Complete LANE Network

Figure 9-26 pulls together many of the concepts and commands discussed earlier in previous sections. This section also shows the configuration for an ATM-attached router. The network consists of two Catalysts that contain Ethernet and LANE modules. Each Catalyst has been configured with two VLANs that use ATM as a trunk media. VLAN 1 is transparently bridged to ELAN1, creating a single broadcast domain. VLAN 2 uses ELAN2. Both Catalysts have two LANE Clients, one for each ELAN. Cat-A is acting...

Addressing in Ethernet

How do stations identify each other In a meeting, you identify the intended recipient by name. You can choose to address the entire group, a set of individuals, or a specific person. Speaking to the group equates to a broadcast a set of individuals is a multicast and addressing one person by name is a unicast. Most traffic in a network is unicast in nature, characterized as traffic from a specific station to another specific device. Some applications generate multicast traffic. Examples include...

Advantages of Campus Wide VLANs

As the paragraphs that follow attest, there are some alluring aspects to the flat earth approach. First, the campus-wide VLANs model allows network designers to create a direct Layer 2 path from end stations to the most commonly used servers. By deploying Layer 2 switching in all three layers of the access distribution core model, campuswide VLANs should dramatically increase available bandwidth. The second advantage of the campus-wide VLANs model is that VLANs can be used to provide logical...

Advantages of Routing

One of the key themes that is developed throughout this chapter is the idea that routing is critical to scalable network design. Hopefully, this is not news to you. However, given the recent popularity and focus on extremely flat, avoid-the-router designs, a fair amount of attention is devoted to this subject. Many people are convinced that the key objective in campus network design is to eliminate as many routers as possible. On the contrary, my experience suggests that this is exactly the...

And Active Topology

The setup in Figure 6-21 clearly illustrates the basic objective of the Spanning-Tree Protocol make one bridge the center of the universe and then have all other bridges locate the shortest path to that location (all roads lead to Rome). This results in an active topology consisting of spoke-like branches that radiate out from the Root Bridge. Notice that the Root Bridge is acting as the central switching station for all traffic between the four branches and must be capable of carrying this...

And MAC Addresses

Although both routers are assigned unique IP addresses as normal (10.1.1.2 and 10.1.1.3), HSRP provides a third address that both routers share. The two routers exchange periodic hello messages (every three seconds by default) to monitor the status of each other. One router is elected the active HSRP peer and handles all router responsibilities for the shared address. The other node then acts as the standby HSRP peer. If the standby peer misses three HSRP hellos, it then assumes that the active...

Answers to Chapter 4 Review Questions

1 What happens if you replace the active Supervisor module A If you replace the active module, the standby becomes the active Supervisor module. If the configuration files differ between the two, the now active Supervisor updates the configuration on the replacement module. Likewise, if any software images differ, the now active module updates the replacement unit. 2 If your redundant Supervisor engines are running software version 4.1, the uplink ports on the standby engine are disabled until...

Answers to Chapter 5 Review Questions

1 Early in this chapter, it was mentioned that you can determine the extent of a broadcast domain in a switched network without configuration files. How do you do it A You can use a brute force approach where you systematically attach a traffic source on a port on a switch configured to generate broadcasts. With a network analyzer, you then check every port in the system to observe where the broadcast appeared. Every port where the broadcast is seen is a member of the same VLAN as the source....

Answers to Chapter 6 Review Questions

1 Summarize the three-step process that STP uses to initially converge on an active topology. A The three-step process is as follows Elect a single Root Bridge for the entire bridged network. Elect one Root Port for every non-Root Bridge. Elect one Designated Port for every segment. 2 How many of the following items does the network shown in Figure 6-24 contain Root Bridges, Root Ports, Designated Ports Assume all devices are operational. A The network in Figure 6-24 contains the following One...

ATM Core

The advantage of this approach is that it uses cost-effective Ethernet technology in the potentially large number of IDF closets. This design is often deployed using the campus-wide VLAN model to extend the speed of ATM through the Ethernet links. The downside is that it creates a large number of Layer 2 loops where redundant MDF-to-IDF links are used. Unfortunately, these links have been shown to create Spanning Tree loops that can disable the entire campus network. Furthermore, it is harder...

