datagrams and ARP requests or replies on IEEE
802 networks other than Ethernet is specified by the Subnetwork Access Protocol (SNAP).
• Proxy ARP helps hosts with no routing tables learn the MAC addresses of hosts on other networks or
subnets. If the Switch (router) receives an ARP request for a host that is not on the same interface as the
ARP request sender, and if the router has all of its routes to the host through other interfaces, it generates
a proxy ARP packet giving its own local data link address. The host that sent the ARP request then sends
its packets to the router, which forwards them to the intended host.
The Switch also uses the Reverse Address Resolution Protocol (RARP), which functions the same as ARP
does, except that the RARP packets request an IP address instead of a local MAC address. Using RARP
requires a RARP server on the same network segment as the router interface. Use the ip rarp-server address
interface configuration command to identify the server.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
776
Routing
Defining a Static ARP Cache
For more information on RARP, see the Cisco IOS Configuration Fundamentals Configuration Guide
Procedure
SwitchDevice> enable
Step 3 arp ip-address hardware-address type Associates an IP address with a MAC (hardware) address
in the ARP cache, and specifies encapsulation type as one
Example:
of these:
SwitchDevice(config)# ip 10.1.5.1 c2f3.220a.12f4 • arpa—ARP encapsulation for Ethernet interfaces
arpa
• snap—Subnetwork Address Protocol encapsulation
for Token Ring and FDDI interfaces
• sap—HP’s ARP type
Step 4 arp ip-address hardware-address type [alias] (Optional) Specifies that the switch respond to ARP
requests as if it were the owner of the specified IP address.
Example:
Step 5 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
777
Routing
Setting ARP Encapsulation
SwitchDevice(config)# end
Step 8 show interfaces [interface-id] Verifies the type of ARP and the timeout value used on
all interfaces or a specific interface.
Example:
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
778
Routing
Enabling Proxy ARP
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the Layer
3 interface to configure.
Example:
SwitchDevice(config)# end
Step 6 show interfaces [interface-id] Verifies ARP encapsulation configuration on all interfaces
or the specified interface.
Example:
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
779
Routing
Routing Assistance When IP Routing is Disabled
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the Layer
3 interface to configure.
Example:
SwitchDevice(config-if)# ip proxy-arp
SwitchDevice(config)# end
Step 6 show ip interface [interface-id] Verifies the configuration on the interface or all interfaces.
Example:
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
780
Routing
Proxy ARP
Proxy ARP
Proxy ARP, the most common method for learning about other routes, enables an Ethernet host with no routing
information to communicate with hosts on other networks or subnets. The host assumes that all hosts are on
the same local Ethernet and that they can use ARP to learn their MAC addresses. If a Switch receives an ARP
request for a host that is not on the same network as the sender, the Switch evaluates whether it has the best
route to that host. If it does, it sends an ARP reply packet with its own Ethernet MAC address, and the host
that sent the request sends the packet to the Switch, which forwards it to the intended host. Proxy ARP treats
all networks as if they are local and performs ARP requests for every IP address.
Proxy ARP
Proxy ARP is enabled by default. To enable it after it has been disabled, see the “Enabling Proxy ARP” section.
Proxy ARP works as long as other routers support it.
Default Gateway
Another method for locating routes is to define a default router or default gateway. All non-local packets are
sent to this router, which either routes them appropriately or sends an IP Control Message Protocol (ICMP)
redirect message back, defining which local router the host should use. The Switch caches the redirect messages
and forwards each packet as efficiently as possible. A limitation of this method is that there is no means of
detecting when the default router has gone down or is unavailable.
Procedure
SwitchDevice> enable
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
781
Routing
ICMP Router Discovery Protocol
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
782
Routing
ICMP Router Discovery Protocol (IRDP)
SwitchDevice(config-if)# ip irdp
Step 6 ip irdp holdtime seconds (Optional) Sets the IRDP period for which advertisements
are valid. The default is three times the maxadvertinterval
Example:
value. It must be greater than maxadvertinterval and
cannot be greater than 9000 seconds. If you change the
SwitchDevice(config-if)# ip irdp holdtime 1000
maxadvertinterval value, this value also changes.
Step 7 ip irdp maxadvertinterval seconds (Optional) Sets the IRDP maximum interval between
advertisements. The default is 600 seconds.
Example:
Step 8 ip irdp minadvertinterval seconds (Optional) Sets the IRDP minimum interval between
advertisements. The default is 0.75 times the
Example:
maxadvertinterval. If you change the maxadvertinterval,
this value changes to the new default (0.75 of
SwitchDevice(config-if)# ip irdp minadvertinterval
500 maxadvertinterval).
Step 9 ip irdp preference number (Optional) Sets a device IRDP preference level. The
allowed range is –231 to 231. The default is 0. A higher
Example:
value increases the router preference level.
SwitchDevice(config-if)# ip irdp preference 2
Step 10 ip irdp address address [number] (Optional) Specifies an IRDP address and preference to
proxy-advertise.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
783
Routing
Configuring Broadcast Packet Handling
SwitchDevice(config)# end
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note You can also limit broadcast, unicast, and multicast traffic on Layer 2 interfaces
by using the storm-control interface configuration command to set traffic
suppression levels.
Routers provide some protection from broadcast storms by limiting their extent to the local cable. Bridges
(including intelligent bridges), because they are Layer 2 devices, forward broadcasts to all network segments,
thus propagating broadcast storms. The best solution to the broadcast storm problem is to use a single broadcast
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
784
Routing
Enabling Directed Broadcast-to-Physical Broadcast Translation
address scheme on a network. In most modern IP implementations, you can set the address to be used as the
broadcast address. Many implementations, including the one in the Switch, support several addressing schemes
for forwarding broadcast messages.
Procedure
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
SwitchDevice(config-if)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
785
Routing
UDP Broadcast Packets and Protocols
SwitchDevice(config)# end
Step 8 show ip interface [interface-id] Verifies the configuration on the interface or all interfaces
Example:
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
786
Routing
Forwarding UDP Broadcast Packets and Protocols
Reference, Volume 1 of 3: Addressing and Services lists the ports that are forwarded by default if you do not
specify any UDP ports.
Procedure
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
Step 4 ip helper-address address Enables forwarding and specifies the destination address
for forwarding UDP broadcast packets, including BOOTP.
Example:
SwitchDevice(config-if)# exit
Step 6 ip forward-protocol {udp [port] | nd | sdns} Specifies which protocols the router forwards when
forwarding broadcast packets.
Example:
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
787
Routing
Establishing an IP Broadcast Address
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
Step 4 ip broadcast-address ip-address Enters a broadcast address different from the default, for
example 128.1.255.255.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
788
Routing
IP Broadcast Flooding
SwitchDevice(config-if)# ip broadcast-address
128.1.255.255
SwitchDevice(config)# end
Step 6 show ip interface [interface-id] Verifies the broadcast address on the interface or all
interfaces.
Example:
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
IP Broadcast Flooding
You can allow IP broadcasts to be flooded throughout your internetwork in a controlled fashion by using the
database created by the bridging STP. Using this feature also prevents loops. To support this capability,
bridging must be configured on each interface that is to participate in the flooding. If bridging is not configured
on an interface, it still can receive broadcasts. However, the interface never forwards broadcasts it receives,
and the router never uses that interface to send broadcasts received on a different interface.
Packets that are forwarded to a single network address using the IP helper-address mechanism can be flooded.
Only one copy of the packet is sent on each network segment.
To be considered for flooding, packets must meet these criteria. (Note that these are the same conditions used
to consider packet forwarding using IP helper addresses.)
• The packet must be a MAC-level broadcast.
• The packet must be an IP-level broadcast.
• The packet must be a TFTP, DNS, Time, NetBIOS, ND, or BOOTP packet, or a UDP specified by the
ip forward-protocol udp global configuration command.
• The time-to-live (TTL) value of the packet must be at least two.
A flooded UDP datagram is given the destination address specified with the ip broadcast-address interface
configuration command on the output interface. The destination address can be set to any address. Thus, the
destination address might change as the datagram propagates through the network. The source address is never
changed. The TTL value is decremented.
When a flooded UDP datagram is sent out an interface (and the destination address possibly changed), the
datagram is handed to the normal IP output routines and is, therefore, subject to access lists, if they are present
on the output interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
789
Routing
Flooding IP Broadcasts
In the Switch, the majority of packets are forwarded in hardware; most packets do not go through the Switch
CPU. For those packets that do go to the CPU, you can speed up spanning tree-based UDP flooding by a
factor of about four to five times by using turbo-flooding. This feature is supported over Ethernet interfaces
configured for ARP encapsulation.
Flooding IP Broadcasts
Procedure
SwitchDevice> enable
Step 3 ip forward-protocol spanning-tree Uses the bridging spanning-tree database to flood UDP
datagrams.
Example:
SwitchDevice(config)# ip forward-protocol
spanning-tree
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
790
Routing
Monitoring and Maintaining IP Addressing
SwitchDevice(config)# ip forward-protocol
turbo-flood
SwitchDevice(config)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
clear arp-cache Clears the IP ARP cache and the fast-switching cache.
clear host {name | *} Removes one or all entries from the hostname and the
address cache.
clear ip route {network [mask] | *} Removes one or more routes from the IP routing table.
You can display specific statistics, such as the contents of IP routing tables, caches, and databases; the
reachability of nodes; and the routing path that packets are taking through the network. The Table lists the
privileged EXEC commands for displaying IP statistics.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
791
Routing
How to Configure IP Unicast Routing
show ip masks address Displays the masks used for network addresses and
the number of subnets using each mask.
show ip route [address [mask]] | [protocol] Displays the current state of the routing table.
show ip route summary Displays the current state of the routing table in
summary form.
Procedure
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
792
Routing
Example of Enabling IP Unicast Routing
SwitchDevice(config)# ip routing
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SwitchDevice(config-router)# end
Using RIP, the Switch sends routing information updates (advertisements) every 30 seconds. If a router does
not receive an update from another router for 180 seconds or more, it marks the routes served by that router
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
793
Routing
How to Configure RIP
as unusable. If there is still no update after 240 seconds, the router removes all routing table entries for the
non-updating router.
RIP uses hop counts to rate the value of different routes. The hop count is the number of routers that can be
traversed in a route. A directly connected network has a hop count of zero; a network with a hop count of 16
is unreachable. This small range (0 to 15) makes RIP unsuitable for large networks.
If the router has a default network path, RIP advertises a route that links the router to the pseudonetwork
0.0.0.0. The 0.0.0.0 network does not exist; it is treated by RIP as a network to implement the default routing
feature. The Switch advertises the default network if a default was learned by RIP or if the router has a gateway
of last resort and RIP is configured with a default metric. RIP sends updates to the interfaces in specified
networks. If an interface’s network is not specified, it is not advertised in any RIP update.
Validate-update-source Enabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
794
Routing
Configuring Basic RIP Parameters
Procedure
SwitchDevice> enable
SwitchDevice(config)# ip routing
Step 4 router rip Enables a RIP routing process, and enter router
configuration mode.
Example:
Step 5 network network number Associates a network with a RIP routing process. You can
specify multiple network commands. RIP routing updates
Example:
are sent and received through interfaces only on these
networks.
SwitchDevice(config)# network 12
Note You must configure a network number for the
RIP commands to take effect.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
795
Routing
Configuring Basic RIP Parameters
Step 8 timers basic update invalid holddown flush (Optional) Adjusts routing protocol timers. Valid ranges
for all timers are 0 to 4294967295 seconds.
Example:
• update—The time between sending routing updates.
SwitchDevice(config)# timers basic 45 360 400 300 The default is 30 seconds.
• invalid—The timer after which a route is declared
invalid. The default is 180 seconds.
• holddown—The time before a route is removed from
the routing table. The default is 180 seconds.
• flush—The amount of time for which routing updates
are postponed. The default is 240 seconds.
Step 9 version {1 | 2} (Optional) Configures the switch to receive and send only
RIP Version 1 or RIP Version 2 packets. By default, the
Example:
switch receives Version 1 and 2 but sends only Version 1.
You can also use the interface commands ip rip {send |
SwitchDevice(config)# version 2
receive} version 1 | 2 | 1 2} to control what versions are
used for sending and receiving on interfaces.
Step 12 output-delay delay (Optional) Adds interpacket delay for RIP updates sent.
By default, packets in a multiple-packet RIP update have
Example:
no delay added between packets. If you are sending packets
to a lower-speed device, you can add an interpacket delay
SwitchDevice(config)# output-delay 8
in the range of 8 to 50 milliseconds.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
796
Routing
Configuring RIP Authentication
SwitchDevice(config)# end
Step 15 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
797
Routing
Summary Addresses and Split Horizon
Step 5 ip rip authentication mode {text | md5} Configures the interface to use plain text authentication (the
default) or MD5 digest authentication.
Example:
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note In general, disabling split horizon is not recommended unless you are certain that your application requires
it to properly advertise routes.
If you want to configure an interface running RIP to advertise a summarized local IP address pool on a network
access server for dial-up clients, use the ip summary-address rip interface configuration command.
Note If split horizon is enabled, neither autosummary nor interface IP summary addresses are advertised.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
798
Routing
Configuring Summary Addresses and Split Horizon
Procedure
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the Layer
3 interface to configure.
Example:
Step 5 ip summary-address rip ip address ip-network mask Configures the IP address to be summarized and the IP
network mask.
Example:
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
799
Routing
Configuring Split Horizon
Note In general, we do not recommend disabling split horizon unless you are certain that your application requires
it to properly advertise routes.
Procedure
SwitchDevice> enable
Step 3 interface interface-id Enters interface configuration mode, and specifies the
interface to configure.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
800
Routing
Configuration Example for Summary Addresses and Split Horizon
SwitchDevice(config-if)# no ip split-horizon
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note If split horizon is enabled, neither autosummary nor interface summary addresses (those configured with the
ip summary-address rip router configuration command) are advertised.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
801
Routing
Information About OSPF
OSPF typically requires coordination among many internal routers, area border routers (ABRs) connected to
multiple areas, and autonomous system boundary routers (ASBRs). The minimum configuration would use
all default parameter values, no authentication, and interfaces assigned to areas. If you customize your
environment, you must ensure coordinated configuration of all routers.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
802
Routing
Default OSPF Configuration
Neighbor database filter Disabled. All outgoing LSAs are flooded to the
neighbor.
Timers shortest path first (spf) spf delay: 5 seconds.; spf-holdtime: 10 seconds.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
803
Routing
OSPF for Routed Access
Note OSPF for Routed Access supports only one OSPFv2 and one OSPFv3 instance with a combined total of 200
dynamically learned routes. The IP Base image provides OSPF for routed access.
However, these restrictions are not enforced in this release.
With the typical topology (hub and spoke) in a campus environment, where the wiring closets (spokes) are
connected to the distribution switch (hub) that forwards all nonlocal traffic to the distribution layer, the wiring
closet Switch need not hold a complete routing table. A best practice design, where the distribution Switch
sends a default route to the wiring closet Switch to reach interarea and external routes (OSPF stub or totally
stub area configuration) should be used when OSPF for Routed Access is used in the wiring closet.
For more details, see the “High Availability Campus Network Design—Routed Access Layer using EIGRP
or OSPF” document.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
804
Routing
OSPF NSF Capability
After a stack master change, the new master sends an OSPF NSF signal to neighboring NSF-aware devices.
A device recognizes this signal to mean that it should not reset the neighbor relationship with the stack. As
the NSF-capable stack master receives signals from other routes on the network, it begins to rebuild its neighbor
list.
When the neighbor relationships are reestablished, the NSF-capable stack master resynchronizes its database
with its NSF-aware neighbors, and routing information is exchanged between the OSPF neighbors. The new
stack master uses this routing information to remove stale routes, to update the routing information database
(RIB), and to update the forwarding information base (FIB) with the new information. The OSPF protocols
then fully converge.
Note OSPF NSF requires that all neighbor networking devices be NSF-aware. If an NSF-capable router discovers
non-NSF aware neighbors on a network segment, it disables NSF capabilities for that segment. Other network
segments where all devices are NSF-aware or NSF-capable continue to provide NSF capabilities.
Use the nsf OSPF routing configuration command to enable OSPF NSF routing. Use the show ip ospf
privileged EXEC command to verify that it is enabled.
For more information, see Cisco Nonstop Forwarding:
http://www.cisco.com/en/US/docs/ios/ha/configuration/guide/ha-nonstp_fwdg.html
Procedure
Step 2 router ospf process-id Enables OSPF routing, and enter router configuration mode.
The process ID is an internally used identification parameter
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
805
Routing
Example: Configuring Basic OSPF Parameters
Step 3 network address wildcard-mask area area-id Define an interface on which OSPF runs and the area ID
for that interface. You can use the wildcard-mask to use a
Example:
single command to define one or more multiple interfaces
to be associated with a specific OSPF area. The area ID can
SwitchDevice(config)# network 10.1.1.1 255.240.0.0
area 20 be a decimal value or an IP address.
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
806
Routing
Configuring OSPF Interfaces
Procedure
Step 2 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
Step 3 ip ospf cost (Optional) Explicitly specifies the cost of sending a packet
on the interface.
Example:
SwitchDevice(config-if)# ip ospf 8
Step 4 ip ospf retransmit-interval seconds (Optional) Specifies the number of seconds between link
state advertisement transmissions. The range is 1 to 65535
Example:
seconds. The default is 5 seconds.
SwitchDevice(config-if)# ip ospf transmit-interval
10
Step 5 ip ospf transmit-delay seconds (Optional) Sets the estimated number of seconds to wait
before sending a link state update packet. The range is 1
Example:
to 65535 seconds. The default is 1 second.
SwitchDevice(config-if)# ip ospf transmit-delay
2
Step 6 ip ospf priority number (Optional) Sets priority to help find the OSPF designated
router for a network. The range is from 0 to 255. The
Example:
default is 1.
SwitchDevice(config-if)# ip ospf priority 5
Step 7 ip ospf hello-interval seconds (Optional) Sets the number of seconds between hello
packets sent on an OSPF interface. The value must be the
Example:
same for all nodes on a network. The range is 1 to 65535
seconds. The default is 10 seconds.
SwitchDevice(config-if)# ip ospf hello-interval
12
Step 8 ip ospf dead-interval seconds (Optional) Sets the number of seconds after the last device
hello packet was seen before its neighbors declare the
Example:
OSPF router to be down. The value must be the same for
all nodes on a network. The range is 1 to 65535 seconds.
SwitchDevice(config-if)# ip ospf dead-interval 8
The default is 4 times the hello interval.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
807
Routing
Configuring OSPF Interfaces
Step 10 ip ospf message digest-key keyid md5 key (Optional) Enables MDS authentication.
Example: • keyid—An identifier from 1 to 255.
Step 11 ip ospf database-filter all out (Optional) Block flooding of OSPF LSA packets to the
interface. By default, OSPF floods new LSAs over all
Example:
interfaces in the same area, except the interface on which
the LSA arrives.
SwitchDevice(config-if)# ip ospf database-filter
all out
SwitchDevice(config)# end
Step 14 show ip ospf neighbor detail Displays NSF awareness status of neighbor switch. The
output matches one of these examples:
Example:
• Options is 0x52
SwitchDevice# show ip ospf neighbor detail
LLS Options is 0x1 (LR)
When both of these lines appear, the neighbor switch
is NSF aware.
• Options is 0x42—This means the neighbor switch is
not NSF aware.
Step 15 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
808
Routing
OSPF Area Parameters
Related Topics
Configuring Other OSPF Parameters, on page 812
Note The OSPF area router configuration commands are all optional.
Procedure
Step 2 router ospf process-id Enables OSPF routing, and enter router configuration
mode.
Example:
Step 4 area area-id authentication message-digest (Optional) Enables MD5 authentication on the area.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
809
Routing
Configuring OSPF Area Parameters
Step 6 area area-id nssa [no-redistribution] (Optional) Defines an area as a not-so-stubby-area. Every
[default-information-originate] [no-summary] router within the same area must agree that the area is
NSSA. Select one of these keywords:
Example:
• no-redistribution—Select when the router is an
SwitchDevice(config-router)# area 1 nssa NSSA ABR and you want the redistribute command
default-information-originate to import routes into normal areas, but not into the
NSSA.
• default-information-originate—Select on an ABR
to allow importing type 7 LSAs into the NSSA.
• no-redistribution—Select to not send summary LSAs
into the NSSA.
Step 7 area area-id range address mask (Optional) Specifies an address range for which a single
route is advertised. Use this command only with area
Example:
border routers.
SwitchDevice(config-router)# area 1 range
255.240.0.0
SwitchDevice(config)# end
Step 9 show ip ospf [process-id] Displays information about the OSPF routing process in
general or for a specific process ID to verify configuration.
Example:
Step 10 show ip ospf [process-id [area-id]] database Displays lists of information related to the OSPF database
for a specific router.
Example:
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
810
Routing
Other OSPF Parameters
Related Topics
Information About Route Maps, on page 901
How to Configure a Route Map
How to Control Route Distribution, on page 905
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
811
Routing
Configuring Other OSPF Parameters
Procedure
Step 2 router ospf process-id Enables OSPF routing, and enter router configuration
mode.
Example:
Step 3 summary-address address mask (Optional) Specifies an address and IP subnet mask for
redistributed routes so that only one summary route is
Example:
advertised.
SwitchDevice(config)# summary-address 10.1.1.1
255.255.255.0
Step 4 area area-id virtual-link router-id [hello-interval (Optional) Establishes a virtual link and set its parameters.
seconds] [retransmit-interval seconds] [trans]
[[authentication-key key] | message-digest-key keyid
md5 key]]
Example:
Step 5 default-information originate [always] [metric (Optional) Forces the ASBR to generate a default route
metric-value] [metric-type type-value] [route-map into the OSPF routing domain. Parameters are all optional.
map-name]
Example:
SwitchDevice(config)# default-information
originate metric 100 metric-type 1
Step 6 ip ospf name-lookup (Optional) Configures DNS name lookup. The default is
disabled.
Example:
Step 7 ip auto-cost reference-bandwidth ref-bw (Optional) Specifies an address range for which a single
route will be advertised. Use this command only with area
Example:
border routers.
SwitchDevice(config)# ip auto-cost
reference-bandwidth 5
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
812
Routing
Configuring Other OSPF Parameters
Step 9 passive-interface type number (Optional) Suppresses the sending of hello packets through
the specified interface.
Example:
SwitchDevice(config)# passive-interface
gigabitethernet 1/0/6
Step 10 timers throttle spf spf-delay spf-holdtime spf-wait (Optional) Configures route calculation timers.
Example: • spf-delay—Delay between receiving a change to SPF
calculation. The range is from 1 to 600000
SwitchDevice(config)# timers throttle spf 200 100 miliseconds.
100
• spf-holdtime—Delay between first and second SPF
calculation. The range is form 1 to 600000 in
milliseconds.
• spf-wait—Maximum wait time in milliseconds for
SPF calculations. The range is from 1 to 600000 in
milliseconds.
Step 11 ospf log-adj-changes (Optional) Sends syslog message when a neighbor state
changes.
Example:
SwitchDevice(config)# end
Step 13 show ip ospf [process-id [area-id]] database Displays lists of information related to the OSPF database
for a specific router.
Example:
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
813
Routing
LSA Group Pacing
Related Topics
Configuring OSPF Interfaces, on page 806
Monitoring OSPF, on page 816
Procedure
Step 2 router ospf process-id Enables OSPF routing, and enter router configuration mode.
Example:
SwitchDevice(config-router)# timers
lsa-group-pacing 15
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
814
Routing
Loopback Interfaces
Loopback Interfaces
OSPF uses the highest IP address configured on the interfaces as its router ID. If this interface is down or
removed, the OSPF process must recalculate a new router ID and resend all its routing information out its
interfaces. If a loopback interface is configured with an IP address, OSPF uses this IP address as its router
ID, even if other interfaces have higher IP addresses. Because loopback interfaces never fail, this provides
greater stability. OSPF automatically prefers a loopback interface over other interfaces, and it chooses the
highest IP address among all loopback interfaces.
Procedure
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
815
Routing
Monitoring OSPF
Monitoring OSPF
You can display specific statistics such as the contents of IP routing tables, caches, and databases.
show ip ospf [process-id] database [router] Displays lists of information related to the OSPF
[link-state-id] database.
show ip ospf [process-id] database [router]
[self-originate]
show ip ospf [process-id] database [router]
[adv-router [ip-address]]
show ip ospf [process-id] database [network]
[link-state-id]
show ip ospf [process-id] database [summary]
[link-state-id]
show ip ospf [process-id] database [asbr-summary]
[link-state-id]
show ip ospf [process-id] database [external]
[link-state-id]
show ip ospf [process-id area-id] database
[database-summary]
show ip ospf border-routes Displays the internal OSPF routing ABR and ASBR
table entries.
show ip ospf neighbor [interface-name] [neighbor-id] Displays OSPF interface neighbor information.
detail
Related Topics
Configuring Other OSPF Parameters, on page 812
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
816
Routing
Information About EIGRP
EIGRP Features
EIGRP offers these features:
• Fast convergence.
• Incremental updates when the state of a destination changes, instead of sending the entire contents of the
routing table, minimizing the bandwidth required for EIGRP packets.
• Less CPU usage because full update packets need not be processed each time they are received.
• Protocol-independent neighbor discovery mechanism to learn about neighboring routers.
• Variable-length subnet masks (VLSMs).
• Arbitrary route summarization.
• EIGRP scales to large networks.
EIGRP Components
EIGRP has these four basic components:
• Neighbor discovery and recovery is the process that routers use to dynamically learn of other routers on
their directly attached networks. Routers must also discover when their neighbors become unreachable
or inoperative. Neighbor discovery and recovery is achieved with low overhead by periodically sending
small hello packets. As long as hello packets are received, the Cisco IOS software can learn that a neighbor
is alive and functioning. When this status is determined, the neighboring routers can exchange routing
information.
• The reliable transport protocol is responsible for guaranteed, ordered delivery of EIGRP packets to all
neighbors. It supports intermixed transmission of multicast and unicast packets. Some EIGRP packets
must be sent reliably, and others need not be. For efficiency, reliability is provided only when necessary.
For example, on a multiaccess network that has multicast capabilities (such as Ethernet), it is not necessary
to send hellos reliably to all neighbors individually. Therefore, EIGRP sends a single multicast hello
with an indication in the packet informing the receivers that the packet need not be acknowledged. Other
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
817
Routing
How to Configure EIGRP
types of packets (such as updates) require acknowledgment, which is shown in the packet. The reliable
transport has a provision to send multicast packets quickly when there are unacknowledged packets
pending. Doing so helps ensure that convergence time remains low in the presence of varying speed
links.
• The DUAL finite state machine embodies the decision process for all route computations. It tracks all
routes advertised by all neighbors. DUAL uses the distance information (known as a metric) to select
efficient, loop-free paths. DUAL selects routes to be inserted into a routing table based on feasible
successors. A successor is a neighboring router used for packet forwarding that has a least-cost path to
a destination that is guaranteed not to be part of a routing loop. When there are no feasible successors,
but there are neighbors advertising the destination, a recomputation must occur. This is the process
whereby a new successor is determined. The amount of time it takes to recompute the route affects the
convergence time. Recomputation is processor-intensive; it is advantageous to avoid recomputation if it
is not necessary. When a topology change occurs, DUAL tests for feasible successors. If there are feasible
successors, it uses any it finds to avoid unnecessary recomputation.
• The protocol-dependent modules are responsible for network layer protocol-specific tasks. An example
is the IP EIGRP module, which is responsible for sending and receiving EIGRP packets that are
encapsulated in IP. It is also responsible for parsing EIGRP packets and informing DUAL of the new
information received. EIGRP asks DUAL to make routing decisions, but the results are stored in the IP
routing table. EIGRP is also responsible for redistributing routes learned by other IP routing protocols.
Note To enable EIGRP, the Switch or stack master must be running the IP services
feature set.
Note If you have routers on your network that are configured for IGRP, and you want to change to EIGRP, you
must designate transition routers that have both IGRP and EIGRP configured. In these cases, perform Steps
1 through 3 in the next section and also see the “Configuring Split Horizon” section. You must use the same
AS number for routes to be automatically redistributed.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
818
Routing
Default EIGRP Configuration
Default metric Only connected routes and interface static routes can
be redistributed without a default metric. The metric
includes:
• Bandwidth: 0 or greater kb/s.
• Delay (tens of microseconds): 0 or any positive
number that is a multiple of 39.1 nanoseconds.
• Reliability: any number between 0 and 255 (255
means 100 percent reliability).
• Loading: effective bandwidth as a number
between 0 and 255 (255 is 100 percent loading).
• MTU: maximum transmission unit size of the
route in bytes. 0 or any positive integer.
IP bandwidth-percent 50 percent.
IP split-horizon Enabled.
Nonstop Forwarding (NSF) Awareness Enabled for IPv4 on switches running the IP services
feature set. Allows Layer 3 switches to continue
forwarding packets from a neighboring NSF-capable
router during hardware or software changes.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
819
Routing
EIGRP Nonstop Forwarding
Offset-list Disabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
820
Routing
Configuring Basic EIGRP Parameters
end of the table content. The stack master recognizes the convergence when it receives the EOT marker, and
it then begins sending updates. When the stack master has received all EOT markers from its neighbors or
when the NSF converge timer expires, EIGRP notifies the routing information database (RIB) of convergence
and floods its topology table to all NSF-aware peers.
Step 2 router eigrp autonomous-system Enables an EIGRP routing process, and enter router
configuration mode. The AS number identifies the routes
Example:
to other EIGRP routers and is used to tag routing
information.
SwitchDevice(config)# router eigrp 10
SwitchDevice(config)# nsf
Step 4 network network-number Associate networks with an EIGRP routing process. EIGRP
sends updates to the interfaces in the specified networks.
Example:
Step 6 metric weights tos k1 k2 k3 k4 k5 (Optional) Adjust the EIGRP metric. Although the defaults
have been carefully set to provide excellent operation in
Example:
most networks, you can adjust them.
SwitchDevice(config)# metric weights 0 2 0 2 0 0 Caution Setting metrics is complex and is not
recommended without guidance from an
experienced network designer.
Step 7 offset-list [access-list number | name] {in | out} offset (Optional) Applies an offset list to routing metrics to
[type number] increase incoming and outgoing metrics to routes learned
through EIGRP. You can limit the offset list with an access
Example:
list or an interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
821
Routing
Configuring EIGRP Interfaces
SwitchDevice(config)# auto-summary
SwitchDevice(config)# end
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
822
Routing
Configuring EIGRP Interfaces
Step 3 ip bandwidth-percent eigrp percent (Optional) Configures the percentage of bandwidth that
can be used by EIGRP on an interface. The default is 50
Example:
percent.
SwitchDevice(config-if)# ip bandwidth-percent
eigrp 60
Step 4 ip summary-address eigrp autonomous-system-number (Optional) Configures a summary aggregate address for a
address mask specified interface (not usually necessary if auto-summary
is enabled).
Example:
Step 5 ip hello-interval eigrp autonomous-system-number (Optional) Change the hello time interval for an EIGRP
seconds routing process. The range is 1 to 65535 seconds. The
default is 60 seconds for low-speed NBMA networks and
Example:
5 seconds for all other networks.
SwitchDevice(config-if)# ip hello-interval eigrp
109 10
Step 6 ip hold-time eigrp autonomous-system-number seconds (Optional) Change the hold time interval for an EIGRP
routing process. The range is 1 to 65535 seconds. The
Example:
default is 180 seconds for low-speed NBMA networks and
15 seconds for all other networks.
SwitchDevice(config-if)# ip hold-time eigrp 109
40 Caution Do not adjust the hold time without consulting
Cisco technical support.
Step 7 no ip split-horizon eigrp autonomous-system-number (Optional) Disables split horizon to allow route information
to be advertised by a router out any interface from which
Example:
that information originated.
SwitchDevice(config-if)# no ip split-horizon eigrp
109
SwitchDevice(config)# end
Step 9 show ip eigrp interface Displays which interfaces EIGRP is active on and
information about EIGRP relating to those interfaces.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
823
Routing
Configuring EIGRP Route Authentication
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Step 2 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
Step 3 ip authentication mode eigrp autonomous-system md5 Enables MD5 authentication in IP EIGRP packets.
Example:
SwitchDevice(config-if)# ip authentication
key-chain eigrp 105 chain1
SwitchDevice(config-if)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
824
Routing
Configuring EIGRP Route Authentication
Step 7 key number In key-chain configuration mode, identify the key number.
Example:
SwitchDevice(config-keychain)# key 1
Step 8 key-string text In key-chain key configuration mode, identify the key
string.
Example:
Step 9 accept-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key
seconds} can be received.
Example: The start-time and end-time syntax can be either hh:mm:ss
Month date year or hh:mm:ss date Month year. The default
SwitchDevice(config-keychain-key)# accept-lifetime is forever with the default start-time and the earliest
13:30:00 Jan 25 2011 duration 7200 acceptable date as January 1, 1993. The default end-time
and duration is infinite.
Step 10 send-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key
seconds} can be sent.
Example: The start-time and end-time syntax can be either hh:mm:ss
Month date year or hh:mm:ss date Month year. The default
SwitchDevice(config-keychain-key)# send-lifetime is forever with the default start-time and the earliest
14:00:00 Jan 25 2011 duration 3600 acceptable date as January 1, 1993. The default end-time
and duration is infinite.
SwitchDevice(config)# end
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
825
Routing
EIGRP Stub Routing
Note The feature set contains EIGRP stub routing capability, which only advertises connected or summary routes
from the routing tables to other Switches in the network. The Switch uses EIGRP stub routing at the access
layer to eliminate the need for other types of routing advertisements.
In a network using EIGRP stub routing, the only allowable route for IP traffic to the user is through a Switch
that is configured with EIGRP stub routing. The Switch sends the routed traffic to interfaces that are configured
as user interfaces or are connected to other devices.
When using EIGRP stub routing, you need to configure the distribution and remote routers to use EIGRP and
to configure only the Switch as a stub. Only specified routes are propagated from the Switch. The Switch
responds to all queries for summaries, connected routes, and routing updates.
Any neighbor that receives a packet informing it of the stub status does not query the stub router for any
routes, and a router that has a stub peer does not query that peer. The stub router depends on the distribution
router to send the proper updates to all peers.
In the figure given below, Switch B is configured as an EIGRP stub router. Switches A and C are connected
to the rest of the WAN. Switch B advertises connected, static, redistribution, and summary routes to Switch
A and C. Switch B does not advertise any routes learned from Switch A (and the reverse).
Figure 79: EIGRP Stub Router Configuration
For more information about EIGRP stub routing, see “Configuring EIGRP Stub Routing” section of the Cisco
IOS IP Configuration Guide, Volume 2 of 3: Routing Protocols.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
826
Routing
Monitoring and Maintaining EIGRP
clear ip eigrp neighbors [if-address | interface] Deletes neighbors from the neighbor table.
show ip eigrp interface [interface] [as number] Displays information about interfaces configured for
EIGRP.
show ip eigrp topology Displays the EIGRP topology table for a given
[autonomous-system-number] | [[ip-address] mask]] process.
show ip eigrp traffic [autonomous-system-number] Displays the number of packets sent and received for
all or a specified EIGRP process.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
827
Routing
BGP Network Topology
Before exchanging information with an external AS, BGP ensures that networks within the AS can be reached
by defining internal BGP peering among routers within the AS and by redistributing BGP routing information
to IGPs that run within the AS, such as IGRP and OSPF.
Routers that run a BGP routing process are often referred to as BGP speakers. BGP uses the Transmission
Control Protocol (TCP) as its transport protocol (specifically port 179). Two BGP speakers that have a TCP
connection to each other for exchanging routing information are known as peers or neighbors. In the above
figure, Routers A and B are BGP peers, as are Routers B and C and Routers C and D. The routing information
is a series of AS numbers that describe the full path to the destination network. BGP uses this information to
construct a loop-free map of autonomous systems.
The network has these characteristics:
• Routers A and B are running EBGP, and Routers B and C are running IBGP. Note that the EBGP peers
are directly connected and that the IBGP peers are not. As long as there is an IGP running that allows
the two neighbors to reach one another, IBGP peers do not have to be directly connected.
• All BGP speakers within an AS must establish a peer relationship with each other. That is, the BGP
speakers within an AS must be fully meshed logically. BGP4 provides two techniques that reduce the
requirement for a logical full mesh: confederations and route reflectors.
• AS 200 is a transit AS for AS 100 and AS 300—that is, AS 200 is used to transfer packets between AS
100 and AS 300.
BGP peers initially exchange their full BGP routing tables and then send only incremental updates. BGP peers
also exchange keepalive messages (to ensure that the connection is up) and notification messages (in response
to errors or special conditions).
In BGP, each route consists of a network number, a list of autonomous systems that information has passed
through (the autonomous system path), and a list of other path attributes. The primary function of a BGP
system is to exchange network reachability information, including information about the list of AS paths,
with other BGP systems. This information can be used to determine AS connectivity, to prune routing loops,
and to enforce AS-level policy decisions.
A router or Switch running Cisco IOS does not select or use an IBGP route unless it has a route available to
the next-hop router and it has received synchronization from an IGP (unless IGP synchronization is disabled).
When multiple routes are available, BGP bases its path selection on attribute values. See the “Configuring
BGP Decision Attributes” section for information about BGP attributes.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
828
Routing
How to Configure BGP
BGP Version 4 supports classless interdomain routing (CIDR) so you can reduce the size of your routing
tables by creating aggregate routes, resulting in supernets. CIDR eliminates the concept of network classes
within BGP and supports the advertising of IP prefixes.
BGP community list • Number: None defined. When you permit a value
for the community number, the list defaults to
an implicit deny for everything else that has not
been permitted.
• Format: Cisco default format (32-bit number).
BGP local preference 100. The range is 0 to 4294967295 with the higher
value preferred.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
829
Routing
Default BGP Configuration
Multi exit discriminator (MED) • Always compare: Disabled. Does not compare
MEDs for paths from neighbors in different
autonomous systems.
• Best path compare: Disabled.
• MED missing as worst path: Disabled.
• Deterministic MED comparison is disabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
830
Routing
Default BGP Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
831
Routing
Nonstop Forwarding Awareness
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
832
Routing
Enabling BGP Routing
Note To enable BGP, the switch or stack master must be running the IP services feature set.
Procedure
SwitchDevice(config)# ip routing
Step 3 router bgp autonomous-system Enables a BGP routing process, assign it an AS number,
and enter router configuration mode. The AS number can
Example:
be from 1 to 65535, with 64512 to 65535 designated as
private autonomous numbers.
SwitchDevice(config)# router bgp 45000
Step 4 network network-number [mask network-mask] Configures a network as local to this AS, and enter it in
[route-map route-map-name] the BGP table.
Example:
Step 5 neighbor {ip-address | peer-group-name} remote-as Adds an entry to the BGP neighbor table specifying that
number the neighbor identified by the IP address belongs to the
specified AS.
Example:
For EBGP, neighbors are usually directly connected, and
SwitchDevice(config)# neighbor 10.108.1.2 the IP address is the address of the interface at the other
remote-as 65200 end of the connection.
For IBGP, the IP address can be the address of any of the
router interfaces.
Step 6 neighbor {ip-address | peer-group-name} (Optional) Removes private AS numbers from the AS-path
remove-private-as in outbound routing updates.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
833
Routing
Example: Configuring BGP on Routers
SwitchDevice(config)# synchronization
SwitchDevice(config)# end
Step 12 show ip bgp neighbor Verifies that NSF awareness (Graceful Restart) is enabled
on the neighbor.
Example:
If NSF awareness is enabled on the switch and the
SwitchDevice# show ip bgp neighbor neighbor, this message appears:
Graceful Restart Capability: advertised and received
If NSF awareness is enabled on the switch, but not on the
neighbor, this message appears:
Graceful Restart Capability: advertised
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
834
Routing
Example: Configuring BGP on Routers
Router A:
Router B:
Router C:
Router D:
To verify that BGP peers are running, use the show ip bgp neighbors privileged EXEC command. This is the
output of this command on Router A:
Anything other than state = established means that the peers are not running. The remote router ID is the
highest IP address on that router (or the highest loopback interface). Each time the table is updated with new
information, the table version number increments. A table version number that continually increments means
that a route is flapping, causing continual routing updates.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
835
Routing
Routing Policy Changes
For exterior protocols, a reference to an IP network from the network router configuration command controls
only which networks are advertised. This is in contrast to Interior Gateway Protocols (IGPs), such as EIGRP,
which also use the network command to specify where to send updates.
For detailed descriptions of BGP configuration, see the “IP Routing Protocols” part of the Cisco IOS IP
Configuration Guide, Release 12.4. For details about specific commands, see the Cisco IOS IP Command
Reference, Volume 2 of 3: Routing Protocols, Release 12.4.
A soft inbound reset causes the new inbound policy to take effect. A soft outbound reset causes the new local
outbound policy to take effect without resetting the BGP session. As a new set of updates is sent during
outbound policy reset, a new inbound policy can also take effect.
The table given below lists the advantages and disadvantages hard reset and soft reset.
Hard reset No memory overhead The prefixes in the BGP, IP, and
FIB tables provided by the neighbor
are lost. Not recommended.
Outbound soft reset No configuration, no storing of Does not reset inbound routing
routing table updates table updates.
Dynamic inbound soft reset Does not clear the BGP session and Both BGP routers must support the
cache route refresh capability (in Cisco
IOS Release 12.1 and later).
Does not require storing of routing
table updates and has no memory
overhead
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
836
Routing
BGP Decision Attributes
Procedure
Step 2 clear ip bgp {* | address | peer-group-name} Resets the routing table on the specified connection.
Example: • Enter an asterisk (*) to specify that all connections be
reset.
SwitchDevice# clear ip bgp *
• Enter an IP address to specify the connection to be
reset.
• Enter a peer group name to reset the peer group.
Step 3 clear ip bgp {* | address | peer-group-name} soft out (Optional) Performs an outbound soft reset to reset the
inbound routing table on the specified connection. Use this
Example:
command if route refresh is supported.
SwitchDevice# clear ip bgp * soft out • Enter an asterisk (*) to specify that all connections be
reset.
• Enter an IP address to specify the connection to be
reset.
• Enter a peer group name to reset the peer group.
Step 4 show ip bgp Verifies the reset by checking information about the routing
table and about BGP neighbors.
Example:
Step 5 show ip bgp neighbors Verifies the reset by checking information about the routing
table and about BGP neighbors.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
837
Routing
BGP Decision Attributes
among the multiple paths. The maximum-paths router configuration command controls the number of paths
allowed.
These factors summarize the order in which BGP evaluates the attributes for choosing the best path:
1. If the path specifies a next hop that is inaccessible, drop the update. The BGP next-hop attribute,
automatically determined by the software, is the IP address of the next hop that is going to be used to
reach a destination. For EBGP, this is usually the IP address of the neighbor specified by the neighbor
remote-as router configuration command. You can disable next-hop processing by using route maps
or the neighbor next-hop-self router configuration command.
2. Prefer the path with the largest weight (a Cisco proprietary parameter). The weight attribute is local to
the router and not propagated in routing updates. By default, the weight attribute is 32768 for paths that
the router originates and zero for other paths. Routes with the largest weight are preferred. You can use
access lists, route maps, or the neighbor weight router configuration command to set weights.
3. Prefer the route with the highest local preference. Local preference is part of the routing update and
exchanged among routers in the same AS. The default value of the local preference attribute is 100.
You can set local preference by using the bgp default local-preference router configuration command
or by using a route map.
4. Prefer the route that was originated by BGP running on the local router.
5. Prefer the route with the shortest AS path.
6. Prefer the route with the lowest origin type. An interior route or IGP is lower than a route learned by
EGP, and an EGP-learned route is lower than one of unknown origin or learned in another way.
7. Prefer the route with the lowest multi -exit discriminator (MED) metric attribute if the neighboring AS
is the same for all routes considered. You can configure the MED by using route maps or by using the
default-metric router configuration command. When an update is sent to an IBGP peer, the MED is
included.
8. Prefer the external (EBGP) path over the internal (IBGP) path.
9. Prefer the route that can be reached through the closest IGP neighbor (the lowest IGP metric). This
means that the router will prefer the shortest internal path within the AS to reach the destination (the
shortest path to the BGP next-hop).
10. If the following conditions are all true, insert the route for this path into the IP routing table:
Both the best route and this route are external.
Both the best route and this route are from the same neighboring autonomous system.
Maximum-paths is enabled.
11. If multipath is not enabled, prefer the route with the lowest IP address value for the BGP router ID. The
router ID is usually the highest IP address on the router or the loopback (virtual) address, but might be
implementation-specific.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
838
Routing
Configuring BGP Decision Attributes
Step 2 router bgp autonomous-system Enables a BGP routing process, assign it an AS number,
and enter router configuration mode.
Example:
Step 3 bgp best-path as-path ignore (Optional) Configures the router to ignore AS path length
in selecting a route.
Example:
Step 4 neighbor {ip-address | peer-group-name} next-hop-self (Optional) Disables next-hop processing on BGP updates
to a neighbor by entering a specific IP address to be used
Example:
instead of the next-hop address.
SwitchDevice(config-router)# neighbor 10.108.1.1
next-hop-self
Step 5 neighbor {ip-address | peer-group-name} weight weight (Optional) Assign a weight to a neighbor connection.
Acceptable values are from 0 to 65535; the largest weight
Example:
is the preferred route. Routes learned through another BGP
peer have a default weight of 0; routes sourced by the local
SwitchDevice(config-router)# neighbor 172.16.12.1
weight 50 router have a default weight of 32768.
Step 6 default-metric number (Optional) Sets a MED metric to set preferred paths to
external neighbors. All routes without a MED will also be
Example:
set to this value. The range is 1 to 4294967295. The lowest
value is the most desirable.
SwitchDevice(config-router)# default-metric 300
Step 7 bgp bestpath med missing-as-worst (Optional) Configures the switch to consider a missing
MED as having a value of infinity, making the path without
Example:
a MED value the least desirable path.
SwitchDevice(config-router)# bgp bestpath med
missing-as-worst
Step 8 bgp always-compare med (Optional) Configures the switch to compare MEDs for
paths from neighbors in different autonomous systems. By
Example:
default, MED comparison is only done among paths in the
same AS.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
839
Routing
Configuring BGP Decision Attributes
SwitchDevice(config-router)# bgp
always-compare-med
Step 9 bgp bestpath med confed (Optional) Configures the switch to consider the MED in
choosing a path from among those advertised by different
Example:
subautonomous systems within a confederation.
SwitchDevice(config-router)# bgp bestpath med
confed
Step 10 bgp deterministic med (Optional) Configures the switch to consider the MED
variable when choosing among routes advertised by
Example:
different peers in the same AS.
SwitchDevice(config-router)# bgp deterministic
med
Step 11 bgp default local-preference value (Optional) Change the default local preference value. The
range is 0 to 4294967295; the default value is 100. The
Example:
highest local preference value is preferred.
SwitchDevice(config-router)# bgp default
local-preference 200
SwitchDevice(config)# end
Step 14 show ip bgp Verifies the reset by checking information about the routing
table and about BGP neighbors.
Example:
Step 15 show ip bgp neighbors Verifies the reset by checking information about the routing
table and about BGP neighbors.
Example:
Step 16 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
840
Routing
Route Maps
Route Maps
Within BGP, route maps can be used to control and to modify routing information and to define the conditions
by which routes are redistributed between routing domains. See the “Using Route Maps to Redistribute Routing
Information” section for more information about route maps. Each route map has a name that identifies the
route map (map tag) and an optional sequence number.
Step 2 route-map map-tag [permit | deny] [sequence-number] Creates a route map, and enter route-map configuration
mode.
Example:
Step 3 set ip next-hop ip-address [...ip-address] [peer-address] (Optional) Sets a route map to disable next-hop processing
Example: • In an inbound route map, set the next hop of matching
routes to be the neighbor peering address, overriding
SwitchDevice(config)# set ip next-hop 10.1.1.3 third-party next hops.
• In an outbound route map of a BGP peer, set the next
hop to the peering address of the local router, disabling
the next-hop calculation.
SwitchDevice(config)# end
Step 5 show route-map [map-name] Displays all route maps configured or only the one specified
to verify configuration.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
841
Routing
BGP Filtering
BGP Filtering
You can filter BGP advertisements by using AS-path filters, such as the as-path access-list global configuration
command and the neighbor filter-list router configuration command. You can also use access lists with the
neighbor distribute-list router configuration command. Distribute-list filters are applied to network numbers.
See the “Controlling Advertising and Processing in Routing Updates” section for information about the
distribute-list command.
You can use route maps on a per-neighbor basis to filter updates and to modify various attributes. A route
map can be applied to either inbound or outbound updates. Only the routes that pass the route map are sent
or accepted in updates. On both inbound and outbound updates, matching is supported based on AS path,
community, and network numbers. Autonomous system path matching requires the match as-path access-list
route-map command, community based matching requires the match community-list route-map command,
and network-based matching requires the ip access-list global configuration command.
Step 2 router bgp autonomous-system Enables a BGP routing process, assign it an AS number,
and enter router configuration mode.
Example:
Step 3 neighbor {ip-address | peer-group name} distribute-list (Optional) Filters BGP routing updates to or from neighbors
{access-list-number | name} {in | out} as specified in an access list.
Example: Note You can also use the neighbor prefix-list router
configuration command to filter updates, but you
SwitchDevice(config-router)# neighbor 172.16.4.1 cannot use both commands to configure the same
distribute-list 39 in BGP peer.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
842
Routing
Configuring BGP Filtering by Access Lists and Neighbors
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Step 2 ip as-path access-list access-list-number {permit | deny} Defines a BGP-related access list.
as-regular-expressions
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
843
Routing
Prefix List for BGP Filtering
Step 4 neighbor {ip-address | peer-group name} filter-list Establishes a BGP filter based on an access list.
{access-list-number | name} {in | out | weight weight}
Example:
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
By default, sequence numbers are generated automatically and incremented in units of five. If you disable the
automatic generation of sequence numbers, you must specify the sequence number for each entry. You can
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
844
Routing
Configuring Prefix Lists for BGP Filtering
specify sequence values in any increment. If you specify increments of one, you cannot insert additional
entries into the list; if you choose very large increments, you might run out of values.
Procedure
Step 2 ip prefix-list list-name [seq seq-value] deny | permit Creates a prefix list with an optional sequence number to
network/len [ge ge-value] [le le-value] deny or permit access for matching conditions. You must
enter at least one permit or deny clause.
Example:
• network/len is the network number and length (in bits)
SwitchDevice(config)# ip prefix-list BLUE permit of the network mask.
172.16.1.0/24
• (Optional) ge and le values specify the range of the
prefix length to be matched.The specified ge-value
and le-value must satisfy this condition: len < ge-value
< le-value < 32
Step 3 ip prefix-list list-name seq seq-value deny | permit (Optional) Adds an entry to a prefix list, and assign a
network/len [ge ge-value] [le le-value] sequence number to the entry.
Example:
SwitchDevice(config)# end
Step 5 show ip prefix list [detail | summary] name [network/len] Verifies the configuration by displaying information about
[seq seq-num] [longer] [first-match] a prefix list or prefix list entries.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
845
Routing
BGP Community Filtering
Based on the community, you can control which routing information to accept, prefer, or distribute to other
neighbors. A BGP speaker can set, append, or modify the community of a route when learning, advertising,
or redistributing routes. When routes are aggregated, the resulting aggregate has a COMMUNITIES attribute
that contains all communities from all the initial routes.
You can use community lists to create groups of communities to use in a match clause of a route map. As
with an access list, a series of community lists can be created. Statements are checked until a match is found.
As soon as one statement is satisfied, the test is concluded.
To set the COMMUNITIES attribute and match clauses based on communities, see the match community-list
and set community route-map configuration commands in the “Using Route Maps to Redistribute Routing
Information” section.
SUMMARY STEPS
1. configure terminal
2. ip community-list community-list-number {permit | deny} community-number
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
846
Routing
Configuring BGP Community Filtering
DETAILED STEPS
Step 2 ip community-list community-list-number {permit | deny} Creates a community list, and assigns it a number.
community-number
• The community-list-number is an integer from 1 to
Example: 99 that identifies one or more permit or deny groups
of communities.
SwitchDevice(config)# ip community-list 1 permit
50000:10 • The community-number is the number configured by
a set community route-map configuration command.
Step 4 neighbor {ip-address | peer-group name} Specifies that the COMMUNITIES attribute be sent to the
send-community neighbor at this IP address.
Example:
Step 5 set comm-list list-num delete (Optional) Removes communities from the community
attribute of an inbound or outbound update that match a
Example:
standard or extended community list specified by a route
map.
SwitchDevice(config-router)# set comm-list 500
delete
SwitchDevice(config-router)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
847
Routing
BGP Neighbors and Peer Groups
SwitchDevice(config)# end
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
848
Routing
Configuring BGP Neighbors and Peer Groups
Procedure
Step 4 neighbor ip-address peer-group peer-group-name Makes a BGP neighbor a member of the peer group.
Step 5 neighbor {ip-address | peer-group-name} remote-as Specifies a BGP neighbor. If a peer group is not configured
number with a remote-as number, use this command to create peer
groups containing EBGP neighbors. The range is 1 to
65535.
Step 6 neighbor {ip-address | peer-group-name} description (Optional) Associates a description with a neighbor.
text
Step 7 neighbor {ip-address | peer-group-name} (Optional) Allows a BGP speaker (the local router) to send
default-originate [route-map map-name] the default route 0.0.0.0 to a neighbor for use as a default
route.
Step 8 neighbor {ip-address | peer-group-name} (Optional) Specifies that the COMMUNITIES attribute
send-community be sent to the neighbor at this IP address.
Step 9 neighbor {ip-address | peer-group-name} update-source (Optional) Allows internal BGP sessions to use any
interface operational interface for TCP connections.
Step 10 neighbor {ip-address | peer-group-name} ebgp-multihop (Optional) Allows BGP sessions, even when the neighbor
is not on a directly connected segment. The multihop
session is not established if the only route to the multihop
peer’s address is the default route (0.0.0.0).
Step 11 neighbor {ip-address | peer-group-name} local-as number (Optional) Specifies an AS number to use as the local AS.
The range is 1 to 65535.
Step 12 neighbor {ip-address | peer-group-name} (Optional) Sets the minimum interval between sending
advertisement-interval seconds BGP routing updates.
Step 13 neighbor {ip-address | peer-group-name} (Optional) Controls how many prefixes can be received
maximum-prefix maximum [threshold] from a neighbor. The range is 1 to 4294967295. The
threshold (optional) is the percentage of maximum at which
a warning message is generated. The default is 75 percent.
Step 14 neighbor {ip-address | peer-group-name} next-hop-self (Optional) Disables next-hop processing on the BGP
updates to a neighbor.
Step 15 neighbor {ip-address | peer-group-name} password string (Optional) Sets MD5 authentication on a TCP connection
to a BGP peer. The same password must be configured on
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
849
Routing
Configuring BGP Neighbors and Peer Groups
Step 16 neighbor {ip-address | peer-group-name} route-map (Optional) Applies a route map to incoming or outgoing
map-name {in | out} routes.
Step 17 neighbor {ip-address | peer-group-name} (Optional) Specifies that the COMMUNITIES attribute
send-community be sent to the neighbor at this IP address.
Step 18 neighbor {ip-address | peer-group-name} timers keepalive (Optional) Sets timers for the neighbor or peer group.
holdtime
• The keepalive interval is the time within which
keepalive messages are sent to peers. The range is 1
to 4294967295 seconds; the default is 60.
• The holdtime is the interval after which a peer is
declared inactive after not receiving a keepalive
message from it. The range is 1 to 4294967295
seconds; the default is 180.
Step 19 neighbor {ip-address | peer-group-name} weight weight (Optional) Specifies a weight for all routes from a
neighbor.
Step 20 neighbor {ip-address | peer-group-name} distribute-list (Optional) Filter BGP routing updates to or from neighbors,
{access-list-number | name} {in | out} as specified in an access list.
Step 23 neighbor {ip-address | peer-group-name} (Optional) Configures the software to start storing received
soft-reconfiguration inbound updates.
SwitchDevice(config)# end
Step 26 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
850
Routing
Aggregate Routes
Aggregate Routes
Classless interdomain routing (CIDR) enables you to create aggregate routes (or supernets) to minimize the
size of routing tables. You can configure aggregate routes in BGP either by redistributing an aggregate route
into BGP or by creating an aggregate entry in the BGP routing table. An aggregate address is added to the
BGP table when there is at least one more specific entry in the BGP table.
Step 3 aggregate-address address mask Creates an aggregate entry in the BGP routing table. The
aggregate route is advertised as coming from the AS, and
Example:
the atomic aggregate attribute is set to indicate that
information might be missing.
SwitchDevice(config-router)# aggregate-address
10.0.0.0 255.0.0.0
Step 4 aggregate-address address mask as-set (Optional) Generates AS set path information. This
command creates an aggregate entry following the same
Example:
rules as the previous command, but the advertised path
will be an AS_SET consisting of all elements contained
SwitchDevice(config-router)# aggregate-address
10.0.0.0 255.0.0.0 as-set in all paths. Do not use this keyword when aggregating
many paths because this route must be continually
withdrawn and updated.
SwitchDevice(config-router)# aggregate-address
10.0.0.0 255.0.0.0 summary-only
Step 6 aggregate-address address mask suppress-map (Optional) Suppresses selected, more specific routes.
map-name
Example:
SwitchDevice(config-router)# aggregate-address
10.0.0.0 255.0.0.0 suppress-map map1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
851
Routing
Routing Domain Confederations
SwitchDevice(config-router)# aggregate-address
10.0.0.0 255.0.0.0 advertise-map map2
Step 8 aggregate-address address mask attribute-map (Optional) Generates an aggregate with attributes specified
map-name in the route map.
Example:
SwitchDevice(config-router)# aggregate-address
10.0.0.0 255.0.0.0 attribute-map map3
SwitchDevice(config)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
852
Routing
Configuring Routing Domain Confederations
Procedure
Step 4 bgp confederation peers autonomous-system Specifies the autonomous systems that belong to the
[autonomous-system ...] confederation and that will be treated as special EBGP peers.
Example:
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
853
Routing
BGP Route Reflectors
Usually a cluster of clients have a single route reflector, and the cluster is identified by the route reflector
router ID. To increase redundancy and to avoid a single point of failure, a cluster might have more than one
route reflector. In this case, all route reflectors in the cluster must be configured with the same 4-byte cluster
ID so that a route reflector can recognize updates from route reflectors in the same cluster. All the route
reflectors serving a cluster should be fully meshed and should have identical sets of client and nonclient peers.
Step 3 neighbor {ip-address | peer-group-name} Configures the local router as a BGP route reflector and the
route-reflector-client specified neighbor as a client.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
854
Routing
Route Dampening
Step 4 bgp cluster-id cluster-id (Optional) Configures the cluster ID if the cluster has more
than one route reflector.
Example:
SwitchDevice(config)# end
Step 7 show ip bgp Verifies the configuration. Displays the originator ID and
the cluster-list attributes.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Route Dampening
Route flap dampening is a BGP feature designed to minimize the propagation of flapping routes across an
internetwork. A route is considered to be flapping when it is repeatedly available, then unavailable, then
available, then unavailable, and so on. When route dampening is enabled, a numeric penalty value is assigned
to a route when it flaps. When a route’s accumulated penalties reach a configurable limit, BGP suppresses
advertisements of the route, even if the route is running. The reuse limit is a configurable value that is compared
with the penalty. If the penalty is less than the reuse limit, a suppressed route that is up is advertised again.
Dampening is not applied to routes that are learned by IBGP. This policy prevents the IBGP peers from having
a higher penalty for routes external to the AS.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
855
Routing
Configuring Route Dampening
Step 4 bgp dampening half-life reuse suppress max-suppress (Optional) Changes the default values of route dampening
[route-map map] factors.
Example:
SwitchDevice(config)# end
Step 6 show ip bgp flap-statistics [{regexp regexp} | {filter-list (Optional) Monitors the flaps of all paths that are flapping.
list} | {address mask [longer-prefix]}] The statistics are deleted when the route is not suppressed
and is stable.
Example:
Step 7 show ip bgp dampened-paths (Optional) Displays the dampened routes, including the
time remaining before they are suppressed.
Example:
Step 8 clear ip bgp flap-statistics [{regexp regexp} | {filter-list (Optional) Clears BGP flap statistics to make it less likely
list} | {address mask [longer-prefix]} that a route will be dampened.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
856
Routing
More BGP Information
Step 9 clear ip bgp dampening (Optional) Clears route dampening information, and
unsuppress the suppressed routes.
Example:
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
clear ip bgp peer-group tag Removes all members of a BGP peer group.
show ip bgp prefix Displays peer groups and peers not in peer groups to
which the prefix has been advertised. Also displays
prefix attributes such as the next hop and the local
prefix.
show ip bgp cidr-only Displays all BGP routes that contain subnet and
supernet network masks.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
857
Routing
Information About ISO CLNS Routing
show ip bgp community [community-number] [exact] Displays routes that belong to the specified
communities.
show ip bgp community-list community-list-number Displays routes that are permitted by the community
[exact-match] list.
show ip bgp filter-list access-list-number Displays routes that are matched by the specified AS
path access list.
show ip bgp regexp regular-expression Displays the routes that have an AS path that matches
the specified regular expression entered on the
command line.
show ip bgp neighbors [address] Displays detailed information on the BGP and TCP
connections to individual neighbors.
show ip bgp neighbors [address] [advertised-routes Displays routes learned from a particular BGP
| dampened-routes | flap-statistics | paths neighbor.
regular-expression | received-routes | routes]
show ip bgp peer-group [tag] [summary] Displays information about BGP peer groups.
The bgp log-neighbor changes command is enabled by default. It allows to log messages that are generated
when a BGP neighbor resets, comes up, or goes down.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
858
Routing
How to Configure ISO CLNS Routing
When dynamically routing, you use IS-IS. This routing protocol supports the concept of areas. Within an area,
all routers know how to reach all the system IDs. Between areas, routers know how to reach the proper area.
IS-IS supports two levels of routing: station routing (within an area) and area routing (between areas).
The key difference between the ISO IGRP and IS-IS NSAP addressing schemes is in the definition of area
addresses. Both use the system ID for Level 1 routing (routing within an area). However, they differ in the
way addresses are specified for area routing. An ISO IGRP NSAP address includes three separate fields for
routing: the domain, area, and system ID. An IS-IS address includes two fields: a single continuous area field
(comprising the domain and area fields) and the system ID.
Note For more detailed information about ISO CLNS, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet,
ISO CLNS and XNS Configuration Guide, Release 12.4. For complete syntax and usage information for the
commands used in this chapter, see the Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS and
XNS Command Reference, Release 12.4, use the IOS command reference master index, or search online.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
859
Routing
Default IS-IS Configuration
Note For more detailed information about IS-IS, see the “IP Routing Protocols” chapter of the Cisco IOS IP
Configuration Guide, Release 12.4. For complete syntax and usage information for the commands used in
this section, see the Cisco IOS IP Command Reference, Release 12.4.
LSP maximum lifetime (without a refresh) 1200 seconds (20 minutes) before t.he LSP packet is
deleted.
LSP refresh interval Send LSP refreshes every 900 seconds (15 minutes).
Partial route computation (PRC) throttling timers Maximum PRC wait interval: 5 seconds.
Initial PRC calculation delay after a topology change:
2000 ms.
Hold time between the first and second PRC
calculation: 5000 ms.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
860
Routing
Nonstop Forwarding Awareness
Shortest path first (SPF) throttling timers Maximum interval between consecutive SFPs: 10
seconds.
Initial SFP calculation after a topology change:
5500 ms.
Holdtime between the first and second SFP
calculation: 5500 ms.
Summary-address Disabled.
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
861
Routing
Enabling IS-IS Routing
Step 4 net network-entity-title Configures the NETs for the routing process. If you are
configuring multiarea IS-IS, specify a NET for each routing
Example:
process. You can specify a name for a NET and for an
address.
SwitchDevice(config-router)# net
47.0004.004d.0001.0001.0c11.1111.00
Step 5 is-type {level-1 | level-1-2 | level-2-only} (Optional) Configures the router to act as a Level 1
(station) router, a Level 2 (area) router for multi-area
Example:
routing, or both (the default):
SwitchDevice(config-router)# is-type level-2-only • level-1—act as a station router only
• level-1-2—act as both a station router and an area
router
• level 2—act as an area router only
SwitchDevice(config-router)# end
Step 7 interface interface-id Specifies an interface to route IS-IS, and enter interface
configuration mode. If the interface is not already
Example:
configured as a Layer 3 interface, enter the no switchport
command to put it into Layer 3 mode.
SwitchDevice(config)# interface gigabitethernet
1/0/1
Step 8 ip router isis [area tag] Configures an IS-IS routing process for ISO CLNS on the
interface and attach an area designator to the routing
Example:
process.
SwitchDevice(config-if)# ip router isis tag1
Step 9 clns router isis [area tag] Enables ISO CLNS on the interface.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
862
Routing
Example: Configuring IS-IS Routing
SwitchDevice(config)# end
Step 12 show isis [area tag] database detail Verifies your entries.
Example:
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Router B:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
863
Routing
IS-IS Global Parameters
Router C:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
864
Routing
Configuring IS-IS Global Parameters
Step 3 router isis Specifies the IS-IS routing protocol and enters router
configuration mode.
Example:
Step 4 default-information originate [route-map map-name] (Optional) Forces a default route into the IS-IS routing
domain. If you enter route-map map-name, the routing
Example:
process generates the default route if the route map is
satisfied.
SwitchDevice(config-router)# default-information
originate route-map map1
SwitchDevice(config-router)# area-password
1password
Step 8 summary-address address mask [level-1 | level-1-2 | (Optional) Creates a summary of addresses for a given
level-2] level.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
865
Routing
Configuring IS-IS Global Parameters
SwitchDevice(config-router)# summary-address
10.1.0.0 255.255.0.0 level-2
Step 9 set-overload-bit [on-startup {seconds | wait-for-bgp}] (Optional) Sets an overload bit (a hippity bit) to allow other
routers to ignore the router in their shortest path first (SPF)
Example:
calculations if the router is having problems.
SwitchDevice(config-router)# set-overload-bit • (Optional) on-startup—sets the overload bit only on
on-startup wait-for-bgp startup. If on-startup is not specified, the overload
bit is set immediately and remains set until you enter
the no set-overload-bit command. If on-startup is
specified, you must enter a number of seconds or
wait-for-bgp.
• seconds—When the on-startup keyword is
configured, causes the overload bit to be set upon
system startup and remain set for this number of
seconds. The range is from 5 to 86400 seconds.
• wait-for-bgp—When the on-startup keyword is
configured, causes the overload bit to be set upon
system startup and remain set until BGP has
converged. If BGP does not signal IS-IS that it is
converged, IS-IS will turn off the overload bit after
10 minutes.
Step 10 lsp-refresh-interval seconds (Optional) Sets an LSP refresh interval in seconds. The
range is from 1 to 65535 seconds. The default is to send
Example:
LSP refreshes every 900 seconds (15 minutes).
SwitchDevice(config-router)# lsp-refresh-interval
1080
Step 11 max-lsp-lifetime seconds (Optional) Sets the maximum time that LSP packets remain
in the router database without being refreshed. The range
Example:
is from 1 to 65535 seconds. The default is 1200 seconds
(20 minutes). After the specified time interval, the LSP
SwitchDevice(config-router)# max-lsp-lifetime 1000
packet is deleted.
Step 12 lsp-gen-interval [level-1 | level-2] lsp-max-wait (Optional) Sets the IS-IS LSP generation throttling timers:
[lsp-initial-wait lsp-second-wait]
• lsp-max-wait—the maximum interval (in seconds)
Example: between two consecutive occurrences of an LSP being
generated. The range is 1 to 120, the default is 5.
SwitchDevice(config-router)# lsp-gen-interval
level-2 2 50 100 • lsp-initial-wait—the initial LSP generation delay (in
milliseconds). The range is 1 to 10000; the default is
50.
• lsp-second-wait—the hold time between the first and
second LSP generation (in milliseconds). The range
is 1 to 10000; the default is 5000.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
866
Routing
Configuring IS-IS Global Parameters
Step 14 prc-interval prc-max-wait [prc-initial-wait (Optional) Sets IS-IS partial route computation (PRC)
prc-second-wait] throttling timers.
Example: • prc-max-wait—the maximum interval (in seconds)
between two consecutive PRC calculations. The range
SwitchDevice(config-router)# prc-interval 5 10 20 is 1 to 120; the default is 5.
• prc-initial-wait—the initial PRC calculation delay (in
milliseconds) after a topology change. The range is
1 to 10,000; the default is 2000.
• prc-second-wait—the hold time between the first and
second PRC calculation (in milliseconds). The range
is 1 to 10,000; the default is 5000.
Step 15 log-adjacency-changes [all] (Optional) Sets the router to log IS-IS adjacency state
changes. Enter all to include all changes generated by
Example:
events that are not related to the Intermediate
System-to-Intermediate System Hellos, including End
SwitchDevice(config-router)# log-adjacency-changes
all System-to-Intermediate System PDUs and link state
packets (LSPs).
Step 16 lsp-mtu size (Optional) Specifies the maximum LSP packet size in
bytes. The range is 128 to 4352; the default is 1497 bytes.
Example:
Note If any link in the network has a reduced MTU
SwitchDevice(config-router)# lsp mtu 1560 size, you must change the LSP MTU size on all
routers in the network.
Step 17 partition avoidance (Optional) Causes an IS-IS Level 1-2 border router to stop
advertising the Level 1 area prefix into the Level 2
Example:
backbone when full connectivity is lost among the border
router, all adjacent level 1 routers, and end hosts.
SwitchDevice(config-router)# partition avoidance
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
867
Routing
IS-IS Interface Parameters
SwitchDevice(config)# end
Step 20 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
• Designated router election priority, which allows you to reduce the number of adjacencies required on
a multiaccess network, which in turn reduces the amount of routing protocol traffic and the size of the
topology database.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
868
Routing
Configuring IS-IS Interface Parameters
• The interface circuit type, which is the type of adjacency desired for neighbors on the specified interface
• Password authentication for the interface
Step 2 interface interface-id Specifies the interface to be configured and enter interface
configuration mode. If the interface is not already
Example:
configured as a Layer 3 interface, enter the no switchport
command to put it into Layer 3 mode.
SwitchDevice(config)# interface gigabitethernet
1/0/1
Step 3 isis metric default-metric [level-1 | level-2] (Optional) Configures the metric (or cost) for the specified
interface. The range is from 0 to 63. The default is 10. If
Example:
no level is entered, the default is to apply to both Level 1
and Level 2 routers.
SwitchDevice(config-if)# isis metric 15
Step 4 isis hello-interval {seconds | minimal} [level-1 | level-2] (Optional) Specifies the length of time between hello
packets sent by the switch. By default, a value three times
Example:
the hello interval seconds is advertised as the holdtime in
the hello packets sent. With smaller hello intervals,
SwitchDevice(config-if)# isis hello-interval
minimal topological changes are detected faster, but there is more
routing traffic.
• minimal—causes the system to compute the hello
interval based on the hello multiplier so that the
resulting hold time is 1 second.
• seconds—the range is from 1 to 65535. The default
is 10 seconds.
Step 5 isis hello-multiplier multiplier [level-1 | level-2] (Optional) Specifies the number of IS-IS hello packets a
neighbor must miss before the router should declare the
Example:
adjacency as down. The range is from 3 to 1000. The
default is 3. Using a smaller hello-multiplier causes fast
SwitchDevice(config-if)# isis hello-multiplier 5
convergence, but can result in more routing instability.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
869
Routing
Configuring IS-IS Interface Parameters
Step 7 isis retransmit-interval seconds (Optional) Configures the number of seconds between
retransmission of IS-IS LSPs for point-to-point links. The
Example:
value you specify should be an integer greater than the
expected round-trip delay between any two routers on the
SwitchDevice(config-if)# isis retransmit-interval
7 network. The range is from 0 to 65535. The default is 5
seconds.
Step 8 isis retransmit-throttle-interval milliseconds (Optional) Configures the IS-IS LSP retransmission throttle
interval, which is the maximum rate (number of
Example:
milliseconds between packets) at which IS-IS LSPs will
be re-sent on point-to-point links. The range is from 0 to
SwitchDevice(config-if)# isis
retransmit-throttle-interval 4000 65535. The default is determined by the isis lsp-interval
command.
Step 9 isis priority value [level-1 | level-2] (Optional) Configures the priority to use for designated
router election. The range is from 0 to 127. The default is
Example:
64.
SwitchDevice(config-if)# isis priority 50
Step 10 isis circuit-type {level-1 | level-1-2 | level-2-only} (Optional) Configures the type of adjacency desired for
neighbors on the specified interface (specify the interface
Example:
circuit type).
SwitchDevice(config-if)# isis circuit-type • level-1—a Level 1 adjacency is established if there
level-1-2 is at least one area address common to both this node
and its neighbors.
• level-1-2—a Level 1 and 2 adjacency is established
if the neighbor is also configured as both Level 1 and
Level 2 and there is at least one area in common.
If there is no area in common, a Level 2 adjacency is
established. This is the default.
• level 2—a Level 2 adjacency is established. If the
neighbor router is a Level 1 router, no adjacency is
established.
