SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
Register your product to gain access to bonus material or receive a coupon.
This PDF will be accessible from your Account page after purchase and requires PDF reading software, such as Acrobat® Reader®.
The eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Cisco LAN Switching Configuration Handbook
Second Edition
A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches
Steve McQuerry, CCIE® No. 6108
David Jansen, CCIE No. 5952
David Hucaby, CCIE No. 4594
Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide design and configuration guidelines. Each chapter starts with common design overviews and then describes the configuration of management features. Coverage includes Layer 2, Layer 3, multicast, high availability, and traffic management configurations.
This book is organized by groups of common features, with sections marked by shaded tabs for quick reference. Information on each feature is presented in a concise format, with background, configuration, and example components. The format is organized for easy accessibility to commands and their proper usage, saving you hours of research time.
From the first page, the authors zero in on quick facts, configuration steps, and explanations of configuration options in each Cisco Catalyst switch feature. The quick reference format allows you to easily locate just the information you need without having to search through thousands of pages of documentation, helping you get your switches up and running quickly and smoothly.
Whether you are looking for a handy, portable reference to more easily configure Cisco Catalyst switches in the field, or you are preparing for CCNA®, CCNP®, or CCIE® certification, you will find Cisco LAN Switching Configuration Handbook, Second Edition, to be an essential resource.
Steve McQuerry, CCIE No. 6108, is a technical solutions architect with Cisco focused on data center solutions. Steve works with enterprise customers in the midwestern United States to help them plan their data center architectures. David Jansen, CCIE No. 5952, is a technical solutions architect (TSA) with Cisco focused on Data Center Architectures at Cisco. David has more than 20 years of experience in the IT industry. David Hucaby, CCIE No. 4594, is a lead network engineer for the University of Kentucky, where he works with healthcare networks based on the Cisco Catalyst, ASA/PIX/FWSM security, and VPN product lines.
This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Introduction
Chapter 1: CLI Usage
1-1: Cisco Internetwork Operating System (IOS) Software
Using Cisco IOS Software
1-2: ROM Monitor
Using the ROM Monitor Command Set
Chapter 2: Switch Functionality
2-1: Catalyst Switch Families
Catalyst 2000 Series
Catalyst 3000 Series
Catalyst 4500 Series
Catalyst 6500
2-2: Switched Campus Network Designs
Catalyst Switch Families
Cisco Validated Designs: Campus
Chapter 3: Supervisor Engine Configuration
3-1: Prompts and Banners
Configuration of Prompt
Configuration of Banner
Feature Example
3-2: IP Addressing and Services
Configuring an IP Management Address
Configuring a Default Gateway
Setting Up DNS Services or Host Tables
Configuring HTTP Services
Feature Example
3-3: Passwords and Password Recovery
Configuration of Passwords
Feature Example
Password Recovery: Procedure 1
Feature Example
Password Recovery on IOS Devices: Procedure 2
Feature Example
3-4: Managing Modules
Viewing Modules
Accessing Modules
Resetting Modules
Powering Modules Up and Down
3-5: File Management and Boot Parameters
Navigating File Systems
Deleting Files from Flash
Copying System Files
File System Boot Parameters
Alias Commands
3-6: Redundant Supervisors
Forcing a Change to the Standby Supervisor
Synchronizing IOS Images
Synchronizing Boot Parameters
3-7: Cisco Discovery Protocol
Configuration of CDP
Feature Example
3-8: Time and Calendar
System Time Configuration
Setting the System Time Manually
Setting the System Time Through NTP
Example
Chapter 4: Layer 2 Interface Configuration
4-1: Switching Table
Configuration
Displaying Information About the Switching Table
Switching Table Example
4-2: Port Selection
Configuration
Port Selection Example
4-3: Ethernet
Configuration
Ethernet Example
Displaying Information About Layer 2 Interfaces
4-4: EtherChannel
Configuration
EtherChannel Example
Displaying Information About EtherChannels
Chapter 5: Layer 3 Interface Configuration
5-1: Layer 3 Switching
5-2: Layer 3 Ethernet Interfaces
Configuration
Verifying the Configuration