ATM Network

Ffpe Protein

Other VLAN types use combinations of Layer 2, Layer 3, or even Layer 4 to create shortcuts in a system. Layer 4 switching creates shortcuts based upon the Layer 3 addresses and upon the Layer 4 port values. This is sometimes called application switching and provides a higher level of granularity for switching. Chapter 11 provides a more thorough discussion on this subject in the context of MLS. Table 5-1 summarizes the various switch types found in the industry. Table 5-1 summarizes the various...

ATM Overhead Protocols

Although ATM theory can be extremely complex, the good news is that it can be amazingly easily to implement in most networks. This plug-and-play nature is due in large part to two automation protocols Integrated Local Management Interface (ILMI) and Private Network-Network Interface (PNNI). Integrated Local Management Interface (ILMI) is a protocol created by the ATM Forum to handle various automation responsibilities. Initially called the Interim Local Management Interface, ILMI utilizes SNMP...

ATM Resiliency

ATM also provides physical layer recovery. However, the failover time is longer than for FDDI. In an ATM network, a cable or interface failure can occur at the Catalyst or between ATM switches. If the failure occurs between ATM switches, the Catalyst requests the ATM network to re-establish a connection to the destination client(s). The ATM network attempts to find an alternate path to complete the connection request. This happens automatically. Figure 8-18 shows a Catalyst attached to two ATM...

Attach to Three ELANs

You need the router shown in Figure 8-13 if workstations in one VLAN desire to communicate with workstations in another VLAN. The router can reside on the LAN side of the Catalysts, but this example illustrates the router on the ATM side. When a station in VLAN 1 attempts to communicate with a station in VLAN 2, the Catalyst bridges the frame out LEC 1 to the router. The router, which also has three clients, routes the frame out the LEC which is a member of ELAN 2 to the destination Catalyst....

B after a Link Failure

Therefore, the Spanning Tree Max Age and Forward Delay parameters can be safely reduced to 12 and 9 seconds, respectively (assuming the default Hello Time of 2 seconds). The safest and simplest way to accomplish this is to use the set spantree root macro to automatically modify the appropriate Spanning Tree parameters. As a result, convergence time can be reduced from a default of 30-50 seconds to 18-30 seconds. To further speed Spanning Tree convergence, UplinkFast, BackboneFast, and PortFast...

Backbone Fast

BackboneFast is a complementary (and patented) technology to UplinkFast. Whereas UplinkFast is designed to quickly respond to failures on links directly connected to leaf-node switches, it does not help in the case of indirect failures in the core of the backbone. This is where BackboneFast comes in. Don't expect BackboneFast to provide the two to three second rollover performance of UplinkFast. As a Max Age optimization, BackboneFast can reduce the indirect failover performance from 50 to 30...

BaseFX

802.3u specifies a variant for single-mode and multimode fiber optic cables. 100BaseFX uses two strands (one pair) of fiber optic cables one for transmitting and one for receiving. Like 100BaseTx, 100BaseFX uses a 4B 5B encoding signaling at 125 MHz on the optical fiber. When should you use the fiber optic version One clear situation arises when you need to support distances greater than 100 meters. Multimode supports up to 2,000 meters in full-duplex mode, 412 meters in half-duplex mode....

Bottom line Controlling VTP in Large Networks

In large networks, these issues multiply and can develop into situations making you want to disable trunking, VTP, or other aspects of VLANs. Clearly, trunking remains as a necessary element of networking life. It is not practical to deploy a large network without trunks because of the number of resources that you consume with multiple access links. Therefore, trunks remain. However, as previously mentioned, we have methods of minimizing some of the negative side effects of trunking. VTP is...

Bridge Priority Load Balancing

How can Bridge Priority be used to accomplish load balancing in the two-building campus illustrated in Figure 7-17 As discussed in the previous section, the IDF switch (Cat-2C) found multiple equal cost paths to the Root Bridge. This caused the third decision criterion, Bridge ID, to be evaluated. Because Cat-2A and Cat-2B were using the default Bridge ID values, Cat-2A had the lower BID for all VLANs (32,768.AA-AA-AA-AA-AA-AA versus 32,768.BB-BB-BB-BB-BB-BB). This is precisely what ruined the...