Step 11 isis password password [level-1 | level-2] (Optional) Configures the authentication password for an
interface. By default, authentication is disabled. Specifying
Example:
Level 1 or Level 2 enables the password only for Level 1
or Level 2 routing, respectively. If you do not specify a
SwitchDevice(config-if)# isis password secret
level, the default is Level 1 and Level 2.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
870
Routing
Monitoring and Maintaining ISO IGRP and IS-IS
SwitchDevice(config)# end
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Table 96: ISO CLNS and IS-IS Clear and Show Commands
Command Purpose
clear clns cache Clears and reinitializes the CLNS routing cache.
clear clns es-neighbors Removes end system (ES) neighbor information from
the adjacency database.
show clns cache Displays the entries in the CLNS routing cache.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
871
Routing
Information About Multi-VRF CE
Command Purpose
show clns es-neighbors Displays ES neighbor entries, including the associated
areas.
show clns protocol List the protocol-specific information for each IS-IS
or ISO IGRP routing process in this router.
show clns route Displays all the destinations to which this router
knows how to route CLNS packets.
show clns traffic Displays information about the CLNS packets this
router has seen.
show ip route isis Displays the current state of the ISIS IP routing table.
show isis spf-log Displays a history of the shortest path first (SPF)
calculations for IS-IS.
show isis topology Displays a list of all connected routers in all areas.
show route-map Displays all route maps configured or only the one
specified.
which-route {nsap-address | clns-name} Displays the routing table in which the specified
CLNS destination is found.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
872
Routing
Understanding Multi-VRF CE
Note The switch does not use Multiprotocol Label Switching (MPLS) to support VPNs.
Understanding Multi-VRF CE
Multi-VRF CE is a feature that allows a service provider to support two or more VPNs, where IP addresses
can be overlapped among the VPNs. Multi-VRF CE uses input interfaces to distinguish routes for different
VPNs and forms virtual packet-forwarding tables by associating one or more Layer 3 interfaces with each
VRF. Interfaces in a VRF can be either physical, such as Ethernet ports, or logical, such as VLAN SVIs, but
an interface cannot belong to more than one VRF at any time.
With multi-VRF CE, multiple customers can share one CE, and only one physical link is used between the
CE and the PE. The shared CE maintains separate VRF tables for each customer and switches or routes packets
for each customer based on its own routing table. Multi-VRF CE extends limited PE functionality to a CE
device, giving it the ability to maintain separate VRF tables to extend the privacy and security of a VPN to
the branch office.
Network Topology
The figure shows a configuration using switches as multiple virtual CEs. This scenario is suited for customers
who have low bandwidth requirements for their VPN service, for example, small companies. In this case,
multi-VRF CE support is required in the switches. Because multi-VRF CE is a Layer 3 feature, each interface
in a VRF must be a Layer 3 interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
873
Routing
Packet-Forwarding Process
When the CE switch receives a command to add a Layer 3 interface to a VRF, it sets up the appropriate
mapping between the VLAN ID and the policy label (PL) in multi-VRF-CE-related data structures and adds
the VLAN ID and PL to the VLAN database.
When multi-VRF CE is configured, the Layer 3 forwarding table is conceptually partitioned into two sections:
• The multi-VRF CE routing section contains the routes from different VPNs.
• The global routing section contains routes to non-VPN networks, such as the Internet.
VLAN IDs from different VRFs are mapped into different policy labels, which are used to distinguish the
VRFs during processing. For each new VPN route learned, the Layer 3 setup function retrieves the policy
label by using the VLAN ID of the ingress port and inserts the policy label and new route to the multi-VRF
CE routing section. If the packet is received from a routed port, the port internal VLAN ID number is used;
if the packet is received from an SVI, the VLAN number is used.
Packet-Forwarding Process
This is the packet-forwarding process in a multi-VRF-CE-enabled network:
• When the switch receives a packet from a VPN, the switch looks up the routing table based on the input
policy label number. When a route is found, the switch forwards the packet to the PE.
• When the ingress PE receives a packet from the CE, it performs a VRF lookup. When a route is found,
the router adds a corresponding MPLS label to the packet and sends it to the MPLS network.
• When an egress PE receives a packet from the network, it strips the label and uses the label to identify
the correct VPN routing table. Then it performs the normal route lookup. When a route is found, it
forwards the packet to the correct adjacency.
• When a CE receives a packet from an egress PE, it uses the input policy label to look up the correct VPN
routing table. If a route is found, it forwards the packet within the VPN.
Network Components
To configure VRF, you create a VRF table and specify the Layer 3 interface associated with the VRF. Then
configure the routing protocols in the VPN and between the CE and the PE. BGP is the preferred routing
protocol used to distribute VPN routing information across the provider’s backbone. The multi-VRF CE
network has three major components:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
874
Routing
VRF-Aware Services
• VPN route target communities—lists of all other members of a VPN community. You need to configure
VPN route targets for each VPN community member.
• Multiprotocol BGP peering of VPN community PE routers—propagates VRF reachability information
to all members of a VPN community. You need to configure BGP peering in all PE routers within a VPN
community.
• VPN forwarding—transports all traffic between all VPN community members across a VPN
service-provider network.
VRF-Aware Services
IP services can be configured on global interfaces, and these services run within the global routing instance.
IP services are enhanced to run on multiple routing instances; they are VRF-aware. Any configured VRF in
the system can be specified for a VRF-aware service.
VRF-Aware services are implemented in platform-independent modules. VRF means multiple routing instances
in Cisco IOS. Each platform has its own limit on the number of VRFs it supports.
VRF-aware services have the following characteristics:
• The user can ping a host in a user-specified VRF.
• ARP entries are learned in separate VRFs. The user can display Address Resolution Protocol (ARP)
entries for specific VRFs.
Forwarding table The default for an interface is the global routing table.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
875
Routing
Multi-VRF CE Configuration Guidelines
Note To use multi-VRF CE, you must have the IP services or advanced IP services feature set enabled on your
switch.
• A switch with multi-VRF CE is shared by multiple customers, and each customer has its own routing
table.
• Because customers use different VRF tables, the same IP addresses can be reused. Overlapped IP addresses
are allowed in different VPNs.
• Multi-VRF CE lets multiple customers share the same physical link between the PE and the CE. Trunk
ports with multiple VLANs separate packets among customers. Each customer has its own VLAN.
• Multi-VRF CE does not support all MPLS-VRF functionality. It does not support label exchange, LDP
adjacency, or labeled packets.
• For the PE router, there is no difference between using multi-VRF CE or using multiple CEs. In
Figure 41-6, multiple virtual Layer 3 interfaces are connected to the multi-VRF CE device.
• The switch supports configuring VRF by using physical ports, VLAN SVIs, or a combination of both.
The SVIs can be connected through an access port or a trunk port.
• A customer can use multiple VLANs as long as they do not overlap with those of other customers. A
customer’s VLANs are mapped to a specific routing table ID that is used to identify the appropriate
routing tables stored on the switch.
• The switch supports one global network and up to 26 VRFs.
• Most routing protocols (BGP, OSPF, RIP, and static routing) can be used between the CE and the PE.
However, we recommend using external BGP (EBGP) for these reasons:
• BGP does not require multiple algorithms to communicate with multiple CEs.
• BGP is designed for passing routing information between systems run by different administrations.
• BGP makes it easy to pass attributes of the routes to the CE.
Configuring VRFs
For complete syntax and usage information for the commands, see the switch command reference for this
release and the Cisco IOS Switching Services Command Reference.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
876
Routing
Configuring VRFs
Procedure
SwitchDevice(config)# ip routing
Step 3 ip vrf vrf-name Names the VRF, and enter VRF configuration mode.
Example:
Step 5 route-target {export | import | both} Creates a list of import, export, or import and export route
route-target-ext-community target communities for the specified VRF. Enter either an
AS system number and an arbitrary number (xxx:y) or an
Example:
IP address and an arbitrary number (A.B.C.D:y). The
route-target-ext-community should be the same as the
SwitchDevice(config-vrf)# route-target both 100:2
route-distinguisher entered in Step 4.
Step 6 import map route-map (Optional) Associates a route map with the VRF.
Example:
Step 7 interface interface-id Specifies the Layer 3 interface to be associated with the
VRF, and enter interface configuration mode. The interface
Example:
can be a routed port or SVI.
SwitchDevice(config-vrf)# interface
gigabitethernet 1/0/1
Step 8 ip vrf forwarding vrf-name Associates the VRF with the Layer 3 interface.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
877
Routing
Configuring VRF-Aware Services
SwitchDevice(config)# end
Step 10 show ip vrf [brief | detail | interfaces] [vrf-name] Verifies the configuration. Displays information about the
configured VRFs.
Example:
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note The switch does not support VRF-aware services for Unicast Reverse Path
Forwarding (uRPF) or Network Time Protocol (NTP).
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
878
Routing
Configuring VRF-Aware Services for Ping
Procedure
Procedure
Step 2 snmp-server trap authentication vrf Enables SNMP traps for packets on a VRF.
Example:
Step 3 snmp-server engineID remote host vrf vpn-instance Configures a name for the remote SNMP engine on a switch.
engine-id string
Example:
Step 4 snmp-server host host vrf vpn-instance traps community Specifies the recipient of an SNMP trap operation and
specifies the VRF table to be used for sending SNMP traps.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
879
Routing
Configuring VRF-Aware Servcies for HSRP
Step 5 snmp-server host host vrf vpn-instance informs community Specifies the recipient of an SNMP inform operation and
specifies the VRF table to be used for sending SNMP
Example:
informs.
SwitchDevice(config)# snmp-server host 172.16.20.3
vrf vpn1 informs comaccess
Step 6 snmp-server user user group remote host vrf vpn-instance Adds a user to an SNMP group for a remote host on a VRF
security model for SNMP access.
Example:
SwitchDevice(config-if)# end
Procedure
Step 2 interfaceinterface-id Enters interface configuration mode, and specifies the Layer
3 interface to configure.
Example:
SwitchDevice(config-if)# no switchport
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
880
Routing
Configuring VRF-Aware Servcies for uRPF
Step 6 standby 1 ip ip-address Enables HSRP and configure the virtual IP address.
Example:
SwitchDevice(config-if)#standby 1 ip 10.1.1.254
SwitchDevice(config-if)# end
Procedure
Step 2 interface interface-id Enters interface configuration mode, and specifies the Layer
3 interface to configure.
Example:
SwitchDevice(config)#
interface gigabitethernet 1/0/1
SwitchDevice(config-if)# no switchport
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
881
Routing
Configuring VRF-Aware RADIUS
SwitchDevice(config-if)# end
Procedure
SwitchDevice(config)# logging on
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
882
Routing
Configuring VRF-Aware Services for Traceroute
Step 4 logging buffered logging buffered size debugging Logs messages to an internal buffer.
Example:
Step 5 logging trap debugging Limits the logging messages sent to the syslog server.
Example:
Step 6 logging facility facility Sends system logging messages to a logging facility.
Example:
SwitchDevice(config-if)# end
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
883
Routing
Configuring VRF-Aware Services for FTP and TFTP
table. In this example, the VRF table is used to look up the destination IP address. These changes are
backward-compatible and do not affect existing behavior. That is, you can use the source-interface CLI to
send packets out a particular interface even if no VRF is configured on that interface.
Procedure
Step 2 ip ftp source-interface interface-type interface-number Specifies the source IP address for FTP connections.
Example:
SwitchDevice(config)#end
Step 5 ip tftp source-interface interface-type interface-number Specifies the source IP address for TFTP connections.
Example:
SwitchDevice(config)# end
SwitchDevice(config)#end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
884
Routing
Configuring Multicast VRFs
Procedure
SwitchDevice(config)# ip routing
Step 3 ip vrf vrf-name Names the VRF, and enter VRF configuration mode.
Example:
Step 5 route-target {export | import | both} Creates a list of import, export, or import and export route
route-target-ext-community target communities for the specified VRF. Enter either an
AS system number and an arbitrary number (xxx:y) or an
Example:
IP address and an arbitrary number (A.B.C.D:y). The
route-target-ext-community should be the same as the
SwitchDevice(config-vrf)# route-target import
100:2 route-distinguisher entered in Step 4.
Step 6 import map route-map (Optional) Associates a route map with the VRF.
Example:
Step 7 ip multicast-routing vrf vrf-name distributed (Optional) Enables global multicast routing for VRF table.
Example:
SwitchDevice(config-vrf)# ip multicast-routing
vrf vpn1 distributed
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
885
Routing
Configuring a VPN Routing Session
Step 9 ip vrf forwarding vrf-name Associates the VRF with the Layer 3 interface.
Example:
Step 10 ip address ip-address mask Configures IP address for the Layer 3 interface.
Example:
Step 11 ip pim sparse-dense mode Enables PIM on the VRF-associated Layer 3 interface.
Example:
SwitchDevice(config)# end
Step 13 show ip vrf [brief | detail | interfaces] [vrf-name] Verifies the configuration. Displays information about the
configured VRFs.
Example:
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
886
Routing
Configuring a VPN Routing Session
Note To configure an EIGRP routing process to run within a VRF instance, you must configure an
autonomous-system number by entering the autonomous-system autonomous-system-number address-family
configuration mode command.
Procedure
Step 2 router ospf process-id vrf vrf-name Enables OSPF routing, specifies a VPN forwarding table,
and enter router configuration mode.
Example:
Step 3 log-adjacency-changes (Optional) Logs changes in the adjacency state. This is the
default state.
Example:
SwitchDevice(config-router)# log-adjacency-changes
Step 4 redistribute bgp autonomous-system-number subnets Sets the switch to redistribute information from the BGP
network to the OSPF network.
Example:
Step 5 network network-number area area-id Defines a network address and mask on which OSPF runs
and the area ID for that network address.
Example:
SwitchDevice(config-router)# end
Step 7 show ip ospf process-id Verifies the configuration of the OSPF network.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
887
Routing
Configuring BGP PE to CE Routing Sessions
Step 2 router bgp autonomous-system-number Configures the BGP routing process with the AS number
passed to other BGP routers, and enter router configuration
Example:
mode.
SwitchDevice(config)# router bgp 2
Step 3 network network-number mask network-mask Specifies a network and mask to announce using BGP.
Example:
Step 4 redistribute ospf process-id match internal Sets the switch to redistribute OSPF internal routes.
Example:
Step 5 network network-number area area-id Defines a network address and mask on which OSPF runs
and the area ID for that network address.
Example:
Step 6 address-family ipv4 vrf vrf-name Defines BGP parameters for PE to CE routing sessions,
and enter VRF address-family mode.
Example:
Step 7 neighbor address remote-as as-number Defines a BGP session between PE and CE routers.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
888
Routing
Multi-VRF CE Configuration Example
SwitchDevice(config-router)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
889
Routing
Multi-VRF CE Configuration Example
Configure the loopback and physical interfaces on Switch A. Gigabit Ethernet port 1 is a trunk connection to
the PE. Gigabit Ethernet ports 8 and 11 connect to VPNs:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
890
Routing
Multi-VRF CE Configuration Example
Configure the VLANs used on Switch A. VLAN 10 is used by VRF 11 between the CE and the PE. VLAN
20 is used by VRF 12 between the CE and the PE. VLANs 118 and 208 are used for the VPNs that include
Switch F and Switch D, respectively:
Switch D belongs to VPN 1. Configure the connection to Switch A by using these commands.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
891
Routing
Multi-VRF CE Configuration Example
Switch F belongs to VPN 2. Configure the connection to Switch A by using these commands.
When used on switch B (the PE router), these commands configure only the connections to the CE device,
Switch A.
Router(config)# ip vrf v2
Router(config-vrf)# rd 100:2
Router(config-vrf)# route-target export 100:2
Router(config-vrf)# route-target import 100:2
Router(config-vrf)# exit
Router(config)# ip cef
Router(config)# interface Loopback1
Router(config-if)# ip vrf forwarding v1
Router(config-if)# ip address 3.3.1.3 255.255.255.0
Router(config-if)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
892
Routing
Monitoring Multi-VRF CE
Router(config-if)# exit
Monitoring Multi-VRF CE
Table 98: Commands for Displaying Multi-VRF CE Information
show ip protocols vrf vrf-name Displays routing protocol information associated with
a VRF.
show ip route vrf vrf-name [connected] [protocol Displays IP routing table information associated with
[as-number]] [list] [mobile] [odr] [profile] [static] a VRF.
[summary] [supernets-only]
show ip vrf [brief | detail | interfaces] [vrf-name] Displays information about the defined VRF instances.
For more information about the information in the displays, see the Cisco IOS Switching Services Command
Reference, Release 12.4.
For detailed IP unicast RPF configuration information, see the Other Security Features chapter in the Cisco
IOS Security Configuration Guide.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
893
Routing
Protocol-Independent Features
Protocol-Independent Features
This section describes IP routing protocol-independent features that are available on switches running the
feature set . For a complete description of the IP routing protocol-independent commands in this chapter, see
the “IP Routing Protocol-Independent Commands” chapter of the Cisco IOS IP Command Reference, Volume
2 of 3: Routing Protocols.
Because the switch or switch stack uses Application Specific Integrated Circuits (ASICs) to achieve
Gigabit-speed line rate IP traffic, CEF or dCEF forwarding applies only to the software-forwarding path, that
is, traffic that is forwarded by the CPU.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
894
Routing
How to Configure Cisco Express Forwarding
Caution Although the no ip route-cache cef interface configuration command to disable CEF on an interface is visible
in the CLI, we strongly recommend that you do not disable CEF or dCEF on interfaces except for debugging
purposes.
To enable CEF or dCEF globally and on an interface for software-forwarded traffic if it has been disabled:
SUMMARY STEPS
1. configure terminal
2. ip cef
3. ip cef distributed
4. interface interface-id
5. ip route-cache cef
6. end
7. show ip cef
8. show cef linecard [detail]
9. show cef linecard [slot-number] [detail]
10. show cef interface [interface-id]
11. show adjacency
12. copy running-config startup-config
DETAILED STEPS
SwitchDevice(config)# ip cef
Step 4 interface interface-id Enters interface configuration mode, and specifies the
Layer 3 interface to configure.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
895
Routing
How to Configure Cisco Express Forwarding
SwitchDevice(config-if)# end
Step 8 show cef linecard [detail] (Optional) Displays CEF-related interface information on
a non-stacking switch.
Example:
Step 9 show cef linecard [slot-number] [detail] (Optional) Displays CEF-related interface information on
a switch by stack member for all switches in the stack or
Example:
for the specified switch.
SwitchDevice# show cef linecard 5 detail (Optional) For slot-number, enter the stack member switch
number.
Step 10 show cef interface [interface-id] Displays detailed CEF information for all interfaces or the
specified interface.
Example:
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
896
Routing
Number of Equal-Cost Routing Paths
Procedure
Step 3 maximum-paths maximum Sets the maximum number of parallel paths for the protocol
routing table. The range is from 1 to 16; the default is 4 for
Example:
most IP routing protocols, but only 1 for BGP.
SwitchDevice(config-router)# maximum-paths 2
SwitchDevice(config-router)# end
Step 5 show ip protocols Verifies the setting in the Maximum path field.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
897
Routing
Static Unicast Routes
Connected interface 0
Static route 1
IGRP 100
OSPF 110
Unknown 225
Static routes that point to an interface are advertised through RIP, IGRP, and other dynamic routing protocols,
whether or not static redistribute router configuration commands were specified for those routing protocols.
These static routes are advertised because static routes that point to an interface are considered in the routing
table to be connected and hence lose their static nature. However, if you define a static route to an interface
that is not one of the networks defined in a network command, no dynamic routing protocols advertise the
route unless a redistribute static command is specified for these protocols.
When an interface goes down, all static routes through that interface are removed from the IP routing table.
When the software can no longer find a valid next hop for the address specified as the forwarding router's
address in a static route, the static route is also removed from the IP routing table.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
898
Routing
Configuring Static Unicast Routes
Procedure
SwitchDevice> enable
Step 3 ip route prefix mask {address | interface} [distance] Establish a static route.
Example:
SwitchDevice(config)# end
Step 5 show ip route Displays the current state of the routing table to verify the
configuration.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
Use the no ip route prefix mask {address| interface} global configuration command to remove a static route.
The switch retains static routes until you remove them.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
899
Routing
Default Routes and Networks
Procedure
SwitchDevice(config)# ip default-network 1
SwitchDevice(config)# end
Step 4 show ip route Displays the selected default route in the gateway of last
resort display.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
900
Routing
Route Maps to Redistribute Routing Information
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note A route map with no set route-map configuration commands is sent to the CPU, which causes high CPU
utilization.
You can also identify route-map statements as permit or deny. If the statement is marked as a deny, the
packets meeting the match criteria are sent back through the normal forwarding channels (destination-based
routing). If the statement is marked as permit, set clauses are applied to packets meeting the match criteria.
Packets that do not meet the match criteria are forwarded through the normal routing channel.
Related Topics
Information About Policy-Based Routing, on page 907
Other OSPF Parameters, on page 811
Note The keywords are the same as defined in the procedure to control the route distribution.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
901
Routing
How to Configure a Route Map
Procedure
Step 2 route-mapmap-tag [permit | deny] [sequence number] Defines any route maps used to control redistribution and
enter route-map configuration mode.
Example:
map-tag—A meaningful name for the route map. The
SwitchDevice(config)# route-map rip-to-ospf permit redistribute router configuration command uses this name
4 to reference this route map. Multiple route maps might
share the same map tag name.
(Optional) If permit is specified and the match criteria are
met for this route map, the route is redistributed as
controlled by the set actions. If deny is specified, the route
is not redistributed.
sequence number (Optional)— Number that indicates the
position a new route map is to have in the list of route maps
already configured with the same name.
SwitchDevice(config-route-map)#match as-path 10
SwitchDevice(config-route-map)# match
community-list 150
Step 5 match ip address {access-list-number | access-list-name} Matches a standard access list by specifying the name or
[...access-list-number | ...access-list-name] number. It can be an integer from 1 to 199.
Example:
Step 6 match metric metric-value Matches the specified route metric. The metric-value can
be an EIGRP metric with a specified value from 0
Example:
to 4294967295.
SwitchDevice(config-route-map)# match metric 2000
Step 7 match ip next-hop {access-list-number | access-list-name} Matches a next-hop router address passed by one of the
[...access-list-number | ...access-list-name] access lists specified (numbered from 1 to 199).
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
902
Routing
How to Configure a Route Map
Step 8 match tag tag value [...tag-value] Matches the specified tag value in a list of one or more
route tag values. Each can be an integer from 0 to
Example:
4294967295.
SwitchDevice(config-route-map)# match tag 3500
Step 9 match interfacetype number [...type-number] Matches the specified next hop route out one of the
specified interfaces.
Example:
Step 10 match ip route-source {access-list-number | Matches the address specified by the specified advertised
access-list-name} [...access-list-number | access lists.
...access-list-name]
Example:
SwitchDevice(config-route-map)# match ip
route-source 10 30
Step 11 match route-type {local | internal | external [type-1 | Matches the specified route-type:
type-2]}
• local—Locally generated BGP routes.
Example:
• internal—OSPF intra-area and interarea routes or
SwitchDevice(config-route-map)# match route-type
EIGRP internal routes.
local
• external—OSPF external routes (Type 1 or Type 2)
or EIGRP external routes.
Step 12 set dampening halflife reuse suppress max-suppress-time Sets BGP route dampening factors.
Example:
SwitchDevice(config-route-map)# set
local-preference 100
Step 14 set origin {igp | egp as | incomplete} Sets the BGP origin code.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
903
Routing
How to Configure a Route Map
Step 16 set level {level-1 | level-2 | level-1-2 | stub-area | Sets the level for routes that are advertised into the
backbone} specified area of the routing domain. The stub-area and
backbone are OSPF NSSA and backbone areas.
Example:
Step 17 set metric metric value Sets the metric value to give the redistributed routes (for
EIGRP only). The metric value is an integer
Example:
from -294967295 to 294967295.
SwitchDevice(config-route-map)# set metric 100
Step 18 set metricbandwidth delay reliability loading mtu Sets the metric value to give the redistributed routes (for
EIGRP only):
Example:
• bandwidth—Metric value or IGRP bandwidth of the
SwitchDevice(config-route-map)# set metric 10000 route in kilobits per second in the range 0 to
10 255 1 1500 4294967295
• delay—Route delay in tens of microseconds in the
range 0 to 4294967295.
• reliability—Likelihood of successful packet
transmission expressed as a number between 0 and
255, where 255 means 100 percent reliability and 0
means no reliability.
• loading—Effective bandwidth of the route expressed
as a number from 0 to 255 (255 is 100 percent
loading).
• mtu—Minimum maximum transmission unit (MTU)
size of the route in bytes in the range 0 to
4294967295.
Step 19 set metric-type {type-1 | type-2} Sets the OSPF external metric type for redistributed routes.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
904
Routing
How to Control Route Distribution
Step 21 set weight number Sets the BGP weight for the routing table. The value can
be from 1 to 65535.
Example:
SwitchDevice(config-route-map)# end
Step 23 show route-map Displays all route maps configured or only the one
specified to verify configuration.
Example:
Step 24 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note The keywords are the same as defined in the procedure to configure the route map for redistritbution.
The metrics of one routing protocol do not necessarily translate into the metrics of another. For example, the
RIP metric is a hop count, and the IGRP metric is a combination of five qualities. In these situations, an
artificial metric is assigned to the redistributed route. Uncontrolled exchanging of routing information between
different routing protocols can create routing loops and seriously degrade network operation.
If you have not defined a default redistribution metric that replaces metric conversion, some automatic metric
translations occur between routing protocols:
• RIP can automatically redistribute static routes. It assigns static routes a metric of 1 (directly connected).
• Any protocol can redistribute other routing protocols if a default mode is in effect.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
905
Routing
How to Control Route Distribution
Procedure
Step 3 redistribute protocol [process-id] {level-1 | level-1-2 | Redistributes routes from one routing protocol to another
level-2} [metric metric-value] [metric-type type-value] routing protocol. If no route-maps are specified, all routes
[match internal | external type-value] [tag tag-value] are redistributed. If the keyword route-map is specified
[route-map map-tag] [weight weight] [subnets] with no map-tag, no routes are distributed.
Example:
Step 4 default-metric number Cause the current routing protocol to use the same metric
value for all redistributed routes ( RIP and OSPF).
Example:
Step 5 default-metric bandwidth delay reliability loading mtu Cause the EIGRP routing protocol to use the same metric
value for all non-EIGRP redistributed routes.
Example:
SwitchDevice(config-router)# end
Step 7 show route-map Displays all route maps configured or only the one specified
to verify configuration.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
906
Routing
Policy-Based Routing
Related Topics
Information About Policy-Based Routing, on page 907
Other OSPF Parameters, on page 811
Policy-Based Routing
Information About Policy-Based Routing
You can use policy-based routing (PBR) to configure a defined policy for traffic flows. By using PBR, you
can have more control over routing by reducing the reliance on routes derived from routing protocols. PBR
can specify and implement routing policies that allow or deny paths based on:
• Identity of a particular end system
• Application
• Protocol
You can use PBR to provide equal-access and source-sensitive routing, routing based on interactive versus
batch traffic, or routing based on dedicated links. For example, you could transfer stock records to a corporate
office on a high-bandwidth, high-cost link for a short time while transmitting routine application data such
as e-mail over a low-bandwidth, low-cost link.
With PBR, you classify traffic using access control lists (ACLs) and then make traffic go through a different
path. PBR is applied to incoming packets. All packets received on an interface with PBR enabled are passed
through route maps. Based on the criteria defined in the route maps, packets are forwarded (routed) to the
appropriate next hop.
• Route map statement marked as permit is processed as follows:
• A match command can match on length or multiple ACLs. A route map statement can contain
multiple match commands. Logical or algorithm function is performed across all the match commands
to reach a permit or deny decision.
For example:
match length A B
match ip address acl1 acl2
match ip address acl3
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
907
Routing
How to Configure PBR
route map until a match is found. If no match is found, normal destination-based routing occurs. There is an
implicit deny at the end of the list of match statements.
If match clauses are satisfied, you can use a set clause to specify the IP addresses identifying the next hop
router in the path.
For details about PBR commands and keywords, see Cisco IOS IP Command Reference, Volume 2 of 3:
Routing Protocols.
Related Topics
Information About Route Maps, on page 901
How to Configure a Route Map
How to Control Route Distribution, on page 905
• VRF and PBR are mutually exclusive on a switch interface. You cannot enable VRF when PBR is enabled
on an interface. The reverse is also true, you cannot enable PBR when VRF is enabled on an interface.
• The number of hardware entries used by PBR depends on the route map itself, the ACLs used, and the
order of the ACLs and route-map entries.
• PBR based on TOS, DSCP and IP Precedence are not supported.
• Set interface, set default next-hop and set default interface are not supported.
• Policy-maps with no set actions are supported. Matching packets are routed normally.
• Policy-maps with no match clauses are supported. Set actions are applied to all packets.
By default, PBR is disabled on the switch. To enable PBR, you must create a route map that specifies the
match criteria and the resulting action. Then, you must enable PBR for that route map on an interface. All
packets arriving on the specified interface matching the match clauses are subject to PBR.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
908
Routing
How to Configure PBR
Packets that are generated by the switch, or local packets, are not normally policy-routed. When you globally
enable local PBR on the switch, all packets that originate on the switch are subject to local PBR. Local PBR
is disabled by default.
Procedure
Step 2 route-map map-tag [permit] [sequence number] Defines route maps that are used to control where packets
are output, and enters route-map configuration mode.
Example:
• map-tag — A meaningful name for the route map.
SwitchDevice(config)# route-map pbr-map permit The ip policy route-map interface configuration
command uses this name to reference the route map.
Multiple route-map statements with the same map
tag define a single route map.
• (Optional) permit — If permit is specified and
the match criteria are met for this route map, the route
is policy routed as defined by the set actions.
• (Optional) sequence number — The sequence
number shows the position of the route-map statement
in the given route map.
Step 3 match ip address {access-list-number | access-list-name} Matches the source and destination IP addresses that are
[access-list-number |...access-list-name] permitted by one or more standard or extended access lists.
ACLs can match on more than one source and destination
Example:
IP address.
SwitchDevice(config-route-map)# match ip address
110 140 If you do not specify a match command, the route map is
applicable to all packets.
Step 4 match length min max Matches the length of the packet.
Example:
SwitchDevice(config-route-map)# match length 64
1500
Step 5 set ip next-hop ip-address [...ip-address] Specifies the action to be taken on the packets that match
the criteria. Sets next hop to which to route the packet (the
Example:
next hop must be adjacent).
SwitchDevice(config-route-map)# set ip next-hop
10.1.6.2
Step 6 set ip next-hop verify-availability [next-hop-address Configures the route map to verify the reachability of the
sequence track object] tracked object.
Example: See Configuring IP SLAs Object Tracking for configuring
SwitchDevice(config-route-map)# set ip next-hop a track object.
verify-availability 95.1.1.2.1 track 100
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
909
Routing
How to Configure PBR
Step 8 interface interface-id Enters interface configuration mode, and specifies the
interface to be configured.
Example:
SwitchDevice(config)# interface gigabitethernet
1/0/1
Step 9 ip policy route-map map-tag Enables PBR on a Layer 3 interface, and identify the route
map to use. You can configure only one route map on an
Example:
interface. However, you can have multiple route map
SwitchDevice(config-if)# ip policy route-map entries with different sequence numbers. These entries are
pbr-map
evaluated in the order of sequence number until the first
match. If there is no match, packets are routed as usual.
Step 10 ip route-cache policy (Optional) Enables fast-switching PBR. You must enable
PBR before enabling fast-switching PBR.
Example:
SwitchDevice(config-if)# ip route-cache policy
Step 12 ip local policy route-map map-tag (Optional) Enables local PBR to perform policy-based
routing on packets originating at the switch. This applies
Example:
to packets generated by the switch, and not to incoming
SwitchDevice(config)# ip local policy route-map packets.
local-pbr
Step 14 show route-map [map-name] (Optional) Displays all the route maps configured or only
the one specified to verify configuration.
Example:
SwitchDevice# show route-map
Step 15 show ip policy (Optional) Displays policy route maps attached to the
interface.
Example:
SwitchDevice# show ip policy
Step 16 show ip local policy (Optional) Displays whether or not local policy routing is
enabled and, if so, the route map being used.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
910
Routing
Filtering Routing Information
Note When routes are redistributed between OSPF processes, no OSPF metrics are preserved.
Procedure
Step 3 passive-interface interface-id Suppresses sending routing updates through the specified
Layer 3 interface.
Example:
SwitchDevice(config-router)# passive-interface
gigabitethernet 1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
911
Routing
Controlling Advertising and Processing in Routing Updates
SwitchDevice(config-router)# passive-interface
default
Step 5 no passive-interface interface type (Optional) Activates only those interfaces that need to have
adjacencies sent.
Example:
SwitchDevice(config-router)# no passive-interface
gigabitethernet1/0/3 gigabitethernet 1/0/5
Step 6 network network-address (Optional) Specifies the list of networks for the routing
process. The network-address is an IP address.
Example:
SwitchDevice(config-router)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
912
Routing
Filtering Sources of Routing Information
SwitchDevice(config-router)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
913
Routing
Managing Authentication Keys
Step 3 distance weight {ip-address {ip-address mask}} [ip access Defines an administrative distance.
list]
weight—The administrative distance as an integer from 10
Example: to 255. Used alone, weight specifies a default administrative
distance that is used when no other specification exists for
SwitchDevice(config-router)# distance 50 10.1.5.1 a routing information source. Routes with a distance of 255
are not installed in the routing table.
(Optional) ip access list—An IP standard or extended access
list to be applied to incoming routing updates.
SwitchDevice(config-router)# end
Step 5 show ip protocols Displays the default administrative distance for a specified
routing process.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Prerequisites
Before you manage authentication keys, you must enable authentication. See the appropriate protocol section
to see how to enable authentication for that protocol. To manage authentication keys, define a key chain,
identify the keys that belong to the key chain, and specify how long each key is valid. Each key has its own
key identifier (specified with the key number key chain configuration command), which is stored locally. The
combination of the key identifier and the interface associated with the message uniquely identifies the
authentication algorithm and Message Digest 5 (MD5) authentication key in use.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
914
Routing
How to Configure Authentication Keys
Procedure
Step 2 key chain name-of-chain Identifies a key chain, and enter key chain configuration
mode.
Example:
Step 3 key number Identifies the key number. The range is 0 to 2147483647.
Example:
Step 4 key-string text Identifies the key string. The string can contain from 1 to
80 uppercase and lowercase alphanumeric characters, but
Example:
the first character cannot be a number.
SwitchDevice(config-keychain)# Room 20, 10th floor
Step 5 accept-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key
seconds} can be received.
Example: The start-time and end-time syntax can be either hh:mm:ss
Month date year or hh:mm:ss date Month year. The default
SwitchDevice(config-keychain)# accept-lifetime is forever with the default start-time and the earliest
12:30:00 Jan 25 1009 infinite acceptable date as January 1, 1993. The default end-time
and duration is infinite.
Step 6 send-lifetime start-time {infinite | end-time | duration (Optional) Specifies the time period during which the key
seconds} can be sent.
Example: The start-time and end-time syntax can be either hh:mm:ss
Month date year or hh:mm:ss date Month year. The default
SwitchDevice(config-keychain)# accept-lifetime is forever with the default start-time and the earliest
23:30:00 Jan 25 1019 infinite acceptable date as January 1, 1993. The default end-time
and duration is infinite.
SwitchDevice(config-keychain)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
915
Routing
Monitoring and Maintaining the IP Network
show ip route [address [mask] [longer-prefixes]] Displays the current state of the routing table.
show ip route summary Displays the current state of the routing table in
summary form.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
916
CHAPTER 37
Configuring Fallback Bridging
• Finding Feature Information, on page 917
• Restrictions for Fallback Bridging, on page 917
• Information about Fallback Bridging, on page 918
• How to Configure Fallback Bridging, on page 919
• Default Fallback Bridging Configuration, on page 930
Related Topics
Changing the VLAN Bridge Spanning Tree Priority, on page 921
Changing the Interface Priority, on page 922
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
917
Routing
Information about Fallback Bridging
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
918
Routing
Example: Fallback Bridging Network
Note The protected port feature is not compatible with fallback bridging. When fallback bridging is enabled, it is
possible for packets to be forwarded from one protected port on to another protected port on the same switch
if the ports are in different VLANs.
SUMMARY STEPS
1. enable
2. configure terminal
3. bridge bridge-groupprioritynumber
4. interfaceinterface -id
5. bridge-group bridge-group
6. show running-config
7. copy running-config startup-config
8. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
919
Routing
Creating a Bridge Group
DETAILED STEPS
SwitchDevice> enable
Step 3 bridge bridge-groupprioritynumber Assign a bridge group number, and specify the
VLAN-bridge spanning-tree protocol to run in the bridge
Example:
group. The ibm and dec keywords are not supported.
SwitchDevice(config)# bridge 10 protocol
vlan-bridge For bridge-group, specify the bridge group number. The
range is 1 to 255. You can create up to 32 bridge groups.
Frames are bridged only among interfaces in the same
group.
Step 4 interfaceinterface -id Specify the interface on which you want to assign the bridge
group, and enter interface configuration mode. The specified
Example:
interface must be one of these:
SwitchDevice(config)# interface
gigabitethernet3/0/1 • A routed port: a physical port that you have configured
as a Layer 3 port by entering the no switchport
interface configuration command.
• An SVI: a VLAN interface that you created by using
the interface vlanvlan-id global configuration
command.
Step 5 bridge-group bridge-group Assign a bridge group number, and specify the
VLAN-bridge spanning-tree protocol to run in the bridge
Example:
group. The ibm and dec keywords are not supported.
SwitchDevice(config)# bridge-group 10
For bridge-group, specify the bridge group number. The
range is 1 to 255. You can create up to 32 bridge groups.
Frames are bridged only among interfaces in the same
group.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
920
Routing
Adjusting Spanning Tree Parameters
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note Only network administrators with a good understanding of how switchesand STP function should make
adjustments to spanning-tree parameters. Poorly planned adjustments can have a negative impact on
performance. A good source on switching is the IEEE 802.1D specification.
SUMMARY STEPS
1. enable
2. configure terminal
3. bridge bridge-groupprioritynumber
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
921
Routing
Changing the Interface Priority
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Fallback Bridging, on page 917
Default Fallback Bridging Configuration, on page 930
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. bridge-group bridge-groupprioritynumber
5. end
6. show running-config
7. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
922
Routing
Changing the Interface Priority
DETAILED STEPS
SwitchDevice> enable
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Fallback Bridging, on page 917
Default Fallback Bridging Configuration, on page 930
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
923
Routing
Assigning Path Cost
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. bridge-group bridge-grouppath costcost
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
924
Routing
Adjusting BPDU Intervals
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Fallback Bridging, on page 917
Default Fallback Bridging Configuration, on page 930
SUMMARY STEPS
1. enable
2. configure terminal
3. bridge bridge-grouphello-timeseconds
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
925
Routing
Changing the Forward-Delay Interval
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Fallback Bridging, on page 917
Default Fallback Bridging Configuration, on page 930
SUMMARY STEPS
1. enable
2. configure terminal
3. bridge bridge-groupforward-timeseconds
4. end
5. show running-config
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
926
Routing
Changing the Maximum-Idle Interval
DETAILED STEPS
SwitchDevice> enable
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Fallback Bridging, on page 917
Default Fallback Bridging Configuration, on page 930
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
927
Routing
Changing the Maximum-Idle Interval
2. configure terminal
3. bridge bridge-groupmax-ageseconds
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 bridge bridge-groupmax-ageseconds Specifies the interval that the switch waits to hear BPDUs
from the root switch.
Example:
SwitchDevice(config)# bridge 10 max-age 30 • For bridge-group, specify the bridge group number.
The range is 1 to 255.
• For seconds, enter a number from 6 to 200. The default
is 30.
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Fallback Bridging, on page 917
Default Fallback Bridging Configuration, on page 930
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
928
Routing
Disabling the Spanning Tree on an Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. bridge-group bridge-grouppriorityspanning-disabled
5. show running-config
6. copy running-config startup-config
7. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
929
Routing
Monitoring and Maintaining Fallback Bridging
Command Purpose
clear bridge bridge-group Removes any learned entries from the forwarding
database.
show bridge[bridge-group] group Displays details about the bridge group.
show bridge [bridge-group] interface-id\mac Displays MAC addresses learned in the bridge group.
-address\verbose
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
930
Routing
Default Fallback Bridging Configuration
Related Topics
Changing the VLAN Bridge Spanning Tree Priority, on page 921
Changing the Interface Priority, on page 922
Assigning Path Cost, on page 924
Adjusting the Intervals Between Hello BPDUs, on page 925
Changing the Forward-Delay Interval, on page 926
Changing the Maximum-Idle Interval, on page 927
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
931
Routing
Default Fallback Bridging Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
932
PA R T VIII
Multicast Routing
• IP Multicast Routing Technology Overview, on page 935
• Configuring IGMP, on page 943
• Configuring CGMP, on page 963
• Configuring PIM, on page 969
• Configuring HSRP Aware PIM, on page 1021
• Configuring VRRP Aware PIM, on page 1027
• Configuring Basic IP Multicast Routing, on page 1031
• Configuring SSM, on page 1043
• Configuring IGMP Snooping and Multicast VLAN Registration, on page 1065
• Configuring MSDP, on page 1111
CHAPTER 38
IP Multicast Routing Technology Overview
• Finding Feature Information, on page 935
• Information About IP Multicast Technology, on page 935
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
935
Multicast Routing
Multicast Group Transmission Scheme
• IGMP is used between hosts on a LAN and the routers on that LAN to track the multicast groups of
which hosts are members.
• Protocol Independent Multicast (PIM) is used between routers so that they can track which multicast
packets to forward to each other and to their directly connected LANs.
This figure shows where these protocols operate within the IP multicast environment.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
936
Multicast Routing
Multicast Group Transmission Scheme
In the next figure, the receivers (the designated multicast group) are interested in receiving the video data
stream from the source. The receivers indicate their interest by sending an IGMP host report to the routers in
the network. The routers are then responsible for delivering the data from the source to the receivers. The
routers use Protocol Independent Multicast (PIM) to dynamically create a multicast distribution tree. The
video data stream will then be delivered only to the network segments that are in the path between the source
and the receivers.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
937
Multicast Routing
IP Multicast Boundary
IP Multicast Boundary
As shown in the figure, address scoping defines domain boundaries so that domains with RPs that have the
same IP address do not leak into each other. Scoping is performed on the subnet boundaries within large
domains and on the boundaries between the domain and the Internet.
Figure 85: Address Scoping at Boundaries
You can set up an administratively scoped boundary on an interface for multicast group addresses using the
ip multicast boundary command with the access-list argument. A standard access list defines the range of
addresses affected. When a boundary is set up, no multicast data packets are allowed to flow across the
boundary from either direction. The boundary allows the same multicast group address to be reused in different
administrative domains.
The Internet Assigned Numbers Authority (IANA) has designated the multicast address range 239.0.0.0 to
239.255.255.255 as the administratively scoped addresses. This range of addresses can be reused in domains
administered by different organizations. They would be considered local, not globally unique.
You can configure the filter-autorp keyword to examine and filter Auto-RP discovery and announcement
messages at the administratively scoped boundary. Any Auto-RP group range announcements from the
Auto-RP packets that are denied by the boundary access control list (ACL) are removed. An Auto-RP group
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
938
Multicast Routing
IP Multicast Group Addressing
range announcement is permitted and passed by the boundary only if all addresses in the Auto-RP group range
are permitted by the boundary ACL. If any address is not permitted, the entire group range is filtered and
removed from the Auto-RP message before the Auto-RP message is forwarded. In order to block all multicast
traffic coming in on interface but allow multicast traffic coming out of the interface, use the{ ip | ipv6 }
multicast boundary block sources command.
IP Class D Addresses
IP multicast addresses have been assigned to the IPv4 Class D address space by IANA. The high-order four
bits of a Class D address are 1110. Therefore, host group addresses can be in the range 224.0.0.0 to
239.255.255.255. A multicast address is chosen at the source (sender) for the receivers in a multicast group.
Note The Class D address range is used only for the group address or destination address of IP multicast traffic.
The source address for multicast datagrams is always the unicast source address.
Reserved Link-Local Addresses 224.0.0.0 to 224.0.0.255 Reserved for use by network protocols on a local network segment.
Globally Scoped Addresses 224.0.1.0 to 238.255.255.255 Reserved to send multicast data between organizations and across
the Internet.
Source Specific Multicast 232.0.0.0 to 232.255.255.255 Reserved for use with the SSM datagram delivery model where
data is forwarded only to receivers that have explicitly joined the
group.
GLOP Addresses 233.0.0.0 to 233.255.255.255 Reserved for statically defined addresses by organizations that
already have an assigned autonomous system (AS) domain number.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
939
Multicast Routing
IP Multicast Address Scoping
Limited Scope Address 239.0.0.0 to 239.255.255.255 Reserved as administratively or limited scope addresses for use in
private multicast domains.
GLOP Addresses
GLOP addressing (as proposed by RFC 2770, GLOP Addressing in 233/8) proposes that the 233.0.0.0/8 range
be reserved for statically defined addresses by organizations that already have an AS number reserved. This
practice is called GLOP addressing. The AS number of the domain is embedded into the second and third
octets of the 233.0.0.0/8 address range. For example, AS 62010 is written in hexadecimal format as F23A.
Separating the two octets F2 and 3A results in 242 and 58 in decimal format. These values result in a subnet
of 233.242.58.0/24 that would be globally reserved for AS 62010 to use.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
940
Multicast Routing
Layer 2 Multicast Addresses
Within an AS or domain, the limited scope address range can be further subdivided so that local multicast
boundaries can be defined.
Note Network administrators may use multicast addresses in this range, inside a domain, without conflicting with
others elsewhere in the Internet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
941
Multicast Routing
Source Specific Multicast
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
942
CHAPTER 39
Configuring IGMP
• Finding Feature Information, on page 943
• Prerequisites for IGMP, on page 943
• Restrictions for Configuring IGMP, on page 944
• Information About IGMP, on page 944
• How to Configure IGMP, on page 950
• Monitoring IGMP, on page 960
• Configuration Examples for IGMP, on page 961
Related Topics
Configuring the Switch as a Member of a Group , on page 950
IGMP Join Process, on page 948
IGMP Leave Process, on page 948
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
943
Multicast Routing
Restrictions for Configuring IGMP
Note For IGMP Version 3, only IGMP Version 3 BISS (Basic IGMPv3 Snooping
Support) is supported.
• IGMP Version 3 uses new membership report messages that might not be correctly recognized by older
IGMP snooping switches.
• IGMPv3 can operate with both ISM and SSM. In ISM, both exclude and include mode reports are
applicable. In SSM, only include mode reports are accepted by the last-hop router. Exclude mode reports
are ignored.
Related Topics
IGMP Version 3, on page 945
Hosts identify group memberships by sending IGMP messages to their local multicast device. Under IGMP,
devices listen to IGMP messages and periodically send out queries to discover which groups are active or
inactive on a particular subnet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
944
Multicast Routing
IGMP Versions
• IGMP group-specific queries are destined to the group IP address for which the device is querying.
• IGMP group membership reports are destined to the group IP address for which the device is reporting.
• IGMPv2 leave-group messages are destined to the address 224.0.0.2 (all devices on a subnet).
• IGMPv3 membership reports are destined to the address 224.0.0.22; all IGMPv3-capable multicast
devices must listen to this address.
IGMP Versions
The switch supports IGMP version 1, IGMP version 2, and IGMP version 3. These versions are interoperable
on the switch. For example, if IGMP snooping is enabled and the querier's version is IGMPv2, and the switch
receives an IGMPv3 report from a host, then the switch can forward the IGMPv3 report to the multicast router.
An IGMPv3 switch can receive messages from and forward messages to a device running the Source Specific
Multicast (SSM) feature.
Related Topics
Changing the IGMP Version, on page 953
Restrictions for IGMP Snooping, on page 1066
IGMP Version 1
IGMP version 1 (IGMPv1) primarily uses a query-response model that enables the multicast router and
multilayer switch to find which multicast groups are active (have one or more hosts interested in a multicast
group) on the local subnet. IGMPv1 has other processes that enable a host to join and leave a multicast group.
For more information, see RFC 1112.
IGMP Version 2
IGMPv2 extends IGMP functionality by providing such features as the IGMP leave process to reduce leave
latency, group-specific queries, and an explicit maximum query response time. IGMPv2 also adds the capability
for routers to elect the IGMP querier without depending on the multicast protocol to perform this task. For
more information, see RFC 2236.
IGMP Version 3
The switch supports IGMP version 3.
An IGMPv3 switch supports Basic IGMPv3 Snooping Support (BISS), which includes support for the snooping
features on IGMPv1 and IGMPv2 switches and for IGMPv3 membership report messages. BISS constrains
the flooding of multicast traffic when your network includes IGMPv3 hosts. It constrains traffic to approximately
the same set of ports as the IGMP snooping feature on IGMPv2 or IGMPv1 hosts.
An IGMPv3 switch can receive messages from and forward messages to a device running the Source Specific
Multicast (SSM) feature.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
945
Multicast Routing
IGMPv3 Host Signalling
Related Topics
Restrictions for Configuring IGMP, on page 944
IGMPv1 Provides the basic query-response mechanism that allows the multicast
device to determine which multicast groups are active and other
processes that enable hosts to join and leave a multicast group. RFC
1112 defines the IGMPv1 host extensions for IP multicasting.
IGMPv2 Extends IGMP, allowing such capabilities as the IGMP leave process,
group-specific queries, and an explicit maximum response time field.
IGMPv2 also adds the capability for devices to elect the IGMP querier
without dependence on the multicast protocol to perform this task. RFC
2236 defines IGMPv2.
Note By default, enabling a PIM on an interface enables IGMPv2 on that device. IGMPv2 was designed to be as
backward compatible with IGMPv1 as possible. To accomplish this backward compatibility, RFC 2236 defined
special interoperability rules. If your network contains legacy IGMPv1 hosts, you should be familiar with
these operability rules. For more information about IGMPv1 and IGMPv2 interoperability, see RFC 2236,
Internet Group Management Protocol, Version 2 .
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
946
Multicast Routing
IGMP Versions Differences
exists for the same multicast group, only one of these hosts sends an IGMP report message; the other hosts
suppress their report messages.
In IGMPv1, there is no election of an IGMP querier. If more than one device on the segment exists, all the
devices send periodic IGMP queries. IGMPv1 has no special mechanism by which the hosts can leave the
group. If the hosts are no longer interested in receiving multicast packets for a particular group, they simply
do not reply to the IGMP query packets sent from the device. The device continues sending query packets. If
the device does not hear a response in three IGMP queries, the group times out and the device stops sending
multicast packets on the segment for the group. If the host later wants to receive multicast packets after the
timeout period, the host simply sends a new IGMP join to the device, and the device begins to forward the
multicast packet again.
If there are multiple devices on a LAN, a designated router (DR) must be elected to avoid duplicating multicast
traffic for connected hosts. PIM devices follow an election process to select a DR. The PIM device with the
highest IP address becomes the DR.
The DR is responsible for the following tasks:
• Sending PIM register and PIM Join and Prune messages toward the rendezvous point (RP) to inform it
about host group membership.
• Sending IGMP host-query messages.
• Sending host-query messages by default every 60 seconds in order to keep the IGMP overhead on hosts
and networks very low.
IGMPv2 also enhances IGMP by providing support for the following capabilities:
• Querier election process--Provides the capability for IGMPv2 devices to elect the IGMP querier without
having to rely on the multicast routing protocol to perform the process.
• Maximum Response Time field--A new field in query messages permits the IGMP querier to specify the
maximum query-response time. This field permits the tuning of the query-response process to control
response burstiness and to fine-tune leave latencies.
• Group-Specific Query messages--Permits the IGMP querier to perform the query operation on a specific
group instead of all groups.
• Leave-Group messages--Provides hosts with a method of notifying devices on the network that they wish
to leave the group.
Unlike IGMPv1, in which the DR and the IGMP querier are typically the same device, in IGMPv2 the two
functions are decoupled. The DR and the IGMP querier are selected based on different criteria and may be
different devices on the same subnet. The DR is the device with the highest IP address on the subnet, whereas
the IGMP querier is the device with the lowest IP address.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
947
Multicast Routing
IGMP Join and Leave Process
Note If some IGMPv3 hosts on a LAN wish to exclude a source and others wish to include the source, then the
device will send traffic for the source on the LAN (that is, inclusion trumps exclusion in this situation).
Related Topics
Configuring the Switch as a Member of a Group , on page 950
Prerequisites for IGMP, on page 943
Example: Configuring the Switch as a Member of a Multicast Group, on page 961
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
948
Multicast Routing
Default IGMP Configuration
on a subnet is when the devices stop receiving membership reports. To facilitate this process, IGMPv1 devices
associate a countdown timer with an IGMP group on a subnet. When a membership report is received for the
group on the subnet, the timer is reset. For IGMPv1 devices, this timeout interval is typically three times the
query interval (3 minutes). This timeout interval means that the device may continue to forward multicast
traffic onto the subnet for up to 3 minutes after all hosts have left the multicast group.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
949
Multicast Routing
How to Configure IGMP
Caution Performing this procedure might impact the CPU performance because the CPU will receive all data traffic
for the group address.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp join-group group-address
5. end
6. show ip igmp interface [interface-id]
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you want to enable
multicast routing, and enters interface configuration mode.
Example:
SwitchDevice(config)# interface
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
950
Multicast Routing
Controlling Access to IP Multicast Group
Step 4 ip igmp join-group group-address Configures the switch to join a multicast group.
Example: By default, no group memberships are defined.
For group-address, specify the multicast IP address in dotted
SwitchDevice(config-if)# ip igmp
join-group 225.2.2.2 decimal notation.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Join Process, on page 948
IGMP Leave Process, on page 948
Prerequisites for IGMP, on page 943
Example: Configuring the Switch as a Member of a Multicast Group, on page 961
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp access-group access-list-number
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
951
Multicast Routing
Controlling Access to IP Multicast Group
5. exit
6. access-list access-list-number {deny | permit} source [source-wildcard]
7. end
8. show ip igmp interface [interface-id]
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
Step 4 ip igmp access-group access-list-number Specifies the multicast groups that hosts on the subnet
serviced by an interface can join.
Example:
By default, all groups are allowed on an interface.
SwitchDevice(config-if)# ip igmp access-group 10
For access-list-number, specify an IP standard access list
number.
The range is 1 to 199.
Note To disable groups on an interface, use the no ip
igmp access-group interface configuration
command.
SwitchDevice(config-if)# exit
Step 6 access-list access-list-number {deny | permit} source Creates a standard access list.
[source-wildcard]
• For access-list-number, specify the access list created
Example: in Step 3.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
952
Multicast Routing
Changing the IGMP Version
SwitchDevice(config-igmp-profile)# end
Related Topics
Example: Controlling Access to IP Multicast Groups, on page 962
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp version {1 | 2 | 3 }
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
953
Multicast Routing
Changing the IGMP Version
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters the
interface configuration mode.
Example:
Step 4 ip igmp version {1 | 2 | 3 } Specifies the IGMP version that the switch uses.
Example: Note If you change to Version 1, you cannot configure
the ip igmp query-interval or the ip igmp
SwitchDevice(config-if)# ip igmp version 2 query-max-response-time interface
configuration commands.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
954
Multicast Routing
Modifying the IGMP Host-Query Message Interval
Related Topics
IGMP Versions, on page 945
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp query-interval seconds
5. end
6. show ip igmp interface [interface-id]
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
955
Multicast Routing
Changing the IGMP Query Timeout for IGMPv2
SwitchDevice(config)# interface
gigabitethernet 1/0/1
Step 4 ip igmp query-interval seconds Configures the frequency at which the designated router
sends IGMP host-query messages.
Example:
By default, the designated router sends IGMP host-query
SwitchDevice(config-if)# ip igmp messages every 60 seconds to keep the IGMP overhead
query-interval 75 very low on hosts and networks.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp querier-timeout seconds
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
956
Multicast Routing
Changing the IGMP Query Timeout for IGMPv2
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you want to enable
multicast routing, and enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet 1/0/1
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
957
Multicast Routing
Changing the Maximum Query Response Time for IGMPv2
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp query-max-response-time seconds
5. end
6. show ip igmp interface [interface-id]
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you want to enable
multicast routing, and enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet 1/0/1
Step 4 ip igmp query-max-response-time seconds Changes the maximum query response time advertised in
IGMP queries.
Example:
The default is 10 seconds. The range is 1 to 25.
SwitchDevice(config-if)# ip igmp
query-max-response-time 15
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
958
Multicast Routing
Configuring the Switch as a Statically Connected Member
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp static-group group-address
5. end
6. show ip igmp interface [interface-id]
7. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
959
Multicast Routing
Monitoring IGMP
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you want to enable
multicast routing, and enters interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet 1/0/1
Step 4 ip igmp static-group group-address Configures the switch as a statically connected member of
a group.
Example:
By default, this feature is disabled.
SwitchDevice(config-if)# ip igmp static-group
239.100.100.101
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Monitoring IGMP
You can display specific statistics, such as the contents of IP routing tables, caches, and databases.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
960
Multicast Routing
Configuration Examples for IGMP
You can display information to learn resource usage and solve network problems. You can also display
information about node reachability and discover the routing path that packets of your device are taking
through the network.
You can use any of the privileged EXEC commands in the following table to display various routing statistics.
Command Purpose
show ip igmp groups [type-number | detail ] Displays the multicast groups that are directly
connected to the switch and that were learned through
IGMP.
show ip igmp ssm-mapping [ hostname/IP address Displays IGMP SSM mapping information.
]
Related Topics
Configuring the Switch as a Member of a Group , on page 950
IGMP Join Process, on page 948
IGMP Leave Process, on page 948
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
961
Multicast Routing
Example: Controlling Access to IP Multicast Groups
Related Topics
Controlling Access to IP Multicast Group, on page 951
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
962
CHAPTER 40
Configuring CGMP
• Finding Feature Information, on page 963
• Prerequisites for Configuring CGMP, on page 963
• Restrictions for CGMP, on page 963
• Information About CGMP, on page 964
• Enabling CGMP Server Support, on page 964
• Monitoring CGMP, on page 966
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
963
Multicast Routing
Information About CGMP
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip cgmp [proxy | router-only]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
964
Multicast Routing
Enabling CGMP Server Support
SwitchDevice(config)# interface
gigabitethernet 1/0/1
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
965
Multicast Routing
Monitoring CGMP
What to do next
Verify the Layer 2 Catalyst switch CGMP-client configuration. For more information, see the documentation
that shipped with the product
Monitoring CGMP
You can display specific statistics, such as the contents of IP routing tables, caches, and databases.
You can display information to learn resource usage and solve network problems. You can also display
information about node reachability and discover the routing path that packets of your device are taking
through the network.
You can use any of the privileged EXEC commands in the following table to display various routing statistics.
Command Purpose
show ip igmp groups [group-name | group-address Displays the multicast groups that are directly
| type number] connected to the switch and that were learned through
IGMP.
show ip mcache [group [source]] Displays the contents of the IP fast-switching cache.
show ip mpacket [source-address | name] Displays the contents of the circular cache-header
[group-address | name] [detail] buffer.
show ip mroute [group-name | group-address] Displays the contents of the IP multicast routing table.
[source] [summary] [count] [active kbps]
show ip pim interface [type number] [count] [detail] Displays information about interfaces configured for
PIM. This command is available in all software
images.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
966
Multicast Routing
Monitoring CGMP
Command Purpose
show ip pim neighbor [type number] Lists the PIM neighbors discovered by the switch.
This command is available in all software images.
show ip pim rp [group-name | group-address] Displays the RP routers associated with a sparse-mode
multicast group. This command is available in all
software images.
show ip rpf {source-address | name} Displays how the switch is doing Reverse-Path
Forwarding (that is, from the unicast routing table,
DVMRP routing table, or static mroutes).
show ip sap [group | session-name | detail] Displays the Session Announcement Protocol (SAP)
Version 2 cache.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
967
Multicast Routing
Monitoring CGMP
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
968
CHAPTER 41
Configuring PIM
• Prerequisites for PIM, on page 969
• Restrictions for PIM, on page 970
• Information About PIM, on page 972
• How to Configure PIM, on page 984
• Monitoring and Troubleshooting PIM, on page 1016
• Configuration Examples for PIM, on page 1017
• Before you configure PIM stub routing, check that you have met these conditions:
• You must have IP multicast routing configured on both the stub router and the central router. You
must also have PIM mode (dense-mode, sparse-mode, or sparse-dense-mode) configured on the
uplink interface of the stub router.
• You must also configure Enhanced Interior Gateway Routing Protocol (EIGRP) stub routing on the
switch.
• The PIM stub router does not route the transit traffic between the distribution routers. Unicast
(EIGRP) stub routing enforces this behavior. You must configure unicast stub routing to assist the
PIM stub router behavior.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
969
Multicast Routing
Restrictions for PIM
Note We recommend that you use PIMv2. The BSR function interoperates with Auto-RP on Cisco routers and
multilayer switches.
When PIMv2 devices interoperate with PIMv1 devices, Auto-RP should have already been deployed. A PIMv2
BSR that is also an Auto-RP mapping agent automatically advertises the RP elected by Auto-RP. That is,
Auto-RP sets its single RP on every router or multilayer switch in the group. Not all routers and switches in
the domain use the PIMv2 hash function to select multiple RPs.
Dense-mode groups in a mixed PIMv1 and PIMv2 region need no special configuration; they automatically
interoperate.
Sparse-mode groups in a mixed PIMv1 and PIMv2 region are possible because the Auto-RP feature in PIMv1
interoperates with the PIMv2 RP feature. Although all PIMv2 devices can also use PIMv1, we recommend
that the RPs be upgraded to PIMv2. To ease the transition to PIMv2, we recommend:
• Using Auto-RP throughout the region.
• Configuring sparse-dense mode throughout the region.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
970
Multicast Routing
Restrictions for Configuring Auto-RP and BSR
• The redundant PIM stub router topology is not supported. Only the nonredundant access router topology
is supported by the PIM stub feature.
Note There are two approaches to using PIMv2. You can use Version 2 exclusively in
your network or migrate to Version 2 by employing a mixed PIM version
environment.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
971
Multicast Routing
Information About PIM
• Because bootstrap messages are sent hop-by-hop, a PIMv1 device prevents these messages from reaching
all routers and multilayer switches in your network. Therefore, if your network has a PIMv1 device in
it and only Cisco routers and multilayer switches, it is best to use Auto-RP.
• If you have a network that includes non-Cisco routers, configure the Auto-RP mapping agent and the
BSR on a Cisco PIMv2 router or multilayer switch. Ensure that no PIMv1 device is on the path between
the BSR and a non-Cisco PIMv2 router.
• If you have non-Cisco PIMv2 routers that need to interoperate with Cisco PIMv1 routers and multilayer
switches, both Auto-RP and a BSR are required. We recommend that a Cisco PIMv2 device be both the
Auto-RP mapping agent and the BSR.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
972
Multicast Routing
PIM Sparse Mode
Note Dense mode is not often used and its use is not recommended. For this reason it is not specified in the
configuration tasks in related modules.
Sparse-Dense Mode
If you configure either sparse mode or dense mode on an interface, then sparseness or denseness is applied
to the interface as a whole. However, some environments might require PIM to run in a single region in sparse
mode for some groups and in dense mode for other groups.
An alternative to enabling only dense mode or only sparse mode is to enable sparse-dense mode. In this case,
the interface is treated as dense mode if the group is in dense mode; the interface is treated in sparse mode if
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
973
Multicast Routing
PIM Versions
the group is in sparse mode. You must have an RP if the interface is in sparse-dense mode and you want to
treat the group as a sparse group.
If you configure sparse-dense mode, the idea of sparseness or denseness is applied to the groups for which
the router is a member.
Another benefit of sparse-dense mode is that Auto-RP information can be distributed in a dense mode; yet,
multicast groups for user groups can be used in a sparse mode manner. Therefore there is no need to configure
a default RP at the leaf routers.
When an interface is treated in dense mode, it is populated in the outgoing interface list of a multicast routing
table when either of the following conditions is true:
• Members or DVMRP neighbors are on the interface.
• There are PIM neighbors and the group has not been pruned.
When an interface is treated in sparse mode, it is populated in the outgoing interface list of a multicast routing
table when either of the following conditions is true:
• Members or DVMRP neighbors are on the interface.
• An explicit Join message has been received by a PIM neighbor on the interface.
PIM Versions
PIMv2 includes these improvements over PIMv1:
• A single, active rendezvous point (RP) exists per multicast group, with multiple backup RPs. This single
RP compares to multiple active RPs for the same group in PIMv1.
• A bootstrap router (BSR) provides a fault-tolerant, automated RP discovery and distribution function
that enables routers and multilayer switches to dynamically learn the group-to-RP mappings.
• Sparse mode and dense mode are properties of a group, as opposed to an interface.
• PIM join and prune messages have more flexible encoding for multiple address families.
• A more flexible hello packet format replaces the query packet to encode current and future capability
options.
• Register messages sent to an RP specify whether they are sent by a border router or a designated router.
• PIM packets are no longer inside IGMP packets; they are standalone packets.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
974
Multicast Routing
IGMP Helper
The PIM stub routing feature supports multicast routing between the distribution layer and the access layer.
It supports two types of PIM interfaces, uplink PIM interfaces, and PIM passive interfaces. A routed interface
configured with the PIM passive mode does not pass or forward PIM control traffic, it only passes and forwards
IGMP traffic.
In a network using PIM stub routing, the only allowable route for IP traffic to the user is through a switch
that is configured with PIM stub routing. PIM passive interfaces are connected to Layer 2 access domains,
such as VLANs, or to interfaces that are connected to other Layer 2 devices. Only directly connected multicast
(IGMP) receivers and sources are allowed in the Layer 2 access domains. The PIM passive interfaces do not
send or process any received PIM control packets.
When using PIM stub routing, you should configure the distribution and remote routers to use IP multicast
routing and configure only the switch as a PIM stub router. The switch does not route transit traffic between
distribution routers. You also need to configure a routed uplink port on the switch. The switch uplink port
cannot be used with SVIs. If you need PIM for an SVI uplink port, you should upgrade to the IP Services
feature set.
Note You must also configure EIGRP stub routing when configuring PIM stub routing on the switch
The redundant PIM stub router topology is not supported. The redundant topology exists when there is more
than one PIM router forwarding multicast traffic to a single access domain. PIM messages are blocked, and
the PIM asset and designated router election mechanisms are not supported on the PIM passive interfaces.
Only the nonredundant access router topology is supported by the PIM stub feature. By using a nonredundant
topology, the PIM passive interface assumes that it is the only interface and designated router on that access
domain.
Figure 86: PIM Stub Router Configuration
In the following figure, the Switch A routed uplink port 25 is connected to the router and PIM stub routing
is enabled on the VLAN 100 interfaces and on Host 3. This configuration allows the directly connected hosts
to receive traffic from multicast source 200.1.1.3.
IGMP Helper
PIM stub routing moves routed traffic closer to the end user and reduces network traffic. You can also reduce
traffic by configuring a stub router (switch) with the IGMP helper feature.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
975
Multicast Routing
Rendezvous Points
You can configure a stub router (switch) with the ip igmp helper-address ip-address interface configuration
command to enable the switch to send reports to the next-hop interface. Hosts that are not directly connected
to a downstream router can then join a multicast group sourced from an upstream network. The IGMP packets
from a host wanting to join a multicast stream are forwarded upstream to the next-hop device when this feature
is configured. When the upstream central router receives the helper IGMP reports or leaves, it adds or removes
the interfaces from its outgoing interface list for that group.
Rendezvous Points
A rendezvous point (RP) is a role that a device performs when operating in Protocol Independent Multicast
(PIM) Sparse Mode (SM). An RP is required only in networks running PIM SM. In the PIM-SM model, only
network segments with active receivers that have explicitly requested multicast data will be forwarded the
traffic. This method of delivering multicast data is in contrast to PIM Dense Mode (PIM DM). In PIM DM,
multicast traffic is initially flooded to all segments of the network. Routers that have no downstream neighbors
or directly connected receivers prune back the unwanted traffic.
An RP acts as the meeting place for sources and receivers of multicast data. In a PIM-SM network, sources
must send their traffic to the RP. This traffic is then forwarded to receivers down a shared distribution tree.
By default, when the first hop device of the receiver learns about the source, it will send a Join message directly
to the source, creating a source-based distribution tree from the source to the receiver. This source tree does
not include the RP unless the RP is located within the shortest path between the source and receiver.
In most cases, the placement of the RP in the network is not a complex decision. By default, the RP is needed
only to start new sessions with sources and receivers. Consequently, the RP experiences little overhead from
traffic flow or processing. In PIM version 2, the RP performs less processing than in PIM version 1 because
sources must only periodically register with the RP to create state.
Auto-RP
In the first version of PIM-SM, all leaf routers (routers directly connected to sources or receivers) were required
to be manually configured with the IP address of the RP. This type of configuration is also known as static
RP configuration. Configuring static RPs is relatively easy in a small network, but it can be laborious in a
large, complex network.
Following the introduction of PIM-SM version 1, Cisco implemented a version of PIM-SM with the Auto-RP
feature. Auto-RP automates the distribution of group-to-RP mappings in a PIM network. Auto-RP has the
following benefits:
• Configuring the use of multiple RPs within a network to serve different groups is easy.
• Auto-RP allows load splitting among different RPs and arrangement of RPs according to the location of
group participants.
• Auto-RP avoids inconsistent, manual RP configurations that can cause connectivity problems.
Multiple RPs can be used to serve different group ranges or serve as backups to each other. For Auto-RP to
work, a router must be designated as an RP-mapping agent, which receives the RP-announcement messages
from the RPs and arbitrates conflicts. The RP-mapping agent then sends the consistent group-to-RP mappings
to all other routers. Thus, all routers automatically discover which RP to use for the groups they support.
Note If you configure PIM in sparse mode or sparse-dense mode and do not configure Auto-RP, you must statically
configure an RP.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
976
Multicast Routing
Sparse-Dense Mode for Auto-RP
Note If router interfaces are configured in sparse mode, Auto-RP can still be used if all routers are configured with
a static RP address for the Auto-RP groups.
To make Auto-RP work, a router must be designated as an RP mapping agent, which receives the RP
announcement messages from the RPs and arbitrates conflicts. The RP mapping agent then sends the consistent
group-to-RP mappings to all other routers by dense mode flooding. Thus, all routers automatically discover
which RP to use for the groups they support. The Internet Assigned Numbers Authority (IANA) has assigned
two group addresses, 224.0.1.39 and 224.0.1.40, for Auto-RP. One advantage of Auto-RP is that any change
to the RP designation must be configured only on the routers that are RPs and not on the leaf routers. Another
advantage of Auto-RP is that it offers the ability to scope the RP address within a domain. Scoping can be
achieved by defining the time-to-live (TTL) value allowed for the Auto-RP advertisements.
Each method for configuring an RP has its own strengths, weaknesses, and level of complexity. In conventional
IP multicast network scenarios, we recommend using Auto-RP to configure RPs because it is easy to configure,
well-tested, and stable. The alternative ways to configure an RP are static RP, Auto-RP, and bootstrap router.
Bootstrap Router
Another RP selection model called bootstrap router (BSR) was introduced after Auto-RP in PIM-SM version
2. BSR performs similarly to Auto-RP in that it uses candidate routers for the RP function and for relaying
the RP information for a group. RP information is distributed through BSR messages, which are carried within
PIM messages. PIM messages are link-local multicast messages that travel from PIM router to PIM router.
Because of this single hop method of disseminating RP information, TTL scoping cannot be used with BSR.
A BSR performs similarly as an RP, except that it does not run the risk of reverting to dense mode operation,
and it does not offer the ability to scope within a domain.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
977
Multicast Routing
Multicast Forwarding
single BSR across all bordering domains and comingle candidate RP advertisements, resulting in the election
of RPs in the wrong domain.
Multicast Forwarding
Forwarding of multicast traffic is accomplished by multicast-capable routers. These routers create distribution
trees that control the path that IP multicast traffic takes through the network in order to deliver traffic to all
receivers.
Multicast traffic flows from the source to the multicast group over a distribution tree that connects all of the
sources to all of the receivers in the group. This tree may be shared by all sources (a shared tree) or a separate
distribution tree can be built for each source (a source tree). The shared tree may be one-way or bidirectional.
Before describing the structure of source and shared trees, it is helpful to explain the notations that are used
in multicast routing tables. These notations include the following:
• (S,G) = (unicast source for the multicast group G, multicast group G)
• (*,G) = (any source for the multicast group G, multicast group G)
The notation of (S,G), pronounced “S comma G,” enumerates a shortest path tree where S is the IP address
of the source and G is the multicast group address.
Shared trees are (*,G) and the source trees are (S,G) and always routed at the sources.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
978
Multicast Routing
Multicast Distribution Shared Tree
Using standard notation, the SPT for the example shown in the figure would be (192.168.1.1, 224.1.1.1).
The (S,G) notation implies that a separate SPT exists for each individual source sending to each group--which
is correct.
In this example, multicast traffic from the sources, Hosts A and D, travels to the root (Router D) and then
down the shared tree to the two receivers, Hosts B and C. Because all sources in the multicast group use a
common shared tree, a wildcard notation written as (*, G), pronounced “star comma G,” represents the tree.
In this case, * means all sources, and G represents the multicast group. Therefore, the shared tree shown in
the figure would be written as (*, 224.2.2.2).
Both source trees and shared trees are loop-free. Messages are replicated only where the tree branches. Members
of multicast groups can join or leave at any time; therefore the distribution trees must be dynamically updated.
When all the active receivers on a particular branch stop requesting the traffic for a particular multicast group,
the routers prune that branch from the distribution tree and stop forwarding traffic down that branch. If one
receiver on that branch becomes active and requests the multicast traffic, the router will dynamically modify
the distribution tree and start forwarding traffic again.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
979
Multicast Routing
Shared Tree Advantage
this optimization comes at a cost. The routers must maintain path information for each source. In a network
that has thousands of sources and thousands of groups, this overhead can quickly become a resource issue on
the routers. Memory consumption from the size of the multicast routing table is a factor that network designers
must take into consideration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
980
Multicast Routing
PIM Shared Tree and Source Tree
The following figure shows this type of shared-distribution tree. Data from senders is delivered to the RP for
distribution to group members joined to the shared tree.
If the data rate warrants, leaf routers (routers without any downstream connections) on the shared tree can
use the data distribution tree rooted at the source. This type of distribution tree is called a shortest-path tree
or source tree. By default, the software switches to a source tree upon receiving the first data packet from a
source.