Feature Example
5-3: Layer 3 EtherChannels
Configuration
Verifying the Channel
Feature Example
5-4: WAN Interfaces
Configuration
Configuring an Enhanced FlexWAN Interface
Configuring a SPA Interface Processor (SIP) / Shared Port Adapter (SPA)
WAN Interface
Configuring a Packet-over-SONET Interface
Verifying Configurations
Feature Example
5-5: Layer 3 Virtual Interfaces
Configuring a VLAN Interface
Configuring Subinterfaces
Verifying Configurations
Feature Example
5-6: Routing Tables
Configuration
Verifying Routes
Chapter 6: VLANs and Trunking
6-1: VLAN Configuration
Creation of an Ethernet VLAN
Feature Example
6-2: VLAN Port Assignments
Configuring Static VLANs
Configuring Dynamic VLANs
Verifying VLAN Assignments
6-3: Trunking
Enabling Trunking
Specifying VLANs to Trunk
Verifying Trunks
Feature Example
6-4: VLAN Trunking Protocol
Enabling VTP for Operation
Setting VTP Passwords
Changing VTP Modes
Enabling VTP Pruning
Changing VTP Versions
Verifying VTP Operation
Feature Example
6-5: Private VLANs
Configuring Private VLANs
Configuring Private Edge VLANs
Verifying Private VLAN Operation
Feature Example
Chapter 7: Spanning Tree Protocol (STP)
7-1: STP Operation
STP Process
STP Tiebreakers
Path Costs
STP Port States
STP Topology Changes
Improving STP Stability
STP Operation Example
7-2: STP Configuration
Displaying Information About STP
STP Configuration Examples
Poor STP Root Placement
STP Load Balancing
7-3: STP Convergence Tuning
Configuring STP Convergence Tuning
7-4: Navigating the Spanning-Tree Topology
Chapter 8: Configuring High Availability Features
8-1: Route Processor Redundancy (RPR/RPR+)
Configuration
Displaying Information About RPR
8-2: Non-Stop Forwarding/Supervisor Switchover (NSF/SSO) with Supervisor
Redundancy
SSO/NSF Configuration
Displaying Information About SSO and NSF
8-3: Router Redundancy with HSRP
Configuration
HSRP Example
Displaying Information About HSRP
8-4: Fast Software Upgrade (FSU) and Enhanced Fast Software Upgrade
(eFSU)
Chapter 9: Multicast
9-1: Multicast Addressing
9-2: IGMP Snooping
Configuration
IGMP Snooping Example
Displaying Information About IGMP Snooping
Chapter 10: Server Load Balancing (SLB)
10-1: SLB
Configuration
SLB Example
Displaying Information About SLB
10-2: SLB Firewall Load Balancing
Configuration
Firewall Load-Balancing Example
Displaying Information About Firewall Load Balancing
10-3: SLB Probes
Configuration
Displaying Information About SLB Probes
Chapter 11: Controlling Traffic and Switch Access
11-1: Broadcast Suppression
Configuring Broadcast Suppression
Verifying Configuration
Feature Example
11-2: Protocol Filtering
Configuration
Verification
Feature Example
11-3: Port Security
Configuration
Verification
Feature Example
11-4: VLAN Access Control Lists
IOS VACL Configuration
Verification
Feature Example
11-5: Switch Authentication
Configuration
Verification
Feature Example
11-6: Access Class
Configuration
Verification
Feature Example
11-7: SSH Telnet Configuration
Configuration
Verification
Feature Example
11-8: 802.1X Port Authentication
Configuration
Feature Example
11-9: Layer 2 Security
Port Security
Feature Example
Verification
DHCP Snooping
Feature Example
Verification
Dynamic ARP Inspection
Feature Example
Verification
Chapter 12: Switch Management
12-1: Logging
Configuration
Logging Example
Displaying Information About Logging
12-2: Simple Network Management Protocol
Configuration
SNMP Example
Displaying Information About SNMP
12-3: Switched Port Analyzer
SPAN Configuration
RSPAN Configuration
SPAN Examples
Displaying Information About SPAN
12-4: Power Management
Configuration
Displaying Information About Power Management
12-5: Environmental Monitoring
12-6: Packet Tracing
Configuration
Packet-Tracing Example
Chapter 13: Quality of Service
13-1: QoS Theory
Layer 2 QoS Classification and Marking
Layer 3 QoS Classification and Marking
Catalyst Switch Queuing
13-2: QoS Configuration
Catalyst 2000/3000 Configuration
All Other Catalyst Configuration
Displaying Information About QoS
13-3: QoS Data Export
Configuration
QoS Data Export Example
Displaying Information About QoS Data Export
Chapter 14: Voice
14-1: Voice Ports
Configuration
Example
Displaying Information About Voice Ports
14-2: Voice QoS
Access Layer Configuration
Distribution and Core Layer Configuration
Voice QoS Example
Appendix A: Cabling Quick Reference
Back-to-Back Connections
Ethernet Connections
Asynchronous Serial Connections
T1/E1 CSU/DSU Connections
Appendix B: Well-known Protocol, Port, and Other Numbers
Index