Bridge Table Corruption

Many switch bridge administrators are aware of the basic problem of broadcast storms as discussed in the previous section. However, fewer people are aware of the fact that even unicast frames can circulate forever in a network that contains loops. Figure 6-4 illustrates this point. Figure 6-4 Without STP, Even Unicast Frames Can Loop and Corrupt Bridging Tables Figure 6-4 Without STP, Even Unicast Frames Can Loop and Corrupt Bridging Tables For example, suppose that Host-A, possessing a prior...

Building a Data Direct VC

This section details the sequence of events that allow two Clients to establish a Data Direct VC. The example uses the network illustrated in Figure 9-16. Figure 9-16 Two Ethernet Hosts Connected via Proxy Figure 9-16 Two Ethernet Hosts Connected via Proxy In the example, Host-A issues an IP ping to Host-B. Both devices are Ethernet-attached PCs connected to Catalysts that contain LANE uplink cards in slot 4. Host-A is using IP address 1.1.1.1 and MAC address AAAA.AAAA.AAAA. Host-B has IP...

Bundling Ports

When bundling ports for EtherChannel using early EtherChannel-capable line modules, you must follow a couple of rules Use contiguous ports for a bundle. All ports must belong to the same VLAN. If the ports are used for trunks, all ports must be set as a trunk. If you set the ports to trunk, make sure that all ports pass the same VLANs. Ensure that all ports at both ends have the same speed and duplex settings. You cannot arbitrarily select ports to bundle. See the following descriptions for...

Calculating Endto End BPDU Propagation Delay for Max

End-to-End BPDU Propagation Delay is the amount of time that it takes for a BPDU to travel from one edge of the network to the other edge of the network. The 802.1D specification assumes that up to three BPDUs can get lost along the way, the maximum distance between any two nodes in the network is seven bridge hops, and each bridge can take up to one second to propagate a BPDU after receiving it. Also, the default Hello Time interval of two seconds is assumed. Table 7-2 documents these...

Campus Wide VLANs Model

As people began to notice their router and hub networks struggling to keep up with traffic demands, they looked for alternate approaches. Many of these organizations decided to implement campus-wide VLANs, also known as the flat earth and end-to-end VLAN approach to network design. Campus-wide VLANs strive to eliminate the use of routers. Because routers had become a significant bottleneck in campus networks, people looked for ways to minimize their use. Because broadcast domains still needed...

Catalyst 50006000 CLI Syntax Conventions

All well-documented equipment uses a standard representation for interpreting commands. The Catalyst is no exception. Cisco documents how to interpret the printed commands of its documentation. Table 4-1 summarizes the command syntax conventions used in the Catalyst documentation and in this book. Table 4-1. Catalyst Syntax Conventions Commands and keywords that are entered literally as shown are in boldface. Arguments for which you supply values are in italics. Elements in square brackets are...

Catalyst VLAN Configuration

Some VLAN components assign stations to VLANs based upon MAC addresses. The Catalyst, on the other hand, associates ports to a VLAN. Any device attached to the port belongs to the VLAN describing the switch interface. Even if a shared hub attaches to the port, all stations on the hub belong to the same VLAN. This is called a port-centric approach to VLANs. To configure VLANs in a Catalyst, you must first plan the VLAN membership and then assign ports to the correct VLAN. Planning VLAN...

CatB

How can the load balancing be fixed in Figure 7-13 Given that Port ID is being used as decision criterion to determine which path to use, one strategy is to focus on influencing these Port ID values. On Catalysts using the XDI CatOS interface (such as the Catalyst 4000s, 5000s, and 6000s), this can be done by applying the set spantree portvlanpri command. The full syntax for this command is set spantree portvlanpri mod num port num priority vlans where mod_num is the slot number that a line...

Changing Traffic Patterns

Any effective campus design must take traffic patterns into account. Otherwise, switching and link bandwidth are almost certainly wasted. The good news is that most modern campus networks follow several trends that create unmistakable flows. This section discusses the traditional campus traffic patterns and shows how popular new technologies have drastically changed this. The earliest seeds of today's campus networks began with departmental servers. In the mid-1980s, the growth of inexpensive...