This process describes the move from a shared tree to a source tree:
1. A receiver joins a group; leaf Router C sends a join message toward the RP.
2. The RP puts a link to Router C in its outgoing interface list.
3. A source sends data; Router A encapsulates the data in a register message and sends it to the RP.
4. The RP forwards the data down the shared tree to Router C and sends a join message toward the source.
At this point, data might arrive twice at Router C, once encapsulated and once natively.
5. When data arrives natively (unencapsulated) at the RP, it sends a register-stop message to Router A.
6. By default, reception of the first data packet prompts Router C to send a join message toward the source.
7. When Router C receives data on (S, G), it sends a prune message for the source up the shared tree.
8. The RP deletes the link to Router C from the outgoing interface of (S, G). The RP triggers a prune message
toward the source.
Join and prune messages are sent for sources and RPs. They are sent hop-by-hop and are processed by each
PIM device along the path to the source or RP. Register and register-stop messages are not sent hop-by-hop.
They are sent by the designated router that is directly connected to a source and are received by the RP for
the group.
Multiple sources sending to groups use the shared tree. You can configure the PIM device to stay on the shared
tree.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
981
Multicast Routing
Reverse Path Forwarding
The change from shared to source tree happens when the first data packet arrives at the last-hop router. This
change depends upon the threshold that is configured by using the ip pim spt-threshold global configuration
command.
The shortest-path tree requires more memory than the shared tree but reduces delay. You may want to postpone
its use. Instead of allowing the leaf router to immediately move to the shortest-path tree, you can specify that
the traffic must first reach a threshold.
You can configure when a PIM leaf router should join the shortest-path tree for a specified group. If a source
sends at a rate greater than or equal to the specified kbps rate, the multilayer switch triggers a PIM join message
toward the source to construct a source tree (shortest-path tree). If the traffic rate from the source drops below
the threshold value, the leaf router switches back to the shared tree and sends a prune message toward the
source.
You can specify to which groups the shortest-path tree threshold applies by using a group list (a standard
access list). If a value of 0 is specified or if the group list is not used, the threshold applies to all groups.
RPF Check
When a multicast packet arrives at a router, the router performs an RPF check on the packet. If the RPF check
succeeds, the packet is forwarded. Otherwise, it is dropped.
For traffic flowing down a source tree, the RPF check procedure works as follows:
1. The router looks up the source address in the unicast routing table to determine if the packet has arrived
on the interface that is on the reverse path back to the source.
2. If the packet has arrived on the interface leading back to the source, the RPF check succeeds and the
packet is forwarded out the interfaces present in the outgoing interface list of a multicast routing table
entry.
3. If the RPF check in Step 2 fails, the packet is dropped.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
982
Multicast Routing
Default PIM Routing Configuration
As the figure illustrates, a multicast packet from source 151.10.3.21 is received on serial interface 0 (S0). A
check of the unicast route table shows that S1 is the interface this router would use to forward unicast data to
151.10.3.21. Because the packet has arrived on interface S0, the packet is discarded.
The figure shows an example of a successful RPF check.
Figure 90: RPF Check Succeeds
In this example, the multicast packet has arrived on interface S1. The router refers to the unicast routing table
and finds that S1 is the correct interface. The RPF check passes, and the packet is forwarded.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
983
Multicast Routing
How to Configure PIM
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip pim passive
5. end
6. show ip pim interface
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface on which you want to enable PIM
stub routing, and enters interface configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
984
Multicast Routing
Configuring a Rendezvous Point
SwitchDevice(config)# interface
gigabitethernet 1/0/1
Step 4 ip pim passive Configures the PIM stub feature on the interface.
Example:
SwitchDevice(config)# end
Step 6 show ip pim interface (Optional) Displays the PIM stub that is enabled on each
interface.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
985
Multicast Routing
Manually Assigning an RP to Multicast Groups
• By using a standards track protocol in the Internet Engineering Task Force (IETF), which includes
configuring PIMv2 BSR .
Note You can use Auto-RP, BSR, or a combination of both, depending on the PIM version that you are running
and the types of routers in your network. For information about working with different PIM versions in your
network, see PIMv1 and PIMv2 Interoperability, on page 970.
Note RPs are not members of the multicast group; they serve as a meeting place for multicast sources and group
members.
You can configure a single RP for multiple groups defined by an access list. If there is no RP configured for
a group, the multilayer switch responds to the group as dense and uses the dense-mode PIM techniques.
This procedure is optional.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip pim rp-address ip-address [access-list-number] [override]
4. access-list access-list-number {deny | permit} source [source-wildcard]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
986
Multicast Routing
Manually Assigning an RP to Multicast Groups
Step 3 ip pim rp-address ip-address [access-list-number] Configures the address of a PIM RP.
[override]
By default, no PIM RP address is configured. You must
Example: configure the IP address of RPs on all routers and multilayer
switches (including the RP).
SwitchDevice(config)# ip pim rp-address
10.1.1.1 20 override
Note If there is no RP configured for a group, the
switch treats the group as dense, using the
dense-mode PIM techniques.
A PIM device can be an RP for more than one group. Only
one RP address can be used at a time within a PIM domain.
The access list conditions specify for which groups the
device is an RP.
• For ip-address, enter the unicast address of the RP in
dotted-decimal notation.
• (Optional) For access-list-number, enter an IP standard
access list number from 1 to 99. If no access list is
configured, the RP is used for all groups.
• (Optional) The override keyword indicates that if there
is a conflict between the RP configured with this
command and one learned by Auto-RP or BSR, the
RP configured with this command prevails.
Step 4 access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, enter the access list number
specified in Step 2.
SwitchDevice(config)# access-list 25
permit 10.5.0.1 255.224.0.0 • The deny keyword denies access if the conditions are
matched.
• The permit keyword permits access if the conditions
are matched.
• For source, enter the multicast group address for which
the RP should be used.
• (Optional) For source-wildcard, enter the wildcard
bits in dotted decimal notation to be applied to the
source. Place ones in the bit positions that you want
to ignore.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
987
Multicast Routing
Setting Up Auto-RP in a New Internetwork
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note Omit Step 3 in the following procedure, if you want to configure a PIM router as the RP for the local group.
SUMMARY STEPS
1. enable
2. show running-config
3. configure terminal
4. ip pim send-rp-announce interface-id scope ttl group-list access-list-number interval seconds
5. access-list access-list-number {deny | permit} source [source-wildcard]
6. ip pim send-rp-discovery scope ttl
7. end
8. show running-config
9. show ip pim rp mapping
10. show ip pim rp
11. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
988
Multicast Routing
Setting Up Auto-RP in a New Internetwork
SwitchDevice> enable
Step 2 show running-config Verifies that a default RP is already configured on all PIM
devices and the RP in the sparse-mode network. It was
Example:
previously configured with the ip pim rp-address global
configuration command.
SwitchDevice# show running-config
Note This step is not required for spare-dense-mode
environments.
Step 4 ip pim send-rp-announce interface-id scope ttl group-list Configures another PIM device to be the candidate RP for
access-list-number interval seconds local groups.
Example: • For interface-id, enter the interface type and number
that identifies the RP address. Valid interfaces include
SwitchDevice(config)# ip pim send-rp-announce physical ports, port channels, and VLANs.
gigabitethernet
1/0/5 scope 20 group-list 10 interval 120 • For scope ttl, specify the time-to-live value in hops.
Enter a hop count that is high enough so that the
RP-announce messages reach all mapping agents in
the network. There is no default setting. The range is
1 to 255.
• For group-list access-list-number, enter an IP
standard access list number from 1 to 99. If no access
list is configured, the RP is used for all groups.
• For interval seconds, specify how often the
announcement messages must be sent. The default is
60 seconds. The range is 1 to 16383.
Step 5 access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, enter the access list number
specified in Step 3.
SwitchDevice(config)# access-list 10 permit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
989
Multicast Routing
Setting Up Auto-RP in a New Internetwork
Step 6 ip pim send-rp-discovery scope ttl Finds a switch whose connectivity is not likely to be
interrupted, and assign it the role of RP-mapping agent.
Example:
For scope ttl, specify the time-to-live value in hops to limit
SwitchDevice(config)# ip pim send-rp-discovery the RP discovery packets. All devices within the hop count
scope 50 from the source device receive the Auto-RP discovery
messages. These messages tell other devices which
group-to-RP mapping to use to avoid conflicts (such as
overlapping group-to-RP ranges). There is no default
setting. The range is 1 to 255.
SwitchDevice(config)# end
Step 9 show ip pim rp mapping Displays active RPs that are cached with associated
multicast routing entries.
Example:
SwitchDevice# show ip pim rp mapping
Step 10 show ip pim rp Displays the information cached in the routing table.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
990
Multicast Routing
Adding Auto-RP to an Existing Sparse-Mode Cloud
SUMMARY STEPS
1. enable
2. show running-config
3. configure terminal
4. ip pim send-rp-announce interface-id scope ttl group-list access-list-number interval seconds
5. access-list access-list-number {deny | permit} source [source-wildcard]
6. ip pim send-rp-discovery scope ttl
7. end
8. show running-config
9. show ip pim rp mapping
10. show ip pim rp
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 2 show running-config Verifies that a default RP is already configured on all PIM
devices and the RP in the sparse-mode network. It was
Example:
previously configured with the ip pim rp-address global
configuration command.
SwitchDevice# show running-config
Note This step is not required for spare-dense-mode
environments.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
991
Multicast Routing
Adding Auto-RP to an Existing Sparse-Mode Cloud
Step 4 ip pim send-rp-announce interface-id scope ttl group-list Configures another PIM device to be the candidate RP for
access-list-number interval seconds local groups.
Example: • For interface-id, enter the interface type and number
that identifies the RP address. Valid interfaces include
SwitchDevice(config)# ip pim send-rp-announce physical ports, port channels, and VLANs.
gigabitethernet
1/0/5 scope 20 group-list 10 interval 120 • For scope ttl, specify the time-to-live value in hops.
Enter a hop count that is high enough so that the
RP-announce messages reach all mapping agents in
the network. There is no default setting. The range is
1 to 255.
• For group-list access-list-number, enter an IP
standard access list number from 1 to 99. If no access
list is configured, the RP is used for all groups.
• For interval seconds, specify how often the
announcement messages must be sent. The default is
60 seconds. The range is 1 to 16383.
Step 5 access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, enter the access list number
specified in Step 3.
SwitchDevice(config)# access-list 10
permit 224.0.0.0 15.255.255.255 • The deny keyword denies access if the conditions are
matched.
• The permit keyword permits access if the conditions
are matched.
• For source, enter the multicast group address range
for which the RP should be used.
• (Optional) For source-wildcard, enter the wildcard
bits in dotted decimal notation to be applied to the
source. Place ones in the bit positions that you want
to ignore.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
992
Multicast Routing
Adding Auto-RP to an Existing Sparse-Mode Cloud
Step 6 ip pim send-rp-discovery scope ttl Finds a switch whose connectivity is not likely to be
interrupted, and assigns it the role of RP-mapping agent.
Example:
For scope ttl, specify the time-to-live value in hops to limit
SwitchDevice(config)# ip pim send-rp-discovery the RP discovery packets. All devices within the hop count
scope 50 from the source device receive the Auto-RP discovery
messages. These messages tell other devices which
group-to-RP mapping to use to avoid conflicts (such as
overlapping group-to-RP ranges). There is no default
setting. The range is 1 to 255.
Note To remove the switch as the RP-mapping agent,
use the no ip pim send-rp-discovery global
configuration command.
SwitchDevice(config)# end
Step 9 show ip pim rp mapping Displays active RPs that are cached with associated
multicast routing entries.
Example:
SwitchDevice#
show ip pim rp mapping
Step 10 show ip pim rp Displays the information cached in the routing table.
Example:
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
993
Multicast Routing
Configuring Sparse Mode with a Single Static RP
SUMMARY STEPS
1. enable
2. configure terminal
3. ip multicast-routing [distributed]
4. interface type number
5. ip pim sparse-mode
6. Repeat Steps 1 through 5 on every interface that uses IP multicast.
7. exit
8. ip pim rp-address rp-address [access-list] [override]
9. end
10. show ip pim rp [mapping] [rp-address]
11. show ip igmp groups [group-name | group-address| interface-type interface-number] [detail]
12. show ip mroute
13. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 interface type number Selects an interface that is connected to hosts on which
PIM can be enabled.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
994
Multicast Routing
Configuring Sparse Mode with a Single Static RP
Step 5 ip pim sparse-mode Enables PIM on an interface. You must use sparse mode.
Example:
SwitchDevice(config-if)# exit
Step 8 ip pim rp-address rp-address [access-list] [override] Configures the address of a PIM RP for a particular group.
Example: • The optional access-list argument is used to specify
the number or name a standard access list that defines
SwitchDevice(config)# ip pim rp-address the multicast groups to be statically mapped to the
192.168.0.0 RP.
Step 9 end Ends the current configuration session and returns to EXEC
mode.
Example:
SwitchDevice(config)# end
Step 10 show ip pim rp [mapping] [rp-address] (Optional) Displays RPs known in the network and shows
how the router learned about each RP.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
995
Multicast Routing
Preventing Join Messages to False RPs
Step 12 show ip mroute (Optional) Displays the contents of the IP mroute table.
Example:
Step 13 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip pim rp-announce-filter rp-list access-list-number group-list access-list-number
4. access-list access-list-number {deny | permit} source [source-wildcard]
5. end
6. show running-config
7. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
996
Multicast Routing
Filtering Incoming RP Announcement Messages
DETAILED STEPS
SwitchDevice> enable
Step 4 access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, enter the access list number
specified in Step 2.
SwitchDevice(config)# access-list 10 permit
10.8.1.0 255.255.224.0 • The deny keyword denies access if the conditions are
matched.
• The permit keyword permits access if the conditions
are matched.
• Create an access list that specifies from which routers
and multilayer switches the mapping agent accepts
candidate RP announcements (rp-list ACL).
• Create an access list that specifies the range of
multicast groups from which to accept or deny
(group-list ACL).
• For source, enter the multicast group address range
for which the RP should be used.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
997
Multicast Routing
Configuring PIMv2 BSR
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip pim bsr-border
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
998
Multicast Routing
Defining the PIM Domain Border
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
Step 4 ip pim bsr-border Defines a PIM bootstrap message boundary for the PIM
domain.
Example:
Enter this command on each interface that connects to other
SwitchDevice(config-if)# ip pim bsr-border bordering PIM domains. This command instructs the switch
to neither send nor receive PIMv2 BSR messages on this
interface.
Note To remove the PIM border, use the no ip pim
bsr-border interface configuration command.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
999
Multicast Routing
Defining the IP Multicast Boundary
SUMMARY STEPS
1. enable
2. configure terminal
3. access-list access-list-number deny source [source-wildcard]
4. interface interface-id
5. ip multicast boundary access-list-number
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 access-list access-list-number deny source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, the range is 1 to 99.
SwitchDevice(config)#
access-list 12 deny 224.0.1.39
• The deny keyword denies access if the conditions are
access-list 12 deny 224.0.1.40 matched.
• For source, enter multicast addresses 224.0.1.39 and
224.0.1.40, which carry Auto-RP information.
• (Optional) For source-wildcard, enter the wildcard
bits in dotted decimal notation to be applied to the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1000
Multicast Routing
Configuring Candidate BSRs
Step 4 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
Step 5 ip multicast boundary access-list-number Configures the boundary, specifying the access list you
created in Step 2.
Example:
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip pim bsr-candidate interface-id hash-mask-length [priority]
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1001
Multicast Routing
Configuring Candidate BSRs
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip pim bsr-candidate interface-id hash-mask-length Configures your switch to be a candidate BSR.
[priority]
• For interface-id, enter the interface on this switch from
Example: which the BSR address is derived to make it a
candidate. This interface must be enabled with PIM.
SwitchDevice(config)# ip pim bsr-candidate Valid interfaces include physical ports, port channels,
gigabitethernet 1/0/3 28 100 and VLANs.
• For hash-mask-length, specify the mask length (32 bits
maximum) that is to be ANDed with the group address
before the hash function is called. All groups with the
same seed hash correspond to the same RP. For
example, if this value is 24, only the first 24 bits of the
group addresses matter.
• (Optional) For priority, enter a number from 0 to 255.
The BSR with the larger priority is preferred. If the
priority values are the same, the device with the highest
IP address is selected as the BSR. The default is 0.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1002
Multicast Routing
Configuring the Candidate RPs
SUMMARY STEPS
1. enable
2. configure terminal
3. ip pim rp-candidate interface-id [group-list access-list-number]
4. access-list access-list-number {deny | permit} source [source-wildcard]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1003
Multicast Routing
Configuring the Candidate RPs
Step 3 ip pim rp-candidate interface-id [group-list Configures your switch to be a candidate RP.
access-list-number]
• For interface-id, specify the interface whose associated
Example: IP address is advertised as a candidate RP address.
Valid interfaces include physical ports, port channels,
SwitchDevice(config)# ip pim rp-candidate and VLANs.
gigabitethernet 1/0/5 group-list 10
• (Optional) For group-list access-list-number, enter an
IP standard access list number from 1 to 99. If no
group-list is specified, the switch is a candidate RP for
all groups.
Step 4 access-list access-list-number {deny | permit} source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, enter the access list number
specified in Step 2.
SwitchDevice(config)# access-list 10 permit
239.0.0.0 0.255.255.255 • The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the
conditions are matched.
• For source, enter the number of the network or host
from which the packet is being sent.
• (Optional) For source-wildcard, enter the wildcard
bits in dotted decimal notation to be applied to the
source. Place ones in the bit positions that you want
to ignore.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1004
Multicast Routing
Delaying the Use of PIM Shortest-Path Tree
SUMMARY STEPS
1. enable
2. configure terminal
3. access-list access-list-number {deny | permit} source [source-wildcard]
4. ip pim spt-threshold {kbps | infinity} [group-list access-list-number]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 access-list access-list-number {deny | permit} source Creates a standard access list.
[source-wildcard]
• For access-list-number, the range is 1 to 99.
Example:
• The deny keyword denies access if the conditions are
SwitchDevice(config)# access-list 16 permit
matched.
225.0.0.0 0.255.255.255
• The permit keyword permits access if the conditions
are matched.
• For source, specify the multicast group to which the
threshold will apply.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1005
Multicast Routing
Delaying the Use of PIM Shortest-Path Tree
Step 4 ip pim spt-threshold {kbps | infinity} [group-list Specifies the threshold that must be reached before moving
access-list-number] to shortest-path tree (spt).
Example: • For kbps, specify the traffic rate in kilobits per second.
The default is 0 kbps.
SwitchDevice(config)# ip pim spt-threshold
infinity group-list 16
Note Because of switch hardware limitations, 0
kbps is the only valid entry even though the
range is 0 to 4294967.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1006
Multicast Routing
Modifying the PIM Router-Query Message Interval
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip pim query-interval seconds
5. end
6. show ip igmp interface [interface-id]
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet 1/0/1
Step 4 ip pim query-interval seconds Configures the frequency at which the switch sends PIM
router-query messages.
Example:
The default is 30 seconds. The range is 1 to 65535.
SwitchDevice(config-if)# ip pim
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1007
Multicast Routing
Verifying PIM Operations
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note If packets are not reaching their expected destinations, you might want consider disabling IP multicast fast
switching, which would place the router in process switching mode. If packets begin reaching their proper
destinations after IP multicast fast switching has been disabled, then the issue most likely was related to IP
multicast fast switching.
SUMMARY STEPS
1. enable
2. show ip mroute [group-address]
3. show ip mroute active [kb/s]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1008
Multicast Routing
Verifying IP Multicast on Routers Along the SPT
DETAILED STEPS
SwitchDevice> enable
Step 2 show ip mroute [group-address] Confirms that the F flag has been set for mroutes on the
first hop router.
Example:
SwitchDevice# show ip mroute 239.1.2.3
(*, 239.1.2.3), 00:18:10/stopped, RP 172.16.0.1,
flags: SPF
Incoming interface: Serial1/0, RPF nbr
172.31.200.2
Outgoing interface list: Null
Step 3 show ip mroute active [kb/s] Displays information about active multicast sources sending
to groups. The output of this command provides information
Example:
about the multicast packet rate for active sources.
SwitchDevice# show ip mroute active
Active IP Multicast Sources - sending >= 4 kbps Note By default, the output of the show ip mroute
command with the active keyword displays
Group: 239.1.2.3, (?)
Source: 10.0.0.1 (?)
information about active sources sending traffic
Rate: 20 pps/4 kbps(1sec), 4 kbps(last 30 to groups at a rate greater than or equal to 4 kb/s.
secs), 4 kbps(life avg) To display information about active sources
sending low-rate traffic to groups (that is, traffic
less than 4 kb/s), specify a value of 1 for the kb/s
argument. Specifying a value of 1 for this
argument displays information about active
sources sending traffic to groups at a rate equal
to or greater than 1 kb/s, which effectively
displays information about all possible active
source traffic.
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1009
Multicast Routing
Verifying IP Multicast Operation on the Last Hop Router
DETAILED STEPS
SwitchDevice> enable
Step 2 show ip mroute [group-address] Confirms the RPF neighbor towards the source for a
particular group or groups.
Example:
SwitchDevice# show ip mroute 239.1.2.3
(*, 239.1.2.3), 00:17:56/00:03:02, RP 172.16.0.1,
flags: S
Incoming interface: Null, RPF nbr 0.0.0.0
Outgoing interface list:
GigabitEthernet0/0/0, Forward/Sparse-Dense,
00:17:56/00:03:02
Step 3 show ip mroute active Displays information about active multicast sources sending
to groups. The output of this command provides information
Example:
about the multicast packet rate for active sources.
SwitchDevice# show ip mroute active
Active IP Multicast Sources - sending >= 4 kbps Note By default, the output of the show ip mroute
command with the active keyword displays
Group: 239.1.2.3, (?)
Source: 10.0.0.1 (?)
information about active sources sending traffic
Rate: 20 pps/4 kbps(1sec), 4 kbps(last 30 to groups at a rate greater than or equal to 4 kb/s.
secs), 4 kbps(life avg) To display information about active sources
sending low-rate traffic to groups (that is, traffic
less than 4 kb/s), specify a value of 1 for the kb/s
argument. Specifying a value of 1 for this
argument displays information about active
sources sending traffic to groups at a rate equal
to or greater than 1 kb/s, which effectively
displays information about all possible active
source traffic.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1010
Multicast Routing
Verifying IP Multicast Operation on the Last Hop Router
SUMMARY STEPS
1. enable
2. show ip igmp groups
3. show ip pim rp mapping
4. show ip mroute
5. show ip interface [type number]
6. show ip pim interface count
7. show ip mroute count
8. show ip mroute active [kb/s]
DETAILED STEPS
SwitchDevice> enable
Step 2 show ip igmp groups Verifies IGMP memberships on the last hop router. This
information will confirm the multicast groups with receivers
Example:
that are directly connected to the last hop router and that
SwitchDevice# show ip igmp groups are learned through IGMP.
IGMP Connected Group Membership
Group Address Interface Uptime
Expires Last Reporter
239.1.2.3 GigabitEthernet1/0/0 00:05:14
00:02:14 10.1.0.6
224.0.1.39 GigabitEthernet0/0/0 00:09:11
00:02:08 172.31.100.1
Step 3 show ip pim rp mapping Confirms that the group-to-RP mappings are being
populated correctly on the last hop router.
Example:
SwitchDevice# show ip pim rp mapping Note Ignore this step if you are verifying a last hop
PIM Group-to-RP Mappings router in a PIM-SSM network. The show ip pim
rp mappingcommand does not work with
Group(s) 224.0.0.0/4
RP 172.16.0.1 (?), v2v1
routers in a PIM-SSM network because
Info source: 172.16.0.1 (?), elected via PIM-SSM does not use RPs. In addition, if
Auto-RP configured correctly, PIM-SSM groups do not
Uptime: 00:09:11, expires: 00:02:47 appear in the output of the show ip pim rp
mappingcommand.
Step 4 show ip mroute Verifies that the mroute table is being populated properly
on the last hop router.
Example:
SwitchDevice# show ip mroute
(*, 239.1.2.3), 00:05:14/00:03:04, RP 172.16.0.1,
flags: SJC
Incoming interface: GigabitEthernet0/0/0, RPF
nbr 172.31.100.1
Outgoing interface list:
GigabitEthernet1/0, Forward/Sparse-Dense,
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1011
Multicast Routing
Verifying IP Multicast Operation on the Last Hop Router
Step 5 show ip interface [type number] Verifies that multicast fast switching is enabled for optimal
performance on the outgoing interface on the last hop router.
Example:
SwitchDevice# show ip interface GigabitEthernet Note Using the no ip mroute-cache interface
0/0/0 command disables IP multicast fast-switching.
GigabitEthernet0/0 is up, line protocol is up When IP multicast fast switching is disabled,
Internet address is 172.31.100.2/24
packets are forwarded through the
Broadcast address is 255.255.255.255
Address determined by setup command process-switched path.
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Multicast reserved groups joined: 224.0.0.1
224.0.0.22 224.0.0.13
224.0.0.5 224.0.0.6
Outgoing access list is not set
Inbound access list is not set
Proxy ARP is enabled
Local Proxy ARP is disabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is
disabled
IP Flow switching is disabled
IP CEF switching is disabled
IP Fast switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is
disabled
IP route-cache flags are Fast
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1012
Multicast Routing
Verifying IP Multicast Operation on the Last Hop Router
Step 6 show ip pim interface count Confirms that multicast traffic is being forwarded on the
last hop router.
Example:
SwitchDevice# show ip pim interface count
Step 7 show ip mroute count Confirms that multicast traffic is being forwarded on the
last hop router.
Example:
SwitchDevice# show ip mroute count
IP Multicast Statistics
6 routes using 4008 bytes of memory
3 groups, 1.00 average sources per group
Forwarding Counts: Pkt Count/Pkts per second/Avg
Pkt Size/Kilobits per second
Other counts: Total/RPF failed/Other
drops(OIF-null, rate-limit etc)
Step 8 show ip mroute active [kb/s] Displays information about active multicast sources sending
traffic to groups on the last hop router. The output of this
Example:
command provides information about the multicast packet
SwitchDevice# show ip mroute active rate for active sources.
Active IP Multicast Sources - sending >= 4 kbps
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1013
Multicast Routing
Using PIM-Enabled Routers to Test IP Multicast Reachability
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number
4. ip igmp join-group group-address
5. Repeat Step 3 and Step 4 for each interface on the router participating in the multicast network.
6. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1014
Multicast Routing
Pinging Routers Configured to Respond to Multicast Pings
Step 4 ip igmp join-group group-address (Optional) Configures an interface on the router to join the
specified group.
Example:
For the purpose of this task, configure the same group
SwitchDevice(config-if)# ip igmp join-group address for the group-address argument on all interfaces
225.2.2.2 on the router participating in the multicast network.
Note With this method, the router accepts the multicast
packets in addition to forwarding them.
Accepting the multicast packets prevents the
router from fast switching.
Step 5 Repeat Step 3 and Step 4 for each interface on the router --
participating in the multicast network.
Step 6 end Ends the current configuration session and returns to
privileged EXEC mode.
Example:
SwitchDevice(config-if)# end
SUMMARY STEPS
1. enable
2. ping group-address
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1015
Multicast Routing
Monitoring and Troubleshooting PIM
Command Purpose
Command Purpose
show ip pim rp [ hostname or IP address | Displays all available RP mappings and metrics. This tells you
mapping [ hostname or IP address | elected how the switch learns of the RP (through the BSR or the
| in-use ] | metric [ hostname or IP address Auto-RP mechanism).
]]
• (Optional) For the hostname, specify the IP name of the
group about which to display RPs.
• (Optional) For the IP address, specify the IP address of
the group about which to display RPs.
• (Optional) Use the mapping keyword to display all
group-to-RP mappings of which the Cisco device is aware
(either configured or learned from Auto-RP).
• (Optional) Use the metric keyword to display the RP
RPF metric.
show ip pim rp-hash group Displays the RP that was selected for the specified group. That
is, on a PIMv2 router or multilayer switch, confirms that the
same RP is the one that a PIMv1 system chooses. For group,
enter the group address for which to display RP information.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1016
Multicast Routing
Troubleshooting PIMv1 and PIMv2 Interoperability Problems
Use the privileged EXEC commands in the following table to monitor BSR information:
Command Purpose
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1017
Multicast Routing
Example: Verifying PIM Stub Routing
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1018
Multicast Routing
Example: Preventing Join Messages to False RPs
The mapping agent accepts candidate RP announcements from only two devices, 172.16.5.1 and 172.16.2.1.
The mapping agent accepts candidate RP announcements from these two devices only for multicast groups
that fall in the group range of 224.0.0.0 to 239.255.255.255. The mapping agent does not accept candidate
RP announcements from any other devices in the network. Furthermore, the mapping agent does not accept
candidate RP announcements from 172.16.5.1 or 172.16.2.1 if the announcements are for any groups in the
239.0.0.0 through 239.255.255.255 range. This range is the administratively scoped address range.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1019
Multicast Routing
Example: Configuring Candidate RPs
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1020
CHAPTER 42
Configuring HSRP Aware PIM
• HSRP Aware PIM, on page 1021
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1021
Multicast Routing
Information About HSRP Aware PIM
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1022
Multicast Routing
How to Configure HSRP Aware PIM
HSRP states in the device. The PIM designated router (DR) runs on the same gateway as the HSRP AR and
maintains mroute states.
In a multiaccess segment (such as LAN), PIM DR election is unaware of the redundancy configuration, and
the elected DR and HSRP AR may not be the same router. In order to ensure that the PIM DR is always able
to forward PIM Join/Prune message towards RP or FHR, the HSRP AR becomes the PIM DR (if there is only
one HSRP group). PIM is responsible for adjusting DR priority based on the group state. When a failover
occurs, multicast states are created on the new AR elected by the HSRP group and the AR assumes responsibility
for the routing and forwarding of all the traffic addressed to the HSRP virtual IP address.
With HSRP Aware PIM enabled, PIM sends an additional PIM Hello message using the HSRP virtual IP
addresses as the source address for each active HSRP group when a device becomes HSRP Active. The PIM
Hello will carry a new GenID in order to trigger other routers to respond to the failover. When a downstream
device receives this PIM Hello, it will add the virtual address to its PIM neighbor list. The new GenID carried
in the PIM Hello will trigger downstream routers to resend PIM Join messages towards the virtual address.
Upstream routers will process PIM Join/Prunes (J/P) based on HSRP group state.
If the J/P destination matches the HSRP group virtual address and if the destination device is in HSRP active
state, the new AR processes the PIM Join because it is now the acting PIM DR. This allows all PIM Join/Prunes
to reach the HSRP group virtual address and minimizes changes and configurations at the downstream routers
side.
The IP routing service utilizes the existing virtual routing protocol to provide basic stateless failover services
to client applications, such as PIM. Changes in the local HSRP group state and standby router responsibility
are communicated to interested client applications. Client applications may build on top of IRS to provide
stateful or stateless failover. PIM, as an HSRP client, listens to the state change notifications from HSRP and
automatically adjusts the priority of the PIM DR based on the HSRP state. The PIM client also triggers
communication between upstream and downstream devices upon failover in order to create an mroute state
on the new AR.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number [name-tag]
4. ip address ip-address mask
5. standby [group-number] ip [ip-address [secondary]]
6. standby [group-number] timers [msec] hellotime [msec] holdtime
7. standby [group-number] priority priority
8. standby [group-number] name group-name
9. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1023
Multicast Routing
Configuring an HSRP Group on an Interface
DETAILED STEPS
Step 3 interface type number [name-tag] Specifies an interface to be configured and enters interface
configuration mode.
Example:
Device(config)# interface ethernet 0/0
Step 4 ip address ip-address mask Sets a primary or secondary IP address for an interface.
Example:
Device(config-if)# ip address 10.0.0.2
255.255.255.0
Step 5 standby [group-number] ip [ip-address [secondary]] Activates HSRP and defines an HRSP group.
Example:
Device(config-if)# standby 1 ip 192.0.2.99
Step 6 standby [group-number] timers [msec] hellotime [msec] (Optional) Configures the time between hello packets and
holdtime the time before other devices declare an HSRP active or
standby router to be down.
Example:
Device(config-if)# standby 1 timers 5 15
Step 7 standby [group-number] priority priority (Optional) Assigns the HSRP priority to be used to help
select the HSRP active and standby routers.
Example:
Device(config-if)# standby 1 priority 120
Step 8 standby [group-number] name group-name (Optional) Defines a name for the HSRP group.
Example: Note We recommend that you always configure the
Device(config-if)# standby 1 name HSRP1 standby ip name command when configuring
an HSRP group to be used for HSRP Aware
PIM.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1024
Multicast Routing
Configuring PIM Redundancy
SUMMARY STEPS
1. enable
2. configure terminal
3. interface type number [name-tag]
4. ip address ip-address mask
5. ip pim redundancy group dr-priority priority
6. end
DETAILED STEPS
Step 3 interface type number [name-tag] Specifies an interface to be configured and enters interface
configuration mode.
Example:
Device(config)# interface ethernet 0/0
Step 4 ip address ip-address mask Sets a primary or secondary IP address for an interface.
Example:
Device(config-if)# ip address 10.0.0.2
255.255.255.0
Step 5 ip pim redundancy group dr-priority priority Enables PIM redundancy and assigns a redundancy priority
value to the active PIM designated router (DR).
Example:
Device(config-if)# ip pim redundancy HSRP1 • Because HSRP group names are case sensitive, the
dr-priority 60 value of the group argument must match the group
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1025
Multicast Routing
Configuration Examples for HSRP Aware PIM
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1026
CHAPTER 43
Configuring VRRP Aware PIM
• VRRP Aware PIM, on page 1027
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1027
Multicast Routing
Information About VRRP Aware PIM
SUMMARY STEPS
1. enable
2. configure terminal
3. fhrp version vrrp version
4. interface type number
5. ip address address
6. vrrp group id address-family ipv4
7. vrrs leader group name
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1028
Multicast Routing
Configuring VRRP Aware PIM
DETAILED STEPS
Device> enable
Step 3 fhrp version vrrp version Enables the ability to configure VRRPv3 and VRRS.
Example:
Step 4 interface type number Specifies an interface to be configured and enters interface
configuration mode.
Example:
Step 5 ip address address Specifies a primary or secondary address for the VRRP
group.
Example:
Step 6 vrrp group id address-family ipv4 Creates a VRRP group and enters VRRP configuration
mode.
Example:
Step 7 vrrs leader group name Enables community and (or) extended community
exchange with the specified neighbor.
Example:
Step 8 vrrp group id ip ip address Exits address family configuration mode and returns to
router configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1029
Multicast Routing
Configuration Examples for VRRP Aware PIM
Device(config-if-vrrp)# exit
Step 10 interface type number Specifies an interface to be configured and enters interface
configuration mode.
Example:
Step 11 ip pim redundancy group name vrrp dr-priority sets the priority for which a router is elected as the
priority-value designated router (DR).
Example: • The redundancy dr-priority value should be same on
all routers that are enabled with VRRP Aware PIM
Device(config-if)# ip pim redundancy VRRP1 vrrp feature.
dr-priority 90
Device(config-if)# end
conf terminal
fhrp version vrrp v3
interface Ethernet0/0
ip address 192.0.2.2
vrrp 1 address-family ipv4
vrrp 1 ip 10.1.6.1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1030
CHAPTER 44
Configuring Basic IP Multicast Routing
• Finding Feature Information, on page 1031
• Prerequisites for Basic IP Multicast Routing, on page 1031
• Restrictions for Basic IP Multicast Routing, on page 1032
• Information About Basic IP Multicast Routing, on page 1032
• How to Configure Basic IP Multicast Routing, on page 1033
• Monitoring and Maintaining Basic IP Multicast Routing, on page 1040
Related Topics
Configuring Basic IP Multicast Routing, on page 1033
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1031
Multicast Routing
Restrictions for Basic IP Multicast Routing
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1032
Multicast Routing
sdr Listener Support
Related Topics
Configuring Basic IP Multicast Routing, on page 1033
Information About Basic IP Multicast Routing, on page 1032
SUMMARY STEPS
1. enable
2. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1033
Multicast Routing
Configuring Basic IP Multicast Routing
3. interface interface-id
4. ip pim {dense-mode | sparse-mode | sparse-dense-mode}
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the Layer 3 interface on which you want to enable
multicast routing, and enters interface configuration mode.
Example:
The specified interface must be one of the following:
SwitchDevice(config)# interface
gigabitethernet 1/0/1 • A routed port—A physical port that has been
configured as a Layer 3 port by entering the no
switchport interface configuration command. You
will also need to enable IP PIM sparse-dense-mode on
the interface, and join the interface as a statically
connected member to an IGMP static group.
• An SVI—A VLAN interface created by using the
interface vlan vlan-id global configuration command.
You will also need to enable IP PIM
sparse-dense-mode on the VLAN, join the VLAN as
a statically connected member to an IGMP static group,
and then enable IGMP snooping on the VLAN, the
IGMP static group, and physical interface.
Step 4 ip pim {dense-mode | sparse-mode | sparse-dense-mode} Enables a PIM mode on the interface.
Example: By default, no mode is configured.
The keywords have these meanings:
SwitchDevice(config-if)# ip pim
sparse-dense-mode • dense-mode—Enables dense mode of operation.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1034
Multicast Routing
Configuring Optional IP Multicast Routing Features
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Information About Basic IP Multicast Routing, on page 1032
Default IP Multicast Routing Configuration, on page 1032
Prerequisites for Basic IP Multicast Routing, on page 1031
SUMMARY STEPS
1. enable
2. configure terminal
3. access-list access-list-number deny source [source-wildcard]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1035
Multicast Routing
Defining the IP Multicast Boundary
4. interface interface-id
5. ip multicast boundary access-list-number
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 access-list access-list-number deny source Creates a standard access list, repeating the command as
[source-wildcard] many times as necessary.
Example: • For access-list-number, the range is 1 to 99.
SwitchDevice(config)#
access-list 12 deny 224.0.1.39
• The deny keyword denies access if the conditions are
access-list 12 deny 224.0.1.40 matched.
• For source, enter multicast addresses 224.0.1.39 and
224.0.1.40, which carry Auto-RP information.
• (Optional) For source-wildcard, enter the wildcard
bits in dotted decimal notation to be applied to the
source. Place ones in the bit positions that you want
to ignore.
Step 4 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
Step 5 ip multicast boundary access-list-number Configures the boundary, specifying the access list you
created in Step 2.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1036
Multicast Routing
Configuring Multicast VRFs
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
SwitchDevice(config)# ip routing
Step 3 ip vrf vrf-name Names the VRF, and enter VRF configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1037
Multicast Routing
Configuring Multicast VRFs
Step 5 route-target {export | import | both} Creates a list of import, export, or import and export route
route-target-ext-community target communities for the specified VRF. Enter either an
AS system number and an arbitrary number (xxx:y) or an
Example:
IP address and an arbitrary number (A.B.C.D:y). The
route-target-ext-community should be the same as the
SwitchDevice(config-vrf)# route-target import
100:2 route-distinguisher entered in Step 4.
Step 6 import map route-map (Optional) Associates a route map with the VRF.
Example:
Step 7 ip multicast-routing vrf vrf-name distributed (Optional) Enables global multicast routing for VRF table.
Example:
SwitchDevice(config-vrf)# ip multicast-routing
vrf vpn1 distributed
Step 8 interface interface-id Specifies the Layer 3 interface to be associated with the
VRF, and enter interface configuration mode. The interface
Example:
can be a routed port or an SVI.
SwitchDevice(config-vrf)# interface
gigabitethernet 1/0/2
Step 9 ip vrf forwarding vrf-name Associates the VRF with the Layer 3 interface.
Example:
Step 10 ip address ip-address mask Configures IP address for the Layer 3 interface.
Example:
Step 11 ip pim sparse-dense mode Enables PIM on the VRF-associated Layer 3 interface.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1038
Multicast Routing
Advertising Multicast Multimedia Sessions Using SAP Listener
SwitchDevice(config)# end
Step 13 show ip vrf [brief | detail | interfaces] [vrf-name] Verifies the configuration. Displays information about the
configured VRFs.
Example:
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip sap cache-timeout minutes
4. interface type number
5. ip sap listen
6. end
7. clear ip sap [group-address | “ session-name ”]
8. show ip sap [group-address | “ session-name ”| detail]
DETAILED STEPS
Router> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1039
Multicast Routing
Monitoring and Maintaining Basic IP Multicast Routing
Step 4 interface type number Selects an interface that is connected to hosts on which
IGMPv3 can be enabled.
Example:
Router(config-if)# end
Step 7 clear ip sap [group-address | “ session-name ”] Deletes a SAP cache entry or the entire SAP cache.
Example:
Step 8 show ip sap [group-address | “ session-name ”| detail] (Optional) Displays the SAP cache.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1040
Multicast Routing
Displaying System and Network Statistics
You can use any of the privileged EXEC commands in the following table to clear IP multicast caches, tables,
and databases.
Command Purpose
clear ip igmp group {group [ hostname | IP address] Deletes entries from the IGMP cache.
| vrf name group [ hostname | IP address] }
clear ip mroute { * | [hostname | IP address] | vrf Deletes entries from the IP multicast routing table.
name group [ hostname | IP address] }
clear ip sap [group-address | “session-name”] Deletes the Session Directory Protocol Version 2
cache or an sdr cache entry.
You can display information to learn resource usage and solve network problems. You can also display
information about node reachability and discover the routing path that packets of your device are taking
through the network.
You can use any of the privileged EXEC commands in the following table to display various routing statistics.
Command Purpose
show ip igmp groups Displays the multicast groups that are directly
[group-name|group-address|type-number] connected to the switch and that were learned through
IGMP.
show ip mroute [group-name | group-address] Displays the contents of the IP multicast routing table.
[source] [ count | interface | proxy | pruned |
summary | verbose]
show ip pim interface [type number] [count | detail Displays information about interfaces configured for
| df | stats ] PIM. This command is available in all software
images.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1041
Multicast Routing
Displaying System and Network Statistics
Command Purpose
show ip pim neighbor [type number] Lists the PIM neighbors discovered by the switch.
This command is available in all software images.
show ip pim rp [group-name | group-address] Displays the RP routers associated with a sparse-mode
multicast group. This command is available in all
software images.
show ip rpf {source-address | name} Displays how the switch is doing Reverse-Path
Forwarding (that is, from the unicast routing table,
DVMRP routing table, or static mroutes).
Command parameters include:
• Host name or IP address—IP name or group
address.
• Select—Group-based VRF select information.
• vrf—Selects VPN Routing/Forwarding instance.
show ip sap [group | “session-name” | detail] Displays the Session Announcement Protocol (SAP)
Version 2 cache.
Command parameters include:
• A.B.C.D—IP group address.
• WORD—Session name (in double quotes).
• detail—Session details.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1042
CHAPTER 45
Configuring SSM
• Finding Feature Information, on page 1043
• Prerequisites for Configuring SSM, on page 1043
• Restrictions for Configuring SSM, on page 1044
• Information About SSM and SSM Mapping, on page 1045
• How to Configure SSM and SSM Mapping, on page 1050
• Monitoring SSM and SSM Mapping, on page 1059
• Configuration Examples for SSM and SSM Mapping, on page 1060
• Before you configure static SSM mapping, you must configure access control lists (ACLs) that define
the group ranges to be mapped to source addresses.
• Before you can configure and use SSM mapping with DNS lookups, you need to add records to a running
DNS server. If you do not already have a DNS server running, you need to install one.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1043
Multicast Routing
Restrictions for Configuring SSM
Note You can use a product such as Cisco Network Registrar to add records to a running
DNS server.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1044
Multicast Routing
Information About SSM and SSM Mapping
• Enable IGMPv3 with care on the last hop router when you rely solely on SSM mapping as a transition
solution for full SSM.
Protocol Independent Multicast (PIM) SSM, or PIM-SSM, is the routing protocol that supports the
implementation of SSM and is derived from PIM sparse mode (PIM-SM). IGMP is the Internet Engineering
Task Force (IETF) standards track protocol used for hosts to signal multicast group membership to routers.
IGMP Version 3 supports source filtering, which is required for SSM. IGMP For SSM to run with IGMPv3,
SSM must be supported in the router, the host where the application is running, and the application itself.
Related Topics
Configuring SSM , on page 1050
SSM with IGMPv3 Example, on page 1060
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1045
Multicast Routing
SSM Operations
(S, G) channels to which they are subscribed, whereas in ISM, receivers need not know the IP addresses of
sources from which they receive their traffic. The proposed standard approach for channel subscription
signaling utilizes IGMP INCLUDE mode membership reports, which are supported only in IGMP Version
3.
SSM can coexist with the ISM service by applying the SSM delivery model to a configured subset of the IP
multicast group address range. The Internet Assigned Numbers Authority (IANA) has reserved the address
range from 232.0.0.0 through 232.255.255.255 for SSM applications and protocols. The software allows SSM
configuration for an arbitrary subset of the IP multicast address range from 224.0.0.0 through 239.255.255.255.
When an SSM range is defined, an existing IP multicast receiver application will not receive any traffic when
it tries to use addresses in the SSM range unless the application is modified to use explicit (S, G) channel
subscription or is SSM-enabled through a URL Rendezvous Directory (URD).
SSM Operations
An established network in which IP multicast service is based on PIM-SM can support SSM services. SSM
can also be deployed alone in a network without the full range of protocols that are required for interdomain
PIM-SM. That is, SSM does not require an RP, so there is no need for an RP mechanism such as Auto-RP,
MSDP, or bootstrap router (BSR).
If SSM is deployed in a network that is already configured for PIM-SM, then only the last-hop routers must
be upgraded to a software image that supports SSM. Routers that are not directly connected to receivers do
not have to upgrade to a software image that supports SSM. In general, these non-last-hop routers must only
run PIM-SM in the SSM range. They may need additional access control configuration to suppress MSDP
signaling, registering, or PIM-SM shared-tree operations from occurring within the SSM range.
The SSM mode of operation is enabled by configuring the SSM range using the ip pim ssm global configuration
command. This configuration has the following effects:
• For groups within the SSM range, (S, G) channel subscriptions are accepted through IGMPv3 INCLUDE
mode membership reports.
• PIM operations within the SSM range of addresses change to PIM-SSM, a mode derived from PIM-SM.
In this mode, only PIM (S, G) Join and Prune messages are generated by the router. Incoming messages
related to rendezvous point tree (RPT) operations are ignored or rejected, and incoming PIM register
messages are immediately answered with Register-Stop messages. PIM-SSM is backward-compatible
with PIM-SM unless a router is a last-hop router. Therefore, routers that are not last-hop routers can run
PIM-SM for SSM groups (for example, if they do not yet support SSM).
• For groups within the SSM range, no MSDP Source-Active (SA) messages within the SSM range will
be accepted, generated, or forwarded.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1046
Multicast Routing
Benefits of
Benefits of
IP Multicast Address Management Not Required
In the ISM service, applications must acquire a unique IP multicast group address because traffic distribution
is based only on the IP multicast group address used. If two applications with different sources and receivers
use the same IP multicast group address, then receivers of both applications will receive traffic from the
senders of both applications. Even though the receivers, if programmed appropriately, can filter out the
unwanted traffic, this situation would cause generally unacceptable levels of unwanted traffic.
Allocating a unique IP multicast group address for an application is still a problem. Most short-lived applications
use mechanisms like Session Description Protocol (SDP) and Session Announcement Protocol (SAP) to get
a random address, a solution that does not work well with a rising number of applications in the Internet. The
best current solution for long-lived applications is described in RFC 2770, but this solution suffers from the
restriction that each autonomous system is limited to only 255 usable IP multicast addresses.
In SSM, traffic from each source is forwarded between routers in the network independent of traffic from
other sources. Thus different sources can reuse multicast group addresses in the SSM range.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1047
Multicast Routing
SSM Mapping Overview
• The ease of installation and operation of SSM makes it ideal for network operators, especially in those
cases where content needs to be forwarded between multiple independent PIM domains (because there
is no need to manage MSDP for SSM between PIM domains).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1048
Multicast Routing
DNS-Based SSM Mapping
the router constructs a domain name that includes the group address G and performs a reverse lookup into the
DNS. The router looks up IP address resource records (IP A RRs) to be returned for this constructed domain
name and uses the returned IP addresses as the source addresses associated with this group. SSM mapping
supports up to 20 sources for each group. The router joins all sources configured for a group.
Figure 91: DNS-Based SSM-Mapping
The SSM mapping mechanism that enables the last hop router to join multiple sources for a group can be used
to provide source redundancy for a TV broadcast. In this context, the redundancy is provided by the last hop
router using SSM mapping to join two video sources simultaneously for the same TV channel. However, to
prevent the last hop router from duplicating the video traffic, it is necessary that the video sources utilize a
server-side switchover mechanism where one video source is active while the other backup video source is
passive. The passive source waits until an active source failure is detected before sending the video traffic for
the TV channel. The server-side switchover mechanism, thus, ensures that only one of the servers is actively
sending the video traffic for the TV channel.
To look up one or more source addresses for a group G that includes G1, G2, G3, and G4, the following DNS
resource records (RRs) must be configured on the DNS server:
IN A source-address-2
IN A source-address-n
The multicast-domain argument is a configurable DNS prefix. The default DNS prefix is in-addr.arpa. You
should only use the default prefix when your installation is either separate from the internet or if the group
names that you map are global scope group addresses (RFC 2770 type addresses that you configure for SSM)
that you own.
The timeout argument configures the length of time for which the router performing SSM mapping will cache
the DNS lookup. This argument is optional and defaults to the timeout of the zone in which this entry is
configured. The timeout indicates how long the router will keep the current mapping before querying the DNS
server for this group. The timeout is derived from the cache time of the DNS RR entry and can be configured
for each group/source entry on the DNS server. You can configure this time for larger values if you want to
minimize the number of DNS queries generated by the router. Configure this time for a low value if you want
to be able to quickly update all routers with new source addresses.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1049
Multicast Routing
SSM Mapping Benefits
Note Refer to your DNS server documentation for more information about configuring DNS RRs.
To configure DNS-based SSM mapping in the software, you must configure a few global commands but no
per-channel specific configuration is needed. There is no change to the configuration for SSM mapping if
additional channels are added. When DNS-based SSM mapping is configured, the mappings are handled
entirely by one or more DNS servers. All DNS techniques for configuration and redundancy management
can be applied to the entries needed for DNS-based SSM mapping.
Related Topics
Configuring DNS-Based SSM Mapping, on page 1054
Configuring Static Traffic Forwarding with SSM Mapping , on page 1056
SUMMARY STEPS
1. enable
2. configure terminal
3. ip pim ssm [default | range access-list]
4. interface type number
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1050
Multicast Routing
Configuring SSM
DETAILED STEPS
SwitchDevice> enable
Step 3 ip pim ssm [default | range access-list] Defines the SSM range of IP multicast addresses.
Example:
Step 4 interface type number Selects an interface that is connected to hosts on which
IGMPv3 can be enabled, and enters the interface
Example:
configuration mode.
SwitchDevice(config)# interface gigabitethernet
1/0/1
Step 5 ip pim {sparse-mode | sparse-dense-mode} Enables PIM on an interface. You must use either sparse
mode or sparse-dense mode.
Example:
Step 6 ip igmp version 3 Enables IGMPv3 on this interface. The default version of
IGMP is set to Version 2.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1051
Multicast Routing
Configuring SSM Mapping
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
SSM Components , on page 1045
SSM with IGMPv3 Example, on page 1060
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp ssm-map enable
4. no ip igmp ssm-map query dns
5. ip igmp ssm-map static access-list source-address
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1052
Multicast Routing
Configuring Static SSM Mapping
Step 3 ip igmp ssm-map enable Enables SSM mapping for groups in the configured SSM
range.
Example:
Note By default, this command enables DNS-based
SwitchDevice(config)# ip igmp ssm-map enable SSM mapping.
Step 4 no ip igmp ssm-map query dns (Optional) Disables DNS-based SSM mapping.
Example: Note Disable DNS-based SSM mapping if you only
want to rely on static SSM mapping. By default,
SwitchDevice(config)# no ip igmp ssm-map query dns the ip igmp ssm-map command enables
DNS-based SSM mapping.
Step 5 ip igmp ssm-map static access-list source-address Configures static SSM mapping.
Example: • The ACL supplied for the access-list argument defines
the groups to be mapped to the source IP address
SwitchDevice(config)# ip igmp ssm-map static 11 entered for the source-address argument.
172.16.8.11
Note You can configure additional static SSM
mappings. If additional SSM mappings are
configured and the router receives an IGMPv1
or IGMPv2 membership report for a group in
the SSM range, the switch determines the source
addresses associated with the group by walking
each configured ip igmp ssm-map static
command. The switch associates up to 20 sources
per group.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1053
Multicast Routing
Configuring DNS-Based SSM Mapping
Related Topics
Static SSM Mapping, on page 1048
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp ssm-map enable
4. ip igmp ssm-map query dns
5. ip domain multicast domain-prefix
6. ip name-server server-address1 [server-address2...server-address6]
7. Repeat Step Step 6, on page 1055 to configure additional DNS servers for redundancy, if required.
8. end
9. show running-config
10. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1054
Multicast Routing
Configuring DNS-Based SSM Mapping
Step 4 ip igmp ssm-map query dns (Optional) Enables DNS-based SSM mapping.
Example: • By default, the ip igmp ssm-map command enables
DNS-based SSM mapping. Only the noform of this
SwitchDevice(config)# ip igmp ssm-map query dns command is saved to the running configuration.
Step 5 ip domain multicast domain-prefix (Optional) Changes the domain prefix used for DNS-based
SSM mapping.
Example:
• By default, the software uses the ip-addr.arpa domain
SwitchDevice(config)# ip domain multicast prefix.
ssm-map.cisco.com
Step 6 ip name-server server-address1 Specifies the address of one or more name servers to use
[server-address2...server-address6] for name and address resolution.
Example:
SwitchDevice(config-if)# end
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1055
Multicast Routing
Configuring Static Traffic Forwarding with SSM Mapping
Related Topics
DNS-Based SSM Mapping, on page 1048
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp static-group group-address source ssm-map
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 ip igmp static-group group-address source ssm-map Configures SSM mapping to statically forward a (S, G)
channel from the interface.
Example:
Use this command if you want to statically forward SSM
SwitchDevice(config-if)# ip igmp traffic for certain groups. Use DNS-based SSM mapping
static-group 239.1.2.1 source to determine the source addresses of the channels.
ssm-map
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1056
Multicast Routing
Verifying SSM Mapping Configuration and Operation
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
DNS-Based SSM Mapping, on page 1048
SUMMARY STEPS
1. enable
2. show ip igmp ssm-mapping
3. show ip igmp ssm-mapping group-address
4. show ip igmp groups [group-name | group-address | interface-type interface-number] [detail]
5. show host
6. debug ip igmp group-address
DETAILED STEPS
SwitchDevice> enable
Step 2 show ip igmp ssm-mapping (Optional) Displays information about SSM mapping
configuration.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1057
Multicast Routing
Verifying SSM Mapping Configuration and Operation
Step 3 show ip igmp ssm-mapping group-address (Optional) Displays the sources that SSM mapping uses for
a particular group.
Example:
The example here shows information about the configured
SwitchDevice# show ip igmp ssm-mapping 232.1.1.4 DNS-based SSM mapping. Here the router has used
Group address: 232.1.1.4 DNS-based mapping to map group 232.1.1.4 to sources
Database : DNS
DNS name : 4.1.1.232.ssm-map.cisco.com
172.16.8.5 and 172.16.8.6. The timeout for this entry is
Expire time : 860000 860000 milliseconds (860 seconds).
Source list : 172.16.8.5
: 172.16.8.6
Step 4 show ip igmp groups [group-name | group-address | (Optional) Displays the multicast groups with receivers that
interface-type interface-number] [detail] are directly connected to the router and that were learned
through IGMP.
Example:
In the example the “M” flag indicates that SSM mapping
SwitchDevice# show ip igmp group 232.1.1.4 detail is configured.
Interface: GigabitEthernet2/0/0
Group: 232.1.1.4 SSM
Uptime: 00:03:20
Group mode: INCLUDE
Last reporter: 0.0.0.0
CSR Grp Exp: 00:02:59
Group source list: (C - Cisco Src
Report, U - URD, R - Remote,
S - Static, M -
SSM Mapping)
Source Address Uptime v3 Exp
CSR Exp Fwd Flags
172.16.8.3 00:03:20 stopped
00:02:59 Yes CM
172.16.8.4 00:03:20 stopped
00:02:59 Yes CM
172.16.8.5 00:03:20 stopped
00:02:59 Yes CM
172.16.8.6 00:03:20 stopped
00:02:59 Yes CM
Step 5 show host (Optional) Displays the default domain name, the style of
name lookup service, a list of name server hosts, and the
Example:
cached list of hostnames and addresses.
SwitchDevice# show host
Default domain is cisco.com
Name/address lookup uses domain service
Name servers are 10.48.81.21
Codes: UN - unknown, EX - expired, OK - OK, ?? -
revalidate
temp - temporary, perm - permanent
NA - Not Applicable None - Not defined
Host Port Flags Age
Type Address(es)
10.0.0.0.ssm-map.cisco.c None (temp, OK) 0
IP 172.16.8.5
172.16.8.6
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1058
Multicast Routing
Monitoring SSM and SSM Mapping
172.16.8.3
Step 6 debug ip igmp group-address (Optional) Displays the IGMP packets received and sent
and IGMP host-related events.
Example:
SwitchDevice# debug ip igmp In the first example, the output indicates that the router is
IGMP(0): Convert IGMPv2 report (*,232.1.2.3) to converting an IGMPv2 join for group G into an IGMPv3
IGMPv3 with 2 source(s) using STATIC. join.
SwitchDevice# debug ip igmp
In the second example, the output indicates that a DNS
IGMP(0): Convert IGMPv2 report (*,232.1.2.3) to
IGMPv3 with 2 source(s) using DNS. lookup has succeeded.
SwitchDevice# debug ip igmp In the third example, the output indicates that DNS-based
IGMP(0): DNS source lookup failed for (*, SSM mapping is enabled and a DNS lookup has failed:
232.1.2.3), IGMPv2 report failed
Related Topics
Static SSM Mapping, on page 1048
Command Purpose
Command Purpose
SwitchDevice#show ip igmp ssm-mapping Displays the sources that SSM mapping uses for a
group-address particular group.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1059
Multicast Routing
Configuration Examples for SSM and SSM Mapping
Command Purpose
SwitchDevice#show ip igmp groups [group-name | Displays the multicast groups with receivers that are
group-address | interface-type interface-number] directly connected to the router and that were learned
[detail] through IGMP.
SwitchDevice#show host Displays the default domain name, the style of name
lookup service, a list of name server hosts, and the
cached list of hostnames and addresses.
SwitchDevice#debug ip igmp group-address Displays the IGMP packets received and sent and
IGMP host-related events.
ip multicast-routing
!
interface GigabitEthernet3/1/0
ip address 172.21.200.203 255.255.255.0
description backbone interface
ip pim sparse-mode
!
interface GigabitEthernet3/2/0
ip address 131.108.1.2 255.255.255.0
ip pim sparse-mode
description ethernet connected to hosts
ip igmp version 3
!
ip pim ssm default
Related Topics
Configuring SSM , on page 1050
SSM Components , on page 1045
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1060
Multicast Routing
SSM Mapping Example
! .
! .
! .
! See ftp://ftpeng.cisco.com/ipmulticast/config-notes/msdp-sa-filter.txt for other SA
! messages that typically need to be filtered.
permit ip any any
! Filter generated SA messages in SSM range. This configuration is only needed if there
! are directly connected sources to this router. The “ip pim accept-register” command
! filters remote sources.
ip msdp redistribute list msdp-nono-list
! Filter received SA messages in SSM range. “Filtered on receipt” means messages are
! neither processed or forwarded. Needs to be configured for each MSDP peer.
ip msdp sa-filter in msdp-peer1 list msdp-nono-list
! .
! .
! .
ip msdp sa-filter in msdp-peerN list msdp-nono-list
Note Address assignment in the global SSM range 232.0.0.0/8 should be random. If you copy parts or all of this
sample configuration, make sure to select a random address range but not 232.1.1.x as shown in this example.
Using a random address range minimizes the possibility of address collision and may prevent conflicts when
other SSM content is imported while SSM mapping is used.
!
no ip domain lookup
ip domain multicast ssm.map.cisco.com
ip name-server 10.48.81.21
!
!
ip multicast-routing distributed
ip igmp ssm-map enable
ip igmp ssm-map static 10 172.16.8.10
ip igmp ssm-map static 11 172.16.8.11
!
!
.
.
.
!
interface GigabitEthernet0/0/0
description Sample IGMP Interface Configuration for SSM-Mapping Example
ip address 10.20.1.2 255.0.0.0
ip pim sparse-mode
ip igmp last-member-query-interval 100
ip igmp static-group 232.1.2.1 source ssm-map
ip igmp version 3
ip igmp explicit-tracking
ip igmp limit 2
ip igmp v3lite
ip urd
!
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1061
Multicast Routing
SSM Mapping Example
.
.
.
!
ip pim ssm default
!
access-list 10 permit 232.1.2.10
access-list 11 permit 232.1.2.0 0.0.0.255
!
This table describes the significant commands shown in the SSM mapping configuration example.
Command Description
ip domain multicast Specifies ssm-map.cisco.com as the domain prefix for SSM mapping.
ssm-map.cisco.com
ip name-server 10.48.81.21 Specifies 10.48.81.21 as the IP address of the DNS server to be used by
SSM mapping and any other service in the software that utilizes DNS.
ip igmp ssm-map static 10 Configures the groups permitted by ACL 10 to use source address
172.16.8.10 172.16.8.10.
• In this example, ACL 10 permits all groups in the 232.1.2.0/25 range
except 232.1.2.10.
ip igmp ssm-map static 11 Configures the groups permitted by ACL 11 to use source address
172.16.8.11 172.16.8.11.
• In this example, ACL 11 permits group 232.1.2.10.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1062
Multicast Routing
DNS Server Configuration Example
Command Description
ip igmp static-group 232.1.2.1 Configures SSM mapping to be used to determine the sources associated
source ssm-map with group 232.1.2.1. The resulting (S, G) channels are statically
forwarded.
ip igmp explicit-tracking Minimizes the leave latency for IGMPv3 host leaving a multicast channel.
Note This command is not required for configuring SSM mapping.
ip igmp limit 2 Limits the number of IGMP states resulting from IGMP membership states
on a per-interface basis.
Note This command is not required for configuring SSM mapping.
ip igmp v3lite Enables the acceptance and processing of IGMP v3lite membership reports
on this interface.
Note This command is shown in the configuration only to
demonstrate that IGMP v3lite can be configured simultaneously
with SSM mapping; however, it is not required.
ip urd Enables interception of TCP packets sent to the reserved URD port 465
on an interface and processing of URD channel subscription reports.
Note This command is shown in the configuration only to
demonstrate that URD can be configured simultaneously with
SSM mapping; however, it is not required.
access-list 10 permit 232.1.2.10 Configures the ACLs to be used for static SSM mapping.
access-list 11 permit 232.1.2.0
Note These are the ACLs that are referenced by the ip igmp
0.0.0.255
ssm-map static commands in this configuration example.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1063
Multicast Routing
DNS Server Configuration Example
The following example shows how to create a zone and import the zone data using Network Registrar:
The following example shows how to import the zone files from a named.conf file for BIND 8:
Note Network Registrar version 8.0 and later support import BIND 8 format definitions.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1064
CHAPTER 46
Configuring IGMP Snooping and Multicast VLAN
Registration
• Finding Feature Information, on page 1065
• Prerequisites for Configuring IGMP Snooping and MVR, on page 1065
• Restrictions for Configuring IGMP Snooping and MVR, on page 1066
• Information About IGMP Snooping and MVR, on page 1068
• How to Configure IGMP Snooping and MVR, on page 1076
• Monitoring IGMP Snooping and MVR, on page 1105
• Configuration Examples for IGMP Snooping and MVR, on page 1108
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1065
Multicast Routing
Prerequisites for MVR
IP address, the switch uses the first available IP address configured on the switch. The first IP address
available appears in the output of the show ip interface privileged EXEC command. The IGMP snooping
querier does not generate an IGMP general query if it cannot find an available IP address on the switch.
• The IGMP snooping querier supports IGMP Versions 1 and 2.
• When administratively enabled, the IGMP snooping querier moves to the nonquerier state if it detects
the presence of a multicast router in the network.
• When it is administratively enabled, the IGMP snooping querier moves to the operationally disabled
state under these conditions:
• IGMP snooping is disabled in the VLAN.
• PIM is enabled on the SVI of the corresponding VLAN.
Related Topics
Configuring the IGMP Snooping Querier , on page 1090
IGMP Snooping, on page 1068
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1066
Multicast Routing
Restrictions for MVR
• The IGMP throttling action restriction can be applied only to Layer 2 ports. You can use ip igmp
max-groups action replace interface configuration command on a logical EtherChannel interface but
cannot use it on ports that belong to an EtherChannel port group.
When the maximum group limitation is set to the default (no maximum), entering the ip igmp max-groups
action {deny | replace} command has no effect.
If you configure the throttling action and set the maximum group limitation after an interface has added
multicast entries to the forwarding table, the forwarding-table entries are either aged out or removed,
depending on the throttling action.
Related Topics
IGMP Versions, on page 945
Configuring IGMP Profiles , on page 1098
Applying IGMP Profiles , on page 1100
Setting the Maximum Number of IGMP Groups , on page 1101
Configuring the IGMP Throttling Action , on page 1103
IGMP Filtering and Throttling, on page 1075
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1067
Multicast Routing
Information About IGMP Snooping and MVR
stack can have up to four stack members. All switches in a switch stack must be running the LAN Base
image.
Note For more information on IP multicast and IGMP, see RFC 1112 and RFC 2236.
The multicast router ) sends out periodic general queries to all VLANs. All hosts interested in this multicast
traffic send join requests and are added to the forwarding table entry. The switch creates one entry per VLAN
in the IGMP snooping IP multicast forwarding table for each group from which it receives an IGMP join
request.
The switch supports IP multicast group-based bridging, instead of MAC-addressed based groups. With
multicast MAC address-based groups, if an IP address being configured translates (aliases) to a previously
configured MAC address or to any reserved multicast MAC addresses (in the range 224.0.0.xxx), the command
fails. Because the switch uses IP multicast groups, there are no address aliasing issues.
The IP multicast groups learned through IGMP snooping are dynamic. However, you can statically configure
multicast groups by using the ip igmp snooping vlan vlan-id static ip_address interface interface-id global
configuration command. If you specify group membership for a multicast group address statically, your setting
supersedes any automatic manipulation by IGMP snooping. Multicast group membership lists can consist of
both user-defined and IGMP snooping-learned settings.
You can configure an IGMP snooping querier to support IGMP snooping in subnets without multicast interfaces
because the multicast traffic does not need to be routed.
If a port spanning-tree, a port group, or a VLAN ID change occurs, the IGMP snooping-learned multicast
groups from this port on the VLAN are deleted.
These sections describe IGMP snooping characteristics:
Related Topics
Configuring the IGMP Snooping Querier , on page 1090
Prerequisites for IGMP Snooping, on page 1065
Example: Setting the IGMP Snooping Querier Source Address, on page 1108
Example: Setting the IGMP Snooping Querier Maximum Response Time, on page 1109
Example: Setting the IGMP Snooping Querier Timeout, on page 1109
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1068
Multicast Routing
IGMP Versions
IGMP Versions
The switch supports IGMP version 1, IGMP version 2, and IGMP version 3. These versions are interoperable
on the switch. For example, if IGMP snooping is enabled and the querier's version is IGMPv2, and the switch
receives an IGMPv3 report from a host, then the switch can forward the IGMPv3 report to the multicast router.
An IGMPv3 switch can receive messages from and forward messages to a device running the Source Specific
Multicast (SSM) feature.
Related Topics
Changing the IGMP Version, on page 953
Restrictions for IGMP Snooping, on page 1066
When a host connected to the switch wants to join an IP multicast group and it is an IGMP version 2 client,
it sends an unsolicited IGMP join message, specifying the IP multicast group to join. Alternatively, when the
switch receives a general query from the router, it forwards the query to all ports in the VLAN. IGMP version
1 or version 2 hosts wanting to join the multicast group respond by sending a join message to the switch. The
switch CPU creates a multicast forwarding-table entry for the group if it is not already present. The CPU also
adds the interface where the join message was received to the forwarding-table entry. The host associated
with that interface receives multicast traffic for that multicast group.
Router A sends a general query to the switch, which forwards the query to ports 2 through 5, all of which are
members of the same VLAN. Host 1 wants to join multicast group 224.1.2.3 and multicasts an IGMP
membership report (IGMP join message) to the group. The switch CPU uses the information in the IGMP
report to set up a forwarding-table entry that includes the port numbers connected to Host 1 and to the router.
224.1.2.3 IGMP 1, 2
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1069
Multicast Routing
Leaving a Multicast Group
The switch hardware can distinguish IGMP information packets from other packets for the multicast group.
The information in the table tells the switching engine to send frames addressed to the 224.1.2.3 multicast IP
address that are not IGMP packets to the router and to the host that has joined the group.
Figure 93: Second Host Joining a Multicast Group
If another host (for example, Host 4) sends an unsolicited IGMP join message for the same group, the CPU
receives that message and adds the port number of Host 4 to the forwarding table. Because the forwarding
table directs IGMP messages only to the CPU, the message is not flooded to other ports on the switch. Any
known multicast traffic is forwarded to the group and not to the CPU.
224.1.2.3 IGMP 1, 2, 5
Related Topics
Configuring a Host Statically to Join a Group , on page 1082
Example: Configuring a Host Statically to Join a Group, on page 1108
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1070
Multicast Routing
Immediate Leave
Immediate Leave
The switch uses IGMP snooping Immediate Leave to remove from the forwarding table an interface that sends
a leave message without the switch sending group-specific queries to the interface. The VLAN interface is
pruned from the multicast tree for the multicast group specified in the original leave message. Immediate
Leave ensures optimal bandwidth management for all hosts on a switched network, even when multiple
multicast groups are simultaneously in use.
Immediate Leave is only supported on IGMP version 2 hosts. IGMP version 2 is the default version for the
switch.
Note You should use the Immediate Leave feature only on VLANs where a single host is connected to each port.
If Immediate Leave is enabled on VLANs where more than one host is connected to a port, some hosts may
be dropped inadvertently.
Related Topics
Enabling IGMP Immediate Leave , on page 1083
Example: Enabling IGMP Immediate Leave, on page 1108
Note IGMP report suppression is supported only when the multicast query has IGMPv1 and IGMPv2 reports. This
feature is not supported when the query includes IGMPv3 reports.
The switch uses IGMP report suppression to forward only one IGMP report per multicast router query to
multicast devices. When IGMP report suppression is enabled (the default), the switch sends the first IGMP
report from all hosts for a group to all the multicast routers. The switch does not send the remaining IGMP
reports for the group to the multicast routers. This feature prevents duplicate reports from being sent to the
multicast devices.
If the multicast router query includes requests only for IGMPv1 and IGMPv2 reports, the switch forwards
only the first IGMPv1 or IGMPv2 report from all hosts for a group to all the multicast routers.
If the multicast router query also includes requests for IGMPv3 reports, the switch forwards all IGMPv1,
IGMPv2, and IGMPv3 reports for a group to the multicast devices.
If you disable IGMP report suppression, all IGMP reports are forwarded to the multicast routers.
Related Topics
Disabling IGMP Report Suppression , on page 1092
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1071
Multicast Routing
Default IGMP Snooping Configuration
MVR assumes that subscriber ports subscribe and unsubscribe (join and leave) these multicast streams by
sending out IGMP join and leave messages. These messages can originate from an IGMP version-2-compatible
host with an Ethernet connection. Although MVR operates on the underlying method of IGMP snooping, the
two features operate independently of each other. One can be enabled or disabled without affecting the behavior
of the other feature. However, if IGMP snooping and MVR are both enabled, MVR reacts only to join and
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1072
Multicast Routing
Modes of Operation
leave messages from multicast groups configured under MVR. Join and leave messages from all other multicast
groups are managed by IGMP snooping.
The switch CPU identifies the MVR IP multicast streams and their associated IP multicast group in the switch
forwarding table, intercepts the IGMP messages, and modifies the forwarding table to include or remove the
subscriber as a receiver of the multicast stream, even though the receivers might be in a different VLAN from
the source. This forwarding behavior selectively allows traffic to cross between different VLANs.
Modes of Operation
You can set the switch for compatible or dynamic mode of MVR operation:
• In compatible mode, multicast data received by MVR hosts is forwarded to all MVR data ports, regardless
of MVR host membership on those ports. The multicast data is forwarded only to those receiver ports
that MVR hosts have joined, either by IGMP reports or by MVR static configuration. IGMP reports
received from MVR hosts are never forwarded from MVR data ports that were configured in the switch.
• In dynamic mode, multicast data received by MVR hosts on the switch is forwarded from only those
MVR data and client ports that the MVR hosts have joined, either by IGMP reports or by MVR static
configuration. Any IGMP reports received from MVR hosts are also forwarded from all the MVR data
ports in the host. This eliminates using unnecessary bandwidth on MVR data port links, which occurs
when the switch runs in compatible mode.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1073
Multicast Routing
MVR in a Multicast Television Application
configuration.
In this example configuration, DHCP assigns an IP address to the set-top box or the PC. When a subscriber
selects a channel, the set-top box or PC sends an IGMP report to Switch A to join the appropriate multicast.
If the IGMP report matches one of the configured IP multicast group addresses, the switch CPU modifies the
hardware address table to include this receiver port and VLAN as a forwarding destination of the specified
multicast stream when it is received from the multicast VLAN. Uplink ports that send and receive multicast
data to and from the multicast VLAN are called MVR source ports.
When a subscriber changes channels or turns off the television, the set-top box sends an IGMP leave message
for the multicast stream. The switch CPU sends a MAC-based general query through the receiver port VLAN.