VLAN Trunking Protocol

This chapter covers the following key topics Understanding VTP Explains what VTP is and why it is used. VTP Modes Compares and demonstrates VTP server, client and transparent modes. The Working Mechanics of VTP Describes the various VTP messages such as summary and subset advertisements, advertisement requests, and pruning messages. Configuring VTP Mode Provides various configuration examples that illustrate VTP operations and troubleshooting tools. VTP Pruning Advanced Traffic Management...

Case Studies Implementing Switches

This chapter covers the following key topics Real-World Design Issues This chapter presents an opportunity to apply the skills learned in earlier chapters in two real-world designs. Campus-Wide VLANs Considers the real-world downsides of flat earth designs. MLS Design Discusses and analyzes the pros and cons of a campus design that uses Multilayer Switching (MLS) for Layer 3 switching. Hardware-Based Routing Design Analyzes the benefits and unique characteristics of a campus design based on the...

Configuring the Catalyst

This chapter covers the following key topics Catalyst 5000 6000 CLI Syntax Conventions Provides the standard Cisco representation for interpreting commands administered on Catalyst switches. Catalyst 5000 Configuration Methods Provides information on how to operate under the Console, Telnet, and TFTP configuration modes for Catalyst configuration. Using the Catalyst 5000 6000 Command-Line Interface Describes command-line recall, editing, and help for the Catalyst 5000 series. Passwords Provides...

Understanding Spanning Tree

The authors would like to thank Radia Perlman for graciously contributing her time to review the material in this chapter. This chapter covers the following key topics What Is Spanning Tree and Why Use Spanning Tree Briefly explains the purpose of the Spanning-Tree Protocol (STP). Explains why some form of loop-prevention protocol is required to prevent broadcast storms and bridge table corruption. Four-Step STP Decision Sequence Describes the process that the Spanning-Tree Protocol uses for...

Trunking with LAN Emulation

This chapter covers the following key topics A Brief ATM Tutorial For engineers accustomed to working in frame-based technologies such as Ethernet, ATM can seem strange and mysterious. However, as this section discusses, it is based on many of the same fundamental concepts as technologies that are probably more familiar. LANE Theory of Operation Introduces the theory used by LAN Emulation (LANE) to simulate Ethernet and Token Ring networks over an ATM infrastructure. Explores the conceptual...

Command Line Recall

When you enter a command in the Catalyst, it retains the command in a buffer called the history buffer. The history buffer can store up to 20 commands for you to recall and edit. Various devices have methods of recalling commands. The Catalyst uses abbreviated key sequences to recall commands. These sequences resemble what a UNIX c-shell user might use. UNIX users often live with awkward methods of recalling and editing commands. Therefore, their comfort level with the legacy Catalyst editing...

Configuring 8021Q

Configuration tasks to enable 802.1Q trunks include the following 1. Specify the correct encapsulation mode (ISL or 802.1Q) for the trunk. 2. Enable the correct DTP trunking mode or manually ensure that both ends of the link support the same trunk mode. 3. Select the correct native VLAN-id on both ends of the 802.1Q trunk. The following syntax enables an 802.1Q trunk on a Catalyst set trunk mod num port num on desirable auto nonegotiate dot1q dot1q specifies the trunk encapsulation type....

Connected

Figure 7-6 illustrates the conversation that ensues between Cat-C and Cat-B. Figure 7-6 Exception Processing of Configuration BPDUs Figure 7-6 Exception Processing of Configuration BPDUs As discussed in Chapter 6, Cat-C initially assumes it is the Root Bridge and immediately starts sending BPDUs to announce itself as such. Because the Root Bridge is currently down, Cat-B Port-1 2 has stopped sending Configuration BPDUs as a part of the normal processing. However, because Cat-B Port-1 2 is the...

Console Configuration

The Catalyst 5000 series Supervisor module has one physical console connection. For a Supervisor I or a Supervisor II, the connection is an EIA-232 25-pin connection. For a Supervisor III module, the connection is an RJ-45 connector. Make sure that you know which kind of Supervisor module you are working with to ensure that you can attach to the console. The console has an interesting feature in that it can operate in one of two modes either as a console or slip interface. When used as a...