If there is another set-top box in the VLAN still subscribing to this group, that set-top box must respond within
the maximum response time specified in the query. If the CPU does not receive a response, it eliminates the
receiver port as a forwarding destination for this group.
Without Immediate Leave, when the switch receives an IGMP leave message from a subscriber on a receiver
port, it sends out an IGMP query on that port and waits for IGMP group membership reports. If no reports
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1074
Multicast Routing
Default MVR Configuration
are received in a configured time period, the receiver port is removed from multicast group membership. With
Immediate Leave, an IGMP query is not sent from the receiver port on which the IGMP leave was received.
As soon as the leave message is received, the receiver port is removed from multicast group membership,
which speeds up leave latency. Enable the Immediate-Leave feature only on receiver ports to which a single
receiver device is connected.
MVR eliminates the need to duplicate television-channel multicast traffic for subscribers in each VLAN.
Multicast traffic for all channels is only sent around the VLAN trunk once—only on the multicast VLAN.
The IGMP leave and join messages are in the VLAN to which the subscriber port is assigned. These messages
dynamically register for streams of multicast traffic in the multicast VLAN on the Layer 3 device. The access
layer switch, Switch A, modifies the forwarding behavior to allow the traffic to be forwarded from the multicast
VLAN to the subscriber port in a different VLAN, selectively allowing traffic to cross between two VLANs.
IGMP reports are sent to the same IP multicast group address as the multicast data. The Switch A CPU must
capture all IGMP join and leave messages from receiver ports and forward them to the multicast VLAN of
the source (uplink) port, based on the MVR mode.
Mode Compatible
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1075
Multicast Routing
Default IGMP Filtering and Throttling Configuration
the forwarding of IP multicast traffic. The filtering feature operates in the same manner whether CGMP or
MVR is used to forward the multicast traffic.
IGMP filtering applies only to the dynamic learning of IP multicast group addresses, not static configuration.
With the IGMP throttling feature, you can set the maximum number of IGMP groups that a Layer 2 interface
can join. If the maximum number of IGMP groups is set, the IGMP snooping forwarding table contains the
maximum number of entries, and the interface receives an IGMP join report, you can configure an interface
to drop the IGMP report or to replace the randomly selected multicast entry with the received IGMP report.
Note IGMPv3 join and leave messages are not supported on switches running IGMP filtering.
Related Topics
Configuring IGMP Profiles , on page 1098
Applying IGMP Profiles , on page 1100
Setting the Maximum Number of IGMP Groups , on page 1101
Configuring the IGMP Throttling Action , on page 1103
Restrictions for IGMP Snooping, on page 1066
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1076
Multicast Routing
Enabling or Disabling IGMP Snooping on a Switch
Global IGMP snooping overrides the VLAN IGMP snooping. If global snooping is disabled, you cannot
enable VLAN snooping. If global snooping is enabled, you can enable or disable VLAN snooping.
Follow these steps to globally enable IGMP snooping on the switch:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping
4. end
5. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip igmp snooping Globally enables IGMP snooping in all existing VLAN
interfaces.
Example:
Note To globally disable IGMP snooping on all VLAN
SwitchDevice(config)# ip igmp snooping interfaces, use the no ip igmp snooping global
configuration command.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Default IGMP Snooping Configuration, on page 1072
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1077
Multicast Routing
Enabling or Disabling IGMP Snooping on a VLAN Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping vlan vlan-id
4. end
5. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip igmp snooping vlan vlan-id Enables IGMP snooping on the VLAN interface. The VLAN
ID range is 1 to 1001 and 1006 to 4094.
Example:
IGMP snooping must be globally enabled before you can
SwitchDevice(config)# ip igmp snooping vlan 7 enable VLAN snooping.
Note To disable IGMP snooping on a VLAN interface,
use the no ip igmp snooping vlan vlan-id global
configuration command for the specified VLAN
number.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1078
Multicast Routing
Setting the Snooping Method
Related Topics
Default IGMP Snooping Configuration, on page 1072
You can configure the switch either to snoop on IGMP queries and PIM/DVMRP packets or to listen to CGMP
self-join or proxy-join packets. By default, the switch snoops on PIM/DVMRP packets on all VLANs. To
learn of multicast router ports through only CGMP packets, use the ip igmp snooping vlan vlan-id mrouter
learn cgmp global configuration command. When this command is entered, the router listens to only CGMP
self-join and CGMP proxy-join packets and to no other CGMP packets. To learn of multicast router ports
through only PIM-DVMRP packets, use the ip igmp snooping vlan vlan-id mrouter learn pim-dvmrp
global configuration command.
If you want to use CGMP as the learning method and no multicast routers in the VLAN are CGMP
proxy-enabled, you must enter the ip cgmp router-only command to dynamically access the router.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping vlan vlan-id mrouter learn {cgmp | pim-dvmrp }
4. end
5. show ip igmp snooping
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1079
Multicast Routing
Configuring a Multicast Router Port
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note Static connections to multicast routers are supported only on switch ports.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping vlan vlan-id mrouter interface interface-id
4. end
5. show ip igmp snooping mrouter [vlan vlan-id]
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1080
Multicast Routing
Configuring a Multicast Router Port
DETAILED STEPS
SwitchDevice> enable
Step 3 ip igmp snooping vlan vlan-id mrouter interface Specifies the multicast router VLAN ID and the interface
interface-id to the multicast router.
Example: • The VLAN ID range is 1 to 1001 and 1006 to 4094.
SwitchDevice(config)# end
Step 5 show ip igmp snooping mrouter [vlan vlan-id] Verifies that IGMP snooping is enabled on the VLAN
interface.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Example: Enabling a Static Connection to a Multicast Router, on page 1108
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1081
Multicast Routing
Configuring a Host Statically to Join a Group
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping vlan vlan-id static ip_address interface interface-id
4. end
5. show ip igmp snooping groups
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip igmp snooping vlan vlan-id static ip_address interface Statically configures a Layer 2 port as a member of a
interface-id multicast group:
Example: • vlan-id is the multicast group VLAN ID. The range is
1 to 1001 and 1006 to 4094.
SwitchDevice(config)# ip igmp snooping vlan 105
static 230.0.0.1 interface gigabitethernet1/0/1 • ip-address is the group IP address.
• interface-id is the member port. It can be a physical
interface or a port channel (1 to 128).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1082
Multicast Routing
Enabling IGMP Immediate Leave
SwitchDevice(config)# end
Step 5 show ip igmp snooping groups Verifies the member port and the IP address.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Joining a Multicast Group, on page 1069
Example: Configuring a Host Statically to Join a Group, on page 1108
Note Immediate Leave is supported only on IGMP Version 2 hosts. IGMP Version 2 is the default version for the
switch.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping vlan vlan-id immediate-leave
4. end
5. show ip igmp snooping vlan vlan-id
6. end
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1083
Multicast Routing
Configuring the IGMP Leave Timer
SwitchDevice> enable
Step 3 ip igmp snooping vlan vlan-id immediate-leave Enables IGMP Immediate Leave on the VLAN interface.
Example: Note To disable IGMP Immediate Leave on a VLAN,
use the no ip igmp snooping vlan vlan-id
SwitchDevice(config)# ip igmp snooping vlan 21 immediate-leave global configuration command.
immediate-leave
SwitchDevice(config)# end
Step 5 show ip igmp snooping vlan vlan-id Verifies that Immediate Leave is enabled on the VLAN
interface.
Example:
SwitchDevice(config)# end
Related Topics
Immediate Leave , on page 1071
Example: Enabling IGMP Immediate Leave, on page 1108
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping last-member-query-interval time
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1084
Multicast Routing
Configuring the IGMP Leave Timer
DETAILED STEPS
SwitchDevice> enable
Step 3 ip igmp snooping last-member-query-interval time Configures the IGMP leave timer globally. The range is
100 to 32767 milliseconds.
Example:
The default leave time is 1000 milliseconds.
SwitchDevice(config)# ip igmp snooping
last-member-query-interval 1000
Note To globally reset the IGMP leave timer to the
default setting, use the no ip igmp snooping
last-member-query-interval global
configuration command.
Step 4 ip igmp snooping vlan vlan-id (Optional) Configures the IGMP leave time on the VLAN
last-member-query-interval time interface. The range is 100 to 32767 milliseconds.
Example: Note Configuring the leave time on a VLAN overrides
the globally configured timer.
SwitchDevice(config)# ip igmp snooping vlan 210
last-member-query-interval 1000 Note To remove the configured IGMP leave-time
setting from the specified VLAN, use the no ip
igmp snooping vlan vlan-id
last-member-query-interval global
configuration command.
SwitchDevice(config)# end
Step 6 show ip igmp snooping (Optional) Displays the configured IGMP leave time.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1085
Multicast Routing
Configuring TCN-Related Commands
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Configurable-Leave Timer, on page 1071
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping tcn flood query count count
4. end
5. show ip igmp snooping
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1086
Multicast Routing
Recovering from Flood Mode
Step 3 ip igmp snooping tcn flood query count count Specifies the number of IGMP general queries for which
the multicast traffic is flooded.
Example:
The range is 1 to 10. The default, the flooding query count
SwitchDevice(config)# ip igmp snooping tcn flood is 2.
query count 3
Note To return to the default flooding query count,
use the no ip igmp snooping tcn flood query
count global configuration command.
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping tcn query solicit
4. end
5. show ip igmp snooping
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1087
Multicast Routing
Disabling Multicast Flooding During a TCN Event
DETAILED STEPS
SwitchDevice> enable
Step 3 ip igmp snooping tcn query solicit Sends an IGMP leave message (global leave) to speed the
process of recovering from the flood mode caused during
Example:
a TCN event. By default, query solicitation is disabled.
SwitchDevice(config)# ip igmp snooping tcn query Note To return to the default query solicitation, use
solicit the no ip igmp snooping tcn query solicit
global configuration command.
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1088
Multicast Routing
Disabling Multicast Flooding During a TCN Event
2. configure terminal
3. interface interface-id
4. no ip igmp snooping tcn flood
5. end
6. show ip igmp snooping
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
Step 4 no ip igmp snooping tcn flood Disables the flooding of multicast traffic during a
spanning-tree TCN event.
Example:
By default, multicast flooding is enabled on an interface.
SwitchDevice(config-if)# no ip igmp snooping tcn
flood
Note To re-enable multicast flooding on an interface,
use the ip igmp snooping tcn flood interface
configuration command.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1089
Multicast Routing
Configuring the IGMP Snooping Querier
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp snooping querier
4. ip igmp snooping querier address ip_address
5. ip igmp snooping querier query-interval interval-count
6. ip igmp snooping querier tcn query [count count | interval interval]
7. ip igmp snooping querier timer expiry timeout
8. ip igmp snooping querier version version
9. end
10. show ip igmp snooping vlan vlan-id
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1090
Multicast Routing
Configuring the IGMP Snooping Querier
Step 5 ip igmp snooping querier query-interval interval-count (Optional) Sets the interval between IGMP queriers. The
range is 1 to 18000 seconds.
Example:
Step 6 ip igmp snooping querier tcn query [count count | (Optional) Sets the time between Topology Change
interval interval] Notification (TCN) queries. The count range is 1 to 10.
The interval range is 1 to 255 seconds.
Example:
Step 7 ip igmp snooping querier timer expiry timeout (Optional) Sets the length of time until the IGMP querier
expires. The range is 60 to 300 seconds.
Example:
Step 8 ip igmp snooping querier version version (Optional) Selects the IGMP version number that the
querier feature uses. Select 1 or 2.
Example:
SwitchDevice(config)# end
Step 10 show ip igmp snooping vlan vlan-id (Optional) Verifies that the IGMP snooping querier is
enabled on the VLAN interface. The VLAN ID range is
Example:
1 to 1001 and 1006 to 4094.
SwitchDevice# show ip igmp snooping vlan 30
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1091
Multicast Routing
Disabling IGMP Report Suppression
Related Topics
IGMP Snooping, on page 1068
Prerequisites for IGMP Snooping, on page 1065
Example: Setting the IGMP Snooping Querier Source Address, on page 1108
Example: Setting the IGMP Snooping Querier Maximum Response Time, on page 1109
Example: Setting the IGMP Snooping Querier Timeout, on page 1109
Example: Setting the IGMP Snooping Querier Feature, on page 1109
SUMMARY STEPS
1. enable
2. configure terminal
3. no ip igmp snooping report-suppression
4. end
5. show ip igmp snooping
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1092
Multicast Routing
Configuring MVR Global Parameters
SwitchDevice(config)# end
Step 5 show ip igmp snooping Verifies that IGMP report suppression is disabled.
Example:
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Report Suppression, on page 1071
Note For complete syntax and usage information for the commands used in this section, see the command reference
for this release.
SUMMARY STEPS
1. enable
2. configure terminal
3. mvr
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1093
Multicast Routing
Configuring MVR Global Parameters
DETAILED STEPS
SwitchDevice> enable
Step 4 mvr group ip-address [count] Configures an IP multicast address on the switch or use
the count parameter to configure a contiguous series of
Example:
MVR group addresses (the range for count is 1 to 256; the
default is 1). Any multicast data sent to this address is sent
SwitchDevice(config)# mvr group
228.1.23.4 to all source ports on the switch and all receiver ports that
have elected to receive data on that multicast address. Each
multicast address would correspond to one television
channel.
Note To return the switch to its default settings, use
the no mvr [mode | group ip-address |
querytime | vlan] global configuration
commands.
Step 5 mvr querytime value (Optional) Defines the maximum time to wait for IGMP
report memberships on a receiver port before removing
Example:
the port from multicast group membership. The value is
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1094
Multicast Routing
Configuring MVR Global Parameters
Step 6 mvr vlan vlan-id (Optional) Specifies the VLAN in which multicast data is
received; all source ports must belong to this VLAN. The
Example:
VLAN range is 1 to 1001 and 1006 to 4094. The default
is VLAN 1.
SwitchDevice(config)# mvr vlan 22
Step 7 mvr mode {dynamic | compatible} (Optional) Specifies the MVR mode of operation:
Example: • dynamic—Allows dynamic MVR membership on
source ports.
SwitchDevice(config)# mvr mode
dynamic • compatible—Is compatible with Catalyst 3500 XL
and Catalyst 2900 XL switches and does not support
IGMP dynamic joins on source ports.
SwitchDevice(config)# end
OR
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1095
Multicast Routing
Configuring MVR Interfaces
SUMMARY STEPS
1. enable
2. configure terminal
3. mvr
4. interface interface-id
5. mvr type {source | receiver}
6. mvr vlan vlan-id group [ip-address]
7. mvr immediate
8. end
9. Use one of the following:
• show mvr
• show mvr interface
• show mvr members
10. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 interface interface-id Specifies the Layer 2 port to configure, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1096
Multicast Routing
Configuring MVR Interfaces
Step 6 mvr vlan vlan-id group [ip-address] (Optional) Statically configures a port to receive multicast
traffic sent to the multicast VLAN and the IP multicast
Example:
address. A port statically configured as a member of a
group remains a member of the group until statically
SwitchDevice(config-if)# mvr vlan 22 group
228.1.23.4 removed.
Note In compatible mode, this command applies to
only receiver ports. In dynamic mode, it applies
to receiver ports and source ports.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1097
Multicast Routing
Configuring IGMP Profiles
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip igmp profile profile number
4. permit | deny
5. range ip multicast address
6. end
7. show ip igmp profile profile number
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1098
Multicast Routing
Configuring IGMP Profiles
Step 3 ip igmp profile profile number Assigns a number to the profile you are configuring, and
enters IGMP profile configuration mode. The profile
Example:
number range is 1 to 4294967295. When you are in IGMP
profile configuration mode, you can create the profile by
SwitchDevice(config)# ip igmp profile 3
using these commands:
• deny—Specifies that matching addresses are denied;
this is the default.
• exit—Exits from igmp-profile configuration mode.
• no—Negates a command or returns to its defaults.
• permit—Specifies that matching addresses are
permitted.
• range—Specifies a range of IP addresses for the
profile. You can enter a single IP address or a range
with a start and an end address.
Step 4 permit | deny (Optional) Sets the action to permit or deny access to the
IP multicast address. If no action is configured, the default
Example:
for the profile is to deny access.
SwitchDevice(config-igmp-profile)# permit
Step 5 range ip multicast address Enters the IP multicast address or range of IP multicast
addresses to which access is being controlled. If entering a
Example:
range, enter the low IP multicast address, a space, and the
high IP multicast address.
SwitchDevice(config-igmp-profile)# range 229.9.9.0
You can use the range command multiple times to enter
multiple addresses or ranges of addresses.
Note To delete an IP multicast address or range of IP
multicast addresses, use the no range ip
multicast address IGMP profile configuration
command.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1099
Multicast Routing
Applying IGMP Profiles
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Filtering and Throttling, on page 1075
Restrictions for IGMP Snooping, on page 1066
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp filter profile number
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1100
Multicast Routing
Setting the Maximum Number of IGMP Groups
SwitchDevice> enable
Step 3 interface interface-id Specifies the physical interface, and enters interface
configuration mode. The interface must be a Layer 2 port
Example:
that does not belong to an EtherChannel port group.
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 ip igmp filter profile number Applies the specified IGMP profile to the interface. The
range is 1 to 4294967295.
Example:
Note To remove a profile from an interface, use the
SwitchDevice(config-if)# ip igmp filter 321 no ip igmp filter profile number interface
configuration command.
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Filtering and Throttling, on page 1075
Restrictions for IGMP Snooping, on page 1066
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1101
Multicast Routing
Setting the Maximum Number of IGMP Groups
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp max-groups number
5. end
6. show running-config interface interface-id
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode. The interface can be a Layer 2 port
Example:
that does not belong to an EtherChannel group or a
EtherChannel interface.
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 4 ip igmp max-groups number Sets the maximum number of IGMP groups that the
interface can join. The range is 0 to 4294967294. The
Example:
default is to have no maximum set.
SwitchDevice(config-if)# ip igmp max-groups 20 Note To remove the maximum group limitation and
return to the default of no maximum, use the no
ip igmp max-groups interface configuration
command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1102
Multicast Routing
Configuring the IGMP Throttling Action
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Filtering and Throttling, on page 1075
Restrictions for IGMP Snooping, on page 1066
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip igmp max-groups action {deny | replace}
5. end
6. show running-config interface interface-id
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1103
Multicast Routing
Configuring the IGMP Throttling Action
Step 3 interface interface-id Specifies the physical interface to be configured, and enters
interface configuration mode. The interface can be a Layer
Example:
2 port that does not belong to an EtherChannel group or an
EtherChannel interface. The interface cannot be a trunk
SwitchDevice(config)# interface gigabitethernet
1/0/1 port.
Step 4 ip igmp max-groups action {deny | replace} When an interface receives an IGMP report and the
maximum number of entries is in the forwarding table,
Example:
specifies the action that the interface takes:
SwitchDevice(config-if)# ip igmp max-groups action • deny—Drops the report. If you configure this throttling
replace action, the entries that were previously in the
forwarding table are not removed but are aged out.
After these entries are aged out and the maximum
number of entries is in the forwarding table, the switch
drops the next IGMP report received on the interface.
• replace—Replaces the existing group with the new
group for which the IGMP report was received. If you
configure this throttling action, the entries that were
previously in the forwarding table are removed. When
the maximum number of entries is in the forwarding
table, the switch replaces a randomly selected entry
with the received IGMP report.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1104
Multicast Routing
Monitoring IGMP Snooping and MVR
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IGMP Filtering and Throttling, on page 1075
Restrictions for IGMP Snooping, on page 1066
Command Purpose
show ip igmp snooping [vlan vlan-id Displays the snooping configuration information for all VLANs
[detail] ] on the switch or for a specified VLAN.
(Optional) Enter vlan vlan-id to display information for a single
VLAN. The VLAN ID range is 1 to 1001 and 1006 to 4094.
show ip igmp snooping groups [count Displays multicast table information for the switch or about a
|dynamic [count] | user [count]] specific parameter:
• count—Displays the total number of entries for the
specified command options instead of the actual entries.
• dynamic—Displays entries learned through IGMP
snooping.
• user—Displays only the user-configured multicast entries.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1105
Multicast Routing
Monitoring MVR
Command Purpose
show ip igmp snooping groups vlan Displays multicast table information for a multicast VLAN or
vlan-id [ip_address | count | dynamic about a specific parameter for the VLAN:
[count] | user[count]]
• vlan-id—The VLAN ID range is 1 to 1001 and 1006 to
4094.
• count—Displays the total number of entries for the
specified command options instead of the actual entries.
• dynamic—Displays entries learned through IGMP
snooping.
• ip_address—Displays characteristics of the multicast group
with the specified group IP address.
• user—Displays only the user-configured multicast entries.
show ip igmp snooping mrouter [vlan Displays information on dynamically learned and manually
vlan-id] configured multicast router interfaces.
Note When you enable IGMP snooping, the switch
automatically learns the interface to which a
multicast router is connected. These are dynamically
learned interfaces.
show ip igmp snooping querier [vlan Displays information about the IP address and receiving port
vlan-id] detail of the most-recently received IGMP query message in the
VLAN and the configuration and operational state of the IGMP
snooping querier in the VLAN.
Monitoring MVR
You can monitor MVR for the switch or for a specified interface by displaying the following MVR information.
Command Purpose
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1106
Multicast Routing
Monitoring IGMP Filtering and Throttling Configuration
Command Purpose
show mvr interface [interface-id] [members [vlan Displays all MVR interfaces and their MVR
vlan-id]] configurations.
When a specific interface is entered, displays this
information:
• Type—Receiver or Source
• Status—One of these:
• Active means the port is part of a VLAN.
• Up/Down means that the port is forwarding
or nonforwarding.
• Inactive means that the port is not part of
any VLAN.
show mvr members [ip-address] Displays all receiver and source ports that are
members of any IP multicast group or the specified
IP multicast group IP address.
Table 124: Commands for Displaying IGMP Filtering and Throttling Configuration
Command Purpose
show ip igmp profile [profile number] Displays the specified IGMP profile or all the IGMP
profiles defined on the switch.
show running-config [interface interface-id] Displays the configuration of the specified interface
or the configuration of all interfaces on the switch,
including (if configured) the maximum number of
IGMP groups to which an interface can belong and
the IGMP profile applied to the interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1107
Multicast Routing
Configuration Examples for IGMP Snooping and MVR
Related Topics
Configuring a Multicast Router Port , on page 1080
Related Topics
Configuring a Host Statically to Join a Group , on page 1082
Joining a Multicast Group, on page 1069
Related Topics
Enabling IGMP Immediate Leave , on page 1083
Immediate Leave , on page 1071
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1108
Multicast Routing
Example: Setting the IGMP Snooping Querier Maximum Response Time
Related Topics
Configuring the IGMP Snooping Querier , on page 1090
IGMP Snooping, on page 1068
Related Topics
Configuring the IGMP Snooping Querier , on page 1090
IGMP Snooping, on page 1068
Related Topics
Configuring the IGMP Snooping Querier , on page 1090
IGMP Snooping, on page 1068
Related Topics
Configuring the IGMP Snooping Querier , on page 1090
IGMP Snooping, on page 1068
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1109
Multicast Routing
Example: Applying IGMP Profile
SwitchDevice(config-igmp-profile)# end
SwitchDevice# show ip igmp profile 4
IGMP Profile 4
permit
range 229.9.9.0 229.9.9.0
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1110
CHAPTER 47
Configuring MSDP
• Finding Feature Information, on page 1111
• Prerequisites for MSDP, on page 1111
• Information About Multicast Source Discovery Protocol, on page 1111
• How to Configure MSDP, on page 1118
• Monitoring and Maintaining MSDP, on page 1137
• Configuration Examples for Configuring MSDP, on page 1141
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1111
Multicast Routing
Note If the RP either has no shared tree for a particular group or a shared tree whose outgoing interface list is null,
it does not send a join to the source in another domain.
When MSDP is enabled, an RP in a PIM-SM domain maintains MSDP peering relationships with
MSDP-enabled devices in other domains. This peering relationship occurs over a TCP connection, where
primarily a list of sources sending to multicast groups is exchanged. MSDP uses TCP (port 639) for its peering
connections. As with BGP, using point-to-point TCP peering means that each peer must be explicitly configured.
The TCP connections between RPs, moreover, are achieved by the underlying routing system. The receiving
RP uses the source lists to establish a source path. If the multicast sources are of interest to a domain that has
receivers, multicast data is delivered over the normal, source-tree building mechanism provided by PIM-SM.
MSDP is also used to announce sources sending to a group. These announcements must originate at the RP
of the domain.
The figure illustrates MSDP operating between two MSDP peers. PIM uses MSDP as the standard mechanism
to register a source with the RP of a domain.
Figure 95: MSDP Running Between RP Peers
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1112
Multicast Routing
MSDP Benefits
Note The DR sends the encapsulated data to the RP only once per source (when the source goes active). If the
source times out, this process happens again when it goes active again. This situation is different from the
periodic SA message that contains all sources that are registered to the originating RP. Those SA messages
are MSDP control packets, and, thus, do not contain encapsulated data from active sources.
1. The SA message identifies the source address, the group that the source is sending to, and the address or
the originator ID of the RP, if configured.
2. Each MSDP peer that receives the SA message floods the SA message to all of its peers downstream from
the originator. In some cases (such as the case with the RPs in PIM-SM domains B and C in the figure),
an RP may receive a copy of an SA message from more than one MSDP peer. To prevent looping, the
RP consults the BGP next-hop database to determine the next hop toward the originator of the SA message.
If both MBGP and unicast BGP are configured, MBGP is checked first, and then unicast BGP. That
next-hop neighbor is the RPF-peer for the originator. SA messages that are received from the originator
on any interface other than the interface to the RPF peer are dropped. The SA message flooding process,
therefore, is referred to as peer-RPF flooding. Because of the peer-RPF flooding mechanism, BGP or
MBGP must be running in conjunction with MSDP.
1. When an RP receives an SA message, it checks to see whether there are any members of the advertised
groups in its domain by checking to see whether there are interfaces on the group’s (*, G) outgoing
interface list. If there are no group members, the RP does nothing. If there are group members, the RP
sends an (S, G) join toward the source. As a result, a branch of the interdomain source tree is constructed
across autonomous system boundaries to the RP. As multicast packets arrive at the RP, they are then
forwarded down its own shared tree to the group members in the RP’s domain. The members’ DRs then
have the option of joining the rendezvous point tree (RPT) to the source using standard PIM-SM procedures.
2. The originating RP continues to send periodic SA messages for the (S, G) state every 60 seconds for as
long as the source is sending packets to the group. When an RP receives an SA message, it caches the SA
message. Suppose, for example, that an RP receives an SA message for (172.16.5.4, 228.1.2.3) from
originating RP 10.5.4.3. The RP consults its mroute table and finds that there are no active members for
group 228.1.2.3, so it passes the SA message to its peers downstream of 10.5.4.3. If a host in the domain
then sends a join to the RP for group 228.1.2.3, the RP adds the interface toward the host to the outgoing
interface list of its (*, 224.1.2.3) entry. Because the RP caches SA messages, the device will have an entry
for (172.16.5.4, 228.1.2.3) and can join the source tree as soon as a host requests a join.
Note In all current and supported software releases, caching of MSDP SA messages is mandatory and cannot be
manually enabled or disabled. By default, when an MSDP peer is configured, the ip multicast cache-sa-state
command will automatically be added to the running configuration.
MSDP Benefits
MSDP has these benefits:
• It breaks up the shared multicast distribution tree. You can make the shared tree local to your domain.
Your local members join the local tree, and join messages for the shared tree never need to leave your
domain.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1113
Multicast Routing
Default MSDP Peers
• PIM sparse-mode domains can rely only on their own RPs, decreasing reliance on RPs in another domain.
This increases security because you can prevent your sources from being known outside your domain.
• Domains with only receivers can receive data without globally advertising group membership.
• Global source multicast routing table state is not required, saving memory.
Device B advertises SAs to Device A and Device C, but uses only Device A or Device C to accept SA messages.
If Device A is first in the configuration, it will be used if it is up and running. Only when Device A is not
running will Device B accept SAs from Device C. This is the behavior without a prefix list.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1114
Multicast Routing
MSDP Mesh Groups
If you specify a prefix list, the peer will be a default peer only for the prefixes in the list. You can have multiple
active default peers when you have a prefix list associated with each. When you do not have any prefix lists,
you can configure multiple default peers, but only the first one is the active default peer as long as the device
has connectivity to this peer and the peer is alive. If the first configured peer goes down or the connectivity
to this peer goes down, the second configured peer becomes the active default, and so on.
SA Origination Filters
By default, an RP that is configured to run MSDP will originate SA messages for all local sources for which
it is the RP. Local sources that register with an RP, therefore, will be advertised in SA messages, which in
some cases is not desirable. For example, if sources inside a PIM-SM domain are using private addresses (for
example, network 10.0.0.0/8), you should configure an SA origination filter to restrict those addresses from
being advertised to other MSDP peers across the Internet.
To control what sources are advertised in SA messages, you can configure SA origination filters on an RP.
By creating SA origination filters, you can control the sources advertised in SA messages as follows:
• You can configure an RP to prevent the device from advertising local sources in SA messages. The device
will still forward SA messages from other MSDP peers in the normal fashion; it will just not originate
any SA messages for local sources.
• You can configure the device to only originate SA messages for local sources sending to specific groups
that match (S, G) pairs defined in the extended access list. All other local sources will not be advertised
in SA messages.
• You can configure the device to only originate SA messages for local sources sending to specific groups
that the match AS paths defined in an AS-path access list. All other local sources will not be advertised
in SA messages.
• You can configure the device to only originate SA messages for local sources that match the criteria
defined in the route map. All other local sources will not be advertised in SA messages.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1115
Multicast Routing
Use of Outgoing Filter Lists in MSDP
• You configure an SA origination filter that includes an extended access list, an AS-path access list, and
route map, or a combination thereof. In this case, all conditions must be true before any local sources
are advertised in SA messages.
Caution Arbitrary filtering of SA messages can result in downstream MSDP peers being starved of SA messages for
legitimate active sources. Care, therefore, should be taken when using these sorts of filters. Normally, outgoing
filter lists are used only to reject undesirable sources, such as sources using private addresses.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1116
Multicast Routing
TTL Thresholds in MSDP
• You can filter all incoming SA messages from a specified MSDP peer by configuring the device to ignore
all SA messages sent to it from the specified MSDP peer.
• You can filter a subset of incoming SA messages from a specified peer based on (S, G) pairs defined in
an extended access list by configuring the device to only receive SA messages from the MSDP peer that
match the (S, G) pairs defined in the extended access list. All other incoming SA messages from the
MSDP peer will be ignored.
• You can filter a subset of incoming SA request messages from a specified peer based on match criteria
defined in a route map by configuring the device to only receive SA messages that match the criteria
defined in the route map. All other incoming SA messages from the MSDP peer will be ignored.
• You can filter a subset of incoming SA messages from a specified peer based on both (S, G) pairs defined
in an extended access list and on match criteria defined in a route map by configuring the device to only
receive incoming SA messages that both match the (S, G) pairs defined in the extended access list and
match the criteria defined in the route map. All other incoming SA messages from the MSDP peer will
be ignored.
• You can filter a subset of incoming SA messages from a specified peer based on the announcing RP
address contained in the SA message by configuring the device to filter incoming SA messages based
on their origin, even after the SA message may have already been transmitted across one or more MSDP
peers.
• You can configure an incoming filter list that includes an extended access list, a route map, and either
an RP access list or an RP route map. In this case, all conditions must be true for the MSDP peer to
receive the incoming SA message.
Caution Arbitrary filtering of SA messages can result in downstream MSDP peers being starved of SA messages for
legitimate active sources. Care, therefore, should be taken when using these sorts of filters. Normally, incoming
filter lists are used only to reject undesirable sources, such as sources using private addresses.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1117
Multicast Routing
MSDP Message Types
SA Messages
SA messages are used to advertise active sources in a domain. In addition, these SA messages may contain
the initial multicast data packet that was sent by the source.
SA messages contain the IP address of the originating RP and one or more (S, G) pairs being advertised. In
addition, the SA message may contain an encapsulated data packet.
SA Request Messages
SA request messages are used to request a list of active sources for a specific group. These messages are sent
to an MSDP SA cache that maintains a list of active (S, G) pairs in its SA cache. Join latency can be reduced
by using SA request messages to request the list of active sources for a group instead of having to wait up to
60 seconds for all active sources in the group to be readvertised by originating RPs.
SA Response Messages
SA response messages are sent by the MSDP peer in response to an SA request message. SA response messages
contain the IP address of the originating RP and one or more (S, G) pairs of the active sources in the originating
RP’s domain that are stored in the cache.
Keepalive Messages
Keepalive messages are sent every 60 seconds in order to keep the MSDP session active. If no keepalive
messages or SA messages are received for 75 seconds, the MSDP session is reset.
Procedure
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1118
Multicast Routing
Configuring a Default MSDP Peer
SwitchDevice> enable
Step 3 ip msdp default-peer ip-address | name [prefix-list list] Defines a default peer from which to accept all MSDP SA
messages.
Example:
• For ip-address | name, enter the IP address or Domain
Router(config)# ip msdp default-peer 10.1.1.1 Name System (DNS) server name of the MSDP default
prefix-list site-a peer.
• (Optional) For prefix-list list, enter the list name that
specifies the peer to be the default peer only for the
listed prefixes. You can have multiple active default
peers when you have a prefix list associated with each.
When you enter multiple ip msdp default-peer
commands with the prefix-list keyword, you use all
the default peers at the same time for different RP
prefixes. This syntax is typically used in a service
provider cloud that connects stub site clouds.
When you enter multiple ip msdp default-peer
commands without the prefix-list keyword, a single
active peer accepts all SA messages. If that peer fails,
the next configured default peer accepts all SA
messages. This syntax is typically used at a stub site.
Step 4 ip prefix-list name [description string] | seq number (Optional) Creates a prefix list using the name specified in
{permit | deny} network length Step 2.
Example: • (Optional) For description string, enter a description
of up to 80 characters to describe this prefix list.
Router(config)# prefix-list site-a seq 3 permit 12
network length 128 • For seq number, enter the sequence number of the
entry. The range is 1 to 4294967294.
• The deny keyword denies access to matching
conditions.
• The permit keyword permits access to matching
conditions.
• For network length, specify the network number and
length (in bits) of the network mask that is permitted
or denied.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1119
Multicast Routing
Caching Source-Active State
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1120
Multicast Routing
Caching Source-Active State
Step 4 access-list access-list-number {deny | permit} protocol Creates an IP extended access list, repeating the command
source source-wildcard destination destination-wildcard as many times as necessary.
Example: • For access-list-number, the range is 100 to 199. Enter
the same number created in Step 2.
SwitchDevice(config)# access-list 100 permit ip
171.69.0.0 0.0.255.255 224.2.0.0 0.0.255.255 • The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the
conditions are matched.
• For protocol, enter ip as the protocol name.
• For source, enter the number of the network or host
from which the packet is being sent.
• For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place
ones in the bit positions that you want to ignore.
• For destination, enter the number of the network or
host to which the packet is being sent.
• For destination-wildcard, enter the wildcard bits in
dotted decimal notation to be applied to the destination.
Place ones in the bit positions that you want to ignore.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1121
Multicast Routing
Requesting Source Information from an MSDP Peer
Procedure
SwitchDevice> enable
Step 3 ip msdp sa-request {ip-address | name} Configure the Switch to send SA request messages to the
specified MSDP peer.
Example:
For ip-address | name, enter the IP address or name of the
SwitchDevice(config)# ip msdp sa-request 171.69.1.1 MSDP peer from which the local Switch requests SA
messages when a new member for a group becomes active.
Repeat the command for each MSDP peer that you want to
supply with SA messages.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1122
Multicast Routing
Controlling Source Information that Your Switch Originates
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
For more information, see the Redistributing Sources, on page 1123 and the Filtering Source-Active Request
Messages, on page 1125.
Redistributing Sources
SA messages originate on RPs to which sources have registered. By default, any source that registers with an
RP is advertised. The A flag is set in the RP when a source is registered, which means the source is advertised
in an SA unless it is filtered.
Follow these steps to further restrict which registered sources are advertised:
Procedure
SwitchDevice> enable
Step 3 ip msdp redistribute [list access-list-name] [asn Configures which (S,G) entries from the multicast routing
aspath-access-list-number] [route-map map] table are advertised in SA messages.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1123
Multicast Routing
Redistributing Sources
Step 4 Use one of the following: Creates an IP standard access list, repeating the command
as many times as necessary.
• access-listaccess-list-number
{deny|permit} or
source
Creates an IP extended access list, repeating the command
[source-wildcard]
as many times as necessary.
• access-listaccess-list-number
{deny|permit} • access-list-number—Enters the same number created
protocol source source-wildcard destination in Step 2. The range is 1 to 99 for standard access lists
destination-wildcard and 100 to 199 for extended lists.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1124
Multicast Routing
Filtering Source-Active Request Messages
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Procedure
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1125
Multicast Routing
Filtering Source-Active Request Messages
Step 4 access-list access-list-number {deny | permit} source Creates an IP standard access list, repeating the command
[source-wildcard] as many times as necessary.
Example: • For access-list-number, the range is 1 to 99.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1126
Multicast Routing
Controlling Source Information that Your Switch Forwards
Using a Filter
By creating a filter, you can perform one of these actions:
• Filter all source/group pairs
• Specify an IP extended access list to pass only certain source/group pairs
• Filter based on match criteria in a route map
Procedure
SwitchDevice> enable
Step 3 Use one of the following: • Filters all SA messages to the specified MSDP peer.
• ip msdp sa-filter out • Passes only those SA messages that pass the IP
extended access list to the specified peer. The range
{ip-address name} for the extended access-list-number is 100 to 199.
• ip msdp sa-filter out
If both the list and the route-map keywords are used,
all conditions must be true to pass any (S,G) pair in
{ip-address name}
outgoing SA messages.
list access-list-number
• ip msdp sa-filter out • Passes only those SA messages that meet the match
criteria in the route map map-tag to the specified
{ip-address name} MSDP peer.
route-map map-tag
If all match criteria are true, a permit from the route
Example: map passes routes through the filter. A deny filters
SwitchDevice(config)# ip msdp sa-filter out routes.
switch.cisco.com
or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1127
Multicast Routing
Using a Filter
or
SwitchDevice(config)# ip msdp sa-filter out
switch.cisco.com route-map 22
Step 4 access-list access-list-number {deny | permit} protocol (Optional) Creates an IP extended access list, repeating the
source source-wildcard destination destination-wildcard command as many times as necessary.
Example: • For access-list-number, enter the number specified in
Step 2.
SwitchDevice(config)# access list 100 permit ip
194.1.22.0 1.1.1.1 194.3.44.0 1.1.1.1 • The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the
conditions are matched.
• For protocol, enter ip as the protocol name.
• For source, enter the number of the network or host
from which the packet is being sent.
• For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place
ones in the bit positions that you want to ignore.
• For destination, enter the number of the network or
host to which the packet is being sent.
• For destination-wildcard, enter the wildcard bits in
dotted decimal notation to be applied to the destination.
Place ones in the bit positions that you want to ignore.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1128
Multicast Routing
Using TTL to Limit the Multicast Data Sent in SA Messages
Procedure
SwitchDevice> enable
Step 3 ip msdp ttl-threshold {ip-address | name} ttl Limits which multicast data is encapsulated in the first SA
message to the specified MSDP peer.
Example:
• For ip-address | name, enter the IP address or name of
SwitchDevice(config)# ip msdp ttl-threshold the MSDP peer to which the TTL limitation applies.
switch.cisco.com 0
• For ttl, enter the TTL value. The default is 0, which
means all multicast data packets are forwarded to the
peer until the TTL is exhausted. The range is 0 to 255.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1129
Multicast Routing
Controlling Source Information that Your Switch Receives
Procedure
SwitchDevice> enable
Step 3 Use one of the following: • Filters all SA messages to the specified MSDP peer.
• ip msdp sa-filter in • Passes only those SA messages from the specified peer
that pass the IP extended access list. The range for the
{ip-address name} extended access-list-number is 100 to 199.
• ip msdp sa-filter in
If both the list and the route-map keywords are used,
all conditions must be true to pass any (S,G) pair in
{ip-address name}
outgoing SA messages.
list access-list-number
• ip msdp sa-filter in • Passes only those SA messages from the specified
MSDP peer that meet the match criteria in the route
{ip-address name} map map-tag.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1130
Multicast Routing
Controlling Source Information that Your Switch Receives
or
SwitchDevice(config)# ip msdp sa-filter in list
100
or
SwitchDevice(config)# ip msdp sa-filter in
switch.cisco.com route-map 22
Step 4 access-list access-list-number {deny | permit} protocol (Optional) Creates an IP extended access list, repeating the
source source-wildcard destination destination-wildcard command as many times as necessary.
Example: • access-list-number, enter the number specified in Step
2.
SwitchDevice(config)# access list 100 permit ip
194.1.22.0 1.1.1.1 194.3.44.0 1.1.1.1 • The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the
conditions are matched.
• For protocol, enter ip as the protocol name.
• For source, enter the number of the network or host
from which the packet is being sent.
• For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place
ones in the bit positions that you want to ignore.
• For destination, enter the number of the network or
host to which the packet is being sent.
• For destination-wildcard, enter the wildcard bits in
dotted decimal notation to be applied to the destination.
Place ones in the bit positions that you want to ignore.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1131
Multicast Routing
Configuring an MSDP Mesh Group
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip msdp mesh-group mesh-name {peer-address | peer-name}
4. Repeat Step 3 to add MSDP peers as members of the mesh group.
5. exit
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip msdp mesh-group mesh-name {peer-address | Configures an MSDP mesh group and indicates that an
peer-name} MSDP peer belongs to that mesh group.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1132
Multicast Routing
Shutting Down an MSDP Peer
SwitchDevice(config)# exit
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note When an MSDP peer is shut down, the TCP connection is terminated and not restarted until the peer is brought
back up using the no ip msdp shutdown command (for the specified peer).
SUMMARY STEPS
1. enable
2. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1133
Multicast Routing
Including a Bordering PIM Dense-Mode Region in MSDP
DETAILED STEPS
SwitchDevice> enable
Step 3 ip msdp shutdown {peer-name | peer-address} Administratively shuts down the specified MSDP peer.
Example:
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1134
Multicast Routing
Including a Bordering PIM Dense-Mode Region in MSDP
Note We do not recommend using the ip msdp border sa-address global configuration command. It is better to
configure the border router in the sparse-mode domain to proxy-register sources in the dense-mode domain
to the RP of the sparse-mode domain and have the sparse-mode domain use standard MSDP procedures to
advertise these sources.
The ip msdp originator-id global configuration command also identifies an interface to be used as the RP
address. If both the ip msdp border sa-address and the ip msdp originator-id global configuration commands
are configured, the address derived from the ip msdp originator-id command specifies the RP address.
Follow these steps to configure the border router to send SA messages for sources active in the dense-mode
region to the MSDP peers:
Procedure
SwitchDevice> enable
Step 3 ip msdp border sa-address interface-id Configures the switch on the border between a dense-mode
and sparse-mode region to send SA messages about active
Example:
sources in the dense-mode region.
SwitchDevice(config)# ip msdp border sa-address For interface-id, specifies the interface from which the IP
0/1 address is derived and used as the RP address in SA
messages.
The IP address of the interface is used as the Originator-ID,
which is the RP field in the SA message.
Step 4 ip msdp redistribute [list access-list-name] [asn Configures which (S,G) entries from the multicast routing
aspath-access-list-number] [route-map map] table are advertised in SA messages.
Example: For more information, see the Redistributing Sources, on
page 1123.
SwitchDevice(config)# ip msdp redistribute list
100
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1135
Multicast Routing
Configuring an Originating Address other than the RP Address
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip msdp originator-id
4. exit
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1136
Multicast Routing
Monitoring and Maintaining MSDP
SwitchDevice> enable
SwitchDevice(config)# exit
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. debug ip msdp [peer-address | peer-name] [detail] [routes]
3. debug ip msdp resets
4. show ip msdp count [as-number]
5. show ip msdp peer [peer-address | peer-name]
6. show ip msdp sa-cache [group-address | source-address | group-name | source-name] [as-number]
7. show ip msdp summary
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1137
Multicast Routing
Monitoring MSDP
DETAILED STEPS
Step 1 enable
Example:
Device# enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1138
Multicast Routing
Monitoring MSDP
Use this command to display the number of sources and groups originated in MSDP SA messages and the number of SA
messages from an MSDP peer in the SA cache. The ip msdp cache-sa-state command must be configured for this
command to produce any output.
The following is sample output from the show ip msdp countcommand:
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1139
Multicast Routing
Clearing MSDP Connections Statistics and SA Cache Entries
SUMMARY STEPS
1. enable
2. clear ip msdp peer [peer-address | peer-name]
3. clear ip msdp statistics [peer-address | peer-name]
4. clear ip msdp sa-cache [group-address]
DETAILED STEPS
Device> enable
Step 2 clear ip msdp peer [peer-address | peer-name] Clears the TCP connection to the specified MSDP peer and
resets all MSDP message counters.
Example:
Step 3 clear ip msdp statistics [peer-address | peer-name] Clears the statistics counters for the specified MSDP peer
and resets all MSDP message counters.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1140
Multicast Routing
Configuration Examples for Configuring MSDP
Router C
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1141
Multicast Routing
Controlling Source Information that Your Switch Originates: Example
Device A Configuration
Device B Configuration
Device C Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1142
Multicast Routing
Requesting Source Information from an MSDP Peer: Example
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1143
Multicast Routing
Requesting Source Information from an MSDP Peer: Example
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1144
PA R T IX
Security
• Security Features Overview, on page 1147
• Preventing Unauthorized Access , on page 1151
• Controlling Switch Access with Passwords and Privilege Levels , on page 1153
• Configuring TACACS+ , on page 1171
• Configuring RADIUS , on page 1185
• Configuring Kerberos , on page 1231
• Configuring Local Authentication and Authorization , on page 1237
• Configuring Secure Shell (SSH) , on page 1241
• Configuring Secure Socket Layer HTTP , on page 1251
• Configuring IPv4 ACLs , on page 1263
• Configuring IPv6 ACLs, on page 1313
• Configuring DHCP , on page 1323
• Configuring IP Source Guard , on page 1345
• Configuring Dynamic ARP Inspection, on page 1353
• Configuring IEEE 802.1x Port-Based Authentication, on page 1371
• Configuring Web-Based Authentication , on page 1461
• Configuring Port-Based Traffic Control, on page 1487
• Configuring IPv6 First Hop Security, on page 1533
• Configuring FIPS, on page 1565
CHAPTER 48
Security Features Overview
• Security Features Overview, on page 1147
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1147
Security
Security Features Overview
• Standard and extended IP access control lists (ACLs) for defining inbound security policies on Layer 2
interfaces (port ACLs).
• Extended MAC access control lists for defining security policies in the inbound direction on Layer 2
interfaces.
• Source and destination MAC-based ACLs for filtering non-IP traffic.
• DHCP snooping to filter untrusted DHCP messages between untrusted hosts and DHCP servers.
• IP source guard to restrict traffic on nonrouted interfaces by filtering traffic based on the DHCP snooping
database and IP source bindings
• Dynamic ARP inspection to prevent malicious attacks on the switch by not relaying invalid ARP requests
and responses to other ports in the same VLAN
• IEEE 802.1x port-based authentication to prevent unauthorized devices (clients) from gaining access to
the network. These 802.1x features are supported:
• Multidomain authentication (MDA) to allow both a data device and a voice device, such as an IP
phone (Cisco or non-Cisco), to independently authenticate on the same IEEE 802.1x-enabled switch
port.
• Dynamic voice virtual LAN (VLAN) for MDA to allow a dynamic voice VLAN on an MDA-enabled
port.
• VLAN assignment for restricting 802.1x-authenticated users to a specified VLAN.
• Support for VLAN assignment on a port configured for multi-auth mode. The RADIUS server
assigns a VLAN to the first host to authenticate on the port, and subsequent hosts use the same
VLAN. Voice VLAN assignment is supported for one IP phone.
• Port security for controlling access to 802.1x ports.
• Voice VLAN to permit a Cisco IP Phone to access the voice VLAN regardless of the authorized or
unauthorized state of the port.
• IP phone detection enhancement to detect and recognize a Cisco IP phone.
• Guest VLAN to provide limited services to non-802.1x-compliant users.
• Restricted VLAN to provide limited services to users who are 802.1x compliant, but do not have
the credentials to authenticate via the standard 802.1x processes.
• 802.1x accounting to track network usage.
• 802.1x with wake-on-LAN to allow dormant PCs to be powered on based on the receipt of a specific
Ethernet frame.
• 802.1x readiness check to determine the readiness of connected end hosts before configuring IEEE
802.1x on the switch.
• Voice aware 802.1x security to apply traffic violation actions only on the VLAN on which a security
violation occurs.
• MAC authentication bypass (MAB) to authorize clients based on the client MAC address.
• Network Admission Control (NAC) Layer 2 802.1x validation of the antivirus condition or posture
of endpoint systems or clients before granting the devices network access.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1148
Security
Security Features Overview
• Network Edge Access Topology (NEAT) with 802.1X switch supplicant, host authorization with
CISP, and auto enablement to authenticate a switch outside a wiring closet as a supplicant to another
switch.
• IEEE 802.1x with open access to allow a host to access the network before being authenticated.
• IEEE 802.1x authentication with downloadable ACLs and redirect URLs to allow per-user ACL
downloads from a Cisco Secure ACS server to an authenticated switch.
• Support for dynamic creation or attachment of an auth-default ACL on a port that has no configured
static ACLs.
• Flexible-authentication sequencing to configure the order of the authentication methods that a port
tries when authenticating a new host.
• Multiple-user authentication to allow more than one host to authenticate on an 802.1x-enabled port.
• TACACS+, a proprietary feature for managing network security through a TACACS server for both
IPv4 and IPv6.
• RADIUS for verifying the identity of, granting access to, and tracking the actions of remote users through
authentication, authorization, and accounting (AAA) services for both IPv4 and IPv6.
• Enhancements to RADIUS, TACACS+, and SSH to function over IPv6.
• Secure Socket Layer (SSL) Version 3.0 support for the HTTP 1.1 server authentication, encryption, and
message integrity and HTTP client authentication to allow secure HTTP communications (requires the
cryptographic version of the software).
• IEEE 802.1x Authentication with ACLs and the RADIUS Filter-Id Attribute.
• Support for IP source guard on static hosts.
• RADIUS Change of Authorization (CoA) to change the attributes of a certain session after it is
authenticated. When there is a change in policy for a user or user group in AAA, administrators can send
the RADIUS CoA packets from the AAA server, such as Cisco Identity Services Engine, or Cisco Secure
ACS to reinitialize authentication, and apply to the new policies.
• IEEE 802.1x User Distribution to allow deployments with multiple VLANs (for a group of users) to
improve scalability of the network by load balancing users across different VLANs. Authorized users
are assigned to the least populated VLAN in the group, assigned by RADIUS server.
• Support for critical VLAN with multiple-host authentication so that when a port is configured for
multi-auth, and an AAA server becomes unreachable, the port is placed in a critical VLAN in order to
still permit access to critical resources.
• Support for Network Edge Access Topology (NEAT) to change the port host mode and to apply a standard
port configuration on the authenticator switch port.
• VLAN-ID based MAC authentication to use the combined VLAN and MAC address information for
user authentication to prevent network access from unauthorized VLANs.
• MAC move to allow hosts (including the hosts connected behind an IP phone) to move across ports
within the same switch without any restrictions to enable mobility. With MAC move, the switch treats
the reappearance of the same MAC address on another port in the same way as a completely new MAC
address.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1149
Security
Security Features Overview
• Support for 3DES and AES with version 3 of the Simple Network Management Protocol (SNMPv3).
This release adds support for the 168-bit Triple Data Encryption Standard (3DES) and the 128-bit, 192-bit,
and 256-bit Advanced Encryption Standard (AES) encryption algorithms to SNMPv3.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1150
CHAPTER 49
Preventing Unauthorized Access
• Finding Feature Information, on page 1151
• Preventing Unauthorized Access, on page 1151
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1151
Security
Preventing Unauthorized Access
• You can also enable the login enhancements feature, which logs both failed and unsuccessful login
attempts. Login enhancements can also be configured to block future login attempts after a set number
of unsuccessful attempts are made. For more information, see the Cisco IOS Login Enhancements
documentation.
Related Topics
Configuring Username and Password Pairs, on page 1162
TACACS+ and Switch Access, on page 1173
Setting a Telnet Password for a Terminal Line, on page 1161
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1152
CHAPTER 50
Controlling Switch Access with Passwords and
Privilege Levels
• Finding Feature Information, on page 1153
• Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1153
• Information About Passwords and Privilege Levels, on page 1154
• How to Control Switch Access with Passwords and Privilege Levels, on page 1156
• Monitoring Switch Access, on page 1168
• Configuration Examples for Setting Passwords and Privilege Levels, on page 1168
Related Topics
Disabling Password Recovery, on page 1159
Password Recovery, on page 1154
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1153
Security
Information About Passwords and Privilege Levels
Enable password and privilege level No password is defined. The default is level 15 (privileged EXEC
level). The password is not encrypted in the configuration file.
Enable secret password and privilege No password is defined. The default is level 15 (privileged EXEC
level level). The password is encrypted before it is written to the
configuration file.
Password Recovery
By default, any end user with physical access to the switch can recover from a lost password by interrupting
the boot process while the switch is powering on and then by entering a new password.
The password-recovery disable feature protects access to the switch password by disabling part of this
functionality. When this feature is enabled, the end user can interrupt the boot process only by agreeing to set
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1154
Security
Terminal Line Telnet Configuration
the system back to the default configuration. With password recovery disabled, you can still interrupt the boot
process and change the password, but the configuration file (config.text) and the VLAN database file (vlan.dat)
are deleted.
If you disable password recovery, we recommend that you keep a backup copy of the configuration file on a
secure server in case the end user interrupts the boot process and sets the system back to default values. Do
not keep a backup copy of the configuration file on the switch. If the switch is operating in VTP transparent
mode, we recommend that you also keep a backup copy of the VLAN database file on a secure server. When
the switch is returned to the default system configuration, you can download the saved files to the switch by
using the Xmodem protocol.
To re-enable password recovery, use the service password-recovery global configuration command.
Related Topics
Disabling Password Recovery, on page 1159
Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1153
Privilege Levels
Cisco switches (and other devices) use privilege levels to provide password security for different levels of
switch operation. By default, the Cisco IOS software operates in two modes (privilege levels) of password
security: user EXEC (Level 1) and privileged EXEC (Level 15). You can configure up to 16 hierarchical
levels of commands for each mode. By configuring multiple passwords, you can allow different sets of users
to have access to specified commands.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1155
Security
How to Control Switch Access with Passwords and Privilege Levels
higher privilege level. You might specify a high level or privilege level for your console line to restrict line
usage.
For example, if you want many users to have access to the clear line command, you can assign it level 2 security
and distribute the level 2 password fairly widely. But if you want more restricted access to the configure
command, you can assign it level 3 security and distribute that password to a more restricted group of users.
SUMMARY STEPS
1. enable
2. configure terminal
3. enable password password
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1156
Security
Setting or Changing a Static Enable Password
Step 3 enable password password Defines a new password or changes an existing password
for access to privileged EXEC mode.
Example:
By default, no password is defined.
SwitchDevice(config)# enable password secret321
For password, specify a string from 1 to 25 alphanumeric
characters. The string cannot start with a number, is case
sensitive, and allows spaces but ignores leading spaces. It
can contain the question mark (?) character if you precede
the question mark with the key combination Crtl-v when
you create the password; for example, to create the password
abc?123, do this:
1. Enter abc.
2. Enter Crtl-v.
3. Enter ?123.
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Example: Setting or Changing a Static Enable Password, on page 1168
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1157
Security
Protecting Enable and Enable Secret Passwords with Encryption
SUMMARY STEPS
1. enable
2. configure terminal
3. Use one of the following:
• enable password [level level]
{password encryption-type encrypted-password}
• enable secret [level level]
{password encryption-type encrypted-password}
4. service password-encryption
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 Use one of the following: • Defines a new password or changes an existing
password for access to privileged EXEC mode.
• enable password [level level]
{password encryption-type encrypted-password} • Defines a secret password, which is saved using a
• enable secret [level level] nonreversible encryption method.
{password encryption-type encrypted-password}
• (Optional) For level, the range is from 0 to 15.
Example: Level 1 is normal user EXEC mode privileges.
SwitchDevice(config)# enable password example102 The default level is 15 (privileged EXEC mode
privileges).
or • For password, specify a string from 1 to 25
SwitchDevice(config)# enable secret level 1 alphanumeric characters. The string cannot start
password secret123sample with a number, is case sensitive, and allows
spaces but ignores leading spaces. By default, no
password is defined.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1158
Security
Disabling Password Recovery
Step 4 service password-encryption (Optional) Encrypts the password when the password is
defined or when the configuration is written.
Example:
Encryption prevents the password from being readable in
SwitchDevice(config)# service password-encryption the configuration file.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Additional Password Security, on page 1154
Example: Protecting Enable and Enable Secret Passwords with Encryption, on page 1168
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1159
Security
Disabling Password Recovery
SUMMARY STEPS
1. enable
2. configure terminal
3. no service password-recovery
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1160
Security
Setting a Telnet Password for a Terminal Line
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
To re-enable password recovery, use the service password-recovery global configuration command.
Related Topics
Password Recovery, on page 1154
Restrictions for Controlling Switch Access with Passwords and Privileges, on page 1153
SUMMARY STEPS
1. enable
2. configure terminal
3. line vty 0 15
4. password password
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1161
Security
Configuring Username and Password Pairs
Step 3 line vty 0 15 Configures the number of Telnet sessions (lines), and enters
line configuration mode.
Example:
There are 16 possible sessions on a command-capable
SwitchDevice(config)# line vty 0 15 SwitchDevice. The 0 and 15 mean that you are configuring
all 16 possible Telnet sessions.
Step 4 password password Sets a Telnet password for the line or lines.
Example: For password, specify a string from 1 to 25 alphanumeric
characters. The string cannot start with a number, is case
SwitchDevice(config-line)# password abcxyz543 sensitive, and allows spaces but ignores leading spaces. By
default, no password is defined.
SwitchDevice(config-line)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Preventing Unauthorized Access, on page 1151
Terminal Line Telnet Configuration, on page 1155
Example: Setting a Telnet Password for a Terminal Line, on page 1168
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1162
Security
Configuring Username and Password Pairs
SUMMARY STEPS
1. enable
2. configure terminal
3. username name [privilege level] {password encryption-type password}
4. Use one of the following:
• line console 0
• line vty 0 15
5. login local
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 username name [privilege level] {password Sets the username, privilege level, and password for each
encryption-type password} user.
Example: • For name, specify the user ID as one word or the MAC
address. Spaces and quotation marks are not allowed.
SwitchDevice(config)# username adamsample privilege
1 password secret456 • You can configure a maximum of 12000 clients each,
for both username and MAC filter.
SwitchDevice(config)# username 111111111111 mac • (Optional) For level, specify the privilege level the
attribute user has after gaining access. The range is 0 to 15.
Level 15 gives privileged EXEC mode access. Level
1 gives user EXEC mode access.
• For encryption-type, enter 0 to specify that an
unencrypted password will follow. Enter 7 to specify
that a hidden password will follow.
• For password, specify the password the user must enter
to gain access to the SwitchDevice. The password must
be from 1 to 25 characters, can contain embedded
spaces, and must be the last option specified in the
username command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1163
Security
Setting the Privilege Level for a Command
or
SwitchDevice(config)# line vty 15
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Preventing Unauthorized Access, on page 1151
Username and Password Pairs, on page 1155
SUMMARY STEPS
1. enable
2. configure terminal
3. privilege mode level level command
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1164
Security
Setting the Privilege Level for a Command
DETAILED STEPS
SwitchDevice> enable
Step 3 privilege mode level level command Sets the privilege level for a command.
Example: • For mode, enter configure for global configuration
mode, exec for EXEC mode, interface for interface
SwitchDevice(config)# privilege exec level 14 configuration mode, or line for line configuration
configure mode.
• For level, the range is from 0 to 15. Level 1 is for
normal user EXEC mode privileges. Level 15 is the
level of access permitted by the enable password.
• For command, specify the command to which you want
to restrict access.
Step 4 enable password level level password Specifies the password to enable the privilege level.
Example: • For level, the range is from 0 to 15. Level 1 is for
normal user EXEC mode privileges.
SwitchDevice(config)# enable password level 14
SecretPswd14 • For password, specify a string from 1 to 25
alphanumeric characters. The string cannot start with
a number, is case sensitive, and allows spaces but
ignores leading spaces. By default, no password is
defined.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1165
Security
Changing the Default Privilege Level for Lines
Related Topics
Privilege Levels, on page 1155
Example: Setting the Privilege Level for a Command, on page 1169
SUMMARY STEPS
1. enable
2. configure terminal
3. line vty line
4. privilege level level
5. end
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 line vty line Selects the virtual terminal line on which to restrict access.
Example:
Step 4 privilege level level Changes the default privilege level for the line.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1166
Security
Logging into and Exiting a Privilege Level
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
Users can override the privilege level you set using the privilege level line configuration command by logging
in to the line and enabling a different privilege level. They can lower the privilege level by using the disable
command. If users know the password to a higher privilege level, they can use that password to enable the
higher privilege level. You might specify a high level or privilege level for your console line to restrict line
usage.
Related Topics
Privilege Levels, on page 1155
SUMMARY STEPS
1. enable level
2. disable level
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1167
Security
Monitoring Switch Access
Related Topics
Privilege Levels, on page 1155
Related Topics
Setting or Changing a Static Enable Password, on page 1156
Related Topics
Protecting Enable and Enable Secret Passwords with Encryption, on page 1158
Additional Password Security, on page 1154
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1168
Security
Example: Setting the Privilege Level for a Command
Related Topics
Setting a Telnet Password for a Terminal Line, on page 1161
Terminal Line Telnet Configuration, on page 1155
Related Topics
Setting the Privilege Level for a Command, on page 1164
Privilege Levels, on page 1155
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1169
Security
Example: Setting the Privilege Level for a Command
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1170
CHAPTER 51
Configuring TACACS+
• Finding Feature Information, on page 1171
• Prerequisites for TACACS+, on page 1171
• Information About TACACS+, on page 1173
• How to Configure TACACS+, on page 1176
• Monitoring TACACS+, on page 1184
The following are the prerequisites for controlling switch access with TACACS+:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1171
Security
Prerequisites for TACACS+
• You must have access to a configured TACACS+ server to configure TACACS+ features on your switch.
Also, you must have access to TACACS+ services maintained in a database on a TACACS+ daemon
typically running on a LINUX or Windows workstation.
• We recommend a redundant connection between a switch stack and the TACACS+ server. This is to
help ensure that the TACACS+ server remains accessible in case one of the connected stack members
is removed from the switch stack.
• You need a system running the TACACS+ daemon software to use TACACS+ on your switch.
• To use TACACS+, it must be enabled.
• Authorization must be enabled on the switch to be used.
• Users must first successfully complete TACACS+ authentication before proceeding to TACACS+
authorization.
• To use any of the AAA commands listed in this section or elsewhere, you must first enable AAA with
the aaa new-model command.
• At a minimum, you must identify the host or hosts maintaining the TACACS+ daemon and define the
method lists for TACACS+ authentication. You can optionally define method lists for TACACS+
authorization and accounting.
• The method list defines the types of authentication to be performed and the sequence in which they are
performed; it must be applied to a specific port before any of the defined authentication methods are
performed. The only exception is the default method list (which, by coincidence, is named default). The
default method list is automatically applied to all ports except those that have a named method list
explicitly defined. A defined method list overrides the default method list.
• Use TACACS+ for privileged EXEC access authorization if authentication was performed by using
TACACS+.
• Use the local database if authentication was not performed by using TACACS+.
Related Topics
TACACS+ Overview, on page 1173
TACACS+ Operation, on page 1174
How to Configure TACACS+, on page 1176
Method List, on page 1175
Configuring TACACS+ Login Authentication, on page 1178
TACACS+ Login Authentication, on page 1175
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1181
TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1176
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1172
Security
Information About TACACS+
TACACS+ Overview
TACACS+ is a security application that provides centralized validation of users attempting to gain access to
your switch.
TACACS+ provides for separate and modular authentication, authorization, and accounting facilities. TACACS+
allows for a single access control server (the TACACS+ daemon) to provide each service—authentication,
authorization, and accounting—independently. Each service can be tied into its own database to take advantage
of other services available on that server or on the network, depending on the capabilities of the daemon.
The goal of TACACS+ is to provide a method for managing multiple network access points from a single
management service. Your switch can be a network access server along with other Cisco routers and access
servers.
Figure 97: Typical TACACS+ Network Configuration
TACACS+, administered through the AAA security services, can provide these services:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1173
Security
TACACS+ Operation
• Authentication—Provides complete control of authentication through login and password dialog, challenge
and response, and messaging support.
The authentication facility can conduct a dialog with the user (for example, after a username and password
are provided, to challenge a user with several questions, such as home address, mother’s maiden name,
service type, and social security number). The TACACS+ authentication service can also send messages
to user screens. For example, a message could notify users that their passwords must be changed because
of the company’s password aging policy.
• Authorization—Provides fine-grained control over user capabilities for the duration of the user’s session,
including but not limited to setting autocommands, access control, session duration, or protocol support.
You can also enforce restrictions on what commands a user can execute with the TACACS+ authorization
feature.
• Accounting—Collects and sends information used for billing, auditing, and reporting to the TACACS+
daemon. Network managers can use the accounting facility to track user activity for a security audit or
to provide information for user billing. Accounting records include user identities, start and stop times,
executed commands (such as PPP), number of packets, and number of bytes.
The TACACS+ protocol provides authentication between the switch and the TACACS+ daemon, and it
ensures confidentiality because all protocol exchanges between the switch and the TACACS+ daemon are
encrypted.
Related Topics
Prerequisites for TACACS+, on page 1171
TACACS+ Operation
When a user attempts a simple ASCII login by authenticating to a switch using TACACS+, this process occurs:
1. When the connection is established, the switch contacts the TACACS+ daemon to obtain a username
prompt to show to the user. The user enters a username, and the switch then contacts the TACACS+
daemon to obtain a password prompt. The switch displays the password prompt to the user, the user enters
a password, and the password is then sent to the TACACS+ daemon.
TACACS+ allows a dialog between the daemon and the user until the daemon receives enough information
to authenticate the user. The daemon prompts for a username and password combination, but can include
other items, such as the user’s mother’s maiden name.
2. The switch eventually receives one of these responses from the TACACS+ daemon:
• ACCEPT—The user is authenticated and service can begin. If the switch is configured to require
authorization, authorization begins at this time.
• REJECT—The user is not authenticated. The user can be denied access or is prompted to retry the
login sequence, depending on the TACACS+ daemon.
• ERROR—An error occurred at some time during authentication with the daemon or in the network
connection between the daemon and the switch. If an ERROR response is received, the switch
typically tries to use an alternative method for authenticating the user.
• CONTINUE—The user is prompted for additional authentication information.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1174
Security
Method List
After authentication, the user undergoes an additional authorization phase if authorization has been enabled
on the switch. Users must first successfully complete TACACS+ authentication before proceeding to
TACACS+ authorization.
3. If TACACS+ authorization is required, the TACACS+ daemon is again contacted, and it returns an
ACCEPT or REJECT authorization response. If an ACCEPT response is returned, the response contains
data in the form of attributes that direct the EXEC or NETWORK session for that user and the services
that the user can access:
• Telnet, Secure Shell (SSH), rlogin, or privileged EXEC services
• Connection parameters, including the host or client IP address, access list, and user timeouts
Related Topics
Prerequisites for TACACS+, on page 1171
Method List
A method list defines the sequence and methods to be used to authenticate, to authorize, or to keep accounts
on a user. You can use method lists to designate one or more security protocols to be used, thus ensuring a
backup system if the initial method fails. The software uses the first method listed to authenticate, to authorize,
or to keep accounts on users; if that method does not respond, the software selects the next method in the list.
This process continues until there is successful communication with a listed method or the method list is
exhausted.
Related Topics
How to Configure TACACS+, on page 1176
Prerequisites for TACACS+, on page 1171
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1175
Security
TACACS+ Authorization for Privileged EXEC Access and Network Services
Related Topics
Configuring TACACS+ Login Authentication, on page 1178
Prerequisites for TACACS+, on page 1171
TACACS+ Accounting
The AAA accounting feature tracks the services that users are accessing and the amount of network resources
that they are consuming. When AAA accounting is enabled, the switch reports user activity to the TACACS+
security server in the form of accounting records. Each accounting record contains accounting attribute-value
(AV) pairs and is stored on the security server. This data can then be analyzed for network management, client
billing, or auditing.
Related Topics
Starting TACACS+ Accounting, on page 1182
Note Although TACACS+ configuration is performed through the CLI, the TACACS+ server authenticates HTTP
connections that have been configured with a privilege level of 15.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1176
Security
Identifying the TACACS+ Server Host and Setting the Authentication Key
Identifying the TACACS+ Server Host and Setting the Authentication Key
Follow these steps to identify the TACACS+ server host and set the authentication key:
SUMMARY STEPS
1. enable
2. configure terminal
3. tacacs-server host hostname
4. aaa new-model
5. aaa group server tacacs+ group-name
6. server ip-address
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 tacacs-server host hostname Identifies the IP host or hosts maintaining a TACACS+
server. Enter this command multiple times to create a list
Example:
of preferred hosts. The software searches for hosts in the
order in which you specify them.
SwitchDevice(config)# tacacs-server host yourserver
For hostname, specify the name or IP address of the host.
Step 5 aaa group server tacacs+ group-name (Optional) Defines the AAA server-group with a group
name.
Example:
This command puts the SwitchDevice in a server group
SwitchDevice(config)# aaa group server tacacs+ subconfiguration mode.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1177
Security
Configuring TACACS+ Login Authentication
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
TACACS+ Configuration Options, on page 1175
Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip
http authentication aaa global configuration command. Configuring AAA authentication does not secure
the switch for HTTP access by using AAA methods.
For more information about the ip http authentication command, see the Cisco IOS Security Command
Reference, Release 12.4.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1178
Security
Configuring TACACS+ Login Authentication
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication login {default | list-name} method1 [method2...]
5. line [console | tty | vty] line-number [ending-line-number]
6. login authentication {default | list-name}
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 aaa authentication login {default | list-name} method1 Creates a login authentication method list.
[method2...]
• To create a default list that is used when a named list
Example: is not specified in the login authentication command,
use the default keyword followed by the methods that
SwitchDevice(config)# aaa authentication login are to be used in default situations. The default method
default tacacs+ local list is automatically applied to all ports.
• For list-name, specify a character string to name the
list you are creating.
• For method1..., specify the actual method the
authentication algorithm tries. The additional methods
of authentication are used only if the previous method
returns an error, not if it fails.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1179
Security
Configuring TACACS+ Login Authentication
Step 5 line [console | tty | vty] line-number [ending-line-number] Enters line configuration mode, and configures the lines to
which you want to apply the authentication list.
Example:
SwitchDevice(config)# line 2 4
Step 6 login authentication {default | list-name} Applies the authentication list to a line or set of lines.
Example: • If you specify default, use the default list created with
the aaa authentication login command.
SwitchDevice(config-line)# login authentication
default • For list-name, specify the list created with the aaa
authentication login command.
SwitchDevice(config-line)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1180
Security
Configuring TACACS+ Authorization for Privileged EXEC Access and Network Services
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
TACACS+ Login Authentication, on page 1175
Prerequisites for TACACS+, on page 1171
Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been
configured.
Follow these steps to specify TACACS+ authorization for privileged EXEC access and network services:
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa authorization network tacacs+
4. aaa authorization exec tacacs+
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1181
Security
Starting TACACS+ Accounting
Step 3 aaa authorization network tacacs+ Configures the switch for user TACACS+ authorization for
all network-related service requests.
Example:
Step 4 aaa authorization exec tacacs+ Configures the switch for user TACACS+ authorization if
the user has privileged EXEC access.
Example:
The exec keyword might return user profile information
SwitchDevice(config)# aaa authorization exec (such as autocommand information).
tacacs+
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
TACACS+ Authorization for Privileged EXEC Access and Network Services, on page 1176
Prerequisites for TACACS+, on page 1171
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1182
Security
Starting TACACS+ Accounting
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa accounting network start-stop tacacs+
4. aaa accounting exec start-stop tacacs+
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 aaa accounting network start-stop tacacs+ Enables TACACS+ accounting for all network-related
service requests.
Example:
Step 4 aaa accounting exec start-stop tacacs+ Enables TACACS+ accounting to send a start-record
accounting notice at the beginning of a privileged EXEC
Example:
process and a stop-record at the end.
SwitchDevice(config)# aaa accounting exec
start-stop tacacs+
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1183
Security
Establishing a Session with a Router if the AAA Server is Unreachable
What to do next
To establish a session with a router if the AAA server is unreachable, use the aaa accounting system
guarantee-first command. It guarantees system accounting as the first record, which is the default condition.
In some situations, users might be prevented from starting a session on the console or terminal connection
until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router
reloads, use the no aaa accounting system guarantee-first command.
Related Topics
TACACS+ Accounting, on page 1176
Monitoring TACACS+
Table 127: Commands for Displaying TACACS+ Information
Command Purpose
show tacacs Displays TACACS+ server statistics.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1184
CHAPTER 52
Configuring RADIUS
• Finding Feature Information, on page 1185
• Prerequisites for Configuring RADIUS, on page 1185
• Restrictions for Configuring RADIUS, on page 1186
• Information about RADIUS, on page 1187
• How to Configure RADIUS, on page 1209
• Monitoring CoA Functionality, on page 1227
• Configuration Examples for Controlling Switch Access with RADIUS, on page 1228
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1185
Security
Restrictions for Configuring RADIUS
• At a minimum, you must identify the host or hosts that run the RADIUS server software and define the
method lists for RADIUS authentication. You can optionally define method lists for RADIUS authorization
and accounting.