Creation Process

Host-B receives the IP ARP request. Recognizing its IP address in the ARP packet, it builds an IP ARP reply packet. Figure 9-19 illustrates the reply. In this case, the ARP message contains the MAC address in question. Also notice that ARP unicasts the reply back to the source node it is not sent to all nodes via the broadcast address. The LEC-B Catalyst receives the IP ARP reply. Having just added a bridging table entry for AAAA.AAAA.AAAA in Step 5, the frame is forwarded to the LANE...

Deploying VLANs to Eliminate Broadcast Domain Issues

Now consider a similar network designed with Catalysts rather than a legacy design. By using Catalysts as in Figure 5-13, you can deploy VLANs to distribute and constrain broadcast domains. When deploying VLANs, some items in Table 5-3 become irrelevant when moving a user from one location to another in the network. Figure 5-13 A Switched Version of the Legacy Network of Figure 5-13 A Switched Version of the Legacy Network of VLANs do not eliminate Layer 1 or Layer 2 issues. You still need to...

Design Alternatives

As with Design 1, hundreds of permutations are possible for Design 2. This section briefly discusses some of the more common alternatives. First, as shown in Figure 17-5, Design 2 calls for a pair of 8500s for the server farm. Figure 17-7 illustrates a potential layout for the server farm under Design 2. Figure 17-7 Detail of Server Farm for Design 2 Figure 17-7 Detail of Server Farm for Design 2 In this plan, a pair of Catalyst 6500 switches are directly connected to the backbone via Cat-B1-0B...

Design Discussion

This section introduces some of the design choices that were made for the first design. However, before diving into the specifics, it is worth pausing to look at the big picture of Design 1. As discussed earlier, both designs use Layer 3 switching in the MDF distribution layer devices. This isolates each building behind a Layer 3 barrier to provide scalability and stability. By placing each building behind the safety of an intelligent Layer 3 router, it is much more difficult for problems to...

Disadvantages of Campus Wide VLANs

There are also some significant downsides to the campus-wide VLANs model Large and overlapping Spanning Tree domains It is easy for a problem in one VLAN to deplete bandwidth in all VLANs across trunk links Many networks using campus-wide VLANs must resort toeliminating all redundancy to achieve network stability Most modern traffic violates the stay in one subnet rule employed by the campus-wide VLAN model Modern routers are not a bottleneck The paragraphs that follow provide more detailed...

Dont Forget PLANs

When creating a new design or when your first one or two attempts at solving a particular problem fail, redraw your VLAN design using physical LANs (PLANs). In other words, take the logical topology created through the use of virtual LANs and redraw it using PLANs. PLAN is a somewhat tongue-in-cheek term the author coined to describe a very serious issue. For some reason, the human brain is almost guaranteed to forget all knowledge of IP subnetting when faced with virtual LANs. People spend...

Duplicate Ring Protocol DRiP

In a Token Ring environment, each ring has a unique ring number identifying it for source-route bridging. Similarly, in a switched Token Ring, except for the default and backup TrCRFs mentioned earlier, each TrCRF has a unique ring number. If an administrator accidentally misconfigures another TrCRF with the same ring number, shown in Figure 3-11, the Token Ring switching process gets confused. Figure 3-11 Do not attempt this. Duplicate ring numbers are not allowed on multiple switches. Figure...

Endto End Distance

Another limitation on extending networks with repeaters focuses on distance. An Ethernet link can extend only so far before the media slotTime specified by Ethernet standards is violated. As described in Chapter 1, the slotTime is a function of the network data rate. A 10 Mbps network such as 10BaseT has a slotTime of 51.2 microseconds. A 100 Mbps network slotTime is one tenth that of 10BaseT. The calculated network extent takes into account the slotTime size, latency through various media such...

Ether Channel Development

EtherChannel defines a bundling technique for standards-based segments such as Fast Ethernet and Gigabit Ethernet. It does not cause the links to operate at clock rates different than they were without bundling. This makes the segments non Fast Ethernet- or Gigabit Ethernet-compliant. EtherChannel enables devices to distribute a traffic load over more than one segment while providing a level of resiliency that does not involve Spanning Tree or other failover mechanisms. The IEEE is examining a...

Ethernet LANE Frame Format

Ethernet LANE traffic that passes over the Data Direct uses the frame format illustrated in Figure 9-15. Figure 9-15 Ethernet Data Frame Format for LANE Figure 9-15 Ethernet Data Frame Format for LANE If you compare the LANE Version 1.0 format to the traditional Ethernet frame you will notice two changes The addition of the 2-byte LEC ID field As LECs contact the LES, they are assigned a unique, 2-byte LECID identifier. In practice, the first LEC that joins is 1, the second is 2, and so on. The...

Ethernet or Token Ring

Since IBM introduced Token Ring to the industry, both Token Ring and Ethernet were recognized as candidates for corporate LAN infrastructures. The great debate among LAN specialists focused upon the question, Which is better Token Ring or Ethernet The answer to that question most often depended on the user application. Early Token Ring limitations offered connection speeds at only 4 Mbps, while Ethernet supported 10 Mbps. It was perceived, therefore, that Ethernet was better because it offered...

Ethernet Resiliency

Ethernet options (both Fast Ethernet and Gigabit Ethernet) rely upon Spanning Tree for resiliency. Spanning Tree, discussed in Chapter 6, Understanding Spanning Tree, operates at Layer 2, the data link layer. Components detect failures when they fail to receive BPDUs from the Root Bridge. Spanning Tree recovery can take as much as 50 seconds depending upon at what values you set the timers. EtherChannel, both Fast and Gigabit, provide local resiliency. Figure 8-19 shows two Catalysts...

Example 101 LANE and MPOA Component Addresses

Router show lane default interface ATM1 0 LANE Client LANE Server LANE Bus LANE Config Server note ** is the subinterface number byte in hex router show mpoa default interface ATM1 0 MPOA Server 47.009181000000009092BF7401. 0090AB16500C.** MPOA Client 47.009181000000009092BF7401. 0090AB16500D.** note ** is the MPS MPC instance number in hex Note that the esi portion highlighted in italics of the MPS and MPC NSAP continue to increment beyond the esi portion of the LECS NSAP address. The selector...

Example 1017 An MPOA Client Statistics Screen

Cat-A sh mp cl statistics MPC Name mpc2, Interface ATM1 0, State Up MPC actual operating address Shortcut-Setup Count 10, Shortcut-Setup Time 1 Transmitted Received MPOA Resolution Requests 1 0 MPOA Resolution Replies 0 1 MPOA Cache Imposition Requests 0 1 MPOA Cache Imposition Replies 1 0 MPOA Cache Purge Requests 0 0 MPOA Cache Purge Replies 0 0 MPOA Trigger Request 0 0 NHRP Purge Requests 0 0 Invalid MPOA Data Packets Received 0 Cat-A If the resolution request counter does not increment, the...

Example 1018 Sample debug mpoa client Command Output

Cat-A debug mp cl all Enable all MPOA Client debugging data Debugs MPOA Client Data Processing egress Debugs MPOA Client Egress Activity general Debugs MPOA Client General Common Activity ingress Debugs MPOA Client Ingress Activity keep-alives Debugs keep-alives received from MPOA servers platform-specific Hardware platform specific debug Cat-A debug mp cl all MPOA CLIENT mpc_trigger_from_lane mac 0090.ab16.5008 on out ATM0.20 MPOA CLIENT Is MAC 0090.ab16.5008 interesting on i f ATM0.20 MPOA...

Example 1019 MPOA Resolution Reply from debug

MPOA CLIENT received a MPOA_RESOLUTION_REPLY packet of size 127 bytes on ATM1 0 vcd 832 dumping nhrp packet fixed part op_type 135 (MPOA_RESOLUTION_REPLY), shtl 20, sstl 0 mandatory part src_proto_len 4, dst_proto_len 4, flags 0, request_id 2 src_nbma_addr src_prot_addr 0.0.0.0 dst_prot_addr 3.0.0.1 cie 0 code 0, prefix_length 0, mtu 1500, holding_time 1200 cli_addr_tl 20, cli_saddr_tl 0, cli_proto_len 0, preference 0 cli_nbma_addr tlv 0 type 4097, length 4 data 15 05 00 01 tlv 1 type 4096,...