• You should have access to and should configure a RADIUS server before configuring RADIUS features
on your SwitchDevice.
• The RADIUS host is normally a multiuser system running RADIUS server software from Cisco (Cisco
Secure Access Control Server Version 3.0), Livingston, Merit, Microsoft, or another software provider.
For more information, see the RADIUS server documentation.
• To use the Change-of-Authorization (CoA) interface, a session must already exist on the switch. CoA
can be used to identify a session and enforce a disconnect request. The update affects only the specified
session.
Related Topics
RADIUS and Switch Access, on page 1187
RADIUS Operation, on page 1188
Related Topics
RADIUS Overview, on page 1187
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1186
Security
Information about RADIUS
RADIUS Overview
RADIUS is a distributed client/server system that secures networks against unauthorized access. RADIUS
clients run on supported Cisco routers and switches. Clients send authentication requests to a central RADIUS
server, which contains all user authentication and network service access information.
Use RADIUS in these network environments that require access security:
• Networks with multiple-vendor access servers, each supporting RADIUS. For example, access servers
from several vendors use a single RADIUS server-based security database. In an IP-based network with
multiple vendors’ access servers, dial-in users are authenticated through a RADIUS server that has been
customized to work with the Kerberos security system.
• Turnkey network security environments in which applications support the RADIUS protocol, such as in
an access environment that uses a smart card access control system. In one case, RADIUS has been used
with Enigma’s security cards to validates users and to grant access to network resources.
• Networks already using RADIUS. You can add a Cisco SwitchDevice containing a RADIUS client to
the network. This might be the first step when you make a transition to a TACACS+ server. See Figure
2: Transitioning from RADIUS to TACACS+ Services below.
• Network in which the user must only access a single service. Using RADIUS, you can control user access
to a single host, to a single utility such as Telnet, or to the network through a protocol such as IEEE
802.1x. For more information about this protocol, see Chapter 11, “Configuring IEEE 802.1x Port-Based
Authentication.”
• Networks that require resource accounting. You can use RADIUS accounting independently of RADIUS
authentication or authorization. The RADIUS accounting functions allow data to be sent at the start and
end of services, showing the amount of resources (such as time, packets, bytes, and so forth) used during
the session. An Internet service provider might use a freeware-based version of RADIUS access control
and accounting software to meet special security and billing needs.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1187
Security
RADIUS Operation
Related Topics
Restrictions for Configuring RADIUS, on page 1186
RADIUS Operation
When a user attempts to log in and authenticate to a SwitchDevice that is access controlled by a RADIUS
server, these events occur:
1. The user is prompted to enter a username and password.
2. The username and encrypted password are sent over the network to the RADIUS server.
3. The user receives one of the following responses from the RADIUS server:
• ACCEPT—The user is authenticated.
• REJECT—The user is either not authenticated and is prompted to re-enter the username and password,
or access is denied.
• CHALLENGE—A challenge requires additional data from the user.
• CHALLENGE PASSWORD—A response requests the user to select a new password.
The ACCEPT or REJECT response is bundled with additional data that is used for privileged EXEC or
network authorization. The additional data included with the ACCEPT or REJECT packets includes these
items:
Related Topics
Prerequisites for Configuring RADIUS, on page 1185
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1188
Security
RADIUS Change of Authorization
A standard RADIUS interface is typically used in a pulled model where the request originates from a network
attached device and the response come from the queried servers. Catalyst switches support the RADIUS CoA
extensions defined in RFC 5176 that are typically used in a pushed model and allow for the dynamic
reconfiguring of sessions from external AAA or policy servers.
The switch supports these per-session CoA requests:
• Session reauthentication
• Session termination
• Session termination with port shutdown
• Session termination with port bounce
This feature is integrated with Cisco Secure Access Control Server (ACS) 5.1.
The RADIUS interface is enabled by default on Catalyst switches. However, some basic configuration is
required for the following attributes:
• Security and Password—refer to the “Preventing Unauthorized Access to Your Switch” section in this
guide.
• Accounting—refer to the “Starting RADIUS Accounting” section in the Configuring Switch-Based
Authentication chapter in this guide.
Cisco IOS software supports the RADIUS CoA extensions defined in RFC 5176 that are typically used in a
push model to allow the dynamic reconfiguring of sessions from external AAA or policy servers. Per-session
CoA requests are supported for session identification, session termination, host reauthentication, port shutdown,
and port bounce. This model comprises one request (CoA-Request) and two possible response codes:
• CoA acknowledgement (ACK) [CoA-ACK]
• CoA nonacknowledgement (NAK) [CoA-NAK]
The request is initiated from a CoA client (typically a AAA or policy server) and directed to the device that
acts as a listener.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1189
Security
Change-of-Authorization Requests
The table below shows the RADIUS CoA commands and vendor-specific attributes (VSAs) supported by
Identity-Based Networking Services. All CoA commands must include the session identifier between the
device and the CoA client.
Session terminate This is a standard disconnect request and does not require a VSA.
Change-of-Authorization Requests
Change of Authorization (CoA) requests, as described in RFC 5176, are used in a push model to allow for
session identification, host reauthentication, and session termination. The model is comprised of one request
(CoA-Request) and two possible response codes:
• CoA acknowledgment (ACK) [CoA-ACK]
• CoA non-acknowledgment (NAK) [CoA-NAK]
The request is initiated from a CoA client (typically a RADIUS or policy server) and directed to the switch
that acts as a listener.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1190
Security
RFC 5176 Compliance
This table shows the IETF attributes are supported for this feature.
24 State
31 Calling-Station-ID
44 Acct-Session-ID
80 Message-Authenticator
101 Error-Cause
This table shows the possible values for the Error-Cause attribute.
Value Explanation
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1191
Security
CoA Request Response Code
Session Identification
For disconnect and CoA requests targeted at a particular session, the switch locates the session based on one
or more of the following attributes:
• Acct-Session-Id (IETF attribute #44)
• Audit-Session-Id (Cisco VSA)
• Calling-Station-Id (IETF attribute #31 which contains the host MAC address)
• IPv6 Attributes, which can be one of the following:
• Framed-IPv6-Prefix (IETF attribute #97) and Framed-Interface-Id (IETF attribute #96), which
together create a full IPv6 address per RFC 3162
• Framed-IPv6-Address
• Plain IP Address (IETF attribute #8)
Unless all session identification attributes included in the CoA message match the session, the switch returns
a Disconnect-NAK or CoA-NAK with the “Invalid Attribute Value” error-code attribute.
If more than one session identification attribute is included in the message, all the attributes must match the
session or the switch returns a Disconnect- negative acknowledgment (NAK) or CoA-NAK with the error
code “Invalid Attribute Value.”
The packet format for a CoA Request code as defined in RFC 5176 consists of the fields: Code, Identifier,
Length, Authenticator, and Attributes in Type:Length:Value (TLV) format.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Code | Identifier | Length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| |
| Authenticator |
| |
| |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Attributes ...
+-+-+-+-+-+-+-+-+-+-+-+-+-
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1192
Security
CoA ACK Response Code
Related Topics
CoA Disconnect-Request, on page 1194
CoA Request: Disable Host Port, on page 1194
CoA Request: Bounce-Port, on page 1195
Terminate session This is a standard disconnect request that does not require a VSA.
Session Reauthentication
The AAA server typically generates a session reauthentication request when a host with an unknown identity
or posture joins the network and is associated with a restricted access authorization profile (such as a guest
VLAN). A reauthentication request allows the host to be placed in the appropriate authorization group when
its credentials are known.
To initiate session authentication, the AAA server sends a standard CoA-Request message which contains a
Cisco VSA in this form: Cisco:Avpair=“subscriber:command=reauthenticate” and one or more session
identification attributes.
The current session state determines the switch response to the message. If the session is currently authenticated
by IEEE 802.1x, the switch responds by sending an EAPoL (Extensible Authentication Protocol over Lan)
-RequestId message to the server.
If the session is currently authenticated by MAC authentication bypass (MAB), the switch sends an
access-request to the server, passing the same identity attributes used for the initial successful authentication.
If session authentication is in progress when the switch receives the command, the switch terminates the
process, and restarts the authentication sequence, starting with the method configured to be attempted first.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1193
Security
Session Termination
If the session is not yet authorized, or is authorized via guest VLAN, or critical VLAN, or similar policies,
the reauthentication message restarts the access control methods, beginning with the method configured to
be attempted first. The current authorization of the session is maintained until the reauthentication leads to a
different authorization result.
Session Termination
There are three types of CoA requests that can trigger session termination. A CoA Disconnect-Request
terminates the session, without disabling the host port. This command causes re-initialization of the authenticator
state machine for the specified host, but does not restrict that host access to the network.
To restrict a host’s access to the network, use a CoA Request with the
Cisco:Avpair="subscriber:command=disable-host-port" VSA. This command is useful when a host is known
to be causing problems on the network, and you need to immediately block network access for the host. When
you want to restore network access on the port, re-enable it using a non-RADIUS mechanism.
When a device with no supplicant, such as a printer, needs to acquire a new IP address (for example, after a
VLAN change), terminate the session on the host port with port-bounce (temporarily disable and then re-enable
the port).
CoA Disconnect-Request
This command is a standard Disconnect-Request. If the session cannot be located, the switch returns a
Disconnect-NAK message with the “Session Context Not Found” error-code attribute. If the session is located,
the switch terminates the session. After the session has been completely removed, the switch returns a
Disconnect-ACK.
If the switch fails-over to a standby switch before returning a Disconnect-ACK to the client, the process is
repeated on the new active switch when the request is re-sent from the client. If the session is not found
following re-sending, a Disconnect-ACK is sent with the “Session Context Not Found” error-code attribute.
Related Topics
Session Identification, on page 1192
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1194
Security
CoA Request: Bounce-Port
Note A Disconnect-Request failure following command re-sending could be the result of either a successful session
termination before change-over (if the Disconnect-ACK was not sent) or a session termination by other means
(for example, a link failure) that occurred after the original command was issued and before the standby switch
became active.
Related Topics
Session Identification, on page 1192
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1195
Security
RADIUS Login Authentication
You identify RADIUS security servers by their hostname or IP address, hostname and specific UDP port
numbers, or their IP address and specific UDP port numbers. The combination of the IP address and the UDP
port number creates a unique identifier, allowing different ports to be individually defined as RADIUS hosts
providing a specific AAA service. This unique identifier enables RADIUS requests to be sent to multiple
UDP ports on a server at the same IP address.
If two different host entries on the same RADIUS server are configured for the same service—for example,
accounting—the second host entry configured acts as a fail-over backup to the first one. Using this example,
if the first host entry fails to provide accounting services, the %RADIUS-4-RADIUS_DEAD message appears,
and then the switch tries the second host entry configured on the same device for accounting services. (The
RADIUS host entries are tried in the order that they are configured.)
A RADIUS server and the switch use a shared secret text string to encrypt passwords and exchange responses.
To configure RADIUS to use the AAA security commands, you must specify the host running the RADIUS
server daemon and a secret text (key) string that it shares with the switch.
The timeout, retransmission, and encryption key values can be configured globally for all RADIUS servers,
on a per-server basis, or in some combination of global and per-server settings.
Related Topics
Identifying the RADIUS Server Host, on page 1209
Defining AAA Server Groups, on page 1214
Configuring Settings for All RADIUS Servers, on page 1220
Configuring RADIUS Login Authentication, on page 1212
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1196
Security
AAA Authorization
as RADIUS hosts providing a specific AAA service. This unique identifier enables RADIUS requests to be
sent to different UDP ports on a server at the same IP address. If you configure two different host entries on
the same RADIUS server for the same service, (for example, accounting), the second configured host entry
acts as a fail-over backup to the first one. If the first host entry fails to provide accounting services, the network
access server tries the second host entry configured on the same device for accounting services. (The RADIUS
host entries are tried in the order in which they are configured.)
Related Topics
Defining AAA Server Groups, on page 1214
AAA Authorization
AAA authorization limits the services available to a user. When AAA authorization is enabled, the switch
uses information retrieved from the user’s profile, which is in the local user database or on the security server,
to configure the user’s session. The user is granted access to a requested service only if the information in the
user profile allows it.
Related Topics
Configuring RADIUS Authorization for User Privileged Access and Network Services, on page 1217
RADIUS Accounting
The AAA accounting feature tracks the services that users are using and the amount of network resources that
they are consuming. When you enable AAA accounting, the switch reports user activity to the RADIUS
security server in the form of accounting records. Each accounting record contains accounting attribute-value
(AV) pairs and is stored on the security server. You can then analyze the data for network management, client
billing, or auditing.
Related Topics
Starting RADIUS Accounting, on page 1218
Protocol is a value of the Cisco protocol attribute for a particular type of authorization. Attribute and value
are an appropriate attributevalue (AV) pair defined in the Cisco TACACS+ specification, and sep is = for
mandatory attributes and is * for optional attributes. The full set of features available for TACACS+
authorization can then be used for RADIUS.
For example, the following AV pair causes Cisco’s “multiple named IP address pools” feature to be activated
during IP authorization (during PPP’s Internet Protocol Control Protocol (IPCP) address assignment):
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1197
Security
Vendor-Specific RADIUS Attributes
cisco-avpair= ”ip:addr-pool=first“
If you insert an “*”, the AV pair “ip:addr-pool=first” becomes optional. Note that any AV pair can be made
optional:
cisco-avpair= ”ip:addr-pool*first“
The following example shows how to cause a user logging in from a network access server to have immediate
access to EXEC commands:
cisco-avpair= ”shell:priv-lvl=15“
Other vendors have their own unique vendor-IDs, options, and associated VSAs. For more information about
vendor-IDs and VSAs, see RFC 2138, “Remote Authentication Dial-In User Service (RADIUS).”
Attribute 26 contains the following three elements:
• Type
• Length
• String (also known as data)
• Vendor-Id
• Vendor-Type
• Vendor-Length
• Vendor-Data
The figure below shows the packet format for a VSA encapsulated “behind” attribute 26.
Figure 99: VSA Encapsulated Behind Attribute 26
Note It is up to the vendor to specify the format of their VSA. The Attribute-Specific field (also known as
Vendor-Data) is dependent on the vendor's definition of that attribute.
The table below describes significant fields listed in the Vendor-Specific RADIUS IETF Attributes table
(second table below), which lists supported vendor-specific RADIUS attributes (IETF attribute 26).
Field Description
Number All attributes listed in the following table are extensions of IETF attribute 26.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1198
Security
Vendor-Specific RADIUS Attributes
Field Description
Vendor-Specific Command Codes A defined code used to identify a particular vendor. Code 9 defines Cisco VSAs, 311 defines
Microsoft VSAs, and 529 defines Ascend VSAs.
Sub-Type Number The attribute ID number. This number is much like the ID numbers of IETF attributes, except
it is a “second layer” ID number encapsulated behind attribute 26.
MS-CHAP Attributes
VPDN Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1199
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1200
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1201
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1202
Security
Vendor-Specific RADIUS Attributes
H323 Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1203
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1204
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1205
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1206
Security
Vendor-Specific RADIUS Attributes
Miscellaneous Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1207
Security
Vendor-Specific RADIUS Attributes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1208
Security
Vendor-Proprietary RADIUS Server Communication
Related Topics
Configuring the Switch to Use Vendor-Specific RADIUS Attributes, on page 1222
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1209
Security
Identifying the RADIUS Server Host
You can configure the SwitchDevice to use AAA server groups to group existing server hosts for authentication.
For more information, see Related Topics below.
You also need to configure some settings on the RADIUS server. These settings include the IP address of the
SwitchDevice and the key string to be shared by both the server and the SwitchDevice. For more information,
see the RADIUS server documentation.
Follow these steps to configure per-server RADIUS server communication.
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout
seconds] [retransmit retries] [key string]
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 radius-server host {hostname | ip-address} [auth-port Specifies the IP address or hostname of the remote RADIUS
port-number] [acct-port port-number] [timeout seconds] server host.
[retransmit retries] [key string]
• (Optional) For auth-port port-number, specify the
Example: UDP destination port for authentication requests.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1210
Security
Identifying the RADIUS Server Host
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1211
Security
Configuring RADIUS Login Authentication
Related Topics
RADIUS Server Host, on page 1195
Defining AAA Server Groups, on page 1214
Configuring Settings for All RADIUS Servers, on page 1220
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication login {default | list-name} method1 [method2...]
5. line [console | tty | vty] line-number [ending-line-number]
6. login authentication {default | list-name}
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1212
Security
Configuring RADIUS Login Authentication
Step 4 aaa authentication login {default | list-name} method1 Creates a login authentication method list.
[method2...]
• To create a default list that is used when a named list
Example: is not specified in the login authentication command,
use the default keyword followed by the methods that
SwitchDevice(config)# aaa authentication login are to be used in default situations. The default method
default local list is automatically applied to all ports.
• For list-name, specify a character string to name the
list you are creating.
• For method1..., specify the actual method the
authentication algorithm tries. The additional methods
of authentication are used only if the previous method
returns an error, not if it fails.
Select one of these methods:
• enable—Use the enable password for
authentication. Before you can use this
authentication method, you must define an enable
password by using the enable password global
configuration command.
• group radius—Use RADIUS authentication.
Before you can use this authentication method,
you must configure the RADIUS server.
• line—Use the line password for authentication.
Before you can use this authentication method,
you must define a line password. Use the
password password line configuration command.
• local—Use the local username database for
authentication. You must enter username
information in the database. Use the username
name password global configuration command.
• local-case—Use a case-sensitive local username
database for authentication. You must enter
username information in the database by using
the username password global configuration
command.
• none—Do not use any authentication for login.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1213
Security
Defining AAA Server Groups
SwitchDevice(config)# line 1 4
Step 6 login authentication {default | list-name} Applies the authentication list to a line or set of lines.
Example: • If you specify default, use the default list created with
the aaa authentication login command.
SwitchDevice(config)# login authentication default
• For list-name, specify the list created with the aaa
authentication login command.
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
RADIUS Login Authentication, on page 1196
RADIUS Server Host, on page 1195
SUMMARY STEPS
1. enable
2. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1214
Security
Defining AAA Server Groups
DETAILED STEPS
SwitchDevice> enable
Step 3 radius-server host {hostname | ip-address} [auth-port Specifies the IP address or hostname of the remote RADIUS
port-number] [acct-port port-number] [timeout seconds] server host.
[retransmit retries] [key string]
• (Optional) For auth-port port-number, specify the
Example: UDP destination port for authentication requests.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1215
Security
Defining AAA Server Groups
Step 5 aaa group server radius group-name Defines the AAA server-group with a group name.
Example: This command puts the switch in a server group
configuration mode.
SwitchDevice(config)# aaa group server radius
group1
Step 6 server ip-address Associates a particular RADIUS server with the defined
server group. Repeat this step for each RADIUS server in
Example:
the AAA server group.
SwitchDevice(config-sg-radius)# server 172.20.0.1 Each server in the group must be previously defined in Step
auth-port 1000 acct-port 1001 2.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1216
Security
Configuring RADIUS Authorization for User Privileged Access and Network Services
Related Topics
Identifying the RADIUS Server Host, on page 1209
RADIUS Server Host, on page 1195
AAA Server Groups, on page 1196
Note Authorization is bypassed for authenticated users who log in through the CLI even if authorization has been
configured.
Follow these steps to configure RADIUS authorization for user priviledged access and network services:
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa authorization network radius
4. aaa authorization exec radius
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1217
Security
Starting RADIUS Accounting
Step 4 aaa authorization exec radius Configures the switch for user RADIUS authorization if
the user has privileged EXEC access.
Example:
The exec keyword might return user profile information
SwitchDevice(config)# aaa authorization exec radius (such as autocommand information).
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
You can use the aaa authorization global configuration command with the radius keyword to set parameters
that restrict a user’s network access to privileged EXEC mode.
The aaa authorization exec radius local command sets these authorization parameters:
• Use RADIUS for privileged EXEC access authorization if authentication was performed by using
RADIUS.
• Use the local database if authentication was not performed by using RADIUS.
Related Topics
AAA Authorization, on page 1197
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1218
Security
Starting RADIUS Accounting
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa accounting network start-stop radius
4. aaa accounting exec start-stop radius
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 aaa accounting network start-stop radius Enables RADIUS accounting for all network-related service
requests.
Example:
Step 4 aaa accounting exec start-stop radius Enables RADIUS accounting to send a start-record
accounting notice at the beginning of a privileged EXEC
Example:
process and a stop-record at the end.
SwitchDevice(config)# aaa accounting exec
start-stop radius
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1219
Security
Configuring Settings for All RADIUS Servers
What to do next
To establishing a session with a router if the AAA server is unreachable, use the aaa accounting system
guarantee-first command. This command guarantees system accounting as the first record, which is the
default condition. In some situations, users might be prevented from starting a session on the console or
terminal connection until after the system reloads, which can take more than 3 minutes.
To establish a console or Telnet session with the router if the AAA server is unreachable when the router
reloads, use the no aaa accounting system guarantee-first command.
Related Topics
RADIUS Accounting, on page 1197
SUMMARY STEPS
1. configure terminal
2. radius-server key string
3. radius-server retransmit retries
4. radius-server timeout seconds
5. radius-server deadtime minutes
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
Step 2 radius-server key string Specifies the shared secret text string used between the
switch and all RADIUS servers.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1220
Security
Configuring Settings for All RADIUS Servers
Step 3 radius-server retransmit retries Specifies the number of times the switch sends each
RADIUS request to the server before giving up. The default
Example:
is 3; the range 1 to 1000.
SwitchDevice(config)# radius-server retransmit 5
Step 4 radius-server timeout seconds Specifies the number of seconds a switch waits for a reply
to a RADIUS request before resending the request. The
Example:
default is 5 seconds; the range is 1 to 1000.
SwitchDevice(config)# radius-server timeout 3
Step 5 radius-server deadtime minutes When a RADIUS server is not responding to authentication
requests, this command specifies a time to stop the request
Example:
on that server. This avoids the wait for the request to timeout
before trying the next configured server. The default is 0;
SwitchDevice(config)# radius-server deadtime 0
the range is 1 to 1440 minutes.
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Identifying the RADIUS Server Host, on page 1209
RADIUS Server Host, on page 1195
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1221
Security
Configuring the Switch to Use Vendor-Specific RADIUS Attributes
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server vsa send [accounting | authentication]
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 radius-server vsa send [accounting | authentication] Enables the switch to recognize and use VSAs as defined
by RADIUS IETF attribute 26.
Example:
• (Optional) Use the accounting keyword to limit the
SwitchDevice(config)# radius-server vsa send set of recognized vendor-specific attributes to only
accounting attributes.
• (Optional) Use the authentication keyword to limit
the set of recognized vendor-specific attributes to only
authentication attributes.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1222
Security
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Vendor-Specific RADIUS Attributes, on page 1197
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server host {hostname | ip-address} non-standard
4. radius-server key string
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1223
Security
Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Step 4 radius-server key string Specifies the shared secret text string used between the
switch and the vendor-proprietary RADIUS server. The
Example:
switch and the RADIUS server use this text string to encrypt
passwords and exchange responses.
SwitchDevice(config)# radius-server key rad124
Note The key is a text string that must match the
encryption key used on the RADIUS server.
Leading spaces are ignored, but spaces within
and at the end of the key are used. If you use
spaces in your key, do not enclose the key in
quotation marks unless the quotation marks are
part of the key.
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
This feature allows access and authentication requests to be evenly across all RADIUS servers in a server
group. For more information, see the “RADIUS Server Load Balancing” chapter of the Cisco IOS Security
Configuration Guide, Release 12.4.
Related Topics
Vendor-Proprietary RADIUS Server Communication, on page 1209
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1224
Security
Configuring CoA on the Switch
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa server radius dynamic-author
5. client {ip-address | name} [vrf vrfname] [server-key string]
6. server-key [0 | 7] string
7. port port-number
8. auth-type {any | all | session-key}
9. ignore session-key
10. ignore server-key
11. authentication command bounce-port ignore
12. authentication command disable-port ignore
13. end
14. show running-config
15. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 aaa server radius dynamic-author Configures the switch as an authentication, authorization,
and accounting (AAA) server to facilitate interaction with
Example:
an external policy server.
SwitchDevice(config)# aaa server radius
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1225
Security
Configuring CoA on the Switch
Step 5 client {ip-address | name} [vrf vrfname] [server-key Enters dynamic authorization local server configuration
string] mode and specifies a RADIUS client from which a device
will accept CoA and disconnect requests.
Step 6 server-key [0 | 7] string Configures the RADIUS key to be shared between a device
and RADIUS clients.
Example:
SwitchDevice(config-sg-radius)# server-key
your_server_key
Step 7 port port-number Specifies the port on which a device listens for RADIUS
requests from configured RADIUS clients.
Example:
SwitchDevice(config-sg-radius)# port 25
Step 8 auth-type {any | all | session-key} Specifies the type of authorization the switch uses for
RADIUS clients.
Example:
The client must match all the configured attributes for
SwitchDevice(config-sg-radius)# auth-type any authorization.
Step 9 ignore session-key (Optional) Configures the switch to ignore the session-key.
For more information about the ignore command, see the
Cisco IOS Intelligent Services Gateway Command
Reference on Cisco.com.
Step 10 ignore server-key (Optional) Configures the switch to ignore the server-key.
Example: For more information about the ignore command, see the
Cisco IOS Intelligent Services Gateway Command
SwitchDevice(config-sg-radius)# ignore server-key Reference on Cisco.com.
Step 11 authentication command bounce-port ignore (Optional) Configures the switch to ignore a CoA request
to temporarily disable the port hosting a session. The
Example:
purpose of temporarily disabling the port is to trigger a
DHCP renegotiation from the host when a VLAN change
SwitchDevice(config-sg-radius)# authentication
command bounce-port ignore occurs and there is no supplicant on the endpoint to detect
the change.
Step 12 authentication command disable-port ignore (Optional) Configures the switch to ignore a nonstandard
command requesting that the port hosting a session be
Example:
administratively shut down. Shutting down the port results
in termination of the session.
SwitchDevice(config-sg-radius)# authentication
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1226
Security
Monitoring CoA Functionality
SwitchDevice(config-sg-radius)# end
Step 15 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show aaa attributes protocol radius Displays AAA attributes of RADIUS commands.
Command Purpose
debug cmdhd [detail | error | events] Displays information for troubleshooting command headers.
For detailed information about the fields in these displays, see the command reference for this release.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1227
Security
Configuration Examples for Controlling Switch Access with RADIUS
This example shows how to configure host1 as the RADIUS server and to use the default ports for both
authentication and accounting:
cisco-avpair= ”ip:addr-pool=first“
This example shows how to provide a user logging in from a switch with immediate access to privileged
EXEC commands:
cisco-avpair= ”shell:priv-lvl=15“
This example shows how to specify an authorized VLAN in the RADIUS server database:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1228
Security
Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
cisco-avpair= ”tunnel-type(#64)=VLAN(13)”
cisco-avpair= ”tunnel-medium-type(#65)=802 media(6)”
cisco-avpair= ”tunnel-private-group-id(#81)=vlanid”
This example shows how to apply an input ACL in ASCII format to an interface for the duration of this
connection:
This example shows how to apply an output ACL in ASCII format to an interface for the duration of this
connection:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1229
Security
Example: Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1230
CHAPTER 53
Configuring Kerberos
• Finding Feature Information, on page 1231
• Prerequisites for Controlling Switch Access with Kerberos, on page 1231
• Information about Kerberos, on page 1232
• How to Configure Kerberos, on page 1235
• Monitoring the Kerberos Configuration, on page 1235
When you add or create entries for the hosts and users, follow these guidelines:
• The Kerberos principal name must be in all lowercase characters.
• The Kerberos instance name must be in all lowercase characters.
• The Kerberos realm name must be in all uppercase characters.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1231
Security
Information about Kerberos
Note In the Kerberos configuration examples, the trusted third party can be any switch that supports Kerberos, that
is configured as a network security server, and that can authenticate users by using the Kerberos protocol.
Kerberos Overview
Kerberos is a secret-key network authentication protocol, which was developed at the Massachusetts Institute
of Technology (MIT). It uses the Data Encryption Standard (DES) cryptographic algorithm for encryption
and authentication and authenticates requests for network resources. Kerberos uses the concept of a trusted
third party to perform secure verification of users and services. This trusted third party is called the key
distribution center (KDC).
Kerberos verifies that users are who they claim to be and the network services that they use are what the
services claim to be. To do this, a KDC or trusted Kerberos server issues tickets to users. These tickets, which
have a limited life span, are stored in user credential caches. The Kerberos server uses the tickets instead of
user names and passwords to authenticate users and network services.
Note A Kerberos server can be any switch that is configured as a network security server and that can authenticate
users by using the Kerberos protocol.
The Kerberos credential scheme uses a process called single logon. This process authenticates a user once
and then allows secure authentication (without encrypting another password) wherever that user credential is
accepted.
This software release supports Kerberos 5, which allows organizations that are already using Kerberos 5 to
use the same Kerberos authentication database on the KDC that they are already using on their other network
hosts (such as UNIX servers and PCs).
Kerberos supports these network services:
• Telnet
• rlogin
• rsh
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1232
Security
Kerberos Overview
Term Definition
Authentication A process by which a user or service identifies itself to another service. For example, a
client can authenticate to a switch or a switch can authenticate to another switch.
Authorization A means by which the switch identifies what privileges the user has in a network or on
the switch and what actions the user can perform.
Credential A general term that refers to authentication tickets, such as TGTs11 and service credentials.
Kerberos credentials verify the identity of a user or service. If a network service decides
to trust the Kerberos server that issued a ticket, it can be used in place of re-entering a
username and password. Credentials have a default life span of eight hours.
Instance An authorization level label for Kerberos principals. Most Kerberos principals are of the
form user@REALM (for example, [email protected]). A Kerberos principal with
a Kerberos instance has the form user/instance@REALM (for example,
smith/[email protected]). The Kerberos instance can be used to specify the
authorization level for the user if authentication is successful. The server of each network
service might implement and enforce the authorization mappings of Kerberos instances
but is not required to do so.
Note The Kerberos principal and instance names must be in all lowercase characters.
KDC12 Key distribution center that consists of a Kerberos server and database program that is
running on a network host.
Kerberized A term that describes applications and services that have been modified to support the
Kerberos credential infrastructure.
Kerberos realm A domain consisting of users, hosts, and network services that are registered to a Kerberos
server. The Kerberos server is trusted to verify the identity of a user or network service
to another user or network service.
Note The Kerberos realm name must be in all uppercase characters.
Kerberos server A daemon that is running on a network host. Users and network services register their
identity with the Kerberos server. Network services query the Kerberos server to
authenticate to other network services.
KEYTAB13 A password that a network service shares with the KDC. In Kerberos 5 and later Kerberos
versions, the network service authenticates an encrypted service credential by using the
KEYTAB to decrypt it. In Kerberos versions earlier than Kerberos 5, KEYTAB is referred
to as SRVTAB14.
Principal Also known as a Kerberos identity, this is who you are or what a service is according to
the Kerberos server.
Note The Kerberos principal name must be in all lowercase characters.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1233
Security
Kerberos Operation
Term Definition
Service A credential for a network service. When issued from the KDC, this credential is encrypted
credential with the password shared by the network service and the KDC. The password is also
shared with the user TGT.
SRVTAB A password that a network service shares with the KDC. In Kerberos 5 or later Kerberos
versions, SRVTAB is referred to as KEYTAB.
TGT Ticket granting ticket that is a credential that the KDC issues to authenticated users. When
users receive a TGT, they can authenticate to network services within the Kerberos realm
represented by the KDC.
11
ticket granting ticket
12
key distribution center
13
key table
14
server table
Kerberos Operation
A Kerberos server can be a switch that is configured as a network security server and that can authenticate
remote users by using the Kerberos protocol. Although you can customize Kerberos in a number of ways,
remote users attempting to access network services must pass through three layers of security before they can
access network services.
To authenticate to network services by using a switch as a Kerberos server, remote users must follow these
steps:
A remote user who initiates a un-Kerberized Telnet session and authenticates to a boundary switch is inside
the firewall, but the user must still authenticate directly to the KDC before getting access to the network
services. The user must authenticate to the KDC because the TGT that the KDC issues is stored on the switch
and cannot be used for additional authentication until the user logs on to the switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1234
Security
Obtaining a TGT from a KDC
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1235
Security
Monitoring the Kerberos Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1236
CHAPTER 54
Configuring Local Authentication and
Authorization
• Finding Feature Information, on page 1237
• How to Configure Local Authentication and Authorization, on page 1237
• Monitoring Local Authentication and Authorization, on page 1240
Note To secure the switch for HTTP access by using AAA methods, you must configure the switch with the ip
http authentication aaa global configuration command. Configuring AAA authentication does not secure
the switch for HTTP access by using AAA methods.
Follow these steps to configure AAA to operate without a server by setting the switch to implement AAA in
local mode:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1237
Security
Configuring the Switch for Local Authentication and Authorization
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication login default local
5. aaa authorization exec local
6. aaa authorization network local
7. username name [privilege level] {password encryption-type password}
8. end
9. show running-config
10. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 aaa authentication login default local Sets the login authentication to use the local username
database. The default keyword applies the local user
Example:
database authentication to all ports.
SwitchDevice(config)# aaa authentication login
default local
Step 5 aaa authorization exec local Configures user AAA authorization, check the local
database, and allow the user to run an EXEC shell.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1238
Security
Configuring the Switch for Local Authentication and Authorization
Step 7 username name [privilege level] {password Enters the local database, and establishes a username-based
encryption-type password} authentication system.
Example: Repeat this command for each user.
• For name, specify the user ID as one word. Spaces
SwitchDevice(config)# username your_user_name
privilege 1 password 7 secret567 and quotation marks are not allowed.
• (Optional) For level, specify the privilege level the
user has after gaining access. The range is 0 to 15.
Level 15 gives privileged EXEC mode access. Level
0 gives user EXEC mode access.
• For encryption-type, enter 0 to specify that an
unencrypted password follows. Enter 7 to specify that
a hidden password follows.
• For password, specify the password the user must
enter to gain access to the switch. The password must
be from 1 to 25 characters, can contain embedded
spaces, and must be the last option specified in the
username command.
SwitchDevice(config)# end
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
SSH Servers, Integrated Clients, and Supported Versions, on page 1243
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1239
Security
Monitoring Local Authentication and Authorization
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1240
CHAPTER 55
Configuring Secure Shell (SSH)
• Finding Feature Information, on page 1241
• Prerequisites for Configuring Secure Shell, on page 1241
• Restrictions for Configuring Secure Shell, on page 1242
• Information about SSH, on page 1242
• How to Configure SSH, on page 1245
• Monitoring the SSH Configuration and Status, on page 1249
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1241
Security
Restrictions for Configuring Secure Shell
• A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System
(IFS) to and from a switch by using the copy command. An authorized administrator can also do this
from a workstation.
• The Secure Shell (SSH) server requires an IPsec (Data Encryption Standard [DES] or 3DES) encryption
software image; the SSH client requires an IPsec (DES or 3DES) encryption software image.)
• Configure a hostname and host domain for your device by using the hostname and ip domain-name
commands in global configuration mode.
Related Topics
Secure Copy Protocol, on page 1244
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1242
Security
SSH Servers, Integrated Clients, and Supported Versions
SSH functions the same in IPv6 as in IPv4. For IPv6, SSH supports IPv6 addresses and enables secure,
encrypted connections with remote IPv6 nodes over an IPv6 transport.
Note The SSH client functionality is available only when the SSH server is enabled.
User authentication is performed like that in the Telnet session to the device. SSH also supports the following
user authentication methods:
• TACACS+
• RADIUS
• Local authentication and authorization
Related Topics
Configuring the Switch for Local Authentication and Authorization, on page 1237
TACACS+ and Switch Access, on page 1173
RADIUS and Switch Access, on page 1187
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1243
Security
Secure Copy Protocol Overview
• When generating the RSA key pair, the message No domain specified might appear. If it does, you must
configure an IP domain name by using the ip domain-name global configuration command.
• When configuring the local authentication and authorization authentication method, make sure that AAA
is disabled on the console.
Related Topics
Setting Up the SwitchDevice to Run SSH, on page 1245
Configuring the Switch for Local Authentication and Authorization, on page 1237
Note When using SCP, you cannot enter the password into the copy command. You must enter the password when
prompted.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1244
Security
How to Configure SSH
SUMMARY STEPS
1. enable
2. configure terminal
3. hostname hostname
4. ip domain-name domain_name
5. crypto key generate rsa
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 hostname hostname Configures a hostname and IP domain name for your
SwitchDevice.
Example:
Note Follow this procedure only if you are configuring
SwitchDevice(config)# hostname your_hostname the SwitchDevice as an SSH server.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1245
Security
Configuring the SSH Server
Step 5 crypto key generate rsa Enables the SSH server for local and remote authentication
on the SwitchDevice and generates an RSA key pair.
Example:
Generating an RSA key pair for the SwitchDevice
automatically enables SSH.
SwitchDevice(config)# crypto key generate rsa
We recommend that a minimum modulus size of 1024 bits.
When you generate RSA keys, you are prompted to enter
a modulus length. A longer modulus length might be more
secure, but it takes longer to generate and to use.
Note Follow this procedure only if you are configuring
the SwitchDevice as an SSH server.
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
SSH Configuration Guidelines, on page 1243
Configuring the Switch for Local Authentication and Authorization, on page 1237
Note This procedure is only required if you are configuring the SwitchDevice as an SSH server.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1246
Security
Configuring the SSH Server
SUMMARY STEPS
1. enable
2. configure terminal
3. ip ssh version [1 | 2]
4. ip ssh {timeout seconds | authentication-retries number}
5. Use one or both of the following:
• line vtyline_number[ending_line_number]
• transport input ssh
6. end
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip ssh version [1 | 2] (Optional) Configures the SwitchDevice to run SSH Version
1 or SSH Version 2.
Example:
• 1—Configure the SwitchDevice to run SSH Version
SwitchDevice(config)# ip ssh version 1 1.
• 2—Configure the SwitchDevice to run SSH Version
2.
Step 4 ip ssh {timeout seconds | authentication-retries number} Configures the SSH control parameters:
Example: • Specify the time-out value in seconds; the default is
120 seconds. The range is 0 to 120 seconds. This
SwitchDevice(config)# ip ssh timeout 90 parameter applies to the SSH negotiation phase. After
authentication-retries 2 the connection is established, the SwitchDevice uses
the default time-out values of the CLI-based sessions.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1247
Security
Configuring the SSH Server
Step 5 Use one or both of the following: (Optional) Configures the virtual terminal line settings.
• line vtyline_number[ending_line_number] • Enters line configuration mode to configure the virtual
• transport input ssh terminal line settings. For line_number and
ending_line_number, specify a pair of lines. The range
Example: is 0 to 15.
SwitchDevice(config)# line vty 1 10
• Specifies that the SwitchDevice prevent non-SSH
Telnet connections. This limits the router to only SSH
or
connections.
SwitchDevice(config-line)# transport input ssh
SwitchDevice(config-line)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1248
Security
Monitoring the SSH Configuration and Status
Table 137: Commands for Displaying the SSH Server Configuration and Status
Command Purpose
show ip Shows the version and configuration information for the SSH server.
ssh
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1249
Security
Monitoring the SSH Configuration and Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1250
CHAPTER 56
Configuring Secure Socket Layer HTTP
• Finding Feature Information, on page 1251
• Information about Secure Sockets Layer (SSL) HTTP, on page 1251
• How to Configure Secure HTTP Servers and Clients, on page 1254
• Monitoring Secure HTTP Server and Client Status, on page 1260
Note SSL evolved into Transport Layer Security (TLS) in 1999, but is still used in this particular context.
The primary role of the HTTP secure server (the switch) is to listen for HTTPS requests on a designated port
(the default HTTPS port is 443) and pass the request to the HTTP 1.1 Web server. The HTTP 1.1 server
processes requests and passes responses (pages) back to the HTTP secure server, which, in turn, responds to
the original request.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1251
Security
Certificate Authority Trustpoints
The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests
for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response
back to the application.
Note The certificate authorities and trustpoints must be configured on each device individually. Copying them from
other devices makes them invalid on the switch.
If a self-signed certificate has been generated, this information is included in the output of the show
running-config privileged EXEC command. This is a partial sample output from that command displaying
a self-signed certificate.
<output truncated>
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1252
Security
CipherSuites
<output truncated>
You can remove this self-signed certificate by disabling the secure HTTP server and entering the no crypto
pki trustpoint TP-self-signed-30890755072 global configuration command. If you later re-enable a secure
HTTP server, a new self-signed certificate is generated.
Note The values that follow TP self-signed depend on the serial number of the device.
You can use an optional command (ip http secure-client-auth) to allow the HTTPS server to request an
X.509v3 certificate from the client. Authenticating the client provides more security than server authentication
by itself.
For additional information on Certificate Authorities, see the “Configuring Certification Authority
Interoperability” chapter in the Cisco IOS Security Configuration Guide, Release 12.4.
CipherSuites
A CipherSuite specifies the encryption algorithm and the digest algorithm to use on a SSL connection. When
connecting to the HTTPS server, the client Web browser offers a list of supported CipherSuites, and the client
and server negotiate the best encryption algorithm to use from those on the list that are supported by both.
For example, Netscape Communicator 4.76 supports U.S. security with RSA Public Key Cryptography, MD2,
MD5, RC2-CBC, RC4, DES-CBC, and DES-EDE3-CBC.
For the best possible encryption, you should use a client browser that supports 128-bit encryption, such as
Microsoft Internet Explorer Version 5.5 (or later) or Netscape Communicator Version 4.76 (or later). The
SSL_RSA_WITH_DES_CBC_SHA CipherSuite provides less security than the other CipherSuites, as it does
not offer 128-bit encryption.
The more secure and more complex CipherSuites require slightly more processing time. This list defines the
CipherSuites supported by the switch and ranks them from fastest to slowest in terms of router processing
load (speed):
1. SSL_RSA_WITH_DES_CBC_SHA—RSA key exchange (RSA Public Key Cryptography) with
DES-CBC for message encryption and SHA for message digest
2. SSL_RSA_WITH_NULL_SHA key exchange with NULL for message encryption and SHA for message
digest (only for SSL 3.0).
3. SSL_RSA_WITH_NULL_MD5 key exchange with NULL for message encryption and MD5 for message
digest (only for SSL 3.0).
4. SSL_RSA_WITH_RC4_128_MD5—RSA key exchange with RC4 128-bit encryption and MD5 for
message digest
5. SSL_RSA_WITH_RC4_128_SHA—RSA key exchange with RC4 128-bit encryption and SHA for
message digest
6. SSL_RSA_WITH_3DES_EDE_CBC_SHA—RSA key exchange with 3DES and DES-EDE3-CBC for
message encryption and SHA for message digest
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1253
Security
Default SSL Configuration
Note The latest versions of Chrome do not support the four original cipher suites, thus disallowing access to both
web GUI and guest portals.
RSA (in conjunction with the specified encryption and digest algorithm combinations) is used for both key
generation and authentication on SSL connections. This usage is independent of whether or not a CA trustpoint
is configured.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1254
Security
Configuring a CA Trustpoint
SUMMARY STEPS
1. configure terminal
2. hostname hostname
3. ip domain-name domain-name
4. crypto key generate rsa
5. crypto ca trustpoint name
6. enrollment url url
7. enrollment http-proxy host-name port-number
8. crl query url
9. primary name
10. exit
11. crypto ca authentication name
12. crypto ca enroll name
13. end
DETAILED STEPS
Step 2 hostname hostname Specifies the hostname of the switch (required only if you
have not previously configured a hostname). The hostname
Example:
is required for security keys and certificates.
SwitchDevice(config)# hostname your_hostname
Step 3 ip domain-name domain-name Specifies the IP domain name of the switch (required only
if you have not previously configured an IP domain name).
Example:
The domain name is required for security keys and
certificates.
SwitchDevice(config)# ip domain-name your_domain
Step 4 crypto key generate rsa (Optional) Generates an RSA key pair. RSA key pairs are
required before you can obtain a certificate for the switch.
Example:
RSA key pairs are generated automatically. You can use
this command to regenerate the keys, if needed.
SwitchDevice(config)# crypto key generate rsa
Step 5 crypto ca trustpoint name Specifies a local configuration name for the CA trustpoint
and enter CA trustpoint configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1255
Security
Configuring a CA Trustpoint
Step 7 enrollment http-proxy host-name port-number (Optional) Configures the switch to obtain certificates from
the CA through an HTTP proxy server.
Example:
• For host-name , specify the proxy server used to get
SwitchDevice(ca-trustpoint)# enrollment http-proxy the CA.
your_host 49 • For port-number, specify the port number used to
access the CA.
Step 8 crl query url Configures the switch to request a certificate revocation
list (CRL) to ensure that the certificate of the peer has not
Example:
been revoked.
SwitchDevice(ca-trustpoint)# crl query
ldap://your_host:49
Step 9 primary name (Optional) Specifies that the trustpoint should be used as
the primary (default) trustpoint for CA requests.
Example:
• For name, specify the trustpoint that you just
SwitchDevice(ca-trustpoint)# primary configured.
your_trustpoint
SwitchDevice(ca-trustpoint)# exit
Step 11 crypto ca authentication name Authenticates the CA by getting the public key of the CA.
Use the same name used in Step 5.
Example:
Step 12 crypto ca enroll name Obtains the certificate from the specified CA trustpoint.
This command requests a signed certificate for each RSA
Example:
key pair.
SwitchDevice(config)# crypto ca enroll
your_trustpoint
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1256
Security
Configuring the Secure HTTP Server
SwitchDevice(config)# end
https://209.165.129:1026
or
https://host.domain.com:1026
SUMMARY STEPS
1. show ip http server status
2. configure terminal
3. ip http secure-server
4. ip http secure-port port-number
5. ip http secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]}
6. ip http secure-client-auth
7. ip http secure-trustpoint name
8. ip http path path-name
9. ip http access-class access-list-number
10. ip http max-connections value
11. ip http timeout-policy idle seconds life seconds requests value
12. end
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1257
Security
Configuring the Secure HTTP Server
or
Step 3 ip http secure-server Enables the HTTPS server if it has been disabled. The
HTTPS server is enabled by default.
Example:
Step 4 ip http secure-port port-number (Optional) Specifies the port number to be used for the
HTTPS server. The default port number is 443. Valid
Example:
options are 443 or any number in the range 1025 to 65535.
SwitchDevice(config)# ip http secure-port 443
Step 7 ip http secure-trustpoint name Specifies the CA trustpoint to use to get an X.509v3
security certificate and to authenticate the client certificate
Example:
connection.
SwitchDevice(config)# ip http secure-trustpoint Note Use of this command assumes you have already
your_trustpoint configured a CA trustpoint according to the
previous procedure.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1258
Security
Configuring the Secure HTTP Client
Step 9 ip http access-class access-list-number (Optional) Specifies an access list to use to allow access
to the HTTP server.
Example:
Step 10 ip http max-connections value (Optional) Sets the maximum number of concurrent
connections that are allowed to the HTTP server. We
Example:
recommend that the value be at least 10 and not less. This
is required for the UI to function as expected.
SwitchDevice(config)# ip http max-connections 4
Step 11 ip http timeout-policy idle seconds life seconds requests (Optional) Specifies how long a connection to the HTTP
value server can remain open under the defined circumstances:
Example: • idle—the maximum time period when no data is
received or response data cannot be sent. The range
SwitchDevice(config)# ip http timeout-policy idle is 1 to 600 seconds. The default is 180 seconds (3
120 life 240 requests 1 minutes).
• life—the maximum time period from the time that
the connection is established. The range is 1 to 86400
seconds (24 hours). The default is 180 seconds.
• requests—the maximum number of requests
processed on a persistent connection. The maximum
value is 86400. The default is 1.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1259
Security
Monitoring Secure HTTP Server and Client Status
on the switch. If a CA trustpoint is not configured and the remote HTTPS server requires client authentication,
connections to the secure HTTP client fail.
SUMMARY STEPS
1. configure terminal
2. ip http client secure-trustpoint name
3. ip http client secure-ciphersuite {[3des-ede-cbc-sha] [rc4-128-md5] [rc4-128-sha] [des-cbc-sha]}
4. end
DETAILED STEPS
Step 2 ip http client secure-trustpoint name (Optional) Specifies the CA trustpoint to be used if the
remote HTTP server requests client authentication. Using
Example:
this command assumes that you have already configured a
CA trustpoint by using the previous procedure. The
SwitchDevice(config)# ip http client
secure-trustpoint your_trustpoint command is optional if client authentication is not needed
or if a primary trustpoint has been configured.
Step 3 ip http client secure-ciphersuite {[3des-ede-cbc-sha] (Optional) Specifies the CipherSuites (encryption
[rc4-128-md5] [rc4-128-sha] [des-cbc-sha]} algorithms) to be used for encryption over the HTTPS
connection. If you do not have a reason to specify a
Example:
particular CipherSuite, you should allow the server and
client to negotiate a CipherSuite that they both support. This
SwitchDevice(config)# ip http client
secure-ciphersuite rc4-128-md5 is the default.
SwitchDevice(config)# end
Table 138: Commands for Displaying the SSL Secure Server and Client Status
Command Purpose
show ip http client secure status Shows the HTTP secure client configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1260
Security
Monitoring Secure HTTP Server and Client Status
Command Purpose
show ip http server secure status Shows the HTTP secure server configuration.
show running-config Shows the generated self-signed certificate for secure HTTP connections.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1261
Security
Monitoring Secure HTTP Server and Client Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1262
CHAPTER 57
Configuring IPv4 ACLs
• Finding Feature Information, on page 1263
• Prerequisites for Configuring IPv4 Access Control Lists, on page 1263
• Restrictions for Configuring IPv4 Access Control Lists, on page 1263
• Information about Network Security with ACLs, on page 1265
• How to Configure ACLs, on page 1276
• Monitoring IPv4 ACLs, on page 1297
• Configuration Examples for ACLs, on page 1298
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1263
Security
Restrictions for Configuring IPv4 Access Control Lists
• A standard ACL and an extended ACL cannot have the same name.
• Though visible in the command-line help strings, appletalk is not supported as a matching condition for
the deny and permit MAC access-list configuration mode commands.
Note By default, the router sends Internet Control Message Protocol (ICMP) unreachable messages when a packet
is denied by an access group on a Layer 3 interface. These access-group denied packets are not dropped in
hardware but are bridged to the switch CPU so that it can generate the ICMP-unreachable message. They do
not generate ICMP unreachable messages. ICMP unreachable messages can be disabled on router ACLs with
the no ip unreachables interface command.
Note The mac access-group interface configuration command is only valid when applied to a physical Layer 2
interface. You cannot use the command on EtherChannel port channels.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1264
Security
Information about Network Security with ACLs
ACL Overview
Packet filtering can help limit network traffic and restrict network use by certain users or devices. ACLs filter
traffic as it passes through a router or switch and permit or deny packets crossing specified interfaces or
VLANs. An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet
is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify
that the packet has the required permissions to be forwarded, based on the criteria specified in the access lists.
One by one, it tests packets against the conditions in an access list. The first match decides whether the switch
accepts or rejects the packets. Because the switch stops testing after the first match, the order of conditions
in the list is critical. If no conditions match, the switch rejects the packet. If there are no restrictions, the switch
forwards the packet; otherwise, the switch drops the packet. The switch can use ACLs on all packets it forwards,
including packets bridged within a VLAN.
You configure access lists on a router or Layer 3 switch to provide basic security for your network. If you do
not configure ACLs, all packets passing through the switch could be allowed onto all parts of the network.
You can use ACLs to control which hosts can access different parts of a network or to decide which types of
traffic are forwarded or blocked at router interfaces. For example, you can allow e-mail traffic to be forwarded
but not Telnet traffic. ACLs can be configured to block inbound traffic, outbound traffic, or both.
Supported ACLs
The switch supports three types of ACLs to filter traffic:
• Port ACLs access-control traffic entering a Layer 2 interface. You can apply only one IP access list and
one MAC access list to a Layer 2 interface.
• Router ACLs access-control routed traffic between VLANs and are applied to Layer 3 interfaces in a
specific direction (inbound or outbound).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1265
Security
ACL Precedence
• VLAN ACLs or VLAN maps access-control all packets (bridged and routed). You can use VLAN maps
to filter traffic between devices in the same VLAN. VLAN maps are configured to provide access control
based on Layer 3 addresses for IPv4. Unsupported protocols are access-controlled through MAC addresses
using Ethernet ACEs. After a VLAN map is applied to a VLAN, all packets (routed or bridged) entering
the VLAN are checked against the VLAN map. Packets can either enter the VLAN through a switch port
or through a routed port after being routed.
ACL Precedence
When VLAN maps, Port ACLs, and router ACLs are configured on the same switch, the filtering precedence,
from greatest to least, is port ACL, router ACL, then VLAN map. The following examples describe simple
use cases:
• When both an input port ACL and a VLAN map are applied, incoming packets received on ports with a
port ACL applied are filtered by the port ACL. Other packets are filtered by the VLAN map
• When an input router ACL and input port ACL exist in a switch virtual interface (SVI), incoming packets
received on ports to which a port ACL is applied are filtered by the port ACL. Incoming routed IP packets
received on other ports are filtered by the router ACL. Other packets are not filtered.
• When an output router ACL and input port ACL exist in an SVI, incoming packets received on the ports
to which a port ACL is applied are filtered by the port ACL. Outgoing routed IP packets are filtered by
the router ACL. Other packets are not filtered.
• When a VLAN map, input router ACL, and input port ACL exist in an SVI, incoming packets received
on the ports to which a port ACL is applied are only filtered by the port ACL. Incoming routed IP packets
received on other ports are filtered by both the VLAN map and the router ACL. Other packets are filtered
only by the VLAN map.
• When a VLAN map, output router ACL, and input port ACL exist in an SVI, incoming packets received
on the ports to which a port ACL is applied are only filtered by the port ACL. Outgoing routed IP packets
are filtered by both the VLAN map and the router ACL. Other packets are filtered only by the VLAN
map.
Related Topics
Restrictions for Configuring IPv4 Access Control Lists, on page 1263
Port ACLs
Port ACLs are ACLs that are applied to Layer 2 interfaces on a switch. Port ACLs are supported only on
physical interfaces and not on EtherChannel interfaces. Port ACLs can be applied on outbound and inbound
interfaces. The following access lists are supported:
• Standard IP access lists using source addresses
• Extended IP access lists using source and destination addresses and optional protocol type information
• MAC extended access lists using source and destination MAC addresses and optional protocol type
information
The switch examines ACLs on an interface and permits or denies packet forwarding based on how the packet
matches the entries in the ACL. In this way, ACLs control access to a network or to part of a network.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1266
Security
Router ACLs
This is an example of using port ACLs to control access to a network when all workstations are in the same
VLAN. ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network, but
prevent Host B from accessing the same network. Port ACLs can only be applied to Layer 2 interfaces in the
inbound direction.
When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.
When you apply a port ACL to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs.
With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses.
You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and
a MAC access list to the interface.
Note You cannot apply more than one IP access list and one MAC access list to a Layer 2 interface. If an IP access
list or MAC access list is already configured on a Layer 2 interface and you apply a new IP access list or MAC
access list to the interface, the new ACL replaces the previously configured one.
Router ACLs
You can apply router ACLs on switch virtual interfaces (SVIs), which are Layer 3 interfaces to VLANs; on
physical Layer 3 interfaces; and on Layer 3 EtherChannel interfaces. You apply router ACLs on interfaces
for specific directions (inbound or outbound). You can apply one router ACL in each direction on an interface.
The switch supports these access lists for IPv4 traffic:
• Standard IP access lists use source addresses for matching operations.
• Extended IP access lists use source and destination addresses and optional protocol type information for
matching operations.
As with port ACLs, the switch examines ACLs associated with features configured on a given interface. As
packets enter the switch on an interface, ACLs associated with all inbound features configured on that interface
are examined. After packets are routed and before they are forwarded to the next hop, all ACLs associated
with outbound features configured on the egress interface are examined.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1267
Security
VLAN Maps
ACLs permit or deny packet forwarding based on how the packet matches the entries in the ACL, and can be
used to control access to a network or to part of a network.
VLAN Maps
Use VLAN ACLs or VLAN maps to access-control all traffic. You can apply VLAN maps to all packets that
are routed into or out of a VLAN or are bridged within a VLAN in the switch or switch stack.
Use VLAN maps for security packet filtering. VLAN maps are not defined by direction (input or output).
You can configure VLAN maps to match Layer 3 addresses for IPv4 traffic.
All non-IP protocols are access-controlled through MAC addresses and Ethertype using MAC VLAN maps.
(IP traffic is not access controlled by MAC VLAN maps.) You can enforce VLAN maps only on packets
going through the switch; you cannot enforce VLAN maps on traffic between hosts on a hub or on another
switch connected to this switch.
With VLAN maps, forwarding of packets is permitted or denied, based on the action specified in the map.
Figure 101: Using VLAN Maps to Control Traffic
This shows how a VLAN map is applied to prevent a specific type of traffic from Host A in VLAN 10 from
being forwarded. You can apply only one VLAN map to a
VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1268
Security
Standard and Extended IPv4 ACLs
Note In the first and second ACEs in the examples, the eq keyword after the destination address means to test for
the TCP-destination-port well-known numbers equaling Simple Mail Transfer Protocol (SMTP) and Telnet,
respectively.
• Packet A is a TCP packet from host 10.2.2.2., port 65000, going to host 10.1.1.1 on the SMTP port. If
this packet is fragmented, the first fragment matches the first ACE (a permit) as if it were a complete
packet because all Layer 4 information is present. The remaining fragments also match the first ACE,
even though they do not contain the SMTP port information, because the first ACE only checks Layer
3 information when applied to fragments. The information in this example is that the packet is TCP and
that the destination is 10.1.1.1.
• Packet B is from host 10.2.2.2, port 65001, going to host 10.1.1.2 on the Telnet port. If this packet is
fragmented, the first fragment matches the second ACE (a deny) because all Layer 3 and Layer 4
information is present. The remaining fragments in the packet do not match the second ACE because
they are missing Layer 4 information. Instead, they match the third ACE (a permit).
Because the first fragment was denied, host 10.1.1.2 cannot reassemble a complete packet, so packet B
is effectively denied. However, the later fragments that are permitted will consume bandwidth on the
network and resources of host 10.1.1.2 as it tries to reassemble the packet.
• Fragmented packet C is from host 10.2.2.2, port 65001, going to host 10.1.1.3, port ftp. If this packet is
fragmented, the first fragment matches the fourth ACE (a deny). All other fragments also match the
fourth ACE because that ACE does not check any Layer 4 information and because Layer 3 information
in all fragments shows that they are being sent to host 10.1.1.3, and the earlier permit ACEs were checking
different hosts.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1269
Security
IPv4 ACL Switch Unsupported Features
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1270
Security
Numbered Standard IPv4 ACLs
In addition to numbered standard and extended ACLs, you can also create standard and extended named IP
ACLs by using the supported numbers. That is, the name of a standard IP ACL can be 1 to 99; the name of
an extended IP ACL can be 100 to 199. The advantage of using named ACLs instead of numbered lists is that
you can delete individual entries from a named list.
Note ICMP echo-reply cannot be filtered. All other ICMP codes or types can be filtered.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1271
Security
Named IPv4 ACLs
Note The name you give to a standard or extended ACL can also be a number in the supported range of access list
numbers. That is, the name of a standard IP ACL can be 1 to 99 and . The advantage of using named ACLs
instead of numbered lists is that you can delete individual entries from a named list.
ACL Logging
The switch software can provide logging messages about packets permitted or denied by a standard IP access
list. That is, any packet that matches the ACL causes an informational logging message about the packet to
be sent to the console. The level of messages logged to the console is controlled by the logging console
commands controlling the syslog messages.
Note Because routing is done in hardware and logging is done in software, if a large number of packets match a
permit or deny ACE containing a log keyword, the software might not be able to match the hardware processing
rate, and not all packets will be logged.
The first packet that triggers the ACL causes a logging message right away, and subsequent packets are
collected over 5-minute intervals before they appear or logged. The logging message includes the access list
number, whether the packet was permitted or denied, the source IP address of the packet, and the number of
packets from that source permitted or denied in the prior 5-minute interval.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1272
Security
Hardware and Software Treatment of IP ACLs
Note The logging facility might drop some logging message packets if there are too many to be handled or if there
is more than one logging message to be handled in 1 second. This behavior prevents the router from crashing
due to too many logging packets. Therefore, the logging facility should not be used as a billing tool or an
accurate source of the number of matches to an access list.
Note If an ACL configuration cannot be implemented in hardware due to an out-of-resource condition on a switch
or stack member, then only the traffic in that VLAN arriving on that switch is affected.
For router ACLs, other factors can cause packets to be sent to the CPU:
• Using the log keyword
• Generating ICMP unreachable messages
When traffic flows are both logged and forwarded, forwarding is done by hardware, but logging must be done
by software. Because of the difference in packet handling capacity between hardware and software, if the sum
of all flows being logged (both permitted flows and denied flows) is of great enough bandwidth, not all of the
packets that are forwarded can be logged.
When you enter the show ip access-lists privileged EXEC command, the match count displayed does not
account for packets that are access controlled in hardware. Use the show platform acl counters hardware
privileged EXEC command to obtain some basic hardware ACL statistics for switched and routed packets.
Router ACLs function as follows:
• The hardware controls permit and deny actions of standard and extended ACLs (input and output) for
security access control.
• If log has not been specified, the flows that match a deny statement in a security ACL are dropped by
the hardware if ip unreachables is disabled. The flows matching a permit statement are switched in
hardware.
• Adding the log keyword to an ACE in a router ACL causes a copy of the packet to be sent to the CPU
for logging only. If the ACE is a permit statement, the packet is still switched and routed in hardware.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1273
Security
VLAN Maps with Router ACLs
Note When you use router ACLs with VLAN maps, packets that require logging on the router ACLs are not logged
if they are denied by a VLAN map.
If the VLAN map has a match clause for the type of packet (IP or MAC) and the packet does not match the
type, the default is to drop the packet. If there is no match clause in the VLAN map, and no action specified,
the packet is forwarded if it does not match any VLAN map entry.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1274
Security
VACL Logging
or
deny... deny... deny... permit ip any any
• To define multiple actions in an ACL (permit, deny), group each action type together to reduce the
number of entries.
• Avoid including Layer 4 information in an ACL; adding this information complicates the merging process.
The best merge results are obtained if the ACLs are filtered based on IP addresses (source and destination)
and not on the full flow (source IP address, destination IP address, protocol, and protocol ports). It is
also helpful to use don’t care bits in the IP address, whenever possible.
If you need to specify the full-flow mode and the ACL contains both IP ACEs and TCP/UDP/ICMP
ACEs with Layer 4 information, put the Layer 4 ACEs at the end of the list. This gives priority to the
filtering of traffic based on IP addresses.
VACL Logging
When you configure VACL logging, syslog messages are generated for denied IP packets under these
circumstances:
• When the first matching packet is received.
• For any matching packets received within the last 5 minutes.
• If the threshold is reached before the 5-minute interval.
Log messages are generated on a per-flow basis. A flow is defined as packets with the same IP addresses and
Layer 4 (UDP or TCP) port numbers. If a flow does not receive any packets in the 5-minute interval, that flow
is removed from the cache. When a syslog message is generated, the timer and packet counter are reset.
VACL logging restrictions:
• Only denied IP packets are logged.
• Packets that require logging on the outbound port ACLs are not logged if they are denied by a VACL.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1275
Security
IPv4 ACL Interface Considerations
Time-based access lists trigger CPU activity because the new configuration of the access list must be merged
with other features and the combined configuration loaded into the hardware memory. For this reason, you
should be careful not to have several access lists configured to take affect in close succession (within a small
number of minutes of each other.)
Note The time range relies on the switch system clock; therefore, you need a reliable clock source. We recommend
that you use Network Time Protocol (NTP) to synchronize the switch clock.
Related Topics
Configuring Time Ranges for ACLs, on page 1285
SUMMARY STEPS
1. Create an ACL by specifying an access list number or name and the access conditions.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1276
Security
Creating a Numbered Standard ACL
2. Apply the ACL to interfaces or terminal lines. You can also apply standard and extended IP ACLs to
VLAN maps.
DETAILED STEPS
SUMMARY STEPS
1. enable
2. configure terminal
3. access-list access-list-number {deny | permit} source source-wildcard [log]
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 access-list access-list-number {deny | permit} source Defines a standard IPv4 access list by using a source address
source-wildcard [log] and wildcard.
Example: The access-list-number is a decimal number from 1 to 99
or 1300 to 1999.
SwitchDevice(config)# access-list 2 deny your_host
Enter deny or permit to specify whether to deny or permit
access if conditions are matched.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1277
Security
Creating a Numbered Extended ACL
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Configuring VLAN Maps, on page 1293
SUMMARY STEPS
1. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1278
Security
Creating a Numbered Extended ACL
DETAILED STEPS
Step 2 access-list access-list-number {deny | permit} protocol Defines an extended IPv4 access list and the access
source source-wildcard destination destination-wildcard conditions.
[precedence precedence] [tos tos] [fragments] [log
The access-list-number is a decimal number from 100 to
[log-input] [time-range time-range-name] [dscp dscp]
199 or 2000 to 2699.
Example:
Enter deny or permit to specify whether to deny or permit
the packet if conditions are matched.
SwitchDevice(config)# access-list 101 permit ip
host 10.1.1.2 any precedence 0 tos 0 log For protocol, enter the name or number of an P protocol:
ahp, eigrp, esp, gre, icmp, igmp, igrp, ip, ipinip, nos,
ospf, pcp, pim, tcp, or udp, or an integer in the range 0 to
255 representing an IP protocol number. To match any
Internet protocol (including ICMP, TCP, and UDP), use
the keyword ip.
Note This step includes options for most IP protocols.
For additional specific parameters for TCP, UDP,
ICMP, and IGMP, see the following steps.
The source is the number of the network or host from which
the packet is sent.
The source-wildcard applies wildcard bits to the source.
The destination is the network or host number to which the
packet is sent.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1279
Security
Creating a Numbered Extended ACL
Step 3 access-list access-list-number {deny | permit} tcp source Defines an extended TCP access list and the access
source-wildcard [operator port] destination conditions.
destination-wildcard [operator port] [established]
The parameters are the same as those described for an
[precedence precedence] [tos tos] [fragments] [log
extended IPv4 ACL, with these exceptions:
[log-input] [time-range time-range-name] [dscp dscp]
[flag] (Optional) Enter an operator and port to compare source
(if positioned after source source-wildcard) or destination
Example:
(if positioned after destination destination-wildcard) port.
Possible operators include eq (equal), gt (greater than), lt
SwitchDevice(config)# access-list 101 permit tcp
(less than), neq (not equal), and range (inclusive range).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1280
Security
Creating a Numbered Extended ACL
Step 4 access-list access-list-number {deny | permit} udp source (Optional) Defines an extended UDP access list and the
source-wildcard [operator port] destination access conditions.
destination-wildcard [operator port] [precedence
The UDP parameters are the same as those described for
precedence] [tos tos] [fragments] [log [log-input]
TCP except that the [operator [port]] port number or name
[time-range time-range-name] [dscp dscp]
must be a UDP port number or name, and the flag and
Example: established keywords are not valid for UDP.
Step 5 access-list access-list-number {deny | permit} icmp source Defines an extended ICMP access list and the access
source-wildcard destination destination-wildcard [icmp-type conditions.
| [[icmp-type icmp-code] | [icmp-message]] [precedence
The ICMP parameters are the same as those described for
precedence] [tos tos] [fragments] [time-range
most IP protocols in an extended IPv4 ACL, with the
time-range-name] [dscp dscp]
addition of the ICMP message type and code parameters.
Example: These optional keywords have these meanings:
• icmp-type—Enter to filter by ICMP message type, a
SwitchDevice(config)# access-list 101 permit icmp
any any 200
number from 0 to 255.
• icmp-code—Enter to filter ICMP packets that are
filtered by the ICMP message code type, a number
from 0 to 255.
• icmp-message—Enter to filter ICMP packets by the
ICMP message type name or the ICMP message type
and code name.
Step 6 access-list access-list-number {deny | permit} igmp source (Optional) Defines an extended IGMP access list and the
source-wildcard destination destination-wildcard access conditions.
[igmp-type] [precedence precedence] [tos tos] [fragments]
The IGMP parameters are the same as those described for
[log [log-input] [time-range time-range-name] [dscp dscp]
most IP protocols in an extended IPv4 ACL, with this
Example: optional parameter.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1281
Security
Creating Named Standard ACLs
SwitchDevice(config)# end
Related Topics
Configuring VLAN Maps, on page 1293
SUMMARY STEPS
1. enable
2. configure terminal
3. ip access-list standard name
4. Use one of the following:
• deny {source [source-wildcard] | host source | any} [log]
• permit {source [source-wildcard] | host source | any} [log]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1282
Security
Creating Extended Named ACLs
Step 4 Use one of the following: In access-list configuration mode, specify one or more
conditions denied or permitted to decide if the packet is
• deny {source [source-wildcard] | host source | any}
forwarded or dropped.
[log]
• permit {source [source-wildcard] | host source | any} • host source—A source and source wildcard of source
[log] 0.0.0.0.
Example: • any—A source and source wildcard of 0.0.0.0
255.255.255.255.
SwitchDevice(config-std-nacl)# deny 192.168.0.0
0.0.255.255 255.255.0.0 0.0.255.255
or
SwitchDevice(config-std-nacl)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1283
Security
Creating Extended Named ACLs
2. configure terminal
3. ip access-list extended name
4. {deny | permit} protocol {source [source-wildcard] | host source | any} {destination [destination-wildcard]
| host destination | any} [precedence precedence] [tos tos] [established] [log] [time-range
time-range-name]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip access-list extended name Defines an extended IPv4 access list using a name, and
enter access-list configuration mode.
Example:
The name can be a number from 100 to 199.
SwitchDevice(config)# ip access-list extended 150
Step 4 {deny | permit} protocol {source [source-wildcard] | host In access-list configuration mode, specify the conditions
source | any} {destination [destination-wildcard] | host allowed or denied. Use the log keyword to get access list
destination | any} [precedence precedence] [tos tos] logging messages, including violations.
[established] [log] [time-range time-range-name]
• host source—A source and source wildcard of source
Example: 0.0.0.0.
SwitchDevice(config-ext-nacl)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1284
Security
Configuring Time Ranges for ACLs
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
When you are creating extended ACLs, remember that, by default, the end of the ACL contains an implicit
deny statement for everything if it did not find a match before reaching the end. For standard ACLs, if you
omit the mask from an associated IP host address access list specification, 0.0.0.0 is assumed to be the mask.
After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL
entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode
commands to remove entries from a named ACL.
Being able to selectively remove lines from a named ACL is one reason you might use named ACLs instead
of numbered ACLs.
What to do next
After creating a named ACL, you can apply it to interfaces or to VLANs .
SUMMARY STEPS
1. enable
2. configure terminal
3. time-range time-range-name
4. Use one of the following:
• absolute [start time date] [end time date]
• periodic day-of-the-week hh:mm to [day-of-the-week] hh:mm
• periodic {weekdays | weekend | daily} hh:mm to hh:mm
5. end
6. show running-config
7. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1285
Security
Configuring Time Ranges for ACLs
DETAILED STEPS
SwitchDevice(config)# enable
Step 4 Use one of the following: Specifies when the function it will be applied to is
operational.
• absolute [start time date] [end time date]
• periodic day-of-the-week hh:mm to [day-of-the-week] • You can use only one absolute statement in the time
hh:mm range. If you configure more than one absolute
• periodic {weekdays | weekend | daily} hh:mm to statement, only the one configured last is executed.
hh:mm • You can enter multiple periodic statements. For
Example: example, you could configure different hours for
weekdays and weekends.
SwitchDevice(config-time-range)# absolute start
00:00 1 Jan 2006 end 23:59 1 Jan 2006 See the example configurations.
or
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1286
Security
Applying an IPv4 ACL to a Terminal Line
What to do next
Repeat the steps if you have multiple items that you want in effect at different times.
Related Topics
Time Ranges for ACLs, on page 1275
SUMMARY STEPS
1. enable
2. configure terminal
3. line [console | vty] line-number
4. access-class access-list-number {in | out}
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice(config)# enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1287
Security
Applying an IPv4 ACL to an Interface
Step 4 access-class access-list-number {in | out} Restricts incoming and outgoing connections between a
particular virtual terminal line (into a device) and the
Example:
addresses in an access list.
SwitchDevice(config-line)# access-class 10 in
SwitchDevice(config-line)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. ip access-group {access-list-number | name} {in | out}
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1288
Security
Applying an IPv4 ACL to an Interface
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Identifies a specific interface for configuration, and enter
interface configuration mode.
Example:
The interface can be a Layer 2 interface (port ACL), or a
SwitchDevice(config)# interface Layer 3 interface (router ACL).
gigabitethernet1/0/1
Step 3 ip access-group {access-list-number | name} {in | out} Controls access to the specified interface.
Example: The out keyword is not supported for Layer 2 interfaces
(port ACLs).
SwitchDevice(config-if)# ip access-group 2 in
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
IPv4 ACL Interface Considerations, on page 1276
Restrictions for Configuring IPv4 Access Control Lists, on page 1263
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1289
Security
Creating Named MAC Extended ACLs
SUMMARY STEPS
1. enable
2. configure terminal
3. mac access-list extended name
4. {deny | permit} {any | host source MAC address | source MAC address mask} {any | host destination
MAC address | destination MAC address mask} [type mask | lsap lsap mask | aarp | amber | dec-spanning
| decnet-iv | diagnostic | dsm | etype-6000 | etype-8042 | lat | lavc-sca | mop-console | mop-dump |
msdos | mumps | netbios | vines-echo | vines-ip | xns-idp | 0-65535] [cos cos]
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 mac access-list extended name Defines an extended MAC access list using a name.