Example 107 Output from show mpoa server Command

Router show mpoa server MPS Name mps, MPS id 0, Interface ATM1 0, State up network-id 1, Keepalive 10 secs, Holding time 1200 secs Keepalive lifetime 35 secs, Giveup time 40 secs MPS actual operating address Lane clients bound to MPS mps ATM1 0.1 ATM1 0.2 Discovered neighbours MPC vcds 75(R,A) MPC vcds 77(R,A) In Example 10-7, the MPS sees two MPC neighbors. The output displays the virtual circuits used to communicate with each of the MPCs. These circuits should not experience idle timeouts and...

Example 111 One LinkPerVLAN Router Configuration

Interface Ethernet0 ip address 10.1.1.1 255.255.255.0 interface Ethernet1 ip address 10.1.2.1 255.255.255.0 ipx network 2 interface Ethernet2 ip address 10.1.3.1 255.255.255.0 appletalk cable-range 300-310 304.101 appletalk zone ZonedOut ipx network 3 The configuration in Example 11-1 provides inter-VLAN routing services for three VLANs VLAN 1 is connected to the Ethernet0 interface and is only using the IP protocol. VLAN 2 is linked the Ethernet1 interface and uses the IP and IPX protocols....

Example 1116 Sample Catalyst 8500 Series Configuration

Ipx routing 0000.0000.1001 interface FastEthernet0 0 0 description VLAN 1 ip address 10.1.1.1 255.255.255.0 interface FastEthernet0 0 1 description VLAN 2 ip address 10.1.2.1 255.255.255.0 ipx network 2 interface FastEthernet0 0 2 description VLAN 3 ip address 10.1.3.1 255.255.255.0 ipx encapsulation ARPA ipx network 3 interface FastEthernet0 0 3 no ip address interface FastEthernet0 0 3.4 description VLAN 4 encapsulation isl 4 ip address 10.1.4.1 255.255.255.0 ipx network 4 interface...

Example 1118 HSRP Configuration for RouterA

Interface EthernetO description Link to wiring closet Catalysts ip address 10.1.1.2 255.255.255.0 standby 1 priority 110 standby 1 preempt standby 1 ip 10.1.1.1 standby 1 track Ethernet1 15 interface Ethernet1 description Link to backbone ip address 10.1.2.2 255.255.255.0 The real IP address is assigned with the usual ip address command. HSRP parameters are then configured using various standby commands. The shared IP address is added with standby group_number ip ip_address command. This...

Example 1120 Isl Hsrp Configuration for RouterB

Interface FastEthernet0 0 0 description Link to wiring closet Catalyst no ip address interface FastEthernet0 0 0.1 encapsulation isl 1 ip address 10.1.1.4 255.255.255.0 standby 1 ip 10.1.1.1 standby 1 priority 100 standby 1 preempt interface FastEthernet0 0 0.2 encapsulation isl 2 ip address 10.1.2.3 255.255.255.0 standby 2 ip 10.1.2.1 standby 2 priority 110 standby 2 track FastEthernet0 0 1 15 standby 2 preempt interface Ethernet0 0 1 description Link to backbone ip address 10.1.3.3...

Example 1124 Using Bridge Groups to Bridge between VLANs

Interface FastEthernet0 0 0 no ip address interface FastEthernet0 0 0.1 encapsulation isl 1 ip address 10.1.1.1 255.255.255.0 interface FastEthernet0 0 0.2 encapsulation isl 2 ip address 10.1.2.1 255.255.255.0 ipx network 2 bridge-group 1 interface FastEthernet0 0 0.3 encapsulation isl 3 ip address 10.1.3.1 255.255.255.0 ipx network 3 bridge-group 1 interface FastEthernet0 0 0.4 encapsulation isl 4 ip address 10.1.4.1 255.255.255.0 ipx network 4 bridge 1 protocol ieee The configuration in...

Example 1126 Routing IP and IPX While Bridging All Other Protocols

Interface FastEthernet0 0 0 no ip address interface FastEthernet0 0 0.1 encapsulation isl 1 ip address 10.1.1.1 255.255.255.0 ipx network 1 bridge-group 1 interface FastEthernet0 0 0.2 encapsulation isl 2 ip address 10.1.2.1 255.255.255.0 ipx network 2 bridge-group 1 bridge 1 protocol ieee The configuration in Example 11-26 routes IP and IPX between VLANs 1 and 2 but also allows non-routable traffic such as NetBIOS NetBEUI to be bridged through the router. However, this also merges the Spanning...