Example:
Step 4 {deny | permit} {any | host source MAC address | source In extended MAC access-list configuration mode, specifies
MAC address mask} {any | host destination MAC address to permit or deny any source MAC address, a source MAC
| destination MAC address mask} [type mask | lsap lsap address with a mask, or a specific host source MAC address
mask | aarp | amber | dec-spanning | decnet-iv | diagnostic and any destination MAC address, destination MAC address
| dsm | etype-6000 | etype-8042 | lat | lavc-sca | with a mask, or a specific destination MAC address.
mop-console | mop-dump | msdos | mumps | netbios |
(Optional) You can also enter these options:
vines-echo | vines-ip | xns-idp | 0-65535] [cos cos]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1290
Security
Applying a MAC ACL to a Layer 2 Interface
SwitchDevice(config-ext-macl)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Restrictions for Configuring IPv4 Access Control Lists, on page 1263
Configuring VLAN Maps, on page 1293
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1291
Security
Applying a MAC ACL to a Layer 2 Interface
DETAILED STEPS
SwitchDevice> enable
Step 4 mac access-group {name} {in | out } Controls access to the specified interface by using the MAC
access list.
Example:
Port ACLs are supported in the outbound and inbound
SwitchDevice(config-if)# mac access-group mac1 in directions .
SwitchDevice(config-if)# end
Step 6 show mac access-group [interface interface-id] Displays the MAC access list applied to the interface or all
Layer 2 interfaces.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1292
Security
Configuring VLAN Maps
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
After receiving a packet, the switch checks it against the inbound ACL. If the ACL permits it, the switch
continues to process the packet. If the ACL rejects the packet, the switch discards it. When you apply an
undefined ACL to an interface, the switch acts as if the ACL has not been applied and permits all packets.
Remember this behavior if you use undefined ACLs for network security.
Related Topics
Restrictions for Configuring IPv4 Access Control Lists, on page 1263
SUMMARY STEPS
1. vlan access-map name [number]
2. match {ip | mac} address {name | number} [name | number]
3. Enter one of the following commands to specify an IP packet or a non-IP packet (with only a known MAC
address) and to match the packet against one or more ACLs (standard or extended):
• action { forward}
• action { drop}
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1293
Security
Configuring VLAN Maps
DETAILED STEPS
Step 2 match {ip | mac} address {name | number} [name | Match the packet (using either the IP or MAC address)
number] against one or more standard or extended access lists. Note
that packets are only matched against access lists of the
Example:
correct protocol type. IP packets are matched against
standard or extended IP access lists. Non-IP packets are
SwitchDevice(config-access-map)# match ip address
ip2 only matched against named MAC extended access lists.
Note If the VLAN map is configured with a match
clause for a type of packet (IP or MAC) and the
map action is drop, all packets that match the
type are dropped. If the VLAN map has no match
clause, and the configured action is drop, all IP
and Layer 2 packets are dropped.
Step 3 Enter one of the following commands to specify an IP Sets the action for the map entry.
packet or a non-IP packet (with only a known MAC address)
and to match the packet against one or more ACLs (standard
or extended):
• action { forward}
• action { drop}
Step 4 vlan filter mapname vlan-list list Applies the VLAN map to one or more VLAN IDs.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1294
Security
Creating a VLAN Map
Related Topics
Creating a Numbered Standard ACL, on page 1277
Creating a Numbered Extended ACL, on page 1278
Creating Named MAC Extended ACLs, on page 1290
Creating a VLAN Map, on page 1295
Applying a VLAN Map to a VLAN, on page 1296
SUMMARY STEPS
1. configure terminal
2. vlan access-map name [number]
3. match {ip | mac} address {name | number} [name | number]
4. action {drop | forward}
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Step 2 vlan access-map name [number] Creates a VLAN map, and give it a name and (optionally)
a number. The number is the sequence number of the entry
Example:
within the map.
SwitchDevice(config)# vlan access-map map_1 20 When you create VLAN maps with the same name, numbers
are assigned sequentially in increments of 10. When
modifying or deleting maps, you can enter the number of
the map entry that you want to modify or delete.
VLAN maps do not use the specific permit or deny
keywords. To deny a packet by using VLAN maps, create
an ACL that would match the packet, and set the action to
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1295
Security
Applying a VLAN Map to a VLAN
Step 3 match {ip | mac} address {name | number} [name | Match the packet (using either the IP or MAC address)
number] against one or more standard or extended access lists. Note
that packets are only matched against access lists of the
Example:
correct protocol type. IP packets are matched against
standard or extended IP access lists. Non-IP packets are
SwitchDevice(config-access-map)# match ip address
ip2 only matched against named MAC extended access lists.
Step 4 action {drop | forward} (Optional) Sets the action for the map entry. The default is
to forward.
Example:
SwitchDevice(config-access-map)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Configuring VLAN Maps, on page 1293
SUMMARY STEPS
1. configure terminal
2. vlan filter mapname vlan-list list
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1296
Security
Monitoring IPv4 ACLs
3. end
4. show running-config
5. copy running-config startup-config
DETAILED STEPS
Step 2 vlan filter mapname vlan-list list Applies the VLAN map to one or more VLAN IDs.
Example: The list can be a single VLAN ID (22), a consecutive list
(10-22), or a string of VLAN IDs (12, 22, 30). Spaces
SwitchDevice(config)# vlan filter map 1 vlan-list around the comma and hyphen are optional.
20-22
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Configuring VLAN Maps, on page 1293
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1297
Security
Configuration Examples for ACLs
When you use the ip access-group interface configuration command to apply ACLs to a Layer 2 or 3 interface,
you can display the access groups on the interface. You can also display the MAC ACLs applied to a Layer
2 interface. You can use the privileged EXEC commands as described in this table to display this information.
Table 140: Commands for Displaying Access Lists and Access Groups
Command Purpose
show access-lists [number | name] Displays the contents of one or all current IP and
MAC address access lists or a specific access list
(numbered or named).
show ip access-lists [number | name] Displays the contents of all current IP access lists or
a specific IP access list (numbered or named).
show running-config [interface interface-id] Displays the contents of the configuration file for the
switch or the specified interface, including all
configured MAC and IP access lists and which access
groups are applied to an interface.
show mac access-group [interface interface-id] Displays MAC access lists applied to all Layer 2
interfaces or the specified
Layer 2 interface.
To apply a time range, enter the time-range name in an extended ACL that can implement time ranges. This
example shows how to create and verify extended access list 188 that denies TCP traffic from any source to
any destination during the defined holiday times and permits all TCP traffic during work hours.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1298
Security
Examples: Including Comments in ACLs
SwitchDevice(config)# end
SwitchDevice# show access-lists
Extended IP access list 188
10 deny tcp any any time-range new_year_day_2006 (inactive)
20 permit tcp any any time-range workhours (inactive)
This example uses named ACLs to permit and deny the same traffic.
For an entry in a named IP ACL, use the remark access-list configuration command. To remove the remark,
use the no form of this command.
In this example, the Jones subnet is not allowed to use outbound Telnet:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1299
Security
IPv4 ACL Configuration Examples
This shows a small networked office environment with routed Port 2 connected to Server A, containing benefits
and other information that all employees can access, and routed Port 1 connected to Server B, containing
confidential payroll data. All users can access Server A, but Server B has restricted
access.
Use router ACLs to do this in one of two ways:
• Create a standard ACL, and filter traffic coming to the server from Port 1.
• Create an extended ACL, and filter traffic coming from the server into Port 1.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1300
Security
Example: Numbered ACLs
This example uses an extended ACL to filter traffic coming from Server B into a port, permitting traffic from
any source address (in this case Server B) to only the Accounting destination addresses 172.20.128.64 to
172.20.128.95. The ACL is applied to traffic going into routed Port 1, permitting it to go only to the specified
destination addresses. Note that with extended ACLs, you must enter the protocol (IP) before the source and
destination information.
In this example, suppose that you have a network connected to the Internet, and you want any host on the
network to be able to form TCP connections to any host on the Internet. However, you do not want IP hosts
to be able to form TCP connections to hosts on your network, except to the mail (SMTP) port of a dedicated
mail host.
SMTP uses TCP port 25 on one end of the connection and a random port number on the other end. The same
port numbers are used throughout the life of the connection. Mail packets coming in from the Internet have
a destination port of 25. Outbound packets have the port numbers reversed. Because the secure system of the
network always accepts mail connections on port 25, the incoming and outgoing services are separately
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1301
Security
Examples: Named ACLs
controlled. The ACL must be configured as an input ACL on the outbound interface and an output ACL on
the inbound interface.
In this example, the network is a Class B network with the address 128.88.0.0, and the mail host address is
128.88.1.2. The established keyword is used only for the TCP to show an established connection. A match
occurs if the TCP datagram has the ACK or RST bits set, which show that the packet belongs to an existing
connection. Gigabit Ethernet interface 1 on stack member 1 is the interface that connects the router to the
Internet.
The marketing_group ACL allows any TCP Telnet traffic to the destination address and wildcard 171.69.0.0
0.0.255.255 and denies any other TCP traffic. It permits ICMP traffic, denies UDP traffic from any source to
the destination address range 171.69.0.0 through 179.69.255.255 with a destination port less than 1024, denies
any other IP traffic, and provides a log of the result.
The Internet_filter ACL is applied to outgoing traffic and the marketing_group ACL is applied to incoming
traffic on a Layer 3 port.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1302
Security
Examples: Time Range Applied to an IP ACL
In this example of a numbered ACL, the Winter and Smith workstations are not allowed to browse the web:
SwitchDevice(config)# access-list 100 remark Do not allow Winter to browse the web
SwitchDevice(config)# access-list 100 deny host 171.69.3.85 any eq www
SwitchDevice(config)# access-list 100 remark Do not allow Smith to browse the web
SwitchDevice(config)# access-list 100 deny host 171.69.3.13 any eq www
In this example of a named ACL, the Jones subnet is not allowed access:
In this example of a named ACL, the Jones subnet is not allowed to use outbound Telnet:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1303
Security
Examples: ACL Logging
<output truncated>
This example is a named extended access list ext1 that permits ICMP packets from any source to 10.1.1.0
0.0.0.255 and denies all UDP packets.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1304
Security
Configuration Examples for ACLs and VLAN Maps
Note that all logging entries for IP ACLs start with %SEC-6-IPACCESSLOG with minor variations in format
depending on the kind of ACL and the access entry that has been matched.
This is an example of an output message when the log-input keyword is entered:
A log message for the same sort of packet using the log keyword does not include the input interface
information:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1305
Security
Example: Default Action of Dropping MAC Packets and Forwarding IP Packets
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1306
Security
Example: Default Action of Dropping All Packets
In a wiring closet configuration, routing might not be enabled on the switch. In this configuration, the switch
can still support a VLAN map and a QoS classification ACL. Assume that Host X and Host Y are in different
VLANs and are connected to wiring closet switches A and C. Traffic from Host X to Host Y is eventually
being routed by Switch B, a Layer 3 switch with routing enabled. Traffic from Host X to Host Y can be
access-controlled at the traffic entry point,
Switch A.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1307
Security
Example: Restricting Access to a Server on Another VLAN
If you do not want HTTP traffic switched from Host X to Host Y, you can configure a VLAN map on Switch
A to drop all HTTP traffic from Host X (IP address 10.1.1.32) to Host Y (IP address 10.1.1.34) at Switch A
and not bridge it to Switch B.
First, define the IP access list http that permits (matches) any TCP traffic on the HTTP port.
Next, create VLAN access map map2 so that traffic that matches the http access list is dropped and all other
IP traffic is forwarded.
You can restrict access to a server on another VLAN. For example, server 10.1.1.100 in VLAN 10 needs to
have access denied to these hosts:
• Hosts in subnet 10.1.2.0/8 in VLAN 20 should not have access.
• Hosts 10.1.1.4 and 10.1.1.8 in VLAN 10 should not have access.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1308
Security
Example: Denying Access to a Server on Another VLAN
Define a VLAN map using this ACL that will drop IP packets that match SERVER1_ACL and forward IP
packets that do not match the ACL.
This example shows how an ACL is applied on packets that are switched within a VLAN. Packets switched
within the VLAN without being routed or forwarded by fallback bridging are only subject to the VLAN map
of the input VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1309
Security
Example: ACLs and Bridged Packets
This example shows how an ACL is applied on fallback-bridged packets. For bridged packets, only Layer 2
ACLs are applied to the input VLAN. Only non-IP, non-ARP packets can be fallback-bridged.
This example shows how ACLs are applied on routed packets. The ACLs are applied in this order:
1. VLAN map for input VLAN
2. Input router ACL
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1310
Security
Example: ACLs and Multicast Packets
This example shows how ACLs are applied on packets that are replicated for IP multicasting. A multicast
packet being routed has two different kinds of filters applied: one for destinations that are other ports in the
input VLAN and another for each of the destinations that are in other VLANs to which the packet has been
routed. The packet might be routed to more than one output VLAN, in which case a different router output
ACL and VLAN map would apply for each destination VLAN. The final result is that the packet might be
permitted in some of the output VLANs and not in others. A copy of the packet is forwarded to those
destinations where it is permitted. However, if the input VLAN map drops the packet, no destination receives
a copy of the packet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1311
Security
Example: ACLs and Multicast Packets
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1312
CHAPTER 58
Configuring IPv6 ACLs
• Finding Feature Information, on page 1313
• IPv6 ACLs Overview, on page 1313
• Restrictions for IPv6 ACLs, on page 1314
• Default Configuration for IPv6 ACLs , on page 1315
• Configuring IPv6 ACLs, on page 1315
• Attaching an IPv6 ACL to an Interface, on page 1319
• Monitoring IPv6 ACLs, on page 1320
The switch does not support VLAN ACLs (VLAN maps) for IPv6 traffic.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1313
Security
Interactions with Other Features and Switches
You can apply both IPv4 and IPv6 ACLs to an interface. As with IPv4 ACLs, IPv6 port ACLs take precedence
over router ACLs.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1314
Security
Default Configuration for IPv6 ACLs
SUMMARY STEPS
1. enable
2. configure terminal
3. {ipv6 access-list list-name
4. {deny | permit} protocol {source-ipv6-prefix/|prefix-length|any| host source-ipv6-address} [ operator
[ port-number ]] { destination-ipv6-prefix/ prefix-length | any | host destination-ipv6-address} [operator
[port-number]][dscp value] [fragments] [log] [log-input] [routing] [sequence value] [time-range
name]
5. {deny | permit} tcp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator
[port-number]] {destination-ipv6- prefix/prefix-length | any | host destination-ipv6-address} [operator
[port-number]] [ack] [dscp value] [established] [fin] [log] [log-input] [neq {port | protocol}] [psh]
[range {port | protocol}] [rst] [routing] [sequence value] [syn] [time-range name] [urg]
6. {deny | permit} udp {source-ipv6-prefix/prefix-length | any | host source-ipv6-address} [operator
[port-number]] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address} [operator
[port-number]] [dscp value] [log] [log-input] [neq {port | protocol}] [range {port | protocol}] [routing]
[sequence value] [time-range name]]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1315
Security
Configuring IPv6 ACLs
DETAILED STEPS
SwitchDevice> enable
Step 3 {ipv6 access-list list-name Defines an IPv6 ACL name, and enters IPv6 access list
configuration mode.
Example:
SwitchDevice(config)# ipv6 access-list
example_acl_list
Step 4 {deny | permit} protocol Enter deny or permit to specify whether to deny or permit
{source-ipv6-prefix/|prefix-length|any| host the packet if conditions are matched. These are the
source-ipv6-address} [ operator [ port-number ]] { conditions:
destination-ipv6-prefix/ prefix-length | any | host
• For protocol, enter the name or number of an Internet
destination-ipv6-address} [operator [port-number]][dscp
protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or
value] [fragments] [log] [log-input] [routing] [sequence
udp, or an integer in the range 0 to 255 representing
value] [time-range name]
an IPv6 protocol number.
• The source-ipv6-prefix/prefix-length or
destination-ipv6-prefix/ prefix-length is the source or
destination IPv6 network or class of networks for
which to set deny or permit conditions, specified in
hexadecimal and using 16-bit values between colons
(see RFC 2373).
• Enter any as an abbreviation for the IPv6 prefix ::/0.
• For host source-ipv6-address or
destination-ipv6-address, enter the source or
destination IPv6 host address for which to set deny
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1316
Security
Configuring IPv6 ACLs
Step 5 {deny | permit} tcp {source-ipv6-prefix/prefix-length | (Optional) Define a TCP access list and the access
any | host source-ipv6-address} [operator conditions.
[port-number]] {destination-ipv6- prefix/prefix-length |
Enter tcp for Transmission Control Protocol. The
any | host destination-ipv6-address} [operator
parameters are the same as those described in Step 3a, with
[port-number]] [ack] [dscp value] [established] [fin] [log]
these additional optional parameters:
[log-input] [neq {port | protocol}] [psh] [range {port |
protocol}] [rst] [routing] [sequence value] [syn] • ack—Acknowledgment bit set.
[time-range name] [urg]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1317
Security
Configuring IPv6 ACLs
Step 6 {deny | permit} udp {source-ipv6-prefix/prefix-length | (Optional) Define a UDP access list and the access
any | host source-ipv6-address} [operator [port-number]] conditions.
{destination-ipv6-prefix/prefix-length | any | host
Enter udp for the User Datagram Protocol. The UDP
destination-ipv6-address} [operator [port-number]] [dscp
parameters are the same as those described for TCP, except
value] [log] [log-input] [neq {port | protocol}] [range
that the [operator [port]] port number or name must be a
{port | protocol}] [routing] [sequence value] [time-range
UDP port number or name, and the established parameter
name]]
is not valid for UDP.
Step 7 {deny | permit} icmp {source-ipv6-prefix/prefix-length (Optional) Define an ICMP access list and the access
| any | host source-ipv6-address} [operator [port-number]] conditions.
{destination-ipv6-prefix/prefix-length | any | host
Enter icmp for Internet Control Message Protocol. The
destination-ipv6-address} [operator [port-number]]
ICMP parameters are the same as those described for most
[icmp-type [icmp-code] | icmp-message] [dscp value] [log]
IP protocols in Step 1, with the addition of the ICMP
[log-input] [routing] [sequence value] [time-range
message type and code parameters. These optional
name]
keywords have these meanings:
• icmp-type—Enter to filter by ICMP message type, a
number from 0 to 255.
• icmp-code—Enter to filter ICMP packets that are
filtered by the ICMP message code type, a number
from 0 to 255.
• icmp-message—Enter to filter ICMP packets by the
ICMP message type name or the ICMP message type
and code name. To see a list of ICMP message type
names and code names, use the ? key or see command
reference for this release.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1318
Security
Attaching an IPv6 ACL to an Interface
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
Attach the IPv6 ACL to an Interface
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. no switchport
5. ipv6 address ipv6-address
6. ipv6 traffic-filter access-list-name {in | out}
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1319
Security
Monitoring IPv6 ACLs
Step 3 interface interface-id Identify a Layer 2 interface (for port ACLs) or Layer 3
interface (for router ACLs) on which to apply an access
list, and enter interface configuration mode.
Step 4 no switchport If applying a router ACL, this changes the interface from
Layer 2 mode (the default) to Layer 3 mode.
Step 5 ipv6 address ipv6-address Configure an IPv6 address on a Layer 3 interface (for router
ACLs).
Step 6 ipv6 traffic-filter access-list-name {in | out} Apply the access list to incoming or outgoing traffic on the
interface.
Note The out keyword is not supported for Layer 2
interfaces (port ACLs).
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show access-lists Displays all access lists configured on the switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1320
Security
Monitoring IPv6 ACLs
Command Purpose
show ipv6 access-list [access-list-name] Displays all configured IPv6 access lists or the access
list specified by name.
This is an example of the output from the show access-lists privileged EXEC command. The output
shows all access lists that are configured on the switch or switch stack.
Switch # show access-lists
Extended IP access list hello
10 permit ip any any
IPv6 access list ipv6
permit ipv6 any any sequence 10
This is an example of the output from the show ipv6 access-list privileged EXEC command. The
output shows only IPv6 access lists configured on the switch or switch stack
Switch# show ipv6 access-list
IPv6 access list inbound
permit tcp any any eq bgp (8 matches) sequence 10
permit tcp any any eq telnet (15 matches) sequence 20
permit udp any any sequence 30
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1321
Security
Monitoring IPv6 ACLs
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1322
CHAPTER 59
Configuring DHCP
• Finding Feature Information, on page 1323
• Information About DHCP, on page 1323
• How to Configure DHCP Features, on page 1330
• Configuring DHCP Server Port-Based Address Allocation, on page 1339
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1323
Security
DHCP Snooping
DHCP Snooping
DHCP snooping is a DHCP security feature that provides network security by filtering untrusted DHCP
messages and by building and maintaining a DHCP snooping binding database, also referred to as a DHCP
snooping binding table.
DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. You use DHCP snooping to
differentiate between untrusted interfaces connected to the end user and trusted interfaces connected to the
DHCP server or another switch.
Note For DHCP snooping to function properly, all DHCP servers must be connected to the switch through trusted
interfaces.
An untrusted DHCP message is a message that is received through an untrusted interface. By default, the
switch considers all interfaces untrusted. So, the switch must be configured to trust some interfaces to use
DHCP Snooping. When you use DHCP snooping in a service-provider environment, an untrusted message
is sent from a device that is not in the service-provider network, such as a customer’s switch. Messages from
unknown devices are untrusted because they can be sources of traffic attacks.
The DHCP snooping binding database has the MAC address, the IP address, the lease time, the binding type,
the VLAN number, and the interface information that corresponds to the local untrusted interfaces of a switch.
It does not have information regarding hosts interconnected with a trusted interface.
In a service-provider network, an example of an interface you might configure as trusted is one connected to
a port on a device in the same network. An example of an untrusted interface is one that is connected to an
untrusted interface in the network or to an interface on a device that is not in the network.
When a switch receives a packet on an untrusted interface and the interface belongs to a VLAN in which
DHCP snooping is enabled, the switch compares the source MAC address and the DHCP client hardware
address. If the addresses match (the default), the switch forwards the packet. If the addresses do not match,
the switch drops the packet.
The switch drops a DHCP packet when one of these situations occurs:
• A packet from a DHCP server, such as a DHCPOFFER, DHCPACK, DHCPNAK, or
DHCPLEASEQUERY packet, is received from outside the network or firewall.
• A packet is received on an untrusted interface, and the source MAC address and the DHCP client hardware
address do not match.
• The switch receives a DHCPRELEASE or DHCPDECLINE broadcast message that has a MAC address
in the DHCP snooping binding database, but the interface information in the binding database does not
match the interface on which the message was received.
• A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is not 0.0.0.0,
or the relay agent forwards a packet that includes option-82 information to an untrusted port.
If the switch is an aggregation switch supporting DHCP snooping and is connected to an edge switch that is
inserting DHCP option-82 information, the switch drops packets with option-82 information when packets
are received on an untrusted interface. If DHCP snooping is enabled and packets are received on a trusted
port, the aggregation switch does not learn the DHCP snooping bindings for connected devices and cannot
build a complete DHCP snooping binding database.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1324
Security
Option-82 Data Insertion
When an aggregation switch can be connected to an edge switch through an untrusted interface and you enter
the ip dhcp snooping information option allow-untrusted global configuration command, the aggregation
switch accepts packets with option-82 information from the edge switch. The aggregation switch learns the
bindings for hosts connected through an untrusted switch interface. The DHCP security features, such as
dynamic ARP inspection or IP source guard, can still be enabled on the aggregation switch while the switch
receives packets with option-82 information on untrusted input interfaces to which hosts are connected. The
port on the edge switch that connects to the aggregation switch must be configured as a trusted interface.
Normally, it is not desirable to broadcast packets to wireless clients. So, DHCP snooping replaces destination
broadcast MAC address (ffff.ffff.ffff) with unicast MAC address for DHCP packets that are going from server
to wireless clients. The unicast MAC address is retrieved from CHADDR field in the DHCP payload. This
processing is applied for server to client packets such as DHCP OFFER, DHCP ACK, and DHCP NACK
messages. The ip dhcp snooping wireless bootp-broadcast enable can be used to revert this behavior. When
the wireless BOOTP broadcast is enabled, the broadcast DHCP packets from server are forwarded to wireless
clients without changing the destination MAC address.
Note The DHCP option-82 feature is supported only when DHCP snooping is globally enabled on the VLANs to
which subscriber devices using option-82 are assigned.
The following illustration shows a metropolitan Ethernet network in which a centralized DHCP server assigns
IP addresses to subscribers connected to the switch at the access layer. Because the DHCP clients and their
associated DHCP server do not reside on the same IP network or subnet, a DHCP relay agent (the Catalyst
switch) is configured with a helper address to enable broadcast forwarding and to transfer DHCP messages
between the clients and the server.
Figure 109: DHCP Relay Agent in a Metropolitan Ethernet Network
When you enable the DHCP snooping information option 82 on the switch, the following sequence of
events occurs:
• The host (DHCP client) generates a DHCP request and broadcasts it on the network.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1325
Security
Option-82 Data Insertion
• When the switch receives the DHCP request, it adds the option-82 information in the packet. By default,
the remote-ID suboption is the switch MAC address, and the circuit-ID suboption is the port identifier,
vlan-mod-port, from which the packet is received.You can configure the remote ID and circuit ID.
• If the IP address of the relay agent is configured, the switch adds this IP address in the DHCP packet.
• The switch forwards the DHCP request that includes the option-82 field to the DHCP server.
• The DHCP server receives the packet. If the server is option-82-capable, it can use the remote ID, the
circuit ID, or both to assign IP addresses and implement policies, such as restricting the number of IP
addresses that can be assigned to a single remote ID or circuit ID. Then the DHCP server echoes the
option-82 field in the DHCP reply.
• The DHCP server unicasts the reply to the switch if the request was relayed to the server by the switch.
The switch verifies that it originally inserted the option-82 data by inspecting the remote ID and possibly
the circuit ID fields. The switch removes the option-82 field and forwards the packet to the switch port
that connects to the DHCP client that sent the DHCP request.
In the default suboption configuration, when the described sequence of events occurs, the values in these
fields do not change (see the illustration,Suboption Packet Formats):
• Circuit-ID suboption fields
• Suboption type
• Length of the suboption type
• Circuit-ID type
• Length of the circuit-ID type
In the port field of the circuit ID suboption, the port numbers start at 3. For example, on a switch with 24
10/100/1000 ports and four small form-factor pluggable (SFP) module slots, port 3 is the Gigabit Ethernet
1/0/1 port, port 4 is the Gigabit Ethernet 1/0/2 port, and so forth. Port 27 is the SFP module slot Gigabit
Ethernet1/0/25, and so forth.
The illustration, Suboption Packet Formats. shows the packet formats for the remote-ID suboption and the
circuit-ID suboption when the default suboption configuration is used. For the circuit-ID suboption, the module
number corresponds to the switch number in the stack. The switch uses the packet formats when you globally
enable DHCP snooping and enter the ip dhcp snooping information option global configuration command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1326
Security
Option-82 Data Insertion
The illustration, User-Configured Suboption Packet Formats, shows the packet formats for user-configured
remote-ID and circuit-ID suboptions The switch uses these packet formats when DHCP snooping is globally
enabled and when the ip dhcp snooping information option format remote-id global configuration command
and theip dhcp snooping vlan information option format-type circuit-id string interface configuration
command are entered.
The values for these fields in the packets change from the default values when you configure the remote-ID
and circuit-ID suboptions:
• Circuit-ID suboption fields
• The circuit-ID type is 1.
• The length values are variable, depending on the length of the string that you configure.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1327
Security
Cisco IOS DHCP Server Database
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1328
Security
DHCP Snooping Binding Database
updated is based on a configurable delay, and the updates are batched. If the file is not updated in a specified
time (set by the write-delay and abort-timeout values), the update stops.
This is the format of the file with bindings:
<initial-checksum>
TYPE DHCP-SNOOPING
VERSION 1
BEGIN
<entry-1> <checksum-1>
<entry-2> <checksum-1-2>
...
...
<entry-n> <checksum-1-2-..-n>
END
Each entry in the file is tagged with a checksum value that the switch uses to verify the entries when it reads
the file. The initial-checksum entry on the first line distinguishes entries associated with the latest file update
from entries associated with a previous file update.
This is an example of a binding file:
2bb4c2a1
TYPE DHCP-SNOOPING
VERSION 1
BEGIN
192.1.168.1 3 0003.47d8.c91f 2BB6488E Gi1/0/4 21ae5fbb
192.1.168.3 3 0003.44d6.c52f 2BB648EB Gi1/0/4 1bdb223f
192.1.168.2 3 0003.47d9.c8f1 2BB648AB Gi1/0/4 584a38f0
END
When the switch starts and the calculated checksum value equals the stored checksum value, the switch reads
entries from the binding file and adds the bindings to its DHCP snooping binding database. The switch ignores
an entry when one of these situations occurs:
• The switch reads the entry and the calculated checksum value does not equal the stored checksum value.
The entry and the ones following it are ignored.
• An entry has an expired lease time (the switch might not remove a binding entry when the lease time
expires).
• The interface in the entry no longer exists on the system.
• The interface is a routed interface or a DHCP snooping-trusted interface.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1329
Security
How to Configure DHCP Features
Checking the relay agent information Enabled (invalid messages are dropped)
DHCP relay agent forwarding policy Replace the existing relay agent information
Cisco IOS DHCP server binding database Enabled in Cisco IOS software, requires configuration.
Note The switch gets network addresses and
configuration parameters only from a
device configured as a DHCP server.
DHCP snooping binding database agent Enabled in Cisco IOS software, requires configuration.
This feature is operational only when a destination is
configured.
15
The switch responds to DHCP requests only if it is configured as a DHCP server.
16
The switch relays DHCP packets only if the IP address of the DHCP server is configured on the SVI
of the DHCP client.
17
Use this feature when the switch is an aggregation switch that receives packets with option-82 information
from an edge switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1330
Security
DHCP Snooping Configuration Guidelines
SUMMARY STEPS
1. enable
2. configure terminal
3. service dhcp
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 service dhcp Enables the DHCP server and relay agent on your switch.
By default, this feature is enabled.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1331
Security
Specifying the Packet Forwarding Address
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
What to do next
See the “Configuring DHCP” section of the “IP Addressing and Services” section of the Cisco IOS IP
Configuration Guide, Release 12.4 for these procedures:
• Checking (validating) the relay agent information
• Configuring the relay agent forwarding policy
SUMMARY STEPS
1. enable
2. configure terminal
3. interface vlan vlan-id
4. ip address ip-address subnet-mask
5. ip helper-address address
6. end
7. Use one of the following:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1332
Security
Specifying the Packet Forwarding Address
DETAILED STEPS
SwitchDevice> enable
Step 3 interface vlan vlan-id Creates a switch virtual interface by entering a VLAN ID,
and enter interface configuration mode.
Example:
Step 4 ip address ip-address subnet-mask Configures the interface with an IP address and an IP
subnet.
Example:
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1333
Security
Prerequisites for Configuring DHCP Snooping and Option 82
Step 8 switchport mode access Defines the VLAN membership mode for the port.
Example:
Step 9 switchport access vlan vlan-id Assigns the ports to the same VLAN as configured in Step
2.
Example:
SwitchDevice(config-if)# end
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1334
Security
Enabling DHCP Snooping and Option 82
• Before configuring the DHCP snooping information option on your switch, be sure to configure the
device that is acting as the DHCP server. You must specify the IP addresses that the DHCP server can
assign or exclude, or you must configure DHCP options for these devices.
• For DHCP snooping to function properly, all DHCP servers must be connected to the switch through
trusted interfaces. In a service-provider network, a trusted interface is connected to a port on a device in
the same network.
• You must configure the switch to use the Cisco IOS DHCP server binding database to use it for DHCP
snooping.
• To use the DHCP snooping option of accepting packets on untrusted inputs, the switch must be an
aggregation switch that receives packets with option-82 information from an edge switch.
• The following prerequisites apply to DHCP snooping binding database configuration:
• You must configure a destination on the DHCP snooping binding database to use the switch for
DHCP snooping.
• Because both NVRAM and the flash memory have limited storage capacity, we recommend that
you store the binding file on a TFTP server.
• For network-based URLs (such as TFTP and FTP), you must create an empty file at the configured
URL before the switch can write bindings to the binding file at that URL. See the documentation
for your TFTP server to determine whether you must first create an empty file on the server; some
TFTP servers cannot be configured this way.
• To ensure that the lease time in the database is accurate, we recommend that you enable and configure
Network Time Protocol (NTP).
• If NTP is configured, the switch writes binding changes to the binding file only when the switch
system clock is synchronized with NTP.
• Before configuring the DHCP relay agent on your switch, make sure to configure the device that is acting
as the DHCP server. You must specify the IP addresses that the DHCP server can assign or exclude,
configure DHCP options for devices, or set up the DHCP database agent.
• If you want the switch to relay DHCP packets, the IP address of the DHCP server must be configured
on the switch virtual interface (SVI) of the DHCP client.
• If a switch port is connected to a DHCP server, configure a port as trusted by entering the ip dhcp
snooping trust interface configuration command.
• If a switch port is connected to a DHCP client, configure a port as untrusted by entering the no ip dhcp
snooping trust interface configuration command.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip dhcp snooping
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1335
Security
Enabling DHCP Snooping and Option 82
DETAILED STEPS
SwitchDevice> enable
Step 4 ip dhcp snooping vlan vlan-range Enables DHCP snooping on a VLAN or range of VLANs.
The range is 1 to 4094. You can enter a single VLAN ID
Example:
identified by VLAN ID number, a series of VLAN IDs
separated by commas, a range of VLAN IDs separated by
SwitchDevice(config)# ip dhcp snooping vlan 10
hyphens, or a range of VLAN IDs separated by entering
the starting and ending VLAN IDs separated by a space.
• You can enter a single VLAN ID identified by VLAN
ID number, a series of VLAN IDs separated by
commas, a range of VLAN IDs separated by hyphens,
or a range of VLAN IDs separated by entering the
starting and ending VLAN IDs separated by a space.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1336
Security
Enabling DHCP Snooping and Option 82
Step 6 ip dhcp snooping information option format remote-id (Optional) Configures the remote-ID suboption.
[string ASCII-string | hostname]
You can configure the remote ID as:
Example:
• String of up to 63 ASCII characters (no spaces)
SwitchDevice(config)# ip dhcp snooping information • Configured hostname for the switch
option format remote-id string acsiistring2
Note If the hostname is longer than 63
characters, it is truncated to 63 characters
in the remote-ID configuration.
Step 7 ip dhcp snooping information option allow-untrusted (Optional) If the switch is an aggregation switch connected
to an edge switch, this command enables the switch to
Example:
accept incoming DHCP snooping packets with option-82
information from the edge switch.
SwitchDevice(config)# ip dhcp snooping information
option allow-untrusted The default setting is disabled.
Note Enter this command only on aggregation
switches that are connected to trusted devices.
Step 8 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 9 ip dhcp snooping vlan vlan information option (Optional) Configures the circuit-ID suboption for the
format-type circuit-id [override] string ASCII-string specified interface.
Example: Specify the VLAN and port identifier, using a VLAN ID
in the range of 1 to 4094. The default circuit ID is the port
SwitchDevice(config-if)# ip dhcp snooping vlan 1 identifier, in the format vlan-mod-port.
information option format-type curcuit-id
override string ovrride2 You can configure the circuit ID to be a string of 3 to 63
ASCII characters (no spaces).
(Optional) Use the override keyword when you do not
want the circuit-ID suboption inserted in TLV format to
define subscriber information.
Step 10 ip dhcp snooping trust (Optional) Configures the interface as trusted or untrusted.
Use the no keyword to configure an interface to receive
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1337
Security
Enabling DHCP Snooping and Option 82
Step 11 ip dhcp snooping limit rate rate (Optional) Configures the number of DHCP packets per
second that an interface can receive. The range is 1 to 2048.
Example:
By default, no rate limit is configured.
SwitchDevice(config-if)# ip dhcp snooping limit Note We recommend an untrusted rate limit of not
rate 100 more than 100 packets per second. If you
configure rate limiting for trusted interfaces,
you might need to increase the rate limit if the
port is a trunk port assigned to more than one
VLAN with DHCP snooping.
SwitchDevice(config-if)# exit
Step 13 ip dhcp snooping verify mac-address (Optional) Configures the switch to verify that the source
MAC address in a DHCP packet received on untrusted
Example:
ports matches the client hardware address in the packet.
The default is to verify that the source MAC address
SwitchDevice(config)# ip dhcp snooping verify
mac-address matches the client hardware address in the packet.
SwitchDevice(config)# end
Step 16 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1338
Security
Enabling the Cisco IOS DHCP Server Database
show ip dhcp snooping binding Displays only the dynamically configured bindings
in the DHCP snooping binding database, also referred
to as a binding table.
show ip dhcp snooping database Displays the DHCP snooping binding database status
and statistics.
show ip dhcp snooping statistics Displays the DHCP snooping statistics in summary
or detail form.
Note If DHCP snooping is enabled and an interface changes to the down state, the switch does not delete the
statically configured bindings.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1339
Security
Default Port-Based Address Allocation Configuration
option in the DHCP packet. Clients that do not include the client identifier option are identified by the client
hardware address. When you configure this feature, the port name of the interface overrides the client identifier
or hardware address and the actual point of connection, the switch port, becomes the client identifier.
In all cases, by connecting the Ethernet cable to the same port, the same IP address is allocated through DHCP
to the attached device.
The DHCP server port-based address allocation feature is only supported on a Cisco IOS DHCP server and
not a third-party server.
SUMMARY STEPS
1. enable
2. configure terminal
3. ip dhcp snooping database {flash[number]:/filename | ftp://user:password@host/filename |
http://[[username:password]@]{hostname | host-ip}[/directory] /image-name.tar |
rcp://user@host/filename}| tftp://host/filename
4. ip dhcp snooping database timeout seconds
5. ip dhcp snooping database write-delay seconds
6. end
7. ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id expiry seconds
8. show ip dhcp snooping database [detail]
9. show running-config
10. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1340
Security
Enabling the DHCP Snooping Binding Database Agent
SwitchDevice> enable
Step 3 ip dhcp snooping database {flash[number]:/filename | Specifies the URL for the database agent or the binding
ftp://user:password@host/filename | file by using one of these forms:
http://[[username:password]@]{hostname |
• flash[number]:/filename
host-ip}[/directory] /image-name.tar |
rcp://user@host/filename}| tftp://host/filename (Optional) Use the number parameter to specify the
stack member number of the stack master. The range
Example:
for number is 1 to 9.
SwitchDevice(config)# ip dhcp snooping database • ftp://user:password@host/filename
tftp://10.90.90.90/snooping-rp2
• http://[[username:password]@]{hostname |
host-ip}[/directory] /image-name.tar
• rcp://user@host/filename
• tftp://host/filename
Step 4 ip dhcp snooping database timeout seconds Specifies (in seconds) how long to wait for the database
transfer process to finish before stopping the process.
Example:
The default is 300 seconds. The range is 0 to 86400. Use
SwitchDevice(config)# ip dhcp snooping database 0 to define an infinite duration, which means to continue
timeout 300 trying the transfer indefinitely.
Step 5 ip dhcp snooping database write-delay seconds Specifies the duration for which the transfer should be
delayed after the binding database changes. The range is
Example:
from 15 to 86400 seconds. The default is 300 seconds (5
minutes).
SwitchDevice(config)# ip dhcp snooping database
write-delay 15
SwitchDevice(config)# end
Step 7 ip dhcp snooping binding mac-address vlan vlan-id (Optional) Adds binding entries to the DHCP snooping
ip-address interface interface-id expiry seconds binding database. The vlan-id range is from 1 to 4904. The
seconds range is from 1 to 4294967295.
Example:
Enter this command for each entry that you add.
SwitchDevice# ip dhcp snooping binding
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1341
Security
Enabling DHCP Server Port-Based Address Allocation
Step 8 show ip dhcp snooping database [detail] Displays the status and statistics of the DHCP snooping
binding database agent.
Example:
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip dhcp use subscriber-id client-id
4. ip dhcp subscriber-id interface-name
5. interface interface-id
6. ip dhcp server use subscriber-id client-id
7. end
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1342
Security
Enabling DHCP Server Port-Based Address Allocation
Step 3 ip dhcp use subscriber-id client-id Configures the DHCP server to globally use the subscriber
identifier as the client identifier on all incoming DHCP
Example:
messages.
SwitchDevice(config)# ip dhcp use subscriber-id
client-id
Step 5 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 6 ip dhcp server use subscriber-id client-id Configures the DHCP server to use the subscriber identifier
as the client identifier on all incoming DHCP messages on
Example:
the interface.
SwitchDevice(config-if)# ip dhcp server use
subscriber-id client-id
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1343
Security
Monitoring DHCP Server Port-Based Address Allocation
What to do next
After enabling DHCP port-based address allocation on the switch, use the ip dhcp pool global configuration
command to preassign IP addresses and to associate them to clients.
Command Purpose
show interface interface id Displays the status and configuration of a specific
interface.
show ip dhcp binding Displays address bindings on the Cisco IOS DHCP
server.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1344
CHAPTER 60
Configuring IP Source Guard
IP Source Guard (IPSG) is a security feature that restricts IP traffic on nonrouted, Layer 2 interfaces by filtering
traffic based on the DHCP snooping binding database and on manually configured IP source bindings.
This chapter contains the following topics:
• Finding Feature Information, on page 1345
• Information About IP Source Guard, on page 1345
• How to Configure IP Source Guard, on page 1347
• Monitoring IP Source Guard, on page 1351
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1345
Security
IP Source Guard for Static Hosts
The IP source binding table has bindings that are learned by DHCP snooping or are manually configured
(static IP source bindings). An entry in this table has an IP address, its associated MAC address, and its
associated VLAN number. The switch uses the IP source binding table only when IP source guard is enabled.
IPSG is supported only on Layer 2 ports, including access and trunk ports. You can configure IPSG with
source IP address filtering or with source IP and MAC address filtering.
Note Do not use IPSG (IP source guard) for static hosts on uplink ports or trunk ports.
IPSG for static hosts extends the IPSG capability to non-DHCP and static environments. The previous IPSG
used the entries created by DHCP snooping to validate the hosts connected to a switch. Any traffic received
from a host without a valid DHCP binding entry is dropped. This security feature restricts IP traffic on
nonrouted Layer 2 interfaces. It filters traffic based on the DHCP snooping binding database and on manually
configured IP source bindings. The previous version of IPSG required a DHCP environment for IPSG to
work.
IPSG for static hosts allows IPSG to work without DHCP. IPSG for static hosts relies on IP device tracking-table
entries to install port ACLs. The switch creates static entries based on ARP requests or other IP packets to
maintain the list of valid hosts for a given port. You can also specify the number of hosts allowed to send
traffic to a given port. This is equivalent to port security at Layer 3.
IPSG for static hosts also supports dynamic hosts. If a dynamic host receives a DHCP-assigned IP address
that is available in the IP DHCP snooping table, the same entry is learned by the IP device tracking table. In
a stacked environment, when the master failover occurs, the IP source guard entries for static hosts attached
to member ports are retained. When you enter the show ip device tracking all EXEC command, the IP device
tracking table displays the entries as ACTIVE.
Note Some IP hosts with multiple network interfaces can inject some invalid packets into a network interface. The
invalid packets contain the IP or MAC address for another network interface of the host as the source address.
The invalid packets can cause IPSG for static hosts to connect to the host, to learn the invalid IP or MAC
address bindings, and to reject the valid bindings. Consult the vender of the corresponding operating system
and the network interface to prevent the host from injecting invalid packets.
IPSG for static hosts initially learns IP or MAC bindings dynamically through an ACL-based snooping
mechanism. IP or MAC bindings are learned from static hosts by ARP and IP packets. They are stored in the
device tracking database. When the number of IP addresses that have been dynamically learned or statically
configured on a given port reaches a maximum, the hardware drops any packet with a new IP address. To
resolve hosts that have moved or gone away for any reason, IPSG for static hosts leverages IP device tracking
to age out dynamically learned IP address bindings. This feature can be used with DHCP snooping. Multiple
bindings are established on a port that is connected to both DHCP and static hosts. For example, bindings are
stored in both the device tracking database as well as in the DHCP snooping binding database.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1346
Security
IP Source Guard Configuration Guidelines
• When IP source guard with source IP filtering is enabled on an interface, DHCP snooping must be enabled
on the access VLAN for that interface.
• If you are enabling IP source guard on a trunk interface with multiple VLANs and DHCP snooping is
enabled on all the VLANs, the source IP address filter is applied on all the VLANs.
Note If IP source guard is enabled and you enable or disable DHCP snooping on a
VLAN on the trunk interface, the switch might not properly filter traffic.
• You can enable this feature when 802.1x port-based authentication is enabled.
• When you configure IP source guard smart logging, packets with a source address other than the specified
address or an address learned by DHCP are denied, and the packet contents are sent to a NetFlow collector.
If you configure this feature, make sure that smart logging is globally enabled.
• In a switch stack, if IP source guard is configured on a stack member interface and you remove the the
configuration of that switch by entering the no switch stack-member-number provision global
configuration command, the interface static bindings are removed from the binding table, but they are
not removed from the running configuration. If you again provision the switch by entering the switch
stack-member-number provision command, the binding is restored.
To remove the binding from the running configuration, you must disable IP source guard before entering
the no switch provision command. The configuration is also removed if the switch reloads while the
interface is removed from the binding table.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1347
Security
Enabling IP Source Guard
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enters interface
configuration mode.
Example:
Step 4 ip verify source [mac-check ] Enables IP source guard with source IP address filtering.
Example: (Optional) mac-check—Enables IP Source Guard with
SwitchDevice(config-if)# ip verify source source IP address and MAC address filtering.
SwitchDevice(config-if)# exit
Step 6 ip source binding mac-address vlan vlan-id ip-address Adds a static IP source binding.
interface interface-id
Enter this command for each static binding.
Example:
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1348
Security
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip device tracking
4. interface interface-id
5. switchport mode access
6. switchport access vlan vlan-id
7. ip verify source[tracking] [mac-check ]
8. ip device tracking maximum number
9. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1349
Security
Configuring IP Source Guard for Static Hosts on a Layer 2 Access Port
Step 6 switchport access vlan vlan-id Configures the VLAN for this port.
Example:
Step 7 ip verify source[tracking] [mac-check ] Enables IP source guard with source IP address filtering.
Example: (Optional) tracking—Enables IP source guard for static
SwitchDevice(config-if)# ip verify source tracking hosts.
mac-check
(Optional) mac-check—Enables MAC address filtering.
The command ip verify source tracking mac-checkenables
IP source guard for static hosts with MAC address filtering.
Step 8 ip device tracking maximum number Establishes a maximum limit for the number of static IPs
that the IP device tracking table allows on the port. The
Example:
range is 1to 10. The maximum number is 10.
SwitchDevice(config-if)# ip device tracking maximum Note You must configure the ip device tracking
8 maximum limit-number interface configuration
command.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1350
Security
Monitoring IP Source Guard
Command Purpose
show ip verify source [ interface interface-id ] Displays the IP source guard configuration on the
switch or on a specific interface.
show ip device tracking { all | interface interface-id Displays information about the entries in the IP device
| ip ip-address | mac imac-address} tracking table.
Command Purpose
For detailed information about the fields in these displays, see the command reference for this release.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1351
Security
Monitoring IP Source Guard
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1352
CHAPTER 61
Configuring Dynamic ARP Inspection
• Finding Feature Information, on page 1353
• Restrictions for Dynamic ARP Inspection, on page 1353
• Understanding Dynamic ARP Inspection, on page 1355
• Default Dynamic ARP Inspection Configuration, on page 1358
• Relative Priority of ARP ACLs and DHCP Snooping Entries, on page 1359
• Configuring ARP ACLs for Non-DHCP Environments , on page 1359
• Configuring Dynamic ARP Inspection in DHCP Environments, on page 1362
• Limiting the Rate of Incoming ARP Packets, on page 1364
• Performing Dynamic ARP Inspection Validation Checks, on page 1366
• Monitoring DAI, on page 1368
• Verifying the DAI Configuration, on page 1368
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1353
Security
Restrictions for Dynamic ARP Inspection
• Dynamic ARP inspection depends on the entries in the DHCP snooping binding database to verify
IP-to-MAC address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP
snooping to permit ARP packets that have dynamically assigned IP addresses.
When DHCP snooping is disabled or in non-DHCP environments, use ARP ACLs to permit or to deny
packets.
• Dynamic ARP inspection is supported on access ports, trunk ports, and EtherChannel ports.
Note Do not enable Dynamic ARP inspection on RSPAN VLANs. If Dynamic ARP
inspection is enabled on RSPAN VLANs, Dynamic ARP inspection packets
might not reach the RSPAN destination port.
• A physical port can join an EtherChannel port channel only when the trust state of the physical port and
the channel port match. Otherwise, the physical port remains suspended in the port channel. A port
channel inherits its trust state from the first physical port that joins the channel. Consequently, the trust
state of the first physical port need not match the trust state of the channel.
Conversely, when you change the trust state on the port channel, the switch configures a new trust state
on all the physical ports that comprise the channel.
• The rate limit is calculated separately on each switch in a switch stack. For a cross-stack EtherChannel,
this means that the actual rate limit might be higher than the configured value. For example, if you set
the rate limit to 30 pps on an EtherChannel that has one port on switch 1 and one port on switch 2, each
port can receive packets at 29 pps without causing the EtherChannel to become error-disabled.
• The operating rate for the port channel is cumulative across all the physical ports within the channel. For
example, if you configure the port channel with an ARP rate-limit of 400 pps, all the interfaces combined
on the channel receive an aggregate 400 pps. The rate of incoming ARP packets on EtherChannel ports
is equal to the sum of the incoming rate of packets from all the channel members. Configure the rate
limit for EtherChannel ports only after examining the rate of incoming ARP packets on the channel-port
members.
The rate of incoming packets on a physical port is checked against the port-channel configuration rather
than the physical-ports configuration. The rate-limit configuration on a port channel is independent of
the configuration on its physical ports.
If the EtherChannel receives more ARP packets than the configured rate, the channel (including all
physical ports) is placed in the error-disabled state.
• Make sure to limit the rate of ARP packets on incoming trunk ports. Configure trunk ports with higher
rates to reflect their aggregation and to handle packets across multiple dynamic ARP inspection-enabled
VLANs. You also can use the ip arp inspection limit none interface configuration command to make
the rate unlimited. A high rate-limit on one VLAN can cause a denial-of-service attack to other VLANs
when the software places the port in the error-disabled state.
• When you enable dynamic ARP inspection on the switch, policers that were configured to police ARP
traffic are no longer effective. The result is that all ARP traffic is sent to the CPU.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1354
Security
Understanding Dynamic ARP Inspection
Hosts A, B, and C are connected to the switch on interfaces A, B and C, all of which are on the same subnet.
Their IP and MAC addresses are shown in parentheses; for example, Host A uses IP address IA and MAC
address MA. When Host A needs to communicate to Host B at the IP layer, it broadcasts an ARP request for
the MAC address associated with IP address IB. When the switch and Host B receive the ARP request, they
populate their ARP caches with an ARP binding for a host with the IP address IA and a MAC address MA;
for example, IP address IA is bound to MAC address MA. When Host B responds, the switch and Host A
populate their ARP caches with a binding for a host with the IP address IB and the MAC address MB.
Host C can poison the ARP caches of the switch, Host A, and Host B by broadcasting forged ARP responses
with bindings for a host with an IP address of IA (or IB) and a MAC address of MC. Hosts with poisoned
ARP caches use the MAC address MC as the destination MAC address for traffic intended for IA or IB. This
means that Host C intercepts that traffic. Because Host C knows the true MAC addresses associated with IA
and IB, it can forward the intercepted traffic to those hosts by using the correct MAC address as the destination.
Host C has inserted itself into the traffic stream from Host A to Host B, the classic man-in-the middleattack.
Dynamic ARP inspection is a security feature that validates ARP packets in a network. It intercepts, logs,and
discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from
certain man-in-the-middle attacks.
Dynamic ARP inspection ensures that only valid ARP requests and responses are relayed. The switch performs
these activities:
• Intercepts all ARP requests and responses on untrusted ports
• Verifies that each of these intercepted packets has a valid IP-to-MAC address binding before updating
the local ARP cache or before forwarding the packet to the appropriate destination
• Drops invalid ARP packets
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1355
Security
Interface Trust States and Network Security
Dynamic ARP inspection determines the validity of an ARP packet based on valid IP-to-MAC address bindings
stored in a trusted database, the DHCP snooping binding database. This database is built by DHCP snooping
if DHCP snooping is enabled on the VLANs and on the switch. If the ARP packet is received on a trusted
interface, the switch forwards the packet without any checks. On untrusted interfaces, the switch forwards
the packet only if it is valid.
You enable dynamic ARP inspection on a per-VLAN basis by using the ip arp inspection vlan vlan-range
global configuration command.
In non-DHCP environments, dynamic ARP inspection can validate ARP packets against user-configured ARP
access control lists (ACLs) for hosts with statically configured IP addresses. You define an ARP ACL by
using the arp access-list acl-name global configuration command.
You can configure dynamic ARP inspection to drop ARP packets when the IP addresses in the packets are
invalid or when the MAC addresses in the body of the ARP packets do not match the addresses specified in
the Ethernet header. Use the ip arp inspection validate {[src-mac] [dst-mac] [ip]} global configuration
command.
Caution Use the trust state configuration carefully. Configuring interfaces as untrusted when they should betrusted
can result in a loss of connectivity.
In the following figure, assume that both Switch A and Switch B are running dynamic ARP inspection on the
VLAN that includes Host 1 and Host 2. If Host 1 and Host 2 acquire their IP addresses from the DHCP server
connected to Switch A, only Switch A binds the IP-to-MAC address of Host 1. Therefore, if the interface
between Switch A and Switch B is untrusted, the ARP packets from Host 1 are dropped by Switch B.
Connectivity between Host 1 and Host 2 is lost.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1356
Security
Rate Limiting of ARP Packets
Figure 113: ARP Packet Validation on a VLAN Enabled for Dynamic ARP Inspection
Configuring interfaces to be trusted when they are actually untrusted leaves a security hole in the network. If
Switch A is not running dynamic ARP inspection, Host 1 can easily poison the ARP cache of Switch B (and
Host 2, if the link between the switches is configured as trusted). This condition can occur even though Switch
B is running dynamic ARP inspection.
Dynamic ARP inspection ensures that hosts (on untrusted interfaces) connected to a switch running dynamic
ARP inspection do not poison the ARP caches of other hosts in the network. However, dynamic ARP inspection
does not prevent hosts in other portions of the network from poisoning the caches of the hosts that are connected
to a switch running dynamic ARP inspection.
In cases in which some switches in a VLAN run dynamic ARP inspection and other switches do not, configure
the interfaces connecting such switches as untrusted. However, to validate the bindings of packets from
nondynamic ARP inspection switches, configure the switch running dynamic ARP inspection with ARP
ACLs. When you cannot determine such bindings, at Layer 3, isolate switches running dynamic ARP inspection
from switches not running dynamic ARP inspection switches.
Note Depending on the setup of the DHCP server and the network, it might not be possible to validate a given ARP
packet on all switches in the VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1357
Security
Relative Priority of ARP ACLs and DHCP Snooping Entries
Note The rate limit for an EtherChannel is applied separately to each switch in a stack. For example, if a limit of
20 pps is configured on the EtherChannel, each switch with ports in the EtherChannel can carry up to 20 pps.
If any switch exceeds the limit, the entire EtherChannel is placed into the error-disabled state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1358
Security
Relative Priority of ARP ACLs and DHCP Snooping Entries
SUMMARY STEPS
1. enable
2. configure terminal
3. arp access-list acl-name
4. permit ip host sender-ip mac host sender-mac
5. exit
6. ip arp inspection filter arp-acl-name vlan vlan-range [static]
7. interface interface-id
8. no ip arp inspection trust
9. end
10. Use the following show commands:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1359
Security
Configuring ARP ACLs for Non-DHCP Environments
DETAILED STEPS
SwitchDevice> enable
Step 3 arp access-list acl-name Defines an ARP ACL, and enters ARP access-list
configuration mode. By default, no ARP access lists are
defined.
Note At the end of the ARP access list, there is an
implicit deny ip any mac any command.
Step 4 permit ip host sender-ip mac host sender-mac Permits ARP packets from the specified host (Host 2).
• Forsender-ip, enter the IP address of Host 2.
• For sender-mac, enter the MAC address of Host 2.
Step 6 ip arp inspection filter arp-acl-name vlan vlan-range Applies ARP ACL to the VLAN. By default, no defined
[static] ARP ACLs are applied to any VLAN.
• For arp-acl-name, specify the name of the ACL
created in Step 2.
• For vlan-range, specify the VLAN that the switches
and hosts are in. You can specify a single VLAN
identified by VLAN ID number, a range of VLANs
separated by a hyphen, or a series of VLANs
separated by a comma. The range is 1 to 4094.
• (Optional) Specify static to treat implicit denies in
the ARP ACL as explicit denies and to drop packets
that do not match any previous clauses in the ACL.
DHCP bindings are not used.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1360
Security
Configuring ARP ACLs for Non-DHCP Environments
Step 8 no ip arp inspection trust Configures Switch A interface that is connected to Switch
B as untrusted.
By default, all interfaces are untrusted.
For untrusted interfaces, the switch intercepts all ARP
requests and responses. It verifies that the intercepted
packets have valid IP-to-MAC address bindings before
updating the local cache and before forwarding the packet
to the appropriate destination. The switch drops invalid
packets and logs them in the log buffer according to the
logging configuration specified with the ip arp inspection
vlan logging global configuration command.
Step 12 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1361
Security
Configuring Dynamic ARP Inspection in DHCP Environments
Note Dynamic ARP inspection depends on the entries in the DHCP snooping binding database to verify IP-to-MAC
address bindings in incoming ARP requests and ARP responses. Make sure to enable DHCP snooping to
permit ARP packets that have dynamically assigned IP addresses.
Follow these steps to configure dynamic ARP inspection. You must perform this procedure on both switches.
This procedure is required.
SUMMARY STEPS
1. enable
2. show cdp neighbors
3. configure terminal
4. ip arp inspection vlan vlan-range
5. Interfaceinterface-id
6. ip arp inspection trust
7. end
8. show ip arp inspection interfaces
9. show ip arp inspection vlan vlan-range
10. show ip dhcp snooping binding
11. show ip arp inspection statistics vlan vlan-range
12. configure terminal
13. configure terminal
DETAILED STEPS
SwitchDevice> enable
Step 2 show cdp neighbors Verify the connection between the switches.
Example:
SwitchDevice(config-if)#show cdp neighbors
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1362
Security
Configuring Dynamic ARP Inspection in DHCP Environments
Step 4 ip arp inspection vlan vlan-range Enable dynamic ARP inspection on a per-VLAN basis.
By default, dynamic ARP inspection is disabled on all
Example:
VLANs. For vlan-range, specify a single VLAN identified
SwitchDevice(config)# ip arp inspection vlan 1 by VLAN ID number, a range of VLANs separated by a
hyphen, or a series of VLANs separated by a comma. The
range is 1 to 4094. Specify the same VLAN ID for both
switches.
Step 5 Interfaceinterface-id Specifies the interface connected to the other switch, and
enter interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 6 ip arp inspection trust Configures the connection between the switches as trusted.
By default, all interfaces are untrusted.
Example:
SwitchDevice(config-if)#ip arp inspection trust The switch does not check ARP packets that it receives
from the other switch on the trusted interface. It simply
forwards the packets.
For untrusted interfaces, the switch intercepts all ARP
requests and responses. It verifies that the intercepted
packets have valid IP-to-MAC address bindings before
updating the local cache and before forwarding the packet
to the appropriate destination. The switch drops invalid
packets and logs them in the log buffer according to the
logging configuration specified with the ip arp inspection
vlan logging global configuration command.
Step 8 show ip arp inspection interfaces Verifies the dynamic ARP inspection configuration on
interfaces.
Example:
Step 9 show ip arp inspection vlan vlan-range Verifies the dynamic ARP inspection configuration on
VLAN.
Example:
SwitchDevice(config-if)#show ip arp inspection
vlan 1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1363
Security
Limiting the Rate of Incoming ARP Packets
Step 11 show ip arp inspection statistics vlan vlan-range Checks the dynamic ARP inspection statistics on VLAN.
Example:
SwitchDevice(config-if)#show ip arp inspection
statistics vlan 1
Note Unless you configure a rate limit on an interface, changing the trust state of the interface also changes its rate
limit to the default value for that trust state. After you configure the rate limit, the interface retains the rate
limit even when its trust state is changed. If you enter the no ip arp inspection limit interface configuration
command, the interface reverts to its default rate limit.
Follow these steps to limit the rate of incoming ARP packets. This procedure is optional.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. ip arp inspection limit {rate pps [burst interval seconds] | none}
5. exit
6. Use the following commands:
• errdisable detect cause arp-inspection
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1364
Security
Limiting the Rate of Incoming ARP Packets
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be rate-limited, and enter interface
configuration mode.
Step 4 ip arp inspection limit {rate pps [burst interval seconds] Limits the rate of incoming ARP requests and responses
| none} on the interface. The default rate is 15 pps on untrusted
interfaces and unlimited on trusted interfaces. The burst
interval is 1 second.
The keywords have these meanings:
• For ratepps, specify an upper limit for the number of
incoming packets processed per second. The range is
0 to 2048 pps.
• (Optional) For burst intervalseconds, specify the
consecutive interval in seconds, over which the
interface is monitored for a high rate of ARP packets.
The range is 1 to 15.
• For rate none, specify no upper limit for the rate of
incoming ARP packets that can be processed.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1365
Security
Performing Dynamic ARP Inspection Validation Checks
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip arp inspection validate {[src-mac] [dst-mac] [ip]}
4. exit
5. show ip arp inspection vlan vlan-range
6. show running-config
7. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1366
Security
Performing Dynamic ARP Inspection Validation Checks
DETAILED STEPS
SwitchDevice> enable
Step 3 ip arp inspection validate {[src-mac] [dst-mac] [ip]} Performs a specific check on incoming ARP packets. By
default, no checks are performed.
The keywords have these meanings:
• For src-mac, check the source MAC address in the
Ethernet header against the sender MAC address in
the ARP body. This check is performed on both ARP
requests and responses. When enabled, packets with
different MAC addresses are classified as invalid and
are dropped.
• For dst-mac, check the destination MAC address in
the Ethernet header against the target MAC address in
ARP body. This check is performed for ARP
responses. When enabled, packets with different MAC
addresses are classified as invalid and are dropped.
• For ip, check the ARP body for invalid and unexpected
IP addresses. Addresses include 0.0.0.0,
255.255.255.255, and all IP multicast addresses.
Sender IP addresses are checked in all ARP requests
and responses, and target IP addresses are checked
only in ARP responses.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1367
Security
Monitoring DAI
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Monitoring DAI
To monitor DAI, use the following commands:
Command Description
clear ip arp inspection statistics Clears dynamic ARP inspection statistics.
show ip arp inspection statistics [vlan vlan-range] Displays statistics for forwarded, dropped, MAC
validation failure, IP validation failure, ACL permitted
and denied, and DHCP permitted and denied packets
for the specified VLAN. If no VLANs are specified
or if a range is specified, displays information only
for VLANs with dynamic ARP inspection enabled
(active).
clear ip arp inspection log Clears the dynamic ARP inspection log buffer.
show ip arp inspection log Displays the configuration and contents of the
dynamic ARP inspection log buffer.
For the show ip arp inspection statistics command, the switch increments the number of forwarded packets
for each ARP request and response packet on a trusted dynamic ARP inspection port. The switch increments
the number of ACL or DHCP permitted packets for each packet that is denied by source MAC, destination
MAC, or IP validation checks, and the switch increments the appropriate.
Command Description
show arp access-list [acl-name] Displays detailed information about ARP ACLs.
show ip arp inspection interfaces [interface-id] Displays the trust state and the rate limit of ARP
packets for the specified interface or all interfaces.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1368
Security
Verifying the DAI Configuration
Command Description
show ip arp inspection vlan vlan-range Displays the configuration and the operating state of
dynamic ARP inspection for the specified VLAN. If
no VLANs are specified or if a range is specified,
displays information only for VLANs with dynamic
ARP inspection enabled (active).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1369
Security
Verifying the DAI Configuration
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1370
CHAPTER 62
Configuring IEEE 802.1x Port-Based
Authentication
This chapter describes how to configure IEEE 802.1x port-based authentication. IEEE 802.1x authentication
prevents unauthorized devices (clients) from gaining access to the network. Unless otherwise noted, the term
switch refers to a standalone switch or a switch stack.
• Finding Feature Information, on page 1371
• Information About 802.1x Port-Based Authentication, on page 1371
• How to Configure 802.1x Port-Based Authentication, on page 1403
• Monitoring 802.1x Statistics and Status, on page 1458
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1371
Security
Port-Based Authentication Process
Note For complete syntax and usage information for the commands used in this chapter, see the “RADIUS
Commands” section in the Cisco IOS Security Command Reference, Release 12.4 and the command reference
for this release.
If Multi Domain Authentication (MDA) is enabled on a port, this flow can be used with some exceptions that
are applicable to voice authorization.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1372
Security
Port-Based Authentication Process
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1373
Security
Port-Based Authentication Initiation and Message Exchange
Note If 802.1x authentication is not enabled or supported on the network access device, any EAPOL frames from
the client are dropped. If the client does not receive an EAP-request/identity frame after three attempts to start
authentication, the client sends frames as if the port is in the authorized state. A port in the authorized state
effectively means that the client has been successfully authenticated.
When the client supplies its identity, the switch begins its role as the intermediary, passing EAP frames between
the client and the authentication server until authentication succeeds or fails. If the authentication succeeds,
the switch port becomes authorized. If the authentication fails, authentication can be retried, the port might
be assigned to a VLAN that provides limited services, or network access is not granted.
The specific exchange of EAP frames depends on the authentication method being used.
Figure 115: Message Exchange
This figure shows a message exchange initiated by the client when the client uses the One-Time-Password
(OTP) authentication method with a RADIUS
server.
If 802.1x authentication times out while waiting for an EAPOL message exchange and MAC authentication
bypass is enabled, the switch can authorize the client when the switch detects an Ethernet packet from the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1374
Security
Authentication Manager for Port-Based Authentication
client. The switch uses the MAC address of the client as its identity and includes this information in the
RADIUS-access/request frame that is sent to the RADIUS server. After the server sends the switch the
RADIUS-access/accept frame (authorization is successful), the port becomes authorized. If authorization fails
and a guest VLAN is specified, the switch assigns the port to the guest VLAN. If the switch detects an EAPOL
packet while waiting for an Ethernet packet, the switch stops the MAC authentication bypass process and
starts 802.1x authentication.
Figure 116: Message Exchange During MAC Authentication Bypass
bypass.
Authentication Mode
method
Single host Multiple host MDA Multiple
Authentication
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1375
Security
Per-User ACLs and Filter-Ids
Authentication Mode
method
Single host Multiple host MDA Multiple
Authentication
MAC authentication VLAN assignment VLAN assignment VLAN assignment VLAN assignment
bypass
Per-user ACL Per-user ACL Per-user ACL
Filter-ID attribute Filter-Id attribute Filter-Id attribute
Downloadable ACL Downloadable ACL Downloadable ACL
Redirect URL Redirect URL Redirect URL
NAC Layer 2 IP Filter-Id attribute Filter-Id attribute Filter-Id attribute Filter-Id attribute
validation
Downloadable ACL Downloadable ACL Downloadable ACL Downloadable ACL
Redirect URL Redirect URL Redirect URL Redirect URL
Web authentication Proxy ACL Proxy ACL Proxy ACL Proxy ACL
as fallback method
Filter-Id attribute Filter-Id attribute Filter-Id attribute Filter-Id attribute
Downloadable ACL Downloadable ACL Downloadable ACL Downloadable ACL
18
Supported in Cisco IOS Release 12.2(50)SE and later.
19
For clients that do not support 802.1x authentication.
Note You can only set any as the source in the ACL.
Note For any ACL configured for multiple-host mode, the source portion of statement must be any. (For example,
permit icmp any host 10.10.1.1.)
You must specify any in the source ports of any defined ACL. Otherwise, the ACL cannot be applied and
authorization fails. Single host is the only exception to support backward compatibility.
More than one host can be authenticated on MDA-enabled and multiauth ports. The ACL policy applied for
one host does not effect the traffic of another host. If only one host is authenticated on a multi-host port, and
the other hosts gain network access without authentication, the ACL policy for the first host can be applied
to the other connected hosts by specifying any in the source address.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1376
Security
Port-Based Authentication Manager CLI Commands
Note If 802.1x authentication is globally disabled, other authentication methods are still enabled on that port, such
as web authentication.
The authentication manager commands provide the same functionality as earlier 802.1x commands.
When filtering out verbose system messages generated by the authentication manager, the filtered content
typically relates to authentication success. You can also filter verbose messages for 802.1x authentication and
MAB authentication. There is a separate command for each authentication method:
• The no authentication logging verbose global configuration command filters verbose messages from
the authentication manager.
• The no dot1x logging verbose global configuration command filters 802.1x authentication verbose
messages.
• The no mab logging verbose global configuration command filters MAC authentication bypass (MAB)
verbose messages
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1377
Security
Ports in Authorized and Unauthorized States
authentication port-control {auto dot1x port-control {auto | Enable manual control of the
| force-authorized | force-un force-authorized | authorization state of the port.
authorized} force-unauthorized}
authentication violation {protect dot1x violation-mode {shutdown Configure the violation modes that
| restrict | shutdown} | restrict | protect} occur when a new device connects
to a port or when a new device
connects to a port after the
maximum number of devices are
connected to that port.
Note CDP bypass is not supported and may cause a port to go into err-disabled state.
If a client that does not support 802.1x authentication connects to an unauthorized 802.1x port, the switch
requests the client’s identity. In this situation, the client does not respond to the request, the port remains in
the unauthorized state, and the client is not granted access to the network.
In contrast, when an 802.1x-enabled client connects to a port that is not running the 802.1x standard, the client
initiates the authentication process by sending the EAPOL-start frame. When no response is received, the
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1378
Security
802.1x Host Mode
client sends the request for a fixed number of times. Because no response is received, the client begins sending
frames as if the port is in the authorized state.
You control the port authorization state by using the authentication port-control interface configuration
command and these keywords:
• force-authorized—disables 802.1x authentication and causes the port to change to the authorized state
without any authentication exchange required. The port sends and receives normal traffic without
802.1x-based authentication of the client. This is the default setting.
• force-unauthorized—causes the port to remain in the unauthorized state, ignoring all attempts by the
client to authenticate. The switch cannot provide authentication services to the client through the port.
• auto—enables 802.1x authentication and causes the port to begin in the unauthorized state, allowing
only EAPOL frames to be sent and received through the port. The authentication process begins when
the link state of the port changes from down to up or when an EAPOL-start frame is received. The switch
requests the identity of the client and begins relaying authentication messages between the client and the
authentication server. Each client attempting to access the network is uniquely identified by the switch
by using the client MAC address.
If the client is successfully authenticated (receives an Accept frame from the authentication server), the port
state changes to authorized, and all frames from the authenticated client are allowed through the port. If the
authentication fails, the port remains in the unauthorized state, but authentication can be retried. If the
authentication server cannot be reached, the switch can resend the request. If no response is received from
the server after the specified number of attempts, authentication fails, and network access is not granted.
When a client logs off, it sends an EAPOL-logoff message, causing the switch port to change to the unauthorized
state.
If the link state of a port changes from up to down, or if an EAPOL-logoff frame is received, the port returns
to the unauthorized state.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1379
Security
802.1x Multiple Authentication Mode
Note For all host modes, the line protocol stays up before authorization when port-based authentication is configured.
The switch supports multidomain authentication (MDA), which allows both a data device and a voice device,
such as an IP Phone (Cisco or non-Cisco), to connect to the same switch port.
Note When a port is in multiple-authentication mode, the authentication-failed VLAN features do not activate.
You can assign a RADIUS-server-supplied VLAN in multi-auth mode, under the following conditions:
• The host is the first host authorized on the port, and the RADIUS server supplies VLAN information
• Subsequent hosts are authorized with a VLAN that matches the operational VLAN.
• A host is authorized on the port with no VLAN assignment, and subsequent hosts either have no VLAN
assignment, or their VLAN information matches the operational VLAN.
• The first host authorized on the port has a group VLAN assignment, and subsequent hosts either have
no VLAN assignment, or their group VLAN matches the group VLAN on the port. Subsequent hosts
must use the same VLAN from the VLAN group as the first host. If a VLAN list is used, all hosts are
subject to the conditions specified in the VLAN list.
• After a VLAN is assigned to a host on the port, subsequent hosts must have matching VLAN information
or be denied access to the port.
• You cannot configure a guest VLAN or an auth-fail VLAN in multi-auth mode.
• The behavior of the critical-auth VLAN is not changed for multi-auth mode. When a host tries to
authenticate and the server is not reachable, all authorized hosts are reinitialized in the configured VLAN.
Note This feature is supported only on Catalyst 2960X switches running the LAN base image
The Multi-auth Per User VLAN assignment feature allows you to create multiple operational access VLANs
based on VLANs assigned to the clients on the port that has a single configured access VLAN. The port
configured as an access port where the traffic for all the VLANs associated with data domain is not dot1q
tagged, and these VLANs are treated as native VLANs.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1380
Security
Limitation in Multi-auth Per User VLAN assignment
The number of hosts per multi-auth port is 8, however there can be more hosts.
Note The Multi-auth Per User VLAN assignment feature is not supported for Voice domain. All clients in Voice
domain on a port must use the same VLAN.
The following scenarios are associated with the multi-auth Per User VLAN assignments:
Scenario one
When a hub is connected to an access port, and the port is configured with an access VLAN (V0).
The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to
V1. This behaviour is similar on a single-host or multi-domain-auth port.
When a second host (H2) is connected and gets assigned to VLAN ( V2), the port will have two operational
VLANs (V1 and V2). If H1 and H2 sends untagged ingress traffic, H1 traffic is mapped to VLAN (V1) and
H2 traffic to VLAN (V2), all egress traffic going out of the port on VLAN (V1) and VLAN (V2) are untagged.
If both the hosts, H1 and H2 are logged out or the sessions are removed due to some reason then VLAN (V1)
and VLAN (V2) are removed from the port, and the configured VLAN (V0) is restored on the port.
Scenario two
When a hub is connected to an access port, and the port is configured with an access VLAN (V0). The host
(H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to V1.
When a second host (H2) is connected and gets authorized without explicit vlan policy, H2 is expected to use
the configured VLAN (V0) that is restored on the port. A ll egress traffic going out of two operational VLANs,
VLAN (V0) and VLAN (V1) are untagged.
If host (H2 ) is logged out or the session is removed due to some reason then the configured VLAN (V0) is
removed from the port, and VLAN (V1) becomes the only operational VLAN on the port.
Scenario three
When a hub is connected to an access port in open mode, and the port is configured with an access VLAN
(V0) .
The host (H1) is assigned to VLAN (V1) through the hub. The operational VLAN of the port is changed to
V1. When a second host (H2) is connected and remains unauthorized, it still has access to operational VLAN
(V1) due to open mode.
If host H1 is logged out or the session is removed due to some reason, VLAN (V1) is removed from the port
and host (H2) gets assigned to VLAN (V0).
Note The combination of Open mode and VLAN assignment has an adverse affect on host (H2) because it has an
IP address in the subnet that corresponds to VLAN (V1).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1381
Security
MAC Move
• IPv4 ARPs: Hosts receive ARP packets from other subnets. This is a problem if two subnets in different
Virtual Routing and Forwarding (VRF) tables with overlapping IP address range are active on the port.
The host ARP cache may get invalid entries.
• IPv6 control packets: In IPv6 deployments, Router Advertisements (RA) are processed by hosts that
are not supposed to receive them. When a host from one VLAN receives RA from a different VLAN,
the host assign incorrect IPv6 address to itself. Such a host is unable to get access to the network.
The workaround is to enable the IPv6 first hop security so that the broadcast ICMPv6 packets are converted
to unicast and sent out from multi-auth enabled ports.. The packet is replicated for each client in multi-auth
port belonging to the VLAN and the destination MAC is set to an individual client. Ports having one
VLAN, ICMPv6 packets broadcast normally.
• IP multicast: Multicast traffic destined to a multicast group gets replicated for different VLANs if the
hosts on those VLANs join the multicast group. When two hosts in different VLANs join a multicast
group (on the same mutli-auth port), two copies of each multicast packet are sent out from that port.
MAC Move
When a MAC address is authenticated on one switch port, that address is not allowed on another authentication
manager-enabled port of the switch. If the switch detects that same MAC address on another authentication
manager-enabled port, the address is not allowed.
There are situations where a MAC address might need to move from one port to another on the same switch.
For example, when there is another device (for example a hub or an IP phone) between an authenticated host
and a switch port, you might want to disconnect the host from the device and connect it directly to another
port on the same switch.
You can globally enable MAC move so the device is reauthenticated on the new port. When a host moves to
a second port, the session on the first port is deleted, and the host is reauthenticated on the new port. MAC
move is supported on all host modes. (The authenticated host can move to any port on the switch, no matter
which host mode is enabled on the that port.) When a MAC address moves from one port to another, the
switch terminates the authenticated session on the original port and initiates a new authentication sequence
on the new port. The MAC move feature applies to both voice and data hosts.
Note In open authentication mode, a MAC address is immediately moved from the original port to the new port,
with no requirement for authorization on the new port.
MAC Replace
The MAC replace feature can be configured to address the violation that occurs when a host attempts to
connect to a port where another host was previously authenticated.
Note This feature does not apply to ports in multi-auth mode, because violations are not triggered in that mode. It
does not apply to ports in multiple host mode, because in that mode, only the first host requires authentication.
If you configure the authentication violation interface configuration command with the replace keyword,
the authentication process on a port in multi-domain mode is:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1382
Security
802.1x Accounting
• A new MAC address is received on a port with an existing authenticated MAC address.
• The authentication manager replaces the MAC address of the current data host on the port with the new
MAC address.
• The authentication manager initiates the authentication process for the new MAC address.
• If the authentication manager determines that the new host is a voice host, the original voice host is
removed.
If a port is in open authentication mode, any new MAC address is immediately added to the MAC address
table.
802.1x Accounting
The 802.1x standard defines how users are authorized and authenticated for network access but does not keep
track of network usage. 802.1x accounting is disabled by default. You can enable 802.1x accounting to monitor
this activity on 802.1x-enabled ports:
• User successfully authenticates.
• User logs off.
• Link-down occurs.
• Re-authentication successfully occurs.
• Re-authentication fails.
The switch does not log 802.1x accounting information. Instead, it sends this information to the RADIUS
server, which must be configured to log accounting messages.
You can view the AV pairs that are being sent by the switch by entering the debug radius accounting
privileged EXEC command. For more information about this command, see the Cisco IOS Debug Command
Reference, Release 12.4.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1383
Security
802.1x Readiness Check
This table lists the AV pairs and when they are sent are sent by the switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1384
Security
Switch-to-RADIUS-Server Communication
Switch-to-RADIUS-Server Communication
RADIUS security servers are identified by their hostname or IP address, hostname and specific UDP port
numbers, or IP address and specific UDP port numbers. The combination of the IP address and UDP port
number creates a unique identifier, which enables RADIUS requests to be sent to multiple UDP ports on a
server at the same IP address. If two different host entries on the same RADIUS server are configured for the
same service—for example, authentication—the second host entry configured acts as the fail-over backup to
the first one. The RADIUS host entries are tried in the order that they were configured.
Related Topics
Configuring the Switch-to-RADIUS-Server Communication, on page 1415
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1385
Security
802.1x Authentication with VLAN Assignment
• If the VLAN configuration change of one device results in matching the other device configured
or assigned VLAN, then authorization of all devices on the port is terminated and multidomain host
mode is disabled until a valid configuration is restored where data and voice device configured
VLANs no longer match.
• If a voice device is authorized and is using a downloaded voice VLAN, the removal of the voice
VLAN configuration, or modifying the configuration value to dot1p or untagged results in voice
device un-authorization and the disablement of multi-domain host mode.
When the port is in the force authorized, force unauthorized, unauthorized, or shutdown state, it is put into
the configured access VLAN.
If an 802.1x port is authenticated and put in the RADIUS server-assigned VLAN, any change to the port
access VLAN configuration does not take effect. In the case of a multidomain host, the same applies to voice
devices when the port is fully authorized with these exceptions:
• If the VLAN configuration change of one device results in matching the other device configured or
assigned VLAN, authorization of all devices on the port is terminated and multidomain host mode is
disabled until a valid configuration is restored where data and voice device configured VLANs no longer
match.
• If a voice device is authorized and is using a downloaded voice VLAN, the removal of the voice VLAN
configuration, or modifying the configuration value to dot1p or untagged results in voice device
un-authorization and the disablement of multi-domain host mode.
When the port is in the force authorized, force unauthorized, unauthorized, or shutdown state, it is put into
the configured access VLAN.
The 802.1x authentication with VLAN assignment feature is not supported on trunk ports, dynamic ports, or
with dynamic-access port assignment through a VLAN Membership Policy Server (VMPS).
To configure VLAN assignment you need to perform these tasks:
• Enable AAA authorization by using the network keyword to allow interface configuration from the
RADIUS server.
• Enable 802.1x authentication. (The VLAN assignment feature is automatically enabled when you configure
802.1x authentication on an access port).
• Assign vendor-specific tunnel attributes in the RADIUS server. The RADIUS server must return these
attributes to the switch:
• [64] Tunnel-Type = VLAN
• [65] Tunnel-Medium-Type = 802
• [81] Tunnel-Private-Group-ID = VLAN name or VLAN ID
• [83] Tunnel-Preference
Attribute [64] must contain the value VLAN (type 13). Attribute [65] must contain the value 802 (type
6). Attribute [81] specifies the VLAN name or VLAN ID assigned to the IEEE 802.1x-authenticated user.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1386
Security
802.1x Authentication with Per-User ACLs
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1387
Security
802.1x Authentication with Downloadable ACLs and Redirect URLs
If more than one host is authenticated and the host is in single-host, MDA, or multiple-authentication mode,
the switch changes the source address of the ACL to the host IP address.
You can apply the ACLs and redirect URLs to all the devices connected to the 802.1x-enabled port.
If no ACLs are downloaded during 802.1x authentication, the switch applies the static default ACL on the
port to the host. On a voice VLAN port configured in multi-auth or MDA mode, the switch applies the ACL
only to the phone as part of the authorization policies.
Note The limit for dACL with stacking is 64 ACEs per dACL per port. The limit without stacking is the number
of available TCAM entries which varies based on the other ACL features that are active.
Beginning with Cisco IOS Release 12.2(55)SE, if there is no static ACL on a port, a dynamic auth-default
ACL is created, and policies are enforced before dACLs are downloaded and applied.
The auth-default ACL is created when at least one host with an authorization policy is detected on the port.
The auth-default ACL is removed from the port when the last authenticated session ends. You can configure
the auth-default ACL by using the ip access-list extended auth-default-acl global configuration command.
Note The auth-default-ACL does not support Cisco Discovery Protocol (CDP) bypass in the single host mode. You
must configure a static ACL on the interface to support CDP bypass.
The 802.1x and MAB authentication methods support two authentication modes, open and closed. If there is
no static ACL on a port in closed authentication mode:
• An auth-default-ACL is created.
• The auth-default-ACL allows only DHCP traffic until policies are enforced.
• When the first host authenticates, the authorization policy is applied without IP address insertion.
• When a second host is detected, the policies for the first host are refreshed, and policies for the first and
subsequent sessions are enforced with IP address insertion.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1388
Security
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL
To control access for hosts with no authorization policy, you can configure a directive. The supported values
for the directive are open and default. When you configure the open directive, all traffic is allowed. The default
directive subjects traffic to the access provided by the port. You can configure the directive either in the user
profile on the AAA server or on the switch. To configure the directive on the AAA server, use the
authz-directive =<open/default> global command. To configure the directive on the switch, use the epm
access-control open global configuration command.
The access control entries (ACEs) in the fallback ACL are converted to per-user entries. If the configured
fallback profile does not include a fallback ACL, the host is subject to the auth-default-ACL associated with
the port.
Note If you use a custom logo with web authentication and it is stored on an external server, the port ACL must
allow access to the external server before authentication. You must either configure a static port ACL or
change the auth-default-ACL to provide appropriate access to the external server.
Cisco Secure ACS and Attribute-Value Pairs for the Redirect URL
The switch uses these cisco-av-pair VSAs:
• url-redirect is the HTTP or HTTPS URL.
• url-redirect-acl is the switch ACL name or number.
The switch uses the CiscoSecure-defined-ACL attribute value pair to intercept an HTTP or HTTPS request
from the end point. The switch then forwards the client web browser to the specified redirect address. The
url-redirect AV pair on the Cisco Secure ACS contains the URL to which the web browser is redirected. The
url-redirect-acl attribute value pair contains the name or number of an ACL that specifies the HTTP or HTTPS
traffic to redirect.
If a redirect URL is configured for a client on the authentication server, a default port ACL on the connected
client switch port must also be configured.
This section describes the ACS server switchover or failover behavior:
The first authorization request is sent to the primary ACS server; after the time out period set by the tacacs-server
timeout command ends, the request is switched-over to the secondary server for authorization. After the first
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1389
Security
Cisco Secure ACS and Attribute-Value Pairs for Downloadable ACLs
authorization request, all succeeding requests are sent to the secondary ACS server. After the switchover, if
the secondary server is not available, attempts are made to reach the server and after the timeout period,
authorization requests are then sent to the primary ACS server. If both servers are down, authorization requests
are sent to the next ACS server in the list, after the configured timeout period ends, sent to the next server,
and so on. If none of the servers are reachable, the user receives an authorization failed message.
If a downloadable ACL is configured for a client on the authentication server, a default port ACL on the
connected client switch port must also be configured.
If the default ACL is configured on the switch and the Cisco Secure ACS sends a host-access-policy to the
switch, it applies the policy to traffic from the host connected to a switch port. If the policy does not apply,
the switch applies the default ACL. If the Cisco Secure ACS sends the switch a downloadable ACL, this ACL
takes precedence over the default ACL that is configured on the switch port. However, if the switch receives
an host access policy from the Cisco Secure ACS but the default ACL is not configured, the authorization
failure is declared.
Note This feature is not supported on Cisco ACS Server. (The ACS server ignores the sent VLAN-IDs for new
hosts and only authenticates based on the MAC address.)
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1390
Security
802.1x Authentication with Restricted VLAN
The switch maintains the EAPOL packet history. If an EAPOL packet is detected on the interface during the
lifetime of the link, the switch determines that the device connected to that interface is an IEEE 802.1x-capable
supplicant, and the interface does not change to the guest VLAN state. EAPOL history is cleared if the interface
link status goes down. If no EAPOL packet is detected on the interface, the interface changes to the guest
VLAN state.
If the switch is trying to authorize an 802.1x-capable voice device and the AAA server is unavailable, the
authorization attempt fails, but the detection of the EAPOL packet is saved in the EAPOL history. When the
AAA server becomes available, the switch authorizes the voice device. However, the switch no longer allows
other devices access to the guest VLAN. To prevent this situation, use one of these command sequences:
• Enter the authentication event no-response action authorize vlan vlan-id interface configuration
command to allow access to the guest VLAN.
• Enter the shutdown interface configuration command followed by the no shutdown interface configuration
command to restart the port.
If devices send EAPOL packets to the switch during the lifetime of the link, the switch no longer allows clients
that fail authentication access to the guest VLAN.
Note If an EAPOL packet is detected after the interface has changed to the guest VLAN, the interface reverts to an
unauthorized state, and 802.1x authentication restarts.
Any number of 802.1x-incapable clients are allowed access when the switch port is moved to the guest VLAN.
If an 802.1x-capable client joins the same port on which the guest VLAN is configured, the port is put into
the unauthorized state in the user-configured access VLAN, and authentication is restarted.
Guest VLANs are supported on 802.1x ports in single host, multiple host, multi-auth and multi-domain modes.
You can configure any active VLAN except an RSPAN VLAN, a private VLAN, or a voice VLAN as an
802.1x guest VLAN. The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk
ports; it is supported only on access ports.
The switch supports MAC authentication bypass. When MAC authentication bypass is enabled on an 802.1x
port, the switch can authorize clients based on the client MAC address when IEEE 802.1x authentication times
out while waiting for an EAPOL message exchange. After detecting a client on an 802.1x port, the switch
waits for an Ethernet packet from the client. The switch sends the authentication server a
RADIUS-access/request frame with a username and password based on the MAC address. If authorization
succeeds, the switch grants the client access to the network. If authorization fails, the switch assigns the port
to the guest VLAN if one is specified.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1391
Security
802.1x Authentication with Inaccessible Authentication Bypass
Note You can configure a VLAN to be both the guest VLAN and the restricted VLAN if you want to provide the
same services to both types of users.
Without this feature, the client attempts and fails authentication indefinitely, and the switch port remains in
the spanning-tree blocking state. With this feature, you can configure the switch port to be in the restricted
VLAN after a specified number of authentication attempts (the default value is 3 attempts).
The authenticator counts the failed authentication attempts for the client. When this count exceeds the configured
maximum number of authentication attempts, the port moves to the restricted VLAN. The failed attempt count
increments when the RADIUS server replies with either an EAP failure or an empty response without an EAP
packet. When the port moves into the restricted VLAN, the failed attempt counter resets.
Users who fail authentication remain in the restricted VLAN until the next re-authentication attempt. A port
in the restricted VLAN tries to re-authenticate at configured intervals (the default is 60 seconds). If
re-authentication fails, the port remains in the restricted VLAN. If re-authentication is successful, the port
moves either to the configured VLAN or to a VLAN sent by the RADIUS server. You can disable
re-authentication. If you do this, the only way to restart the authentication process is for the port to receive a
link down or EAP logoff event. We recommend that you keep re-authentication enabled if a client might
connect through a hub. When a client disconnects from the hub, the port might not receive the link down or
EAP logoff event.
After a port moves to the restricted VLAN, a simulated EAP success message is sent to the client. This prevents
clients from indefinitely attempting authentication. Some clients (for example, devices running Windows XP)
cannot implement DHCP without EAP success.
Restricted VLANs are supported on 802.1x ports in all host modes and on Layer 2 ports.
You can configure any active VLAN except an RSPAN VLAN, a primary private VLAN, or a voice VLAN
as an 802.1x restricted VLAN. The restricted VLAN feature is not supported on internal VLANs (routed
ports) or trunk ports; it is supported only on access ports.
Other security port features such as dynamic ARP Inspection, DHCP snooping, and IP source guard can be
configured independently on a restricted VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1392
Security
Inaccessible Authentication Bypass Authentication Results
multiple-authentication (multiauth) ports, use the authentication event server dead action reinitialize vlan
vlan-id command. When a new host tries to connect to the critical port, that port is reinitialized and all the
connected hosts are moved to the user-specified access VLAN.
This command is supported on all host modes.
You can configure the critical port to reinitialize hosts and move them out of the critical VLAN when the
RADIUS server is again available. When this is configured, all critical ports in the critical-authentication state
are automatically re-authenticated.
• Restricted VLAN—If the port is already authorized in a restricted VLAN and the RADIUS servers are
unavailable, the switch puts the critical port in the critical-authentication state in the restricted VLAN.
• 802.1x accounting—Accounting is not affected if the RADIUS servers are unavailable.
• Private VLAN—You can configure inaccessible authentication bypass on a private VLAN host port.
The access VLAN must be a secondary private VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1393
Security
802.1x Critical Voice VLAN
• Voice VLAN—Inaccessible authentication bypass is compatible with voice VLAN, but the
RADIUS-configured or user-specified access VLAN and the voice VLAN must be different.
• Remote Switched Port Analyzer (RSPAN)—Do not configure an RSPAN VLAN as the
RADIUS-configured or user-specified access VLAN for inaccessible authentication bypass.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1394
Security
802.1x User Distribution Configuration Guidelines
Note The RADIUS server can send the VLAN information in any combination of
VLAN-IDs, VLAN names, or VLAN groups.
The IP phone uses the VVID for its voice traffic, regardless of the authorization state of the port. This allows
the phone to work independently of IEEE 802.1x authentication.
In single-host mode, only the IP phone is allowed on the voice VLAN. In multiple-hosts mode, additional
clients can send traffic on the voice VLAN after a supplicant is authenticated on the PVID. When multiple-hosts
mode is enabled, the supplicant authentication affects both the PVID and the VVID.
A voice VLAN port becomes active when there is a link, and the device MAC address appears after the first
CDP message from the IP phone. Cisco IP phones do not relay CDP messages from other devices. As a result,
if several IP phones are connected in series, the switch recognizes only the one directly connected to it. When
IEEE 802.1x authentication is enabled on a voice VLAN port, the switch drops packets from unrecognized
IP phones more than one hop away.
When IEEE 802.1x authentication is enabled on a switch port, you can configure an access port VLAN that
is also a voice VLAN.
When IP phones are connected to an 802.1x-enabled switch port that is in single host mode, the switch grants
the phones network access without authenticating them. We recommend that you use multidomain authentication
(MDA) on the port to authenticate both a data device and a voice device, such as an IP phone
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1395
Security
IEEE 802.1x Authentication with Port Security
Note If you enable IEEE 802.1x authentication on an access port on which a voice VLAN is configured and to
which a Cisco IP Phone is connected, the Cisco IP phone loses connectivity to the switch for up to 30 seconds.
Note If PortFast is not enabled on the port, the port is forced to the bidirectional state.
When you configure a port as unidirectional by using the authentication control-direction in interface
configuration command, the port changes to the spanning-tree forwarding state. The port can send packets to
the host but cannot receive packets from the host.
When you configure a port as bidirectional by using the authentication control-direction both interface
configuration command, the port is access-controlled in both directions. The port does not receive packets
from or send packets to the host.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1396
Security
IEEE 802.1x Authentication with MAC Authentication Bypass
password based on the MAC address. If authorization succeeds, the switch grants the client access to the
network. If authorization fails, the switch assigns the port to the guest VLAN if one is configured. This process
works for most client devices; however, it does not work for clients that use an alternate MAC address format.
You can configure how MAB authentication is performed for clients with MAC addresses that deviate from
the standard format or where the RADIUS configuration requires the user name and password to differ.
If an EAPOL packet is detected on the interface during the lifetime of the link, the switch determines that the
device connected to that interface is an 802.1x-capable supplicant and uses 802.1x authentication (not MAC
authentication bypass) to authorize the interface. EAPOL history is cleared if the interface link status goes
down.
If the switch already authorized a port by using MAC authentication bypass and detects an IEEE 802.1x
supplicant, the switch does not unauthorize the client connected to the port. When re-authentication occurs,
the switch uses the authentication or re-authentication methods configured on the port, if the previous session
ended because the Termination-Action RADIUS attribute value is DEFAULT.
Clients that were authorized with MAC authentication bypass can be re-authenticated. The re-authentication
process is the same as that for clients that were authenticated with IEEE 802.1x. During re-authentication, the
port remains in the previously assigned VLAN. If re-authentication is successful, the switch keeps the port
in the same VLAN. If re-authentication fails, the switch assigns the port to the guest VLAN, if one is configured.
If re-authentication is based on the Session-Timeout RADIUS attribute (Attribute[27]) and the
Termination-Action RADIUS attribute (Attribute [29]) and if the Termination-Action RADIUS attribute
(Attribute [29]) action is Initialize (the attribute value is DEFAULT), the MAC authentication bypass session
ends, and connectivity is lost during re-authentication. If MAC authentication bypass is enabled and the IEEE
802.1x authentication times out, the switch uses the MAC authentication bypass feature to initiate
re-authorization. For more information about these AV pairs, see RFC 3580, “IEEE 802.1X Remote
Authentication Dial In User Service (RADIUS) Usage Guidelines.”
MAC authentication bypass interacts with the features:
• IEEE 802.1x authentication—You can enable MAC authentication bypass only if 802.1x authentication
is enabled on the port .
• Guest VLAN—If a client has an invalid MAC address identity, the switch assigns the client to a guest
VLAN if one is configured.
• Restricted VLAN—This feature is not supported when the client connected to an IEEE 802.lx port is
authenticated with MAC authentication bypass.
• Port security
• Voice VLAN
• VLAN Membership Policy Server (VMPS)—IEEE802.1x and VMPS are mutually exclusive.
• Private VLAN—You can assign a client to a private VLAN.
• Network Edge Access Topology (NEAT)—MAB and NEAT are mutually exclusive. You cannot enable
MAB when NEAT is enabled on an interface, and you cannot enable NEAT when MAB is enabled on
an interface.
Cisco IOS Release 12.2(55)SE and later supports filtering of verbose MAB system messages
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1397
Security
Network Admission Control Layer 2 IEEE 802.1x Validation
Configuring NAC Layer 2 IEEE 802.1x validation is similar to configuring IEEE 802.1x port-based
authentication except that you must configure a posture token on the RADIUS server.
Using this feature, you can control which ports use which authentication methods, and you can control the
failover sequencing of methods on those ports. For example, MAC authentication bypass and 802.1x can be
the primary or secondary authentication methods, and web authentication can be the fallback method if either
or both of those authentication attempts fail.
The IEEE 802.1X Flexible Authentication feature supports the following host modes:
• multi-auth—Multiauthentication allows one authentication on a voice VLAN and multiple authentications
on the data VLAN.
• multi-domain—Multidomain authentication allows two authentications: one on the voice VLAN and
one on the data VLAN.
Related Topics
Configuring Flexible Authentication Ordering, on page 1453
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1398
Security
Open1x Authentication
Open1x Authentication
Open1x authentication allows a device access to a port before that device is authenticated. When open
authentication is configured, a new host can pass traffic according to the access control list (ACL) defined on
the port. After the host is authenticated, the policies configured on the RADIUS server are applied to that
host.
You can configure open authentication with these scenarios:
• Single-host mode with open authentication–Only one user is allowed network access before and after
authentication.
• MDA mode with open authentication–Only one user in the voice domain and one user in the data domain
are allowed.
• Multiple-hosts mode with open authentication–Any host can access the network.
• Multiple-authentication mode with open authentication–Similar to MDA, except multiple hosts can be
authenticated.
Related Topics
Configuring Open1x, on page 1454
Multidomain Authentication
The switch supports multidomain authentication (MDA), which allows both a data device and voice device,
such as an IP phone (Cisco or non-Cisco), to authenticate on the same switch port. The port is divided into a
data domain and a voice domain.
Note For all host modes, the line protocol stays up before authorization when port-based authentication is configured.
MDA does not enforce the order of device authentication. However, for best results, we recommend that a
voice device is authenticated before a data device on an MDA-enabled port.
Follow these guidelines for configuring MDA:
• You must configure a switch port for MDA.
• You must configure the voice VLAN for the IP phone when the host mode is set to multidomain.
• Voice VLAN assignment on an MDA-enabled port is supported Cisco IOS Release 12.2(40)SE and later.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1399
Security
Multidomain Authentication
Note You can assign a dynamic VLAN to a voice device on an MDA-enabled switch
port, but the voice device fails authorization if a static voice VLAN configured
on the switchport is the same as the dynamic VLAN assigned for the voice device
in the RADIUS server.
• To authorize a voice device, the AAA server must be configured to send a Cisco Attribute-Value (AV)
pair attribute with a value of device-traffic-class=voice. Without this value, the switch treats the voice
device as a data device.
• The guest VLAN and restricted VLAN features only apply to the data devices on an MDA-enabled port.
The switch treats a voice device that fails authorization as a data device.
• If more than one device attempts authorization on either the voice or the data domain of a port, it is error
disabled.
• Until a device is authorized, the port drops its traffic. Non-Cisco IP phones or voice devices are allowed
into both the data and voice VLANs. The data VLAN allows the voice device to contact a DHCP server
to obtain an IP address and acquire the voice VLAN information. After the voice device starts sending
on the voice VLAN, its access to the data VLAN is blocked.
• A voice device MAC address that is binding on the data VLAN is not counted towards the port security
MAC address limit.
• You can use dynamic VLAN assignment from a RADIUS server only for data devices.
• MDA can use MAC authentication bypass as a fallback mechanism to allow the switch port to connect
to devices that do not support IEEE 802.1x authentication.
• When a data or a voice device is detected on a port, its MAC address is blocked until authorization
succeeds. If the authorization fails, the MAC address remains blocked for 5 minutes.
• If more than five devices are detected on the data VLAN or more than one voice device is detected on
the voice VLAN while a port is unauthorized, the port is error disabled.
• When a port host mode is changed from single- or multihost to multidomain mode, an authorized data
device remains authorized on the port. However, a Cisco IP phone that has been allowed on the port
voice VLAN is automatically removed and must be reauthenticated on that port.
• Active fallback mechanisms such as guest VLAN and restricted VLAN remain configured after a port
changes from single- or multihost mode to multidomain mode.
• Switching a port host mode from multidomain to single- or multihost mode removes all authorized devices
from the port.
• If a data domain is authorized first and placed in the guest VLAN, non-IEEE 802.1x-capable voice
devices need to tag their packets on the voice VLAN to trigger authentication.
• We do not recommend per-user ACLs with an MDA-enabled port. An authorized device with a per-user
ACL policy might impact traffic on both the voice and data VLANs of the port. If used, only one device
on the port should enforce per-user ACLs.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1400
Security
802.1x Supplicant and Authenticator Switches with Network Edge Access Topology (NEAT)
In the default state, when you connect a supplicant switch to an authenticator switch that has BPDU guard
enabled, the authenticator port could be error-disabled if it receives a Spanning Tree Protocol (STP) bridge
protocol data unit (BPDU) packets before the supplicant switch has authenticated. Beginning with Cisco IOS
Release 15.0(1)SE, you can control traffic exiting the supplicant port during the authentication period. Entering
the dot1x supplicant controlled transient global configuration command temporarily blocks the supplicant
port during authentication to ensure that the authenticator port does not shut down before authentication
completes. If authentication fails, the supplicant port opens. Entering the no dot1x supplicant controlled
transient global configuration command opens the supplicant port during the authentication period. This is
the default behavior.
We strongly recommend using the dot1x supplicant controlled transientcommand on a supplicant switch
when BPDU guard is enabled on the authenticator switch port with the spanning-tree bpduguard enable
interface configuration command.
Note If you globally enable BPDU guard on the authenticator switch by using the spanning-tree portfast bpduguard
default global configuration command, entering the dot1x supplicant controlled transient command does
not prevent the BPDU violation.
You can enable MDA or multiauth mode on the authenticator switch interface that connects to one more
supplicant switches. Multihost mode is not supported on the authenticator switch interface.
Use the dot1x supplicant force-multicast global configuration command on the supplicant switch for Network
Edge Access Topology (NEAT) to work in all host modes.
• Host Authorization: Ensures that only traffic from authorized hosts (connecting to the switch with
supplicant) is allowed on the network. The switches use Client Information Signalling Protocol (CISP)
to send the MAC addresses connecting to the supplicant switch to the authenticator switch.
• Auto enablement: Automatically enables trunk configuration on the authenticator switch, allowing user
traffic from multiple VLANs coming from supplicant switches. Configure the cisco-av-pair as
device-traffic-class=switch at the ACS. (You can configure this under the group or the user settings.)
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1401
Security
Voice Aware 802.1x Security
5 Trunk port
Note The switchport nonegotiate command is not supported on supplicant and authenticator switches with NEAT.
This command should not be configured at the supplicant side of the topology. If configured on the authenticator
side, the internal macros will automatically remove this command from the port.
Note To use voice aware IEEE 802.1x authentication, the switch must be running the LAN base image.
You use the voice aware 802.1x security feature to configure the switch to disable only the VLAN on which
a security violation occurs, whether it is a data or voice VLAN. In previous releases, when an attempt to
authenticate the data client caused a security violation, the entire port shut down, resulting in a complete loss
of connectivity.
You can use this feature in IP phone deployments where a PC is connected to the IP phone. A security violation
found on the data VLAN results in the shutdown of only the data VLAN. The traffic on the voice VLAN
flows through the switch without interruption.
Related Topics
Configuring Voice Aware 802.1x Security, on page 1409
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1402
Security
Common Session ID
Common Session ID
Authentication manager uses a single session ID (referred to as a common session ID) for a client no matter
which authentication method is used. This ID is used for all reporting purposes, such as the show commands
and MIBs. The session ID appears with all per-session syslog messages.
The session ID includes:
• The IP address of the Network Access Device (NAD)
• A monotonically increasing unique 32 bit integer
• The session start time stamp (a 32 bit integer)
This example shows how the session ID appears in the output of the show authentication command. The
session ID in this example is 160000050000000B288508E5:
This is an example of how the session ID appears in the syslog output. The session ID in this example is
also160000050000000B288508E5:
The session ID is used by the NAD, the AAA server, and other report-analyzing applications to identify the
client. The ID appears automatically. No configuration is required.
AAA Disabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1403
Security
Default 802.1x Authentication Configuration
Re-authentication number 2 times (number of times that the switch restarts the
authentication process before the port changes to the
unauthorized state).
Maximum retransmission number 2 times (number of times that the switch will send an
EAP-request/identity frame before restarting the
authentication process).
Authentication server timeout period 30 seconds (when relaying a response from the client
to the authentication server, the amount of time the
switch waits for a reply before resending the response
to the server.)
You can change this timeout period by using the dot1x
timeout server-timeout interface configuration
command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1404
Security
802.1x Authentication Configuration Guidelines
• Before globally enabling 802.1x authentication on a switch by entering the dot1x system-auth-control
global configuration command, remove the EtherChannel configuration from the interfaces on which
802.1x authentication and EtherChannel are configured.
• Cisco IOS Release 12.2(55)SE and later supports filtering of system messages related to 802.1x
authentication.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1405
Security
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
VLAN Assignment, Guest VLAN, Restricted VLAN, and Inaccessible Authentication Bypass
These are the configuration guidelines for VLAN assignment, guest VLAN, restricted VLAN, and inaccessible
authentication bypass:
• When 802.1x authentication is enabled on a port, you cannot configure a port VLAN that is equal to a
voice VLAN.
• The 802.1x authentication with VLAN assignment feature is not supported on trunk ports, dynamic ports,
or with dynamic-access port assignment through a VMPS.
• You can configure any VLAN except an RSPAN VLAN or a voice VLAN as an 802.1x guest VLAN.
The guest VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is supported
only on access ports.
• After you configure a guest VLAN for an 802.1x port to which a DHCP client is connected, you might
need to get a host IP address from a DHCP server. You can change the settings for restarting the 802.1x
authentication process on the switch before the DHCP process on the client times out and tries to get a
host IP address from the DHCP server. Decrease the settings for the 802.1x authentication process
(authentication timer inactivity and authentication timer reauthentication interface configuration
commands). The amount to decrease the settings depends on the connected 802.1x client type.
• When configuring the inaccessible authentication bypass feature, follow these guidelines:
• The feature is supported on 802.1x port in single-host mode and multihosts mode.
• If the client is running Windows XP and the port to which the client is connected is in the
critical-authentication state, Windows XP might report that the interface is not authenticated.
• If the Windows XP client is configured for DHCP and has an IP address from the DHCP server,
receiving an EAP-Success message on a critical port might not re-initiate the DHCP configuration
process.
• You can configure the inaccessible authentication bypass feature and the restricted VLAN on an
802.1x port. If the switch tries to re-authenticate a critical port in a restricted VLAN and all the
RADIUS servers are unavailable, switch changes the port state to the critical authentication state
and remains in the restricted VLAN.
• You can configure any VLAN except an RSPAN VLAN or a voice VLAN as an 802.1x restricted VLAN.
The restricted VLAN feature is not supported on internal VLANs (routed ports) or trunk ports; it is
supported only on access ports.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1406
Security
Maximum Number of Allowed Devices Per Port
• If the port is in the authorized state, the port remains in this state until re-authorization occurs.
• You can configure a timeout period for hosts that are connected by MAC authentication bypass but are
inactive. The range is 1to 65535 seconds.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1407
Security
Configuring 802.1x Readiness Check
SUMMARY STEPS
1. enable
2. configure terminal
3. dot1x test eapol-capable [interface interface-id]
4. dot1x test timeout timeout
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 dot1x test eapol-capable [interface interface-id] Enables the 802.1x readiness check on the switch.
Example: (Optional) For interface-id specify the port on which to
SwitchDevice# dot1x test eapol-capable interface check for IEEE 802.1x readiness.
gigabitethernet1/0/13
DOT1X_PORT_EAPOL_CAPABLE:DOT1X: MAC
Note If you omit the optional interface keyword, all
00-01-02-4b-f1-a3 on gigabitethernet1/0/13 is EAPOL interfaces on the switch are tested.
capable
Step 4 dot1x test timeout timeout (Optional) Configures the timeout used to wait for EAPOL
response. The range is from 1 to 65535 seconds. The default
is 10 seconds.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1408
Security
Configuring Voice Aware 802.1x Security
Related Topics
802.1x Readiness Check, on page 1384
Note To use voice aware IEEE 802.1x authentication, the switch must be running the LAN base image.
You use the voice aware 802.1x security feature on the switch to disable only the VLAN on which a security
violation occurs, whether it is a data or voice VLAN. You can use this feature in IP phone deployments where
a PC is connected to the IP phone. A security violation found on the data VLAN results in the shutdown of
only the data VLAN. The traffic on the voice VLAN flows through the switch without interruption.
Follow these guidelines to configure voice aware 802.1x voice security on the switch:
• You enable voice aware 802.1x security by entering the errdisable detect cause security-violation
shutdown vlan global configuration command. You disable voice aware 802.1x security by entering the
no version of this command. This command applies to all 802.1x-configured ports in the switch.
Note If you do not include the shutdown vlan keywords, the entire port is shut down
when it enters the error-disabled state.
• If you use the errdisable recovery cause security-violation global configuration command to configure
error-disabled recovery, the port is automatically re-enabled. If error-disabled recovery is not configured
for the port, you re-enable it by using the shutdown and no shutdown interface configuration commands.
• You can re-enable individual VLANs by using the clear errdisable interface interface-id vlan [vlan-list]
privileged EXEC command. If you do not specify a range, all VLANs on the port are enabled.
Beginning in privileged EXEC mode, follow these steps to enable voice aware 802.1x security:
SUMMARY STEPS
1. configure terminal
2. errdisable detect cause security-violation shutdown vlan
3. errdisable recovery cause security-violation
4. clear errdisable interfaceinterface-id vlan [vlan-list]
5. Enter the following:
• shutdown
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1409
Security
Configuring Voice Aware 802.1x Security
• no shutdown
6. end
7. show errdisable detect
DETAILED STEPS
Step 2 errdisable detect cause security-violation shutdown vlan Shut down any VLAN on which a security violation error
occurs.
Note If the shutdown vlan keywords are not
included, the entire port enters the error-disabled
state and shuts down.
Step 5 Enter the following: (Optional) Re-enable an error-disabled VLAN, and clear
all error-disable indications.
• shutdown
• no shutdown
Example
This example shows how to configure the switch to shut down any VLAN on which a security
violation error occurs:
Switch(config)# errdisable detect cause security-violation shutdown vlan
This example shows how to re-enable all VLANs that were error disabled on port Gigabit Ethernet
40/2.
Switch# clear errdisable interface gigabitethernet4/0/2
vlan
You can verify your settings by entering the show errdisable detect privileged EXEC command.
Related Topics
Voice Aware 802.1x Security, on page 1402
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1410
Security
Configuring 802.1x Violation Modes
Beginning in privileged EXEC mode, follow these steps to configure the security violation actions on the
switch:
SUMMARY STEPS
1. configure terminal
2. aaa new-model
3. aaa authentication dot1x {default} method1
4. interface interface-id
5. switchport mode access
6. authentication violation {shutdown | restrict | protect | replace}
7. end
DETAILED STEPS
Step 3 aaa authentication dot1x {default} method1 Creates an 802.1x authentication method list.
Example: To create a default list that is used when a named list is not
specified in the authentication command, use the default
SwitchDevice(config)# aaa authentication dot1x keyword followed by the method that is to be used in default
default group radius situations. The default method list is automatically applied
to all ports.
For method1, enter the group radius keywords to use the
list of all RADIUS servers for authentication.
Note Though other keywords are visible in the
command-line help string, only the group radius
keywords are supported.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1411
Security
Configuring 802.1x Authentication
Step 6 authentication violation {shutdown | restrict | protect | Configures the violation mode. The keywords have these
replace} meanings:
Example: • shutdown–Error disable the port.
SwitchDevice(config-if)# end
SUMMARY STEPS
1. A user connects to a port on the switch.
2. Authentication is performed.
3. VLAN assignment is enabled, as appropriate, based on the RADIUS server configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1412
Security
Configuring 802.1x Port-Based Authentication
DETAILED STEPS
SUMMARY STEPS
1. configure terminal
2. aaa new-model
3. aaa authentication dot1x {default} method1
4. dot1x system-auth-control
5. aaa authorization network {default} group radius
6. radius-server host ip-address
7. radius-server key string
8. interface interface-id
9. switchport mode access
10. authentication port-control auto
11. dot1x pae authenticator
12. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1413
Security
Configuring 802.1x Port-Based Authentication
DETAILED STEPS
Step 3 aaa authentication dot1x {default} method1 Creates an 802.1x authentication method list.
Example: To create a default list that is used when a named list is
not specified in the authentication command, use the
SwitchDevice(config)# aaa authentication dot1x default keyword followed by the method that is to be used
default group radius in default situations. The default method list is
automatically applied to all ports.
For method1, enter the group radius keywords to use the
list of all RADIUS servers for authentication.
Note Though other keywords are visible in the
command-line help string, only the group
radius keywords are supported.
Step 5 aaa authorization network {default} group radius (Optional) Configures the switch to use user-RADIUS
authorization for all network-related service requests, such
Example:
as per-user ACLs or VLAN assignment.
SwitchDevice(config)# aaa authorization network Note For per-user ACLs, single-host mode must be
default group radius configured. This setting is the default.
Step 6 radius-server host ip-address (Optional) Specifies the IP address of the RADIUS server.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1414
Security
Configuring the Switch-to-RADIUS-Server Communication
Step 8 interface interface-id Specifies the port connected to the client that is to be
enabled for IEEE 802.1x authentication, and enter interface
Example:
configuration mode.
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 9 switchport mode access (Optional) Sets the port to access mode only if you
configured the RADIUS server in Step 6 and Step 7.
Example:
SwitchDevice(config-if)# authentication
port-control auto
Step 11 dot1x pae authenticator Sets the interface Port Access Entity to act only as an
authenticator and ignore messages meant for a supplicant.
Example:
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1415
Security
Configuring the Switch-to-RADIUS-Server Communication
Follow these steps to configure the RADIUS server parameters on the switch. This procedure is required.
SUMMARY STEPS
1. enable
2. configure terminal
3. radius-server host {hostname | ip-address} auth-port port-number key string
4. end
DETAILED STEPS
SwitchDevice> enable
Step 3 radius-server host {hostname | ip-address} auth-port Configures the RADIUS server parameters.
port-number key string
For hostname | ip-address, specify the hostname or IP
Example: address of the remote RADIUS server.
For auth-port port-number, specify the UDP destination
SwitchDevice(config)# radius-server host 125.5.5.43
auth-port 1812 key string port for authentication requests. The default is 1812. The
range is 0 to 65536.
For key string, specify the authentication and encryption
key used between the switch and the RADIUS daemon
running on the RADIUS server. The key is a text string that
must match the encryption key used on the RADIUS server.
Note Always configure the key as the last item in the
radius-server host command syntax because
leading spaces are ignored, but spaces within
and at the end of the key are used. If you use
spaces in the key, do not enclose the key in
quotation marks unless the quotation marks are
part of the key. This key must match the
encryption used on the RADIUS daemon.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1416
Security
Configuring the Host Mode
SwitchDevice(config)# end
Related Topics
Switch-to-RADIUS-Server Communication, on page 1385
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication host-mode [multi-auth | multi-domain | multi-host | single-host]
4. end
DETAILED STEPS
Step 2 interface interface-id Specifies the port to which multiple hosts are indirectly
attached, and enter interface configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 3 authentication host-mode [multi-auth | multi-domain | Allows multiple hosts (clients) on an 802.1x-authorized
multi-host | single-host] port.
Example: The keywords have these meanings:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1417
Security
Configuring Periodic Re-Authentication
SwitchDevice(config-if)# end
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication periodic
4. authentication timer {{[inactivity | reauthenticate | restart]} {value}}
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1418
Security
Changing the Quiet Period
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 4 authentication timer {{[inactivity | reauthenticate | Sets the number of seconds between re-authentication
restart]} {value}} attempts.
Example: The authentication timer keywords have these meanings:
• inactivity—Interval in seconds after which if there is
SwitchDevice(config-if)# authentication timer
reauthenticate 180 no activity from the client then it is unauthorized
• reauthenticate—Time in seconds after which an
automatic re-authentication attempt is initiated
• restart value—Interval in seconds after which an
attempt is made to authenticate an unauthorized port
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1419
Security
Changing the Quiet Period
authentication of the client might occur because the client provided an invalid password. You can provide a
faster response time to the user by entering a number smaller than the default.
Beginning in privileged EXEC mode, follow these steps to change the quiet period. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication timer restart seconds
4. end
5. show authentication sessions interface interface-id
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 3 authentication timer restart seconds Sets the number of seconds that the switch remains in the
quiet state following a failed authentication exchange with
Example:
the client.
SwitchDevice(config-if)# authentication timer The range is 1 to 65535 seconds; the default is 60.
restart 30
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1420
Security
Changing the Switch-to-Client Retransmission Time
Note You should change the default value of this command only to adjust for unusual circumstances such as
unreliable links or specific behavioral problems with certain clients and authentication servers.
Beginning in privileged EXEC mode, follow these steps to change the amount of time that the switch waits
for client notification. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication timer reauthenticate seconds
4. end
5. show authentication sessions interface interface-id
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1421
Security
Setting the Switch-to-Client Frame-Retransmission Number
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note You should change the default value of this command only to adjust for unusual circumstances such as
unreliable links or specific behavioral problems with certain clients and authentication servers.
Beginning in privileged EXEC mode, follow these steps to set the switch-to-client frame-retransmission
number. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. dot1x max-reauth-req count
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1422
Security
Setting the Re-Authentication Number
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 3 dot1x max-reauth-req count Sets the number of times that the switch sends an
EAP-request/identity frame to the client before restarting
Example:
the authentication process. The range is 1 to 10; the default
is 2.
SwitchDevice(config-if)# dot1x max-reauth-req 5
SwitchDevice(config-if)# end
Note You should change the default value of this command only to adjust for unusual circumstances such as
unreliable links or specific behavioral problems with certain clients and authentication servers.
Beginning in privileged EXEC mode, follow these steps to set the re-authentication number. This procedure
is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport mode access
4. dot1x max-req count
5. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1423
Security
Enabling MAC Move
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
Step 3 switchport mode access Sets the port to access mode only if you previously
configured the RADIUS server.
Example:
Step 4 dot1x max-req count Sets the number of times that the switch restarts the
authentication process before the port changes to the
Example:
unauthorized state. The range is 0 to 10; the default is 2.
SwitchDevice(config-if)# dot1x max-req 4
SwitchDevice(config-if)# end
SUMMARY STEPS
1. configure terminal
2. authentication mac-move permit
3. end
4. show running-config
5. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1424
Security
Enabling MAC Replace
DETAILED STEPS
Step 2 authentication mac-move permit Enables MAC move on the switch. Default is deny.
Example: In Session Aware Networking mode, the default CLI is
access-session mac-move deny. To enable Mac Move in
SwitchDevice(config)# authentication mac-move Session Aware Networking, use the no access-session
permit mac-move global configuration command.
SwitchDevice(config)# end
Step 5 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication violation {protect | replace | restrict | shutdown}
4. end
5. show running-config
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1425
Security
Enabling MAC Replace
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/2
Step 3 authentication violation {protect | replace | restrict | Use the replace keyword to enable MAC replace on the
shutdown} interface. The port removes the current session and initiates
authentication with the new host.
Example:
The other keywords have these effects:
SwitchDevice(config-if)# authentication violation
replace • protect: the port drops packets with unexpected MAC
addresses without generating a system message.
• restrict: violating packets are dropped by the CPU
and a system message is generated.
• shutdown: the port is error disabled when it receives
an unexpected MAC address.
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1426
Security
Configuring 802.1x Accounting
When the stop message is not sent successfully, this message appears:
Note You must configure the RADIUS server to perform accounting tasks, such as logging start, stop, and
interim-update messages and time stamps. To turn on these functions, enable logging of “Update/Watchdog
packets from this AAA client” in your RADIUS server Network Configuration tab. Next, enable “CVS
RADIUS Accounting” in your RADIUS server System Configuration tab.
Beginning in privileged EXEC mode, follow these steps to configure 802.1x accounting after AAA is enabled
on your switch. This procedure is optional.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. aaa accounting dot1x default start-stop group radius
4. aaa accounting system default start-stop group radius
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1427
Security
Configuring a Guest VLAN
Step 3 aaa accounting dot1x default start-stop group radius Enables 802.1x accounting using the list of all RADIUS
servers.
Example:
Step 4 aaa accounting system default start-stop group radius (Optional) Enables system accounting (using the list of all
RADIUS servers) and generates system accounting reload
Example:
event messages when the switch reloads.
SwitchDevice(config-if)# aaa accounting system
default start-stop group radius
SwitchDevice(config-if)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. Use one of the following:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1428
Security
Configuring a Guest VLAN
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/2
Step 3 Use one of the following: • Sets the port to access mode.
• switchport mode access • Configures the Layer 2 port as a private-VLAN host
• switchport mode private-vlan host port.
Example:
Step 4 authentication event no-response action authorize vlan Specifies an active VLAN as an 802.1x guest VLAN. The
vlan-id range is 1 to 4094.
Example: You can configure any active VLAN except an internal
VLAN (routed port), an RSPAN VLAN or a voice VLAN
SwitchDevice(config-if)# authentication event as an 802.1x guest VLAN.
no-response action authorize vlan 2
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1429
Security
Configuring a Restricted VLAN
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. Use one of the following:
• switchport mode access
• switchport mode private-vlan host
4. authentication port-control auto
5. authentication event fail action authorize vlan vlan-id
6. end
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/2
Step 3 Use one of the following: • Sets the port to access mode.
• switchport mode access • Configures the Layer 2 port as a private-VLAN host
• switchport mode private-vlan host port.
Example:
SwitchDevice(config-if)# authentication
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1430
Security
Configuring Number of Authentication Attempts on a Restricted VLAN
Step 5 authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1x restricted VLAN.
The range is 1 to 4094.
Example:
You can configure any active VLAN except an internal
SwitchDevice(config-if)# authentication event fail VLAN (routed port), an RSPAN VLAN or a voice VLAN
action authorize vlan 2 as an 802.1x restricted VLAN.
SwitchDevice(config-if)# end
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. Use one of the following:
• switchport mode access
• switchport mode private-vlan host
4. authentication port-control auto
5. authentication event fail action authorize vlan vlan-id
6. authentication event retry retry count
7. end
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1431
Security
Configuring Number of Authentication Attempts on a Restricted VLAN
SwitchDevice(config)# interface
gigabitethernet2/0/3
Step 3 Use one of the following: • Sets the port to access mode.
• switchport mode access • Configures the Layer 2 port as a private-VLAN host
• switchport mode private-vlan host port.
Example:
or
SwitchDevice(config-if)# authentication
port-control auto
Step 5 authentication event fail action authorize vlan vlan-id Specifies an active VLAN as an 802.1x restricted VLAN.
The range is 1 to 4094.
Example:
You can configure any active VLAN except an internal
SwitchDevice(config-if)# authentication event fail VLAN (routed port), an RSPAN VLAN or a voice VLAN
action authorize vlan 8 as an 802.1x restricted VLAN.
Step 6 authentication event retry retry count Specifies a number of authentication attempts to allow
before a port moves to the restricted VLAN. The range is
Example:
1 to 3, and the default is 3.
SwitchDevice(config-if)# authentication event retry
2
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1432
Security
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN
SUMMARY STEPS
1. configure terminal
2. aaa new-model
3. radius-server dead-criteria{time seconds } [tries number]
4. radius-serverdeadtimeminutes
5. radius-server host ip-address address[acct-port udp-port][auth-port udp-port] [testusername
name[idle-time time] [ignore-acct-port][ignore auth-port]] [key string]
6. dot1x critical {eapol | recovery delay milliseconds}
7. interface interface-id
8. authentication event server dead action {authorize | reinitialize} vlan vlan-id]
9. switchport voice vlan vlan-id
10. authentication event server dead action authorize voice
11. show authentication interface interface-id
12. copy running-config startup-config
DETAILED STEPS
Step 3 radius-server dead-criteria{time seconds } [tries Sets the conditions that determine when a RADIUS server
number] is considered un-available or down (dead).
Example: • time— 1 to 120 seconds. The switch dynamically
determines a default seconds value between 10 and
SwitchDevice(config)# radius-server dead-criteria 60.
time 20 tries 10
• number—1 to 100 tries. The switch dynamically
determines a default triesnumber between 10 and
100.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1433
Security
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN
Step 5 radius-server host ip-address address[acct-port (Optional) Configure the RADIUS server parameters by
udp-port][auth-port udp-port] [testusername using these keywords:
name[idle-time time] [ignore-acct-port][ignore
• acct-portudp-port—Specify the UDP port for the
auth-port]] [key string]
RADIUS accounting server. The range for the UDP
Example: port number is from 0 to 65536. The default is 1646.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1434
Security
Configuring 802.1x Inaccessible Authentication Bypass with Critical Voice VLAN
Step 6 dot1x critical {eapol | recovery delay milliseconds} (Optional) Configure the parameters for inaccessible
authentication bypass:
Example:
• eapol—Specify that the switch sends an
SwitchDevice(config)# dot1x critical eapol EAPOL-Success message when the switch
(config)# dot1x critical recovery delay 2000 successfully authenticates the critical port.
• recovery delaymilliseconds—Set the recovery delay
period during which the switch waits to re-initialize
a critical port when a RADIUS server that was
unavailable becomes available. The range is from 1
to 10000 milliseconds. The default is 1000
milliseconds (a port can be re-initialized every
second).
Step 7 interface interface-id Specify the port to be configured, and enter interface
configuration mode.
Example:
Step 8 authentication event server dead action {authorize | Use these keywords to move hosts on the port if the
reinitialize} vlan vlan-id] RADIUS server is unreachable:
Example: • authorize—Move any new hosts trying to
authenticate to the user-specified critical VLAN.
SwitchDevice(config-if)# authentication event
server dead action • reinitialize—Move all authorized hosts on the port
reinitialicze vlan 20 to the user-specified critical VLAN.
Step 9 switchport voice vlan vlan-id Specifies the voice VLAN for the port. The voice VLAN
cannot be the same as the critical data VLAN configured
Example:
in Step 6.
SwitchDevice(config-if)# switchport voice vlan
Step 10 authentication event server dead action authorize voice Configures critical voice VLAN to move data traffic on
the port to the voice VLAN if the RADIUS server is
Example:
unreachable.
SwitchDevice(config-if)# authentication event
server dead action
authorize voice
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1435
Security
Example of Configuring Inaccessible Authentication Bypass
Example
To return to the RADIUS server default settings, use the no radius-server dead-criteria, the no
radius-server deadtime, and the no radius-server host global configuration commands. To disable
inaccessible authentication bypass, use the no authentication event server dead action interface
configuration command. To disable critical voice VLAN, use the no authentication event server
dead action authorize voice interface configuration command.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication control-direction {both | in}
4. end
5. show authentication sessions interface interface-id
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1436
Security
Configuring 802.1x Authentication with WoL
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/3
Step 3 authentication control-direction {both | in} Enables 802.1x authentication with WoL on the port, and
use these keywords to configure the port as bidirectional or
Example:
unidirectional.
SwitchDevice(config-if)# authentication • both—Sets the port as bidirectional. The port cannot
control-direction both receive packets from or send packets to the host. By
default, the port is bidirectional.
• in—Sets the port as unidirectional. The port can send
packets to the host but cannot receive packets from
the host.
SwitchDevice(config-if)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1437
Security
Configuring MAC Authentication Bypass
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. authentication port-control auto
4. mab [eap]
5. end
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
SwitchDevice(config-if)# authentication
port-control auto
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1438
Security
Formatting a MAC Authentication Bypass Username and Password
SUMMARY STEPS
1. configure terminal
2. mab request format attribute 1 groupsize {1 | 2 | 4 |12} [separator {- | : | .} {lowercase | uppercase}]
3. mab request format attribute2 {0 | 7} text
4. end
DETAILED STEPS
Step 2 mab request format attribute 1 groupsize {1 | 2 | 4 |12} Specifies the format of the MAC address in the User-Name
[separator {- | : | .} {lowercase | uppercase}] attribute of MAB-generated Access-Request packets.
Example: 1—Sets the username format of the 12 hex digits of the
MAC address.
SwitchDevice(config)# mab request format attribute
1 groupsize 12 group size—The number of hex nibbles to concatenate
before insertion of a separator. A valid groupsize must be
either 1, 2, 4, or 12.
separator—The character that separates the hex nibbles
according to group size. A valid separator must be either a
hyphen, colon, or period. No separator is used for a group
size of 12.
{lowercase | uppercase}—Specifies if nonnumeric hex
nibbles should be in lowercase or uppercase.
Step 3 mab request format attribute2 {0 | 7} text 2—Specifies a custom (nondefault) value for the
User-Password attribute in MAB-generated Access-Request
Example:
packets.
SwitchDevice(config)# mab request format attribute 0—Specifies a cleartext password to follow.
2 7 A02f44E18B12
7—Specifies an encrypted password to follow.
text—Specifies the password to be used in the
User-Password attribute.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1439
Security
Configuring 802.1x User Distribution
SwitchDevice(config)# end
SUMMARY STEPS
1. configure terminal
2. vlan group vlan-group-name vlan-list vlan-list
3. end
4. no vlan group vlan-group-name vlan-list vlan-list
DETAILED STEPS
Step 2 vlan group vlan-group-name vlan-list vlan-list Configures a VLAN group, and maps a single VLAN or a
range of VLANs to it.
Example:
SwitchDevice(config)# end
Step 4 no vlan group vlan-group-name vlan-list vlan-list Clears the VLAN group configuration or elements of the
VLAN group configuration.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1440
Security
Example of Configuring VLAN Groups
This example shows how to add a VLAN to an existing VLAN group and to verify that the VLAN was added:
This example shows that when all the VLANs are cleared from a VLAN group, the VLAN group is cleared:
For more information about these commands, see the Cisco IOS Security Command Reference.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1441
Security
Configuring NAC Layer 2 802.1x Validation
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport mode access
4. authentication event no-response action authorize vlan vlan-id
5. authentication periodic
6. authentication timer reauthenticate
7. end
8. show authentication sessions interface interface-id
9. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/3
Step 3 switchport mode access Sets the port to access mode only if you configured the
RADIUS server.
Example:
Step 4 authentication event no-response action authorize vlan Specifies an active VLAN as an 802.1x guest VLAN. The
vlan-id range is 1 to 4094.
Example: You can configure any active VLAN except an internal
VLAN (routed port), an RSPAN VLAN, or a voice VLAN
SwitchDevice(config-if)# authentication event as an 802.1x guest VLAN.
no-response action authorize vlan 8
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1442
Security
Configuring an Authenticator Switch with NEAT
Step 6 authentication timer reauthenticate Sets re-authentication attempt for the client (set to one hour).
Example: This command affects the behavior of the switch only if
periodic re-authentication is enabled.
SwitchDevice(config-if)# authentication timer
reauthenticate
SwitchDevice(config-if)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note • The switch must be restarted and the authenticator switch interface configuration must be restored to
access mode explicitly if a line card is removed and inserted in the chassis when CISP or NEAT session
is active.
• The cisco-av-pairs must be configured as device-traffic-class=switch on the ISE, which sets the interface
as a trunk after the supplicant is successfully authenticated.
Beginning in privileged EXEC mode, follow these steps to configure a switch as an authenticator:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1443
Security
Configuring an Authenticator Switch with NEAT
SUMMARY STEPS
1. configure terminal
2. cisp enable
3. interface interface-id
4. switchport mode access
5. authentication port-control auto
6. dot1x pae authenticator
7. spanning-tree portfast
8. end
9. show running-config interface interface-id
10. copy running-config startup-config
DETAILED STEPS
Step 3 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config-if)# authentication
port-control auto
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1444
Security
Configuring a Supplicant Switch with NEAT
Step 7 spanning-tree portfast Enables Port Fast on an access port connected to a single
workstation or server..
Example:
SwitchDevice(config-if)# end
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example: Note Saving changes to the configuration file will
mean that the authenticator interface will
SwitchDevice# copy running-config startup-config continue to be in trunk mode after reload. If
you want the authenticator interface to remain
as an access port, do not save your changes to
the configuration file.
SUMMARY STEPS
1. configure terminal
2. cisp enable
3. dot1x credentials profile
4. username suppswitch
5. password password
6. dot1x supplicant force-multicast
7. interface interface-id
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1445
Security
Configuring a Supplicant Switch with NEAT
DETAILED STEPS
Step 3 dot1x credentials profile Creates 802.1x credentials profile. This must be attached
to the port that is configured as supplicant.
Example:
Step 6 dot1x supplicant force-multicast Forces the switch to send only multicast EAPOL packets
when it receives either unicast or multicast packets.
Example:
This also allows NEAT to work on the supplicant switch
SwitchDevice(config)# dot1x supplicant in all host modes.
force-multicast
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1446
Security
Configuring a Supplicant Switch with NEAT
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 8 switchport trunk encapsulation dot1q Sets the port to trunk mode.
Example:
Step 9 switchport mode trunk Configures the interface as a VLAN trunk port.
Example:
Step 10 dot1x pae supplicant Configures the interface as a port access entity (PAE)
supplicant.
Example:
Step 11 dot1x credentials profile-name Attaches the 802.1x credentials profile to the interface.
Example:
SwitchDevice(config-if)# end
Step 14 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1447
Security
Configuring 802.1x Authentication with Downloadable ACLs and Redirect URLs
Step 15 Configuring NEAT with Auto Smartports Macros You can also use an Auto Smartports user-defined macro
instead of the switch VSA to configure the authenticator
switch. For more information, see the Auto Smartports
Configuration Guide for this release.
Note You must configure a downloadable ACL on the ACS before downloading it to the switch.
After authentication on the port, you can use the show ip access-list privileged EXEC command to display
the downloaded ACLs on the port.
SUMMARY STEPS
1. configure terminal
2. ip device tracking
3. aaa new-model
4. aaa authorization network default local group radius
5. radius-server vsa send authentication
6. interface interface-id
7. ip access-group acl-id in
8. show running-config interface interface-id
9. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1448
Security
Configuring Downloadable ACLs
Step 4 aaa authorization network default local group radius Sets the authorization method to local. To remove the
authorization method, use the no aaa authorization
Example:
network default local group radius command.
SwitchDevice(config)# aaa authorization network
default local group radius
Step 5 radius-server vsa send authentication Configures the radius vsa send authentication.
Example:
Step 6 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/4
Step 7 ip access-group acl-id in Configures the default ACL on the port in the input
direction.
Example:
Note The acl-id is an access list name or number.
SwitchDevice(config-if)# ip access-group
default_acl in
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1449
Security
Configuring a Downloadable Policy
SUMMARY STEPS
1. configure terminal
2. access-list access-list-number { deny | permit } { hostname | any | host } log
3. interface interface-id
4. ip access-group acl-id in
5. exit
6. aaa new-model
7. aaa authorization network default group radius
8. ip device tracking
9. ip device tracking probe [count | interval | use-svi]
10. radius-server vsa send authentication
11. end
DETAILED STEPS
Step 2 access-list access-list-number { deny | permit } { Defines the default port ACL.
hostname | any | host } log
The access-list-number is a decimal number from 1 to 99
Example: or 1300 to 1999.
SwitchDevice(config)# access-list 1 deny any log Enter deny or permit to specify whether to deny or permit
access if conditions are matched.
The source is the source address of the network or host
that sends a packet, such as this:
• hostname: The 32-bit quantity in dotted-decimal
format.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1450
Security
Configuring a Downloadable Policy
SwitchDevice(config)# interface
gigabitethernet2/0/2
Step 4 ip access-group acl-id in Configures the default ACL on the port in the input
direction.
Example:
Note The acl-id is an access list name or number.
SwitchDevice(config-if)# ip access-group
default_acl in
SwitchDevice(config-if)# exit
Step 7 aaa authorization network default group radius Sets the authorization method to local. To remove the
authorization method, use the no aaa authorization
Example:
network default group radius command.
SwitchDevice(config)# aaa authorization network
default group radius
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1451
Security
Configuring VLAN ID-based MAC Authentication
Step 9 ip device tracking probe [count | interval | use-svi] (Optional) Configures the IP device tracking table:
Example: • count count—Sets the number of times that the switch
sends the ARP probe. The range is from 1 to 5. The
SwitchDevice(config)# ip device tracking probe default is 3.
count
• interval interval—Sets the number of seconds that
the switch waits for a response before resending the
ARP probe. The range is from 30 to 300 seconds. The
default is 30 seconds.
• use-svi—Uses the switch virtual interface (SVI) IP
address as source of ARP probes.
Step 10 radius-server vsa send authentication Configures the network access server to recognize and use
vendor-specific attributes.
Example:
Note The downloadable ACL must be operational.
SwitchDevice(config)# radius-server vsa send
authentication
SwitchDevice(config)# end
SUMMARY STEPS
1. configure terminal
2. mab request format attribute 32 vlan access-vlan
3. copy running-config startup-config
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1452
Security
Configuring Flexible Authentication Ordering
Step 3 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note Before changing the default order and priority of these authentication methods, however, you should understand
the potential consequences of those changes. See
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6638/application_note_c27-573287_ps6638_Products_White_Paper.html
for details.
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport mode access
4. authentication order [ dot1x | mab ] | {webauth}
5. authentication priority [ dot1x | mab ] | {webauth}
6. end
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1453
Security
Configuring Open1x
Step 3 switchport mode access Sets the port to access mode only if you previously
configured the RADIUS server.
Example:
Step 4 authentication order [ dot1x | mab ] | {webauth} (Optional) Sets the order of authentication methods used
on a port.
Example:
Step 5 authentication priority [ dot1x | mab ] | {webauth} (Optional) Adds an authentication method to the
port-priority list.
Example:
SwitchDevice(config-if)# end
Related Topics
Flexible Authentication Ordering, on page 1398
Configuring Open1x
Beginning in privileged EXEC mode, follow these steps to enable manual control of the port authorization
state:
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport mode access
4. authentication control-direction {both | in}
5. authentication fallback name
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1454
Security
Configuring Open1x
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
Step 3 switchport mode access Sets the port to access mode only if you configured the
RADIUS server.
Example:
Step 4 authentication control-direction {both | in} (Optional) Configures the port control as unidirectional or
bidirectional.
Example:
SwitchDevice(config-if)# authentication
control-direction both
Step 5 authentication fallback name (Optional) Configures a port to use web authentication as
a fallback method for clients that do not support 802.1x
Example:
authentication.
SwitchDevice(config-if)# authentication fallback
profile1
Step 6 authentication host-mode [multi-auth | multi-domain (Optional) Sets the authorization manager mode on a port.
| multi-host | single-host]
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1455
Security
Disabling 802.1x Authentication on the Port
Step 8 authentication order [ dot1x | mab ] | {webauth} (Optional) Sets the order of authentication methods used
on a port.
Example:
Step 10 authentication port-control {auto | force-authorized | (Optional) Enables manual control of the port authorization
force-un authorized} state.
Example:
SwitchDevice(config-if)# authentication
port-control auto
SwitchDevice(config-if)# end
Related Topics
Open1x Authentication, on page 1399
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. switchport mode access
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1456
Security
Resetting the 802.1x Authentication Configuration to the Default Values
DETAILED STEPS
Step 2 interface interface-id Specifies the port to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet2/0/1
Step 3 switchport mode access (Optional) Sets the port to access mode only if you
configured the RADIUS server.
Example:
SwitchDevice(config-if)# end
SUMMARY STEPS
1. configure terminal
2. interface interface-id
3. dot1x default
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1457
Security
Monitoring 802.1x Statistics and Status
DETAILED STEPS
Step 2 interface interface-id Enters interface configuration mode, and specify the port
to be configured.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 3 dot1x default Resets the 802.1x parameters to the default values.
Example:
SwitchDevice(config-if)# end
Command Purpose
show dot1x all statistics Displays 802.1x statistics for all ports
show dot1x interface interface-id statistics Displays 802.1x statistics for a specific port
show dot1x all [count | details | statistics | Displays the 802.1x administrative and operational status
summary] for a switch
show dot1x interface interface-id Displays the 802.1x administrative and operational status
for a specific port
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1458
Security
Monitoring 802.1x Statistics and Status
Command Purpose
no dot1x logging Filters verbose 802.1x authentication messages (beginning with Cisco IOS Release
verbose 12.2(55)SE)
For detailed information about the fields in these displays, see the command reference for this release.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1459
Security
Monitoring 802.1x Statistics and Status
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1460
CHAPTER 63
Configuring Web-Based Authentication
This chapter describes how to configure web-based authentication on the switch. It contains these sections:
• Finding Feature Information, on page 1461
• Web-Based Authentication Overview, on page 1461
• How to Configure Web-Based Authentication, on page 1470
• Monitoring Web-Based Authentication Status, on page 1486
Note You can configure web-based authentication on Layer 2 and Layer 3 interfaces.
When you initiate an HTTP session, web-based authentication intercepts ingress HTTP packets from the host
and sends an HTML login page to the users. The users enter their credentials, which the web-based
authentication feature sends to the authentication, authorization, and accounting (AAA) server for authentication.
If authentication succeeds, web-based authentication sends a Login-Successful HTML page to the host and
applies the access policies returned by the AAA server.
If authentication fails, web-based authentication forwards a Login-Fail HTML page to the user, prompting
the user to retry the login. If the user exceeds the maximum number of attempts, web-based authentication
forwards a Login-Expired HTML page to the host, and the user is placed on a watch list for a waiting period.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1461
Security
Device Roles
Note HTTPS traffic interception for central web authentication redirect is not supported.
Note You should use global parameter-map (for method-type, custom, and redirect) only for using the same web
authentication methods like consent, web consent, and webauth, for all the clients and SSIDs. This ensures
that all the clients have the same web-authentication method.
If the requirement is to use Consent for one SSID and Web-authentication for another SSID, then you should
use two named parameter-maps. You should configure Consent in first parameter-map and configure webauth
in second parameter-map.
Device Roles
With web-based authentication, the devices in the network have these specific roles:
• Client—The device (workstation) that requests access to the LAN and the services and responds to
requests from the switch. The workstation must be running an HTML browser with Java Script enabled.
• Authentication server—Authenticates the client. The authentication server validates the identity of the
client and notifies the switch that the client is authorized to access the LAN and the switch services or
that the client is denied.
• Switch—Controls the physical access to the network based on the authentication status of the client. The
switch acts as an intermediary (proxy) between the client and the authentication server, requesting identity
information from the client, verifying that information with the authentication server, and relaying a
response to the client.
network.
Host Detection
The switch maintains an IP device tracking table to store information about detected hosts.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1462
Security
Session Creation
Note By default, the IP device tracking feature is disabled on a switch. You must enable the IP device tracking
feature to use web-based authentication.
For Layer 2 interfaces, web-based authentication detects IP hosts by using these mechanisms:
• ARP based trigger—ARP redirect ACL allows web-based authentication to detect hosts with a static IP
address or a dynamic IP address.
• Dynamic ARP inspection
• DHCP snooping—Web-based authentication is notified when the switch creates a DHCP-binding entry
for the host.
Session Creation
When web-based authentication detects a new host, it creates a session as follows:
• Reviews the exception list.
If the host IP is included in the exception list, the policy from the exception list entry is applied, and the
session is established.
• Reviews for authorization bypass
If the host IP is not on the exception list, web-based authentication sends a nonresponsive-host (NRH)
request to the server.
If the server response is access accepted, authorization is bypassed for this host. The session is established.
• Sets up the HTTP intercept ACL
If the server response to the NRH request is access rejected, the HTTP intercept ACL is activated, and
the session waits for HTTP traffic from the host.
Authentication Process
When you enable web-based authentication, these events occur:
• The user initiates an HTTP session.
• The HTTP traffic is intercepted, and authorization is initiated. The switch sends the login page to the
user. The user enters a username and password, and the switch sends the entries to the authentication
server.
• If the authentication succeeds, the switch downloads and activates the user’s access policy from the
authentication server. The login success page is sent to the user.
• If the authentication fails, the switch sends the login fail page. The user retries the login. If the maximum
number of attempts fails, the switch sends the login expired page, and the host is placed in a watch list.
After the watch list times out, the user can retry the authentication process.
• If the authentication server does not respond to the switch, and if an AAA fail policy is configured, the
switch applies the failure access policy to the host. The login success page is sent to the user.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1463
Security
Local Web Authentication Banner
• The switch reauthenticates a client when the host does not respond to an ARP probe on a Layer 2 interface,
or when the host does not send any traffic within the idle timeout on a Layer 3 interface.
• The feature applies the downloaded timeout or the locally configured session timeout.
• If the terminate action is RADIUS, the feature sends a nonresponsive host (NRH) request to the server.
The terminate action is included in the response from the server.
• If the terminate action is default, the session is dismantled, and the applied policy is removed.
The Local Web Authentication Banner can be configured in legacy and new-style (Session-aware) CLIs as
follows:
• Legacy mode—Use the ip admission auth-proxy-banner http global configuration command.
• New-style mode—Use the parameter-map type webauth global bannerglobal configuration command.
The default banner Cisco Systems and Switch host-name Authentication appear on the Login Page. Cisco
Systems appears on the authentication result pop-up page.
Figure 120: Authentication Successful Banner
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1464
Security
Local Web Authentication Banner
If you do not enable a banner, only the username and password dialog boxes appear in the web authentication
login screen, and no banner appears when you log into the switch.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1465
Security
Web Authentication Customizable Web Pages
Guidelines
• You can substitute your own HTML pages for the default internal HTML pages.
• You can use a logo or specify text in the login, success, failure, and expire web pages.
• On the banner page, you can specify text in the login page.
• The pages are in HTML.
• You must include an HTML redirect command in the success page to access a specific URL.
• The URL string must be a valid URL (for example, http://www.cisco.com). An incomplete URL might
cause page not found or similar errors on a web browser.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1466
Security
Guidelines
• If you configure web pages for HTTP authentication, they must include the appropriate HTML commands
(for example, to set the page time out, to set a hidden password, or to confirm that the same page is not
submitted twice).
• The CLI command to redirect users to a specific URL is not available when the configured login form
is enabled. The administrator should ensure that the redirection is configured in the web page.
• If the CLI command redirecting users to specific URL after authentication occurs is entered and then the
command configuring web pages is entered, the CLI command redirecting users to a specific URL does
not take effect.
• Configured web pages can be copied to the switch boot flash or flash.
• On stackable switches, configured pages can be accessed from the flash on the stack master or members.
• The login page can be on one flash, and the success and failure pages can be another flash (for example,
the flash on the stack master or a member).
• You must configure all four pages.
• The banner page has no effect if it is configured with the web page.
• All of the logo files (image, flash, audio, video, and so on) that are stored in the system directory (for
example, flash, disk0, or disk) and that must be displayed on the login page must use
web_auth_<filename> as the file name.
• The configured authentication proxy feature supports both HTTP and SSL.
You can substitute your HTML pages for the default internal HTML pages. You can also specify a URL to
which users are redirected after authentication occurs, which replaces the internal Success page.
Figure 123: Customizable Authentication Page
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1467
Security
Authentication Proxy Web Page Guidelines
Because the custom login page is a public web form, consider these guidelines for the page:
• The login form must accept user entries for the username and password and must show them as uname
and pwd.
• The custom login page should follow best practices for a web form, such as page timeout, hidden password,
and prevention of redundant submissions.
Related Topics
Customizing the Authentication Proxy Web Pages, on page 1478
Related Topics
Specifying a Redirection URL for Successful Login, on page 1479
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1468
Security
Web-based Authentication Interactions with Other Features
LAN Port IP
You can configure LAN port IP (LPIP) and Layer 2 web-based authentication on the same port. The host is
authenticated by using web-based authentication first, followed by LPIP posture validation. The LPIP host
policy overrides the web-based authentication host policy.
If the web-based authentication idle timer expires, the NAC policy is removed. The host is authenticated, and
posture is validated again.
Gateway IP
You cannot configure Gateway IP (GWIP) on a Layer 3 VLAN interface if web-based authentication is
configured on any of the switch ports in the VLAN.
You can configure web-based authentication on the same Layer 3 interface as Gateway IP. The host policies
for both features are applied in software. The GWIP policy overrides the web-based authentication host policy.
ACLs
If you configure a VLAN ACL or a Cisco IOS ACL on an interface, the ACL is applied to the host traffic
only after the web-based authentication host policy is applied.
For Layer 2 web-based authentication, it is more secure, though not required, to configure a port ACL (PACL)
as the default access policy for ingress traffic from hosts connected to the port. After authentication, the
web-based authentication host policy overrides the PACL. The Policy ACL is applied to the session even if
there is no ACL configured on the port.
You cannot configure a MAC ACL and web-based authentication on the same interface.
You cannot configure web-based authentication on a port whose access VLAN is configured for VACL
capture.
EtherChannel
You can configure web-based authentication on a Layer 2 EtherChannel interface. The web-based authentication
configuration applies to all member channels.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1469
Security
How to Configure Web-Based Authentication
AAA Disabled
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1470
Security
Configuring the Authentication Rule and Interfaces
• Only the Password Authentication Protocol (PAP) is supported for web-based RADIUS authentication
on controllers. The Challenge Handshake Authentication Protocol (CHAP) is not supported for web-based
RADIUS authentication on controllers.
• Identify the following RADIUS security server settings that will be used while configuring
switch-to-RADIUS-server communication:
• Host name
• Host IP address
• Host name and specific UDP port numbers
• IP address and specific UDP port numbers
The combination of the IP address and UDP port number creates a unique identifier, that enables RADIUS
requests to be sent to multiple UDP ports on a server at the same IP address. If two different host entries
on the same RADIUS server are configured for the same service (for example, authentication) the second
host entry that is configured functions as the failover backup to the first one. The RADIUS host entries
are chosen in the order that they were configured.
• When you configure the RADIUS server parameters:
• Specify the key string on a separate command line.
• For key string, specify the authentication and encryption key used between the switch and the
RADIUS daemon running on the RADIUS server. The key is a text string that must match the
encryption key used on the RADIUS server.
• When you specify the key string, use spaces within and at the end of the key. If you use spaces in
the key, do not enclose the key in quotation marks unless the quotation marks are part of the key.
This key must match the encryption used on the RADIUS daemon.
• You can globally configure the timeout, retransmission, and encryption key values for all RADIUS
servers by using with the radius-server host global configuration command. If you want to configure
these options on a per-server basis, use the radius-server timeout, radius-server transmit, and the
radius-server key global configuration commands. For more information, see the Cisco IOS Security
Configuration Guide, Release 12.4 and the Cisco IOS Security Command Reference, Release 12.4.
Note You need to configure some settings on the RADIUS server, including: the switch
IP address, the key string to be shared by both the server and the switch, and the
downloadable ACL (DACL). For more information, see the RADIUS server
documentation.
SUMMARY STEPS
1. enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1471
Security
Configuring the Authentication Rule and Interfaces
2. configure terminal
3. ip admission name name proxy http
4. interface type slot/port
5. ip access-group name
6. ip admission name
7. exit
8. ip device tracking
9. end
10. show ip admission status
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 ip admission name name proxy http Configures an authentication rule for web-based
authorization.
Example:
Step 4 interface type slot/port Enters interface configuration mode and specifies the
ingress Layer 2 or Layer 3 interface to be enabled for
Example:
web-based authentication.
SwitchDevice(config)# interface type can be fastethernet, gigabit ethernet, or
gigabitEthernet1/0/1 tengigabitethernet.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1472
Security
Configuring AAA Authentication
SwitchDevice(config-if)# exit
SwitchDevice(config)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. aaa new-model
4. aaa authentication login default group {tacacs+ | radius}
5. aaa authorization auth-proxy default group {tacacs+ | radius}
6. tacacs-server host {hostname | ip_address}
7. tacacs-server key {key-data}
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1473
Security
Configuring AAA Authentication
8. end
9. show running-config
10. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 4 aaa authentication login default group {tacacs+ | Defines the list of authentication methods at login.
radius}
Example:
Step 5 aaa authorization auth-proxy default group {tacacs+ Creates an authorization method list for web-based
| radius} authorization.
Example:
Step 7 tacacs-server key {key-data} Configures the authorization and encryption key used
between the switch and the TACACS server.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1474
Security
Configuring Switch-to-RADIUS-Server Communication
SwitchDevice(config)# end
Step 10 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip radius source-interface vlan vlan interface number
4. radius-server host {hostname | ip-address} test username username
5. radius-server key string
6. radius-server dead-criteria tries num-tries
7. end
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1475
Security
Configuring the HTTP Server
Step 3 ip radius source-interface vlan vlan interface number Specifies that the RADIUS packets have the IP address of
the indicated interface.
Example:
Step 4 radius-server host {hostname | ip-address} test username Specifies the host name or IP address of the remote
username RADIUS server.
Example: The test username username option enables automated
testing of the RADIUS server connection. The specified
SwitchDevice(config)# radius-server host username does not need to be a valid user name.
172.l20.39.46 test username user1
The key option specifies an authentication and encryption
key to use between the switch and the RADIUS server.
To use multiple RADIUS servers, reenter this command
for each server.
Step 5 radius-server key string Configures the authorization and encryption key used
between the switch and the RADIUS daemon running on
Example:
the RADIUS server.
SwitchDevice(config)# radius-server key rad123
Step 6 radius-server dead-criteria tries num-tries Specifies the number of unanswered sent messages to a
RADIUS server before considering the server to be inactive.
Example:
The range of num-tries is 1 to 100.
SwitchDevice(config)# radius-server dead-criteria
tries 30
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1476
Security
Configuring the HTTP Server
Note The Apple psuedo-browser will not open if you configure only the ip http secure-server command. You
should also configure the ip http server command.
Follow these steps to enable the server for either HTTP or HTTPS:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip http server
4. ip http secure-server
5. end
DETAILED STEPS
SwitchDevice> enable
Step 3 ip http server Enables the HTTP server. The web-based authentication
feature uses the HTTP server to communicate with the hosts
Example:
for user authentication.
SwitchDevice(config)# ip http server
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1477
Security
Customizing the Authentication Proxy Web Pages
SwitchDevice(config)# end
SUMMARY STEPS
1. enable
2. configure terminal
3. ip admission proxy http login page file device:login-filename
4. ip admission proxy http success page file device:success-filename
5. ip admission proxy http failure page file device:fail-filename
6. ip admission proxy http login expired page file device:expired-filename
7. end
DETAILED STEPS
SwitchDevice> enable
Step 3 ip admission proxy http login page file Specifies the location in the SwitchDevice memory file
device:login-filename system of the custom HTML file to use in place of the
default login page. The device: is flash memory.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1478
Security
Specifying a Redirection URL for Successful Login
Step 4 ip admission proxy http success page file Specifies the location of the custom HTML file to use in
device:success-filename place of the default login success page.
Example:
Step 5 ip admission proxy http failure page file Specifies the location of the custom HTML file to use in
device:fail-filename place of the default login failure page.
Example:
Step 6 ip admission proxy http login expired page file Specifies the location of the custom HTML file to use in
device:expired-filename place of the default login expired page.
Example:
SwitchDevice(config)# end
Related Topics
Authentication Proxy Web Page Guidelines, on page 1468
SUMMARY STEPS
1. enable
2. configure terminal
3. ip admission proxy http success redirect url-string
4. end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1479
Security
Configuring the Web-Based Authentication Parameters
DETAILED STEPS
SwitchDevice> enable
Step 3 ip admission proxy http success redirect url-string Specifies a URL for redirection of the user in place of the
default login success page.
Example:
SwitchDevice(config)# end
Related Topics
Redirection URL for Successful Login Guidelines, on page 1468
SUMMARY STEPS
1. enable
2. configure terminal
3. ip admission max-login-attempts number
4. end
5. show running-config
6. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1480
Security
Configuring a Web-Based Authentication Local Banner
DETAILED STEPS
SwitchDevice> enable
Step 3 ip admission max-login-attempts number Sets the maximum number of failed login attempts. The
range is 1 to 2147483647 attempts. The default is 5.
Example:
SwitchDevice(config)# ip admission
max-login-attempts 10
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. ip admission auth-proxy-banner http [banner-text | file-path]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1481
Security
Configuring Web-Based Authentication without SVI
4. end
5. show running-config
6. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
SwitchDevice(config)# end
Step 6 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1482
Security
Configuring Web-Based Authentication without SVI
SUMMARY STEPS
1. enable
2. configure terminal
3. parameter-map type webauth global
4. l2-webauth-enabled
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 parameter-map type webauth global Creates a parameter map and enters parameter-map webauth
configuration mode. The specific configuration commands
Example:
supported for a global parameter map defined with the
SwitchDevice (config)# parameter-map type webauth global keyword differ from the commands supported for a
global
named parameter map defined with the parameter-map-name
argument.
Step 4 l2-webauth-enabled Enables the web-based authentication without SVI feature
Example:
SwitchDevice (config-params-parameter-map)#
l2-webauth-enabled
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1483
Security
Configuring Web-Based Authentication with VRF Aware
SUMMARY STEPS
1. enable
2. configure terminal
3. parameter-map type webauth global
4. webauth-vrf-aware
5. end
6. show running-config
7. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 parameter-map type webauth global Creates a parameter map and enters parameter-map webauth
configuration mode. The specific configuration commands
Example:
supported for a global parameter map defined with the
SwitchDevice (config)# parameter-map type webauth global keyword differ from the commands supported for a
global
named parameter map defined with the parameter-map-name
argument.
Step 4 webauth-vrf-aware Enables the web-based authentication VRF aware feature
on SVI.
Example:
SwitchDevice (config-params-parameter-map)#
webauth-vrf-aware
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1484
Security
Removing Web-Based Authentication Cache Entries
SwitchDevice(config)# end
Step 7 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. clear ip auth-proxy cache {* | host ip address}
3. clear ip admission cache {* | host ip address}
DETAILED STEPS
SwitchDevice> enable
Step 2 clear ip auth-proxy cache {* | host ip address} Delete authentication proxy entries. Use an asterisk to delete
all cache entries. Enter a specific IP address to delete the
Example:
entry for a single host.
SwitchDevice# clear ip auth-proxy cache 192.168.4.5
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1485
Security
Monitoring Web-Based Authentication Status
Command Purpose
show authentication sessions method Displays the web-based authentication settings for all interfaces for
webauth fastethernet, gigabitethernet, or tengigabitethernet
show authentication sessions interface Displays the web-based authentication settings for the specified
type slot/port[details] interface for fastethernet, gigabitethernet, or tengigabitethernet.
In Session Aware Networking mode, use the show access-session
interface command.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1486
CHAPTER 64
Configuring Port-Based Traffic Control
• Overview of Port-Based Traffic Control , on page 1487
• Finding Feature Information, on page 1488
• Information About Storm Control, on page 1488
• How to Configure Storm Control, on page 1490
• Information About Protected Ports, on page 1497
• How to Configure Protected Ports, on page 1498
• Monitoring Protected Ports, on page 1499
• Where to Go Next, on page 1500
• Information About Port Blocking, on page 1500
• How to Configure Port Blocking, on page 1500
• Monitoring Port Blocking, on page 1502
• Prerequisites for Port Security, on page 1502
• Restrictions for Port Security, on page 1502
• Information About Port Security, on page 1502
• How to Configure Port Security, on page 1507
• Configuration Examples for Port Security, on page 1528
• Information About Protocol Storm Protection, on page 1529
• How to Configure Protocol Storm Protection, on page 1529
• Monitoring Protocol Storm Protection, on page 1531
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1487
Security
Finding Feature Information
With each method, the port blocks traffic when the rising threshold is reached. The port remains blocked until
the traffic rate drops below the falling threshold (if one is specified) and then resumes normal forwarding. If
the falling suppression level is not specified, the switch blocks all traffic until the traffic rate drops below the
rising suppression level. In general, the higher the level, the less effective the protection against broadcast
storms.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1488
Security
Traffic Patterns
Note When the storm control threshold for multicast traffic is reached, all multicast traffic except control traffic,
such as bridge protocol data unit (BDPU) and Cisco Discovery Protocol (CDP) frames, are blocked. However,
the switch does not differentiate between routing updates, such as OSPF, and regular multicast data traffic,
so both types of traffic are blocked.
Traffic Patterns
Figure 124: Broadcast Storm Control Example
This example shows broadcast traffic patterns on an interface over a given period of time.
Broadcast traffic being forwarded exceeded the configured threshold between time intervals T1 and T2 and
between T4 and T5. When the amount of specified traffic exceeds the threshold, all traffic of that kind is
dropped for the next time period. Therefore, broadcast traffic is blocked during the intervals following T2
and T5. At the next time interval (for example, T3), if broadcast traffic does not exceed the threshold, it is
again forwarded.
The combination of the storm-control suppression level and the 1-second time interval controls the way the
storm control algorithm works. A higher threshold allows more packets to pass through. A threshold value
of 100 percent means that no limit is placed on the traffic. A value of 0.0 means that all broadcast, multicast,
or unicast traffic on that port is blocked.
Note Because packets do not arrive at uniform intervals, the 1-second time interval during which traffic activity is
measured can affect the behavior of storm control.
You use the storm-control interface configuration commands to set the threshold value for each traffic type.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1489
Security
How to Configure Storm Control
Note Storm control is supported on physical interfaces. You can also configure storm control on an EtherChannel.
When storm control is configured on an EtherChannel, the storm control settings propagate to the EtherChannel
physical interfaces.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. storm-control {broadcast | multicast | unicast} level {level [level-low] | bps bps [bps-low] | pps pps
[pps-low]}
5. storm-control action {shutdown | trap}
6. end
7. show storm-control [interface-id] [broadcast | multicast | unicast]
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1490
Security
Configuring Storm Control and Threshold Levels
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 storm-control {broadcast | multicast | unicast} level Configures broadcast, multicast, or unicast storm control.
{level [level-low] | bps bps [bps-low] | pps pps [pps-low]} By default, storm control is disabled.
Example: The keywords have these meanings:
• For level, specifies the rising threshold level for
SwitchDevice(config-if)# storm-control unicast
level 87 65 broadcast, multicast, or unicast traffic as a percentage
(up to two decimal places) of the bandwidth. The port
blocks traffic when the rising threshold is reached. The
range is 0.00 to 100.00.
• (Optional) For level-low, specifies the falling threshold
level as a percentage (up to two decimal places) of the
bandwidth. This value must be less than or equal to
the rising suppression value. The port forwards traffic
when traffic drops below this level. If you do not
configure a falling suppression level, it is set to the
rising suppression level. The range is 0.00 to 100.00.
If you set the threshold to the maximum value (100
percent), no limit is placed on the traffic. If you set the
threshold to 0.0, all broadcast, multicast, and unicast
traffic on that port is blocked.
• For bps bps, specifies the rising threshold level for
broadcast, multicast, or unicast traffic in bits per
second (up to one decimal place). The port blocks
traffic when the rising threshold is reached. The range
is 0.0 to 10000000000.0.
• (Optional) For bps-low, specifies the falling threshold
level in bits per second (up to one decimal place). It
can be less than or equal to the rising threshold level.
The port forwards traffic when traffic drops below this
level. The range is 0.0 to 10000000000.0.
• For pps pps, specifies the rising threshold level for
broadcast, multicast, or unicast traffic in packets per
second (up to one decimal place). The port blocks
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1491
Security
Configuring Storm Control and Threshold Levels
For BPS and PPS settings, you can use metric suffixes such
as k, m, and g for large number thresholds.
Step 5 storm-control action {shutdown | trap} Specifies the action to be taken when a storm is detected.
The default is to filter out the traffic and not to send traps.
Example:
• Select the shutdown keyword to error-disable the port
SwitchDevice(config-if)# storm-control action trap during a storm.
• Select the trap keyword to generate an SNMP trap
when a storm is detected.
SwitchDevice(config-if)# end
Step 7 show storm-control [interface-id] [broadcast | multicast Verifies the storm control suppression levels set on the
| unicast] interface for the specified traffic type. If you do not enter
a traffic type, broadcast storm control settings are displayed.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1492
Security
Configuring Storm Control and Threshold Levels
Note Storm control is supported on physical interfaces. You can also configure storm control on an EtherChannel.
When storm control is configured on an EtherChannel, the storm control settings propagate to the EtherChannel
physical interfaces.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. storm-control action {shutdown | trap}
5. storm-control {broadcast | multicast | unicast} level {level [level-low] | bps bps [bps-low] | pps pps
[pps-low]}
6. end
7. show storm-control [interface-id] [broadcast | multicast | unicast]
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 storm-control action {shutdown | trap} Specifies the action to be taken when a storm is detected.
The default is to filter out the traffic and not to send traps.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1493
Security
Configuring Storm Control and Threshold Levels
Step 5 storm-control {broadcast | multicast | unicast} level Configures broadcast, multicast, or unicast storm control.
{level [level-low] | bps bps [bps-low] | pps pps [pps-low]} By default, storm control is disabled.
Example: The keywords have these meanings:
• For level, specifies the rising threshold level for
SwitchDevice(config-if)# storm-control unicast
level 87 65 broadcast, multicast, or unicast traffic as a percentage
(up to two decimal places) of the bandwidth. The port
blocks traffic when the rising threshold is reached. The
range is 0.00 to 100.00.
• (Optional) For level-low, specifies the falling threshold
level as a percentage (up to two decimal places) of the
bandwidth. This value must be less than or equal to
the rising suppression value. The port forwards traffic
when traffic drops below this level. If you do not
configure a falling suppression level, it is set to the
rising suppression level. The range is 0.00 to 100.00.
If you set the threshold to the maximum value (100
percent), no limit is placed on the traffic. If you set the
threshold to 0.0, all broadcast, multicast, and unicast
traffic on that port is blocked.
• For bps bps, specifies the rising threshold level for
broadcast, multicast, or unicast traffic in bits per
second (up to one decimal place). The port blocks
traffic when the rising threshold is reached. The range
is 0.0 to 10000000000.0.
• (Optional) For bps-low, specifies the falling threshold
level in bits per second (up to one decimal place). It
can be less than or equal to the rising threshold level.
The port forwards traffic when traffic drops below this
level. The range is 0.0 to 10000000000.0.
• For pps pps, specifies the rising threshold level for
broadcast, multicast, or unicast traffic in packets per
second (up to one decimal place). The port blocks
traffic when the rising threshold is reached. The range
is 0.0 to 10000000000.0.
• (Optional) For pps-low, specifies the falling threshold
level in packets per second (up to one decimal place).
It can be less than or equal to the rising threshold level.
The port forwards traffic when traffic drops below this
level. The range is 0.0 to 10000000000.0.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1494
Security
Configuring Small-Frame Arrival Rate
SwitchDevice(config-if)# end
Step 7 show storm-control [interface-id] [broadcast | multicast Verifies the storm control suppression levels set on the
| unicast] interface for the specified traffic type. If you do not enter
a traffic type, details for all traffic types (broadcast,
Example:
multicast and unicast) are displayed.
SwitchDevice# show storm-control
gigabitethernet1/0/1 unicast
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. errdisable detect cause small-frame
4. errdisable recovery interval interval
5. errdisable recovery cause small-frame
6. interface interface-id
7. small-frame violation-rate pps
8. end
9. show interfaces interface-id
10. show running-config
11. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1495
Security
Configuring Small-Frame Arrival Rate
DETAILED STEPS
SwitchDevice> enable
Step 3 errdisable detect cause small-frame Enables the small-frame rate-arrival feature on the switch.
Example:
Step 4 errdisable recovery interval interval (Optional) Specifies the time to recover from the specified
error-disabled state.
Example:
Step 5 errdisable recovery cause small-frame (Optional) Configures the recovery time for error-disabled
ports to be automatically re-enabled after they are error
Example:
disabled by the arrival of small frames
SwitchDevice(config)# errdisable recovery cause Storm control is supported on physical interfaces. You can
small-frame also configure storm control on an EtherChannel. When
storm control is configured on an EtherChannel, the storm
control settings propagate to the EtherChannel physical
interfaces.
Step 6 interface interface-id Enters interface configuration mode, and specify the
interface to be configured.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 7 small-frame violation-rate pps Configures the threshold rate for the interface to drop
incoming packets and error disable the port. The range is
Example:
1 to 10,000 packets per second (pps)
SwitchDevice(config-if)# small-frame violation
rate 10000
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1496
Security
Information About Protected Ports
SwitchDevice(config)# end
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Because a switch stack represents a single logical switch, Layer 2 traffic is not forwarded between any protected
ports in the switch stack, whether they are on the same or different switches in the stack.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1497
Security
Default Protected Port Configuration
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport protected
5. end
6. show interfaces interface-id switchport
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1498
Security
Monitoring Protected Ports
SwitchDevice(config)# interface
gigabitethernet1/0/1
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show interfaces [interface-id] switchport Displays the administrative and operational status of
all switching (nonrouting) ports or the specified port,
including port blocking and port protection settings.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1499
Security
Where to Go Next
Where to Go Next
•
Note With multicast traffic, the port blocking feature blocks only pure Layer 2 packets. Multicast packets that
contain IPv4 or IPv6 information in the header are not blocked.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport block multicast
5. switchport block unicast
6. end
7. show interfaces interface-id switchport
8. show running-config
9. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1500
Security
Blocking Flooded Traffic on an Interface
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 switchport block multicast Blocks unknown multicast forwarding out of the port.
Example: Note Only pure Layer 2 multicast traffic is blocked.
Multicast packets that contain IPv4 or IPv6
SwitchDevice(config-if)# switchport block multicast information in the header are not blocked.
Step 5 switchport block unicast Blocks unknown unicast forwarding out of the port.
Example:
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1501
Security
Monitoring Port Blocking
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show interfaces [interface-id] switchport Displays the administrative and operational status of
all switching (nonrouting) ports or the specified port,
including port blocking and port protection settings.
Note If you try to set the maximum value to a number less than the number of secure addresses already configured
on an interface, the command is rejected.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1502
Security
Types of Secure MAC Addresses
does not forward packets with source addresses outside the group of defined addresses. If you limit the number
of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that
port is assured the full bandwidth of the port.
If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when
the MAC address of a station attempting to access the port is different from any of the identified secure MAC
addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on
one secure port attempts to access another secure port, a violation is flagged.
Related Topics
Enabling and Configuring Port Security, on page 1507
Configuration Examples for Port Security, on page 1528
Security Violations
It is a security violation when one of these situations occurs:
• The maximum number of secure MAC addresses have been added to the address table, and a station
whose MAC address is not in the address table attempts to access the interface.
• An address learned or configured on one secure interface is seen on another secure interface in the same
VLAN.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1503
Security
Security Violations
You can configure the interface for one of three violation modes, based on the action to be taken if a violation
occurs:
• protect—when the number of secure MAC addresses reaches the maximum limit allowed on the port,
packets with unknown source addresses are dropped until you remove a sufficient number of secure
MAC addresses to drop below the maximum value or increase the number of maximum allowable
addresses. You are not notified that a security violation has occurred.
Note We do not recommend configuring the protect violation mode on a trunk port.
The protect mode disables learning when any VLAN reaches its maximum limit,
even if the port has not reached its maximum limit.
• restrict—when the number of secure MAC addresses reaches the maximum limit allowed on the port,
packets with unknown source addresses are dropped until you remove a sufficient number of secure
MAC addresses to drop below the maximum value or increase the number of maximum allowable
addresses. In this mode, you are notified that a security violation has occurred. An SNMP trap is sent, a
syslog message is logged, and the violation counter increments.
• shutdown—a port security violation causes the interface to become error-disabled and to shut down
immediately, and the port LED turns off. When a secure port is in the error-disabled state, you can bring
it out of this state by entering the errdisable recovery cause psecure-violation global configuration
command, or you can manually re-enable it by entering the shutdown and no shut down interface
configuration commands. This is the default mode.
• shutdown vlan—Use to set the security violation mode per-VLAN. In this mode, the VLAN is error
disabled instead of the entire port when a violation occurs
This table shows the violation mode and the actions taken when you configure an interface for port security.
Violation Traffic is Sends SNMP Sends syslog Displays error Violation Shuts down
Mode forwarded trap message message counter port
21 22 increments
protect No No No No No No
21
Packets with unknown source addresses are dropped until you remove a sufficient number of secure
MAC addresses.
22
The switch returns an error message if you manually configure an address that would cause a security
violation.
23
Shuts down only the VLAN on which the violation occurred.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1504
Security
Port Security Aging
Related Topics
Enabling and Configuring Port Security Aging, on page 1512
Violation mode Shutdown. The port shuts down when the maximum
number of secure MAC addresses is exceeded.
•
Note Voice VLAN is only supported on access ports and not on trunk ports, even
though the configuration is allowed.
• When you enable port security on an interface that is also configured with a voice VLAN, set the maximum
allowed secure addresses on the port to two. When the port is connected to a Cisco IP phone, the IP
phone requires one MAC address. The Cisco IP phone address is learned on the voice VLAN, but is not
learned on the access VLAN. If you connect a single PC to the Cisco IP phone, no additional MAC
addresses are required. If you connect more than one PC to the Cisco IP phone, you must configure
enough secure addresses to allow one for each PC and one for the phone.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1505
Security
Port Security Configuration Guidelines
• When a trunk port configured with port security and assigned to an access VLAN for data traffic and to
a voice VLAN for voice traffic, entering the switchport voice and switchport priority extend interface
configuration commands has no effect.
When a connected device uses the same MAC address to request an IP address for the access VLAN and
then an IP address for the voice VLAN, only the access VLAN is assigned an IP address.
• When you enter a maximum secure address value for an interface, and the new value is greater than the
previous value, the new value overwrites the previously configured value. If the new value is less than
the previous value and the number of configured secure addresses on the interface exceeds the new value,
the command is rejected.
• The switch does not support port security aging of sticky secure MAC addresses.
This table summarizes port security compatibility with other port-based features.
DTP 24 port 25 No
Dynamic-access port 26 No
Routed port No
EtherChannel Yes
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1506
Security
Overview of Port-Based Traffic Control
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport mode {access | trunk}
5. switchport voice vlan vlan-id
6. switchport port-security
7. switchport port-security [maximum value [vlan {vlan-list | {access | voice}}]]
8. switchport port-security violation {protect | restrict | shutdown | shutdown vlan}
9. switchport port-security [mac-address mac-address [vlan {vlan-id | {access | voice}}]
10. switchport port-security mac-address sticky
11. switchport port-security mac-address sticky [mac-address | vlan {vlan-id | {access | voice}}]
12. end
13. show port-security
14. show running-config
15. copy running-config startup-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1507
Security
Enabling and Configuring Port Security
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 switchport mode {access | trunk} Sets the interface switchport mode as access or trunk; an
interface in the default mode (dynamic auto) cannot be
Example:
configured as a secure port.
SwitchDevice(config-if)# switchport mode access
Step 7 switchport port-security [maximum value [vlan (Optional) Sets the maximum number of secure MAC
{vlan-list | {access | voice}}]] addresses for the interface. The maximum number of
secure MAC addresses that you can configure on a switch
Example:
or switch stack is set by the maximum number of available
MAC addresses allowed in the system. This number is set
SwitchDevice(config-if)# switchport port-security
maximum 20 by the active Switch Database Management (SDM)
template. This number is the total of available MAC
addresses, including those used for other Layer 2 functions
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1508
Security
Enabling and Configuring Port Security
Step 8 switchport port-security violation {protect | restrict | (Optional) Sets the violation mode, the action to be taken
shutdown | shutdown vlan} when a security violation is detected, as one of these:
Example: • protect—When the number of port secure MAC
addresses reaches the maximum limit allowed on the
SwitchDevice(config-if)# switchport port-security port, packets with unknown source addresses are
violation restrict dropped until you remove a sufficient number of
secure MAC addresses to drop below the maximum
value or increase the number of maximum allowable
addresses. You are not notified that a security
violation has occurred.
Note We do not recommend configuring the
protect mode on a trunk port. The protect
mode disables learning when any VLAN
reaches its maximum limit, even if the port
has not reached its maximum limit.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1509
Security
Enabling and Configuring Port Security
Step 9 switchport port-security [mac-address mac-address (Optional) Enters a secure MAC address for the interface.
[vlan {vlan-id | {access | voice}}] You can use this command to enter the maximum number
of secure MAC addresses. If you configure fewer secure
Example:
MAC addresses than the maximum, the remaining MAC
addresses are dynamically learned.
SwitchDevice(config-if)# switchport port-security
mac-address 00:A0:C7:12:C9:25 vlan 3 voice Note If you enable sticky learning after you enter this
command, the secure addresses that were
dynamically learned are converted to sticky
secure MAC addresses and are added to the
running configuration.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1510
Security
Enabling and Configuring Port Security
Step 10 switchport port-security mac-address sticky (Optional) Enables sticky learning on the interface.
Example:
Step 11 switchport port-security mac-address sticky (Optional) Enters a sticky secure MAC address, repeating
[mac-address | vlan {vlan-id | {access | voice}}] the command as many times as necessary. If you configure
fewer secure MAC addresses than the maximum, the
Example:
remaining MAC addresses are dynamically learned, are
converted to sticky secure MAC addresses, and are added
SwitchDevice(config-if)# switchport port-security
mac-address sticky 00:A0:C7:12:C9:25 vlan voice to the running configuration.
Note If you do not enable sticky learning before this
command is entered, an error message appears,
and you cannot enter a sticky secure MAC
address.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1511
Security
Enabling and Configuring Port Security Aging
Step 15 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Port Security, on page 1469
Port Security, on page 1502
Configuration Examples for Port Security, on page 1528
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport port-security aging {static | time time | type {absolute | inactivity}}
5. end
6. show port-security [interface interface-id] [address]
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1512
Security
Enabling and Configuring Port Security Aging
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 switchport port-security aging {static | time time | type Enables or disable static aging for the secure port, or set the
{absolute | inactivity}} aging time or type.
Example: Note The switch does not support port security aging
of sticky secure addresses.
SwitchDevice(config-if)# switchport port-security
aging time 120 Enter static to enable aging for statically configured secure
addresses on this port.
For time, specifies the aging time for this port. The valid
range is from 0 to 1440 minutes.
For type, select one of these keywords:
• absolute—Sets the aging type as absolute aging. All
the secure addresses on this port age out exactly after
the time (minutes) specified lapses and are removed
from the secure address list.
• inactivity—Sets the aging type as inactivity aging.
The secure addresses on this port age out only if there
is no data traffic from the secure source addresses for
the specified time period.
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1513
Security
Finding Feature Information
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Related Topics
Port Security Aging, on page 1505
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1514
Security
Traffic Patterns
With each method, the port blocks traffic when the rising threshold is reached. The port remains blocked until
the traffic rate drops below the falling threshold (if one is specified) and then resumes normal forwarding. If
the falling suppression level is not specified, the switch blocks all traffic until the traffic rate drops below the
rising suppression level. In general, the higher the level, the less effective the protection against broadcast
storms.
Note When the storm control threshold for multicast traffic is reached, all multicast traffic except control traffic,
such as bridge protocol data unit (BDPU) and Cisco Discovery Protocol (CDP) frames, are blocked. However,
the switch does not differentiate between routing updates, such as OSPF, and regular multicast data traffic,
so both types of traffic are blocked.
Traffic Patterns
Figure 125: Broadcast Storm Control Example
This example shows broadcast traffic patterns on an interface over a given period of time.
Broadcast traffic being forwarded exceeded the configured threshold between time intervals T1 and T2 and
between T4 and T5. When the amount of specified traffic exceeds the threshold, all traffic of that kind is
dropped for the next time period. Therefore, broadcast traffic is blocked during the intervals following T2
and T5. At the next time interval (for example, T3), if broadcast traffic does not exceed the threshold, it is
again forwarded.
The combination of the storm-control suppression level and the 1-second time interval controls the way the
storm control algorithm works. A higher threshold allows more packets to pass through. A threshold value
of 100 percent means that no limit is placed on the traffic. A value of 0.0 means that all broadcast, multicast,
or unicast traffic on that port is blocked.
Note Because packets do not arrive at uniform intervals, the 1-second time interval during which traffic activity is
measured can affect the behavior of storm control.
You use the storm-control interface configuration commands to set the threshold value for each traffic type.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1515
Security
How to Configure Storm Control
Note Storm control is supported on physical interfaces. You can also configure storm control on an EtherChannel.
When storm control is configured on an EtherChannel, the storm control settings propagate to the EtherChannel
physical interfaces.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. storm-control {broadcast | multicast | unicast} level {level [level-low] | bps bps [bps-low] | pps pps
[pps-low]}
5. storm-control action {shutdown | trap}
6. end
7. show storm-control [interface-id] [broadcast | multicast | unicast]
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1516
Security
Configuring Storm Control and Threshold Levels
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 storm-control {broadcast | multicast | unicast} level Configures broadcast, multicast, or unicast storm control.
{level [level-low] | bps bps [bps-low] | pps pps [pps-low]} By default, storm control is disabled.
Example: The keywords have these meanings:
• For level, specifies the rising threshold level for
SwitchDevice(config-if)# storm-control unicast
level 87 65 broadcast, multicast, or unicast traffic as a percentage
(up to two decimal places) of the bandwidth. The port
blocks traffic when the rising threshold is reached. The
range is 0.00 to 100.00.
• (Optional) For level-low, specifies the falling threshold
level as a percentage (up to two decimal places) of the
bandwidth. This value must be less than or equal to
the rising suppression value. The port forwards traffic
when traffic drops below this level. If you do not
configure a falling suppression level, it is set to the
rising suppression level. The range is 0.00 to 100.00.
If you set the threshold to the maximum value (100
percent), no limit is placed on the traffic. If you set the
threshold to 0.0, all broadcast, multicast, and unicast
traffic on that port is blocked.
• For bps bps, specifies the rising threshold level for
broadcast, multicast, or unicast traffic in bits per
second (up to one decimal place). The port blocks
traffic when the rising threshold is reached. The range
is 0.0 to 10000000000.0.
• (Optional) For bps-low, specifies the falling threshold
level in bits per second (up to one decimal place). It
can be less than or equal to the rising threshold level.
The port forwards traffic when traffic drops below this
level. The range is 0.0 to 10000000000.0.
• For pps pps, specifies the rising threshold level for
broadcast, multicast, or unicast traffic in packets per
second (up to one decimal place). The port blocks
traffic when the rising threshold is reached. The range
is 0.0 to 10000000000.0.
• (Optional) For pps-low, specifies the falling threshold
level in packets per second (up to one decimal place).
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1517
Security
Configuring Storm Control and Threshold Levels
For BPS and PPS settings, you can use metric suffixes such
as k, m, and g for large number thresholds.
Step 5 storm-control action {shutdown | trap} Specifies the action to be taken when a storm is detected.
The default is to filter out the traffic and not to send traps.
Example:
• Select the shutdown keyword to error-disable the port
SwitchDevice(config-if)# storm-control action trap during a storm.
• Select the trap keyword to generate an SNMP trap
when a storm is detected.
SwitchDevice(config-if)# end
Step 7 show storm-control [interface-id] [broadcast | multicast Verifies the storm control suppression levels set on the
| unicast] interface for the specified traffic type. If you do not enter
a traffic type, broadcast storm control settings are displayed.
Example:
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Note Storm control is supported on physical interfaces. You can also configure storm control on an EtherChannel.
When storm control is configured on an EtherChannel, the storm control settings propagate to the EtherChannel
physical interfaces.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1518
Security
Configuring Storm Control and Threshold Levels
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. storm-control action {shutdown | trap}
5. storm-control {broadcast | multicast | unicast} level {level [level-low] | bps bps [bps-low] | pps pps
[pps-low]}
6. end
7. show storm-control [interface-id] [broadcast | multicast | unicast]
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Step 4 storm-control action {shutdown | trap} Specifies the action to be taken when a storm is detected.
The default is to filter out the traffic and not to send traps.
Example:
• Select the shutdown keyword to error-disable the port
SwitchDevice(config-if)# storm-control action trap during a storm.
• Select the trap keyword to generate an SNMP trap
when a storm is detected.
Step 5 storm-control {broadcast | multicast | unicast} level Configures broadcast, multicast, or unicast storm control.
{level [level-low] | bps bps [bps-low] | pps pps [pps-low]} By default, storm control is disabled.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1519
Security
Configuring Storm Control and Threshold Levels
For BPS and PPS settings, you can use metric suffixes such
as k, m, and g for large number thresholds.
SwitchDevice(config-if)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1520
Security
Configuring Small-Frame Arrival Rate
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
SUMMARY STEPS
1. enable
2. configure terminal
3. errdisable detect cause small-frame
4. errdisable recovery interval interval
5. errdisable recovery cause small-frame
6. interface interface-id
7. small-frame violation-rate pps
8. end
9. show interfaces interface-id
10. show running-config
11. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1521
Security
Configuring Small-Frame Arrival Rate
Step 3 errdisable detect cause small-frame Enables the small-frame rate-arrival feature on the switch.
Example:
Step 4 errdisable recovery interval interval (Optional) Specifies the time to recover from the specified
error-disabled state.
Example:
Step 5 errdisable recovery cause small-frame (Optional) Configures the recovery time for error-disabled
ports to be automatically re-enabled after they are error
Example:
disabled by the arrival of small frames
SwitchDevice(config)# errdisable recovery cause Storm control is supported on physical interfaces. You can
small-frame also configure storm control on an EtherChannel. When
storm control is configured on an EtherChannel, the storm
control settings propagate to the EtherChannel physical
interfaces.
Step 6 interface interface-id Enters interface configuration mode, and specify the
interface to be configured.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/2
Step 7 small-frame violation-rate pps Configures the threshold rate for the interface to drop
incoming packets and error disable the port. The range is
Example:
1 to 10,000 packets per second (pps)
SwitchDevice(config-if)# small-frame violation
rate 10000
SwitchDevice(config)# end
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1522
Security
Information About Protected Ports
Step 11 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Because a switch stack represents a single logical switch, Layer 2 traffic is not forwarded between any protected
ports in the switch stack, whether they are on the same or different switches in the stack.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1523
Security
How to Configure Protected Ports
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport protected
5. end
6. show interfaces interface-id switchport
7. show running-config
8. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
gigabitethernet1/0/1
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1524
Security
Monitoring Protected Ports
SwitchDevice(config)# end
Step 8 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Command Purpose
show interfaces [interface-id] switchport Displays the administrative and operational status of
all switching (nonrouting) ports or the specified port,
including port blocking and port protection settings.
Where to Go Next
•
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1525
Security
How to Configure Port Blocking
unicast or multicast traffic from being forwarded from one port to another, you can block a port (protected or
nonprotected) from flooding unknown unicast or multicast packets to other ports.
Note With multicast traffic, the port blocking feature blocks only pure Layer 2 packets. Multicast packets that
contain IPv4 or IPv6 information in the header are not blocked.
SUMMARY STEPS
1. enable
2. configure terminal
3. interface interface-id
4. switchport block multicast
5. switchport block unicast
6. end
7. show interfaces interface-id switchport
8. show running-config
9. copy running-config startup-config
DETAILED STEPS
SwitchDevice> enable
Step 3 interface interface-id Specifies the interface to be configured, and enter interface
configuration mode.
Example:
SwitchDevice(config)# interface
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1526
Security
Blocking Flooded Traffic on an Interface
Step 4 switchport block multicast Blocks unknown multicast forwarding out of the port.
Example: Note Only pure Layer 2 multicast traffic is blocked.
Multicast packets that contain IPv4 or IPv6
SwitchDevice(config-if)# switchport block multicast information in the header are not blocked.
Step 5 switchport block unicast Blocks unknown unicast forwarding out of the port.
Example:
SwitchDevice(config)# end
Step 9 copy running-config startup-config (Optional) Saves your entries in the configuration file.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1527
Security
Monitoring Port Blocking
Command Purpose
show interfaces [interface-id] switchport Displays the administrative and operational status of
all switching (nonrouting) ports or the specified port,
including port blocking and port protection settings.
This example shows how to configure a static secure MAC address on VLAN 3 on a port:
This example shows how to enable sticky port security on a port, to manually configure MAC addresses for
data VLAN and voice VLAN, and to set the total maximum number of secure addresses to 20 (10 for data
VLAN and 10 for voice VLAN).
Related Topics
Port Security, on page 1502
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1528
Security
Information About Protocol Storm Protection
Using protocol storm protection, you can control the rate at which control packets are sent to the switch by
specifying the upper threshold for the packet flow rate. The supported protocols are ARP, ARP snooping,
Dynamic Host Configuration Protocol (DHCP) v4, DHCP snooping, Internet Group Management Protocol
(IGMP), and IGMP snooping.
When the packet rate exceeds the defined threshold, the switch drops all traffic arriving on the specified virtual
port for 30 seconds. The packet rate is measured again, and protocol storm protection is again applied if
necessary.
For further protection, you can manually error disable the virtual port, blocking all incoming traffic on the
virtual port. You can manually enable the virtual port or set a time interval for automatic re-enabling of the
virtual port.
Note Excess packets are dropped on no more than two virtual ports.
Virtual port error disabling is not supported for EtherChannel and Flexlink interfaces
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1529
Security
Enabling Protocol Storm Protection
2. configure terminal
3. psp {arp | dhcp | igmp} pps value
4. errdisable detect cause psp
5. errdisable recovery interval time
6. end
7. show psp config {arp | dhcp | igmp}
DETAILED STEPS
SwitchDevice> enable
Step 3 psp {arp | dhcp | igmp} pps value Configures protocol storm protection for ARP, IGMP, or
DHCP.
Example:
For value, specifies the threshold value for the number of
SwitchDevice(config)# psp dhcp pps 35 packets per second. If the traffic exceeds this value, protocol
storm protection is enforced. The range is from 5 to 50
packets per second.
Step 4 errdisable detect cause psp (Optional) Enables error-disable detection for protocol storm
protection. If this feature is enabled, the virtual port is error
Example:
disabled. If this feature is disabled, the port drops excess
packets without error disabling the port.
SwitchDevice(config)# errdisable detect cause psp
Step 5 errdisable recovery interval time (Optional) Configures an auto-recovery time (in seconds)
for error-disabled virtual ports. When a virtual port is
Example:
error-disabled, the switch auto-recovers after this time. The
range is from 30 to 86400 seconds.
SwitchDevice
SwitchDevice(config)# end
Step 7 show psp config {arp | dhcp | igmp} Verifies your entries.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1530
Security
Monitoring Protocol Storm Protection
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1531
Security
Monitoring Protocol Storm Protection
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1532
CHAPTER 65
Configuring IPv6 First Hop Security
• Finding Feature Information, on page 1533
• Prerequisites for First Hop Security in IPv6, on page 1533
• Restrictions for First Hop Security in IPv6, on page 1534
• Information about First Hop Security in IPv6, on page 1534
• How to Configure an IPv6 Snooping Policy, on page 1536
• How to Configure the IPv6 Binding Table Content , on page 1540
• How to Configure an IPv6 Neighbor Discovery Inspection Policy, on page 1542
• How to Configure an IPv6 Router Advertisement Guard Policy, on page 1546
• How to Configure an IPv6 DHCP Guard Policy , on page 1550
• How to Configure IPv6 Source Guard, on page 1555
• How to Configure IPv6 Source Guard, on page 1557
• How to Configure IPv6 Prefix Guard, on page 1560
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1533
Security
Restrictions for First Hop Security in IPv6
• By default, a snooping policy has a security-level of guard. When such a snooping policy is configured
on an access switch, external IPv6 Router Advertisement (RA) or Dynamic Host Configuration Protocol
for IPv6 (DHCPv6) server packets are blocked, even though the uplink port facing the router or DHCP
server/relay is configured as a trusted port. To allow IPv6 RA or DHCPv6 server messages, do the
following:
• Apply an IPv6 RA-guard policy (for RA) or IPv6 DHCP-guard policy (for DHCP server messages
) on the uplink port.
• Configure a snooping policy with a lower security-level, for example glean or inspect. However;
configuring a lower security level is not recommended with such a snooping policy, because benefits
of First Hop security features are not effective.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1534
Security
Information about First Hop Security in IPv6
advertisement and router redirect messages are disallowed on the port. The RA guard feature compares
configuration information on the Layer 2 device with the information found in the received RA frame.
Once the Layer 2 device has validated the content of the RA frame and router redirect frame against the
configuration, it forwards the RA to its unicast or multicast destination. If the RA frame content is not
validated, the RA is dropped.
• IPv6 DHCP Guard—The IPv6 DHCP Guard feature blocks reply and advertisement messages that come
from unauthorized DHCPv6 servers and relay agents. IPv6 DHCP guard can prevent forged messages
from being entered in the binding table and block DHCPv6 server messages when they are received on
ports that are not explicitly configured as facing a DHCPv6 server or DHCP relay. To use this feature,
configure a policy and attach it to an interface or a VLAN. To debug DHCP guard packets, use the debug
ipv6 snooping dhcp-guard privileged EXEC command.
• IPv6 Source Guard—Like IPv4 Source Guard, IPv6 Source Guard validates the source address or prefix
to prevent source address spoofing.
A source guard programs the hardware to allow or deny traffic based on source or destination addresses.
It deals exclusively with data packet traffic.
The IPv6 source guard feature provides the ability to use the IPv6 binding table to install PACLs to
prevent a host from sending packets with an invalid IPv6 source address.
To debug source-guard packets, use the debug ipv6 snooping source-guard privileged EXEC command.
Note The IPv6 PACL feature is supported only in the ingress direction; it is not
supported in the egress direction.
For more information on IPv6 Source Guard, see the IPv6 Source Guard chapter of the Cisco IOS IPv6
Configuration Guide Library on Cisco.com.
• IPv6 Prefix Guard—The IPv6 prefix guard feature works within the IPv6 source guard feature, to enable
the device to deny traffic originated from non-topologically correct addresses. IPv6 prefix guard is often
used when IPv6 prefixes are delegated to devices (for example, home gateways) using DHCP prefix
delegation. The feature discovers ranges of addresses assigned to the link and blocks any traffic sourced
with an address outside this range.
For more information on IPv6 Prefix Guard, see the IPv6 Prefix Guard chapter of the Cisco IOS IPv6
Configuration Guide Library on Cisco.com.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1535
Security
How to Configure an IPv6 Snooping Policy
• IPv6 Destination Guard—The IPv6 destination guard feature works with IPv6 neighbor discovery to
ensure that the device performs address resolution only for those addresses that are known to be active
on the link. It relies on the address glean functionality to populate all destinations active on the link into
the binding table and then blocks resolutions before they happen when the destination is not found in the
binding table.
For more information about IPv6 Destination Guard, see the IPv6 Destination Guard chapter of the Cisco
IOS IPv6 Configuration Guide Library on Cisco.com.
• IPv6 Neighbor Discovery Multicast Suppress—The IPv6 Neighbor Discovery multicast suppress feature
is an IPv6 snooping feature that runs on a switch or a wireless controller and is used to reduce the amount
of control traffic necessary for proper link operations.
• DHCPv6 Relay—Lightweight DHCPv6 Relay Agent—The DHCPv6 Relay—Lightweight DHCPv6
Relay Agent feature allows relay agent information to be inserted by an access node that performs a
link-layer bridging (non-routing) function. Lightweight DHCPv6 Relay Agent (LDRA) functionality
can be implemented in existing access nodes, such as DSL access multiplexers (DSLAMs) and Ethernet
switches, that do not support IPv6 control or routing functions. LDRA is used to insert relay-agent options
in DHCP version 6 (DHCPv6) message exchanges primarily to identify client-facing interfaces. LDRA
functionality can be enabled on an interface and on a VLAN.
For more information about DHCPv6 Relay, See the DHCPv6 Relay—Lightweight DHCPv6 Relay
Agent section of the IP Addressing: DHCP Configuration Guide, Cisco IOS Release 15.1SG.
SUMMARY STEPS
1. configure terminal
2. ipv6 snooping policy policy-name
3. {[default ] | [device-role {node | switch}] | [limit address-count value] | [no] | [protocol {dhcp | ndp}
] | [security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] |
enable [reachable-lifetime [seconds | infinite] } ] | [trusted-port ] }
4. end
5. show ipv6 snooping policy policy-name
DETAILED STEPS
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1536
Security
How to Configure an IPv6 Snooping Policy
Step 3 {[default ] | [device-role {node | switch}] | [limit Enables data address gleaning, validates messages against
address-count value] | [no] | [protocol {dhcp | ndp} ] | various criteria, specifies the security level for messages.
[security-level {glean | guard | inspect} ] | [tracking
• (Optional) default—Sets all to default options.
{disable [stale-lifetime [seconds | infinite] | enable
[reachable-lifetime [seconds | infinite] } ] | [trusted-port • (Optional) device-role{node] | switch}—Specifies
]} the role of the device attached to the port. Default is
Example: node.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1537
Security
How to Attach an IPv6 Snooping Policy to an Interface
Step 5 show ipv6 snooping policy policy-name Displays the snooping policy configuration.
Example:
SwitchDevice#show ipv6 snooping policy
example_policy
What to do next
Attach an IPv6 Snooping policy to interfaces or VLANs.
SUMMARY STEPS
1. configure terminal
2. interface Interface_type stack/module/port
3. switchport
4. ipv6 snooping [attach-policy policy_name [ vlan {vlan_id | add vlan_ids | exceptvlan_ids | none |
remove vlan_ids}] | vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ]
5. do show running-config
DETAILED STEPS
Step 2 interface Interface_type stack/module/port Specifies an interface type and identifier; enters the interface
configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/1/4
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1538
Security
How to Attach an IPv6 Snooping Policy to a Layer 2 EtherChannel Interface
Step 4 ipv6 snooping [attach-policy policy_name [ vlan {vlan_id Attaches a custom ipv6 snooping policy to the interface or
| add vlan_ids | exceptvlan_ids | none | remove vlan_ids}] the specified VLANs on the interface. To attach the default
| vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | policy to the interface, use the ipv6 snooping command
remove vlan_ids | all} ] without the attach-policy keyword. To attach the default
policy to VLANs on the interface, use the ipv6 snooping
Example:
vlan command. The default policy is, security-level guard,
SwitchDevice(config-if)# ipv6 snooping device-role node, protocol ndp and dhcp.
or
or
SwitchDevice(config-if)# ipv6 snooping vlan 111,112
or
Step 5 do show running-config Verifies that the policy is attached to the specified interface
without exiting the interface configuration mode.
Example:
SwitchDevice#(config-if)# do show running-config
SUMMARY STEPS
1. configure terminal
2. interface range Interface_name
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1539
Security
How to Configure the IPv6 Binding Table Content
3. ipv6 snooping [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none |
remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
4. do show running-config interfaceportchannel_interface_name
DETAILED STEPS
Step 2 interface range Interface_name Specify the port-channel interface name assigned when the
EtherChannel was created. Enters the interface range
Example:
configuration mode.
SwitchDevice(config)# interface Po11
Tip Enter the do show interfaces summary
command for quick reference to interface names
and types.
Step 3 ipv6 snooping [attach-policy policy_name [ vlan {vlan_ids Attaches the IPv6 Snooping policy to the interface or the
| add vlan_ids | except vlan_ids | none | remove vlan_ids specified VLANs on that interface. The default policy is
| all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | attached if the attach-policy option is not used.
none | remove vlan_ids | all} ]
Example:
SwitchDevice(config-if-range)# ipv6 snooping
attach-policy example_policy
or
or
Step 4 do show running-config Confirms that the policy is attached to the specified interface
interfaceportchannel_interface_name without exiting the configuration mode.
Example:
SwitchDevice#(config-if-range)# do show
running-config int po11
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1540
Security
How to Configure the IPv6 Binding Table Content
SUMMARY STEPS
1. configure terminal
2. [no] ipv6 neighbor binding [vlan vlan-id {ipv6-address interface interface_type stack/module/port
hw_address [reachable-lifetimevalue [seconds | default | infinite] | [tracking{ [default | disable] [
reachable-lifetimevalue [seconds | default | infinite] | [enable [reachable-lifetimevalue [seconds |
default | infinite] | [retry-interval {seconds| default [reachable-lifetimevalue [seconds | default |
infinite] } ]
3. [no] ipv6 neighbor binding max-entries number [mac-limit number | port-limit number [mac-limit
number] | vlan-limit number [ [mac-limit number] | [port-limit number [mac-limitnumber] ] ] ]
4. ipv6 neighbor binding logging
5. exit
6. show ipv6 neighbor binding
DETAILED STEPS
Step 2 [no] ipv6 neighbor binding [vlan vlan-id {ipv6-address Adds a static entry to the binding table database.
interface interface_type stack/module/port hw_address
[reachable-lifetimevalue [seconds | default | infinite] |
[tracking{ [default | disable] [ reachable-lifetimevalue
[seconds | default | infinite] | [enable
[reachable-lifetimevalue [seconds | default | infinite] |
[retry-interval {seconds| default [reachable-lifetimevalue
[seconds | default | infinite] } ]
Example:
SwitchDevice(config)# ipv6 neighbor binding
Step 3 [no] ipv6 neighbor binding max-entries number Specifies the maximum number of entries that are allowed
[mac-limit number | port-limit number [mac-limit number] to be inserted in the binding table cache.
| vlan-limit number [ [mac-limit number] | [port-limit
number [mac-limitnumber] ] ] ]
Example:
SwitchDevice(config)# ipv6 neighbor binding
max-entries 30000
Step 4 ipv6 neighbor binding logging Enables the logging of binding table main events.
Example:
SwitchDevice(config)# ipv6 neighbor binding logging
Step 5 exit Exits global configuration mode, and places the router in
privileged EXEC mode.
Example:
SwitchDevice(config)# exit
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1541
Security
How to Configure an IPv6 Neighbor Discovery Inspection Policy
SUMMARY STEPS
1. configure terminal
2. [no]ipv6 nd inspection policy policy-name
3. device-role {host | monitor | router | switch}
4. drop-unsecure
5. limit address-count value
6. sec-level minimum value
7. tracking {enable [reachable-lifetime {value | infinite}] | disable [stale-lifetime {value | infinite}]}
8. trusted-port
9. validate source-mac
10. no {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking | trusted-port
| validate source-mac}
11. default {device-role | drop-unsecure | limit address-count | sec-level minimum | tracking |
trusted-port | validate source-mac}
12. do show ipv6 nd inspection policy policy_name
DETAILED STEPS
Step 2 [no]ipv6 nd inspection policy policy-name Specifies the ND inspection policy name and enters ND
Inspection Policy configuration mode.
Example:
SwitchDevice(config)# ipv6 nd inspection policy
example_policy
Step 3 device-role {host | monitor | router | switch} Specifies the role of the device attached to the port. The
default is host.
Example:
SwitchDevice(config-nd-inspection)# device-role
switch
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1542
Security
How to Configure an IPv6 Neighbor Discovery Inspection Policy
Step 6 sec-level minimum value Specifies the minimum security level parameter value
when Cryptographically Generated Address (CGA) options
Example:
are used.
SwitchDevice(config-nd-inspection)# limit
address-count 1000
Step 7 tracking {enable [reachable-lifetime {value | infinite}] Overrides the default tracking policy on a port.
| disable [stale-lifetime {value | infinite}]}
Example:
SwitchDevice(config-nd-inspection)# tracking
disable stale-lifetime infinite
Step 9 validate source-mac Checks the source media access control (MAC) address
against the link-layer address.
Example:
SwitchDevice(config-nd-inspection)# validate
source-mac
Step 10 no {device-role | drop-unsecure | limit address-count | Remove the current configuration of a parameter with the
sec-level minimum | tracking | trusted-port | validate no form of the command.
source-mac}
Example:
SwitchDevice(config-nd-inspection)# no validate
source-mac
Step 11 default {device-role | drop-unsecure | limit Restores configuration to the default values.
address-count | sec-level minimum | tracking |
trusted-port | validate source-mac}
Example:
SwitchDevice(config-nd-inspection)# default limit
address-count
Step 12 do show ipv6 nd inspection policy policy_name Verifies the ND Inspection Configuration without exiting
ND inspection configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1543
Security
How to Attach an IPv6 Neighbor Discovery Inspection Policy to an Interface
SUMMARY STEPS
1. configure terminal
2. interface Interface_type stack/module/port
3. ipv6 nd inspection [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
4. do show running-config
DETAILED STEPS
Step 2 interface Interface_type stack/module/port Specifies an interface type and identifier; enters the interface
configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/1/4
Step 3 ipv6 nd inspection [attach-policy policy_name [ vlan Attaches the Neighbor Discovery Inspection policy to the
{vlan_ids | add vlan_ids | except vlan_ids | none | remove interface or the specified VLANs on that interface. The
vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | default policy is attached if the attach-policy option is not
exceptvlan_ids | none | remove vlan_ids | all} ] used.
Example:
SwitchDevice(config-if)# ipv6 nd inspection
attach-policy example_policy
or
or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1544
Security
How to Attach an IPv6 Neighbor Discovery Inspection Policy to a Layer 2 EtherChannel Interface
SUMMARY STEPS
1. configure terminal
2. interface range Interface_name
3. ipv6 nd inspection [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
4. do show running-config interfaceportchannel_interface_name
DETAILED STEPS
Step 2 interface range Interface_name Specify the port-channel interface name assigned when the
EtherChannel was created. Enters the interface range
Example:
configuration mode.
SwitchDevice(config)# interface Po11
Tip Enter the do show interfaces summary
command for quick reference to interface names
and types.
Step 3 ipv6 nd inspection [attach-policy policy_name [ vlan Attaches the ND Inspection policy to the interface or the
{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is
vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used.
exceptvlan_ids | none | remove vlan_ids | all} ]
Example:
SwitchDevice(config-if-range)# ipv6 nd inspection
attach-policy example_policy
or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1545
Security
How to Configure an IPv6 Router Advertisement Guard Policy
or
SwitchDevice(config-if-range)#ipv6 nd inspection
vlan 222, 223,224
Step 4 do show running-config Confirms that the policy is attached to the specified interface
interfaceportchannel_interface_name without exiting the configuration mode.
Example:
SwitchDevice#(config-if-range)# do show
running-config int po11
SUMMARY STEPS
1. configure terminal
2. [no]ipv6 nd raguard policy policy-name
3. [no]device-role {host | monitor | router | switch}
4. [no]hop-limit {maximum | minimum} value
5. [no]managed-config-flag {off | on}
6. [no]match {ipv6 access-list list | ra prefix-list list}
7. [no]other-config-flag {on | off}
8. [no]router-preference maximum {high | medium | low}
9. [no]trusted-port
10. default {device-role | hop-limit {maximum | minimum} | managed-config-flag | match {ipv6
access-list | ra prefix-list } | other-config-flag | router-preference maximum| trusted-port}
11. do show ipv6 nd raguard policy policy_name
DETAILED STEPS
Step 2 [no]ipv6 nd raguard policy policy-name Specifies the RA Guard policy name and enters RA Guard
Policy configuration mode.
Example:
SwitchDevice(config)# ipv6 nd raguard policy
example_policy
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1546
Security
How to Configure an IPv6 Router Advertisement Guard Policy
Step 4 [no]hop-limit {maximum | minimum} value (1–255) Range for Maximum and Minimum Hop Limit
values.
Example:
SwitchDevice(config-nd-raguard)# hop-limit maximum Enables filtering of Router Advertisement messages by
33 the Hop Limit value. A rogue RA message may have a
low Hop Limit value (equivalent to the IPv4 Time to Live)
that when accepted by the host, prevents the host from
generating traffic to destinations beyond the rogue RA
message generator. An RA message with an unspecified
Hop Limit value is blocked.
If not configured, this filter is disabled. Configure
minimum to block RA messages with Hop Limit values
lower than the value you specify. Configure maximumto
block RA messages with Hop Limit values greater than
the value you specify.
Step 6 [no]match {ipv6 access-list list | ra prefix-list list} Matches a specified prefix list or access list.
Example:
SwitchDevice(config-nd-raguard)# match ipv6
access-list example_list
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1547
Security
How to Attach an IPv6 Router Advertisement Guard Policy to an Interface
Step 9 [no]trusted-port When configured as a trusted port, all attached devices are
trusted, and no further message verification is performed.
Example:
SwitchDevice(config-nd-raguard)# trusted-port
Step 10 default {device-role | hop-limit {maximum | minimum} Restores a command to its default value.
| managed-config-flag | match {ipv6 access-list | ra
prefix-list } | other-config-flag | router-preference
maximum| trusted-port}
Example:
SwitchDevice(config-nd-raguard)# default hop-limit
Step 11 do show ipv6 nd raguard policy policy_name (Optional)—Displays the ND Guard Policy configuration
without exiting the RA Guard policy configuration mode.
Example:
SwitchDevice(config-nd-raguard)# do show ipv6 nd
raguard policy example_policy
SUMMARY STEPS
1. configure terminal
2. interface Interface_type stack/module/port
3. ipv6 nd raguard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none |
remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
4. do show running-config
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1548
Security
How to Attach an IPv6 Router Advertisement Guard Policy to a Layer 2 EtherChannel Interface
DETAILED STEPS
Step 2 interface Interface_type stack/module/port Specifies an interface type and identifier; enters the interface
configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/1/4
Step 3 ipv6 nd raguard [attach-policy policy_name [ vlan Attaches the Neighbor Discovery Inspection policy to the
{vlan_ids | add vlan_ids | except vlan_ids | none | remove interface or the specified VLANs on that interface. The
vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | default policy is attached if the attach-policy option is not
exceptvlan_ids | none | remove vlan_ids | all} ] used.
Example:
SwitchDevice(config-if)# ipv6 nd raguard
attach-policy example_policy
or
or
Step 4 do show running-config Confirms that the policy is attached to the specified interface
without exiting the configuration mode.
Example:
SwitchDevice#(config-if)# do show running-config
SUMMARY STEPS
1. configure terminal
2. interface range Interface_name
3. ipv6 nd raguard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none |
remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1549
Security
How to Configure an IPv6 DHCP Guard Policy
DETAILED STEPS
Step 2 interface range Interface_name Specify the port-channel interface name assigned when the
EtherChannel was created. Enters the interface range
Example:
configuration mode.
SwitchDevice(config)# interface Po11
Tip Enter the do show interfaces summary
command for quick reference to interface names
and types.
Step 3 ipv6 nd raguard [attach-policy policy_name [ vlan Attaches the RA Guard policy to the interface or the
{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is
vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used.
exceptvlan_ids | none | remove vlan_ids | all} ]
Example:
SwitchDevice(config-if-range)# ipv6 nd raguard
attach-policy example_policy
or
or
Step 4 do show running-config Confirms that the policy is attached to the specified interface
interfaceportchannel_interface_name without exiting the configuration mode.
Example:
SwitchDevice#(config-if-range)# do show
running-config int po11
SUMMARY STEPS
1. configure terminal
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1550
Security
How to Configure an IPv6 DHCP Guard Policy
DETAILED STEPS
Step 2 [no]ipv6 dhcp guard policy policy-name Specifies the DHCPv6 Guard policy name and enters
DHCPv6 Guard Policy configuration mode.
Example:
SwitchDevice(config)# ipv6 dhcp guard policy
example_policy
Step 3 [no]device-role {client | server} (Optional) Filters out DHCPv6 replies and DHCPv6
advertisements on the port that are not from a device of the
Example:
specified role. Default is client.
SwitchDevice(config-dhcp-guard)# device-role server
• client—Default value, specifies that the attached
device is a client. Server messages are dropped on this
port.
• server—Specifies that the attached device is a
DHCPv6 server. Server messages are allowed on this
port.
Step 4 [no] match server access-list ipv6-access-list-name (Optional). Enables verification that the advertised DHCPv6
server or relay address is from an authorized server access
Example:
list (The destination address in the access list is 'any'). If
not configured, this check will be bypassed. An empty
;;Assume a preconfigured IPv6 Access List as
follows: access list is treated as a permit all.
SwitchDevice(config)# ipv6 access-list my_acls
SwitchDevice(config-ipv6-acl)# permit host
FE80::A8BB:CCFF:FE01:F700 any
Step 5 [no] match reply prefix-list ipv6-prefix-list-name (Optional) Enables verification of the advertised prefixes
in DHCPv6 reply messages from the configured authorized
Example:
prefix list. If not configured, this check will be bypassed.
An empty prefix list is treated as a permit.
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1551
Security
How to Configure an IPv6 DHCP Guard Policy
Step 6 [no]preference{ max limit | min limit } Configure max and min when device-role is serverto filter
DCHPv6 server advertisements by the server preference
Example:
value. The defaults permit all advertisements.
SwitchDevice(config-dhcp-guard)# preference max
250 max limit—(0 to 255) (Optional) Enables verification that
SwitchDevice(config-dhcp-guard)#preference min 150 the advertised preference (in preference option) is less than
the specified limit. Default is 255. If not specified, this
check will be bypassed.
min limit—(0 to 255) (Optional) Enables verification that
the advertised preference (in preference option) is greater
than the specified limit. Default is 0. If not specified, this
check will be bypassed.
Step 9 do show ipv6 dhcp guard policy policy_name (Optional) Displays the configuration of the IPv6 DHCP
guard policy without leaving the configuration submode.
Example:
Omitting the policy_name variable displays all DHCPv6
SwitchDevice(config-dhcp-guard)# do show ipv6 dhcp policies.
guard policy example_policy
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1552
Security
How to Attach an IPv6 DHCP Guard Policy to an Interface or a VLAN on an Interface
trusted-port
interface GigabitEthernet 0/2/0
switchport
ipv6 dhcp guard attach-policy pol1 vlan add 1
vlan 1
ipv6 dhcp guard attach-policy pol1
show ipv6 dhcp guard policy pol1
SUMMARY STEPS
1. configure terminal
2. interface Interface_type stack/module/port
3. ipv6 dhcp guard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
4. do show running-config interface Interface_type stack/module/port
DETAILED STEPS
Step 2 interface Interface_type stack/module/port Specifies an interface type and identifier; enters the interface
configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/1/4
Step 3 ipv6 dhcp guard [attach-policy policy_name [ vlan Attaches the DHCP Guard policy to the interface or the
{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is
vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used.
exceptvlan_ids | none | remove vlan_ids | all} ]
Example:
SwitchDevice(config-if)# ipv6 dhcp guard
attach-policy example_policy
or
or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1553
Security
How to Attach an IPv6 DHCP Guard Policy to a Layer 2 EtherChannel Interface
Step 4 do show running-config interface Interface_type Confirms that the policy is attached to the specified interface
stack/module/port without exiting the configuration mode.
Example:
SwitchDevice#(config-if)# do show running-config
gig 1/1/4
SUMMARY STEPS
1. configure terminal
2. interface range Interface_name
3. ipv6 dhcp guard [attach-policy policy_name [ vlan {vlan_ids | add vlan_ids | except vlan_ids | none
| remove vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | exceptvlan_ids | none | remove vlan_ids |
all} ]
4. do show running-config interfaceportchannel_interface_name
DETAILED STEPS
Step 2 interface range Interface_name Specify the port-channel interface name assigned when the
EtherChannel was created. Enters the interface range
Example:
configuration mode.
SwitchDevice(config)# interface Po11
Tip Enter the do show interfaces summary
command for quick reference to interface names
and types.
Step 3 ipv6 dhcp guard [attach-policy policy_name [ vlan Attaches the DHCP Guard policy to the interface or the
{vlan_ids | add vlan_ids | except vlan_ids | none | remove specified VLANs on that interface. The default policy is
vlan_ids | all} ] | vlan [ {vlan_ids | add vlan_ids | attached if the attach-policy option is not used.
exceptvlan_ids | none | remove vlan_ids | all} ]
Example:
SwitchDevice(config-if-range)# ipv6 dhcp guard
attach-policy example_policy
or
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1554
Security
How to Configure IPv6 Source Guard
or
Step 4 do show running-config Confirms that the policy is attached to the specified interface
interfaceportchannel_interface_name without exiting the configuration mode.
Example:
SwitchDevice#(config-if-range)# do show
running-config int po11
DETAILED STEPS
SwitchDevice> enable
Step 3 [no] ipv6 source-guard policy policy_name Specifies the IPv6 Source Guard policy name and enters
IPv6 Source Guard policy configuration mode.
Example:
SwitchDevice(config)# ipv6 source-guard policy
example_policy
Step 4 [deny global-autoconf] [permit link-local] [default{. . . (Optional) Defines the IPv6 Source Guard policy.
}] [exit] [no{. . . }]
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1555
Security
How to Attach an IPv6 Source Guard Policy to an Interface
Step 5 end Exits out of IPv6 Source Guard policy configuration mode.
Example:
SwitchDevice(config-sisf-sourceguard)# end
Step 6 show ipv6 source-guard policy policy_name Shows the policy configuration and all the interfaces where
the policy is applied.
Example:
SwitchDevice# show ipv6 source-guard policy
example_policy
What to do next
Apply the IPv6 Source Guard policy to an interface.
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1556
Security
How to Configure IPv6 Source Guard
Step 3 interface Interface_type stack/module/port Specifies an interface type and identifier; enters the interface
configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/1/4
Step 4 ipv6 source-guard [attach-policy <policy_name> ] Attaches the IPv6 Source Guard policy to the interface. The
default policy is attached if the attach-policy option is not
Example:
used.
SwitchDevice(config-if)# ipv6 source-guard
attach-policy example_policy
Step 5 show ipv6 source-guard policy policy_name Shows the policy configuration and all the interfaces where
the policy is applied.
Example:
SwitchDevice#(config-if)# show ipv6 source-guard
policy example_policy
DETAILED STEPS
SwitchDevice> enable
Step 3 [no] ipv6 source-guard policy policy_name Specifies the IPv6 Source Guard policy name and enters
IPv6 Source Guard policy configuration mode.
Example:
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1557
Security
How to Attach an IPv6 Source Guard Policy to an Interface
Step 4 [deny global-autoconf] [permit link-local] [default{. . . (Optional) Defines the IPv6 Source Guard policy.
}] [exit] [no{. . . }]
• deny global-autoconf—Denies data traffic from
Example: auto-configured global addresses. This is useful when
SwitchDevice(config-sisf-sourceguard)# deny all global addresses on a link are DHCP-assigned and
global-autoconf the administrator wants to block hosts with
self-configured addresses to send traffic.
• permit link-local—Allows all data traffic that is
sourced by a link-local address.
Note Trusted option under source guard policy is not
supported.
Step 5 end Exits out of IPv6 Source Guard policy configuration mode.
Example:
SwitchDevice(config-sisf-sourceguard)# end
Step 6 show ipv6 source-guard policy policy_name Shows the policy configuration and all the interfaces where
the policy is applied.
Example:
SwitchDevice# show ipv6 source-guard policy
example_policy
What to do next
Apply the IPv6 Source Guard policy to an interface.
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1558
Security
How to attach an IPv6 Source Guard Policy to a Layer 2 EtherChannel Interface
Step 3 interface Interface_type stack/module/port Specifies an interface type and identifier; enters the interface
configuration mode.
Example:
SwitchDevice(config)# interface gigabitethernet
1/1/4
Step 4 ipv6 source-guard [attach-policy <policy_name> ] Attaches the IPv6 Source Guard policy to the interface. The
default policy is attached if the attach-policy option is not
Example:
used.
SwitchDevice(config-if)# ipv6 source-guard
attach-policy example_policy
Step 5 show ipv6 source-guard policy policy_name Shows the policy configuration and all the interfaces where
the policy is applied.
Example:
SwitchDevice#(config-if)# show ipv6 source-guard
policy example_policy
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1559
Security
How to Configure IPv6 Prefix Guard
Step 4 ipv6 source-guard [attach-policy <policy_name> ] Attaches the IPv6 Source Guard policy to the interface. The
default policy is attached if the attach-policy option is not
Example:
used.
SwitchDevice(config-if) # ipv6 source-guard
attach-policy example_policy
Step 5 show ipv6 source-guard policy policy_name Shows the policy configuration and all the interfaces where
the policy is applied.
Example:
SwitchDevice(config-if) #show ipv6 source-guard
policy example_policy
Note To allow routing protocol control packets sourced by a link-local address when prefix guard is applied, enable
the permit link-local command in the source-guard policy configuration mode.
SUMMARY STEPS
1. enable
2. configure terminal
3. [no] ipv6 source-guard policy source-guard-policy
4. [ no ] validate address
5. validate prefix
6. exit
7. show ipv6 source-guard policy [source-guard-policy]
DETAILED STEPS
SwitchDevice> enable
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(3)E (Catalyst 3560-CX and 2960-CX Switches)
1560
Security
How to Attach an IPv6 Prefix Guard Policy to an Interface
Step 3 [no] ipv6 source-guard policy source-guard-policy Defines an IPv6 source-guard policy name and enters switch
integrated security features source-guard policy
Example:
configuration mode.
SwitchDevice (config)# ipv6 source-guard policy
my_snooping_policy
Step 4 [ no ] validate address Disables the validate address feature and enables the IPv6
prefix guard feature to be configured.
Example:
SwitchDevice (config-sisf-sourceguard)# no validate
address
Step 5 validate prefix Enables IPv6 source guard to perform the IPv6 prefix-guard
operation.
Example:
SwitchDevice (config-sisf-sourceguard)# validate
prefix
Step 7 show ipv6 source-guard policy [source-guard-policy] Displays the IPv6 source-guard policy configuration.
Example:
SwitchDevice # show ipv6 source-guard policy
policy1