Example 121 Creating a VLAN with No VTP Domain Configured

Console> (enable) set vlan 10 name willitwork Cannot add modify VLANs on a VTP server without a domain name. Console> (enable) What constitutes a VTP domain Three required conditions associate Catalysts to a common VTP domain The Catalysts must have the same VTP domain name. Trunking must be enabled between the Catalysts. The first prerequisite for VTP domain membership involves the management domain name. Catalysts identify their VTP management domain membership through the domain name....

Example 124 show vtp domain Output

Console> (enable) show vtp domain Domain Name Domain Index VTP Version Local Mode ---------wally 1 2 server - Vlan-count Max-vlan-storage Config Revision 5 1023 0 disabled Last Updater V2 Mode Pruning PruneEligible on ----------------------- 0.0.0.0 disabled disabled 2-1000 Console> (enable) For example, in the highlighted portion of Example 12-4, the Catalyst's display indicates that it belongs to the domain wally. If the Domain Name field is blank, the domain is NULL. VTP domain names are...

Example 125 Clearing a VLAN in a Management Domain

Console> (enable) clear vlan 10 This command will deactivate all ports on vlan 10 in the entire management domain Do you want to continue(y n) n y Vlan 10 deleted Console> (enable) Clearing a VLAN does not cause the ports in the management domain to reassign themselves to the default VLAN 1. Rather, the Catalysts keep the ports assigned to the previous VLAN, but in an inactive state. You need to reassign ports to an active VLAN before the attached devices can communicate again.

Example 126 Setting VTP Mode to Client

Console> (enable) set vtp mode client VTP domain wally modified Console> (enable) show vtp domain Domain Name Domain Index VTP Version Local Mode wally 1 2 client - Vlan-count Max-vlan-storage Config Revision Notifications--------- 10 1023 40 enabled Last Updater V2 Mode Pruning PruneEligible on -----10.0.0.1 disabled disabled 2-1000 Console> (enable) As illustrated in the section on decoding VTP subset advertisements, all VLAN information sent over the wire is cleartext. Anyone with an...

Example 132 show ip igmp interface Output

Router3-gateway show ip igmp interface e0 Ethernet0 is up, line protocol is up Internet address is 193.10.2.33 27 IGMP is enabled on interface Current IGMP version is 2 CGMP is enabled on interface IGMP query interval is 60 seconds IGMP querier timeout is 120 seconds IGMP max query response time is 10 seconds Inbound IGMP access group is not set IGMP activity 3 joins, 2 leaves Multicast routing is enabled on interface Multicast TTL threshold is 0 Multicast designated router (DR) is 193.10.2.33...

Example 162 Output from show test

Console> show test Environmental Status (. Pass, F Fail, U Unknown) PS (3.3V) . PS (12V) . PS (24V) . PS1 . PS2 . Temperature . Fan . Module 1 2-port 10 100BaseTX Supervisor Network Management Processor (NMP) Status (. Pass, F Fail, U Unknown) ROM . Flash-EEPROM . Ser-EEPROM . NVRAM . MCP Comm . EARL Status NewLearnTest . IndexLearnTest . DontForwardTest . MonitorTest . DontLearn . FlushPacket . ConditionalLearn . EarlLearnDiscard . EarlTrapTest . LCP Diag Status for Module 1 (. Pass, F Fail,...

Example 163 Output from show port counters

Console> show port counters Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize -- 1 1 0 0 0 0 0 1 2 0 0 0 0 0 4 1 0 0 0 0 0 4 2 0 0 0 0 0 4 3 0 0 0 0 0 4 4 0 0 0 0 0 Port Single-Col Multi-Coll Late-Coll Excess-Col Carri-Sen Runts --------------------1 1 12 0 0 0 0 0 - 1 2 0 0 0 0 0 0 0 4 1 0 0 0 0 0 0 0 4 2 0 0 0 0 0 0 0 4 3 0 0 0 0 0 0 0 4 4 0 0 0 0 0 0 0 Ler Port CE-State Conn-State Type Neig Con Est Alm Cut Lem-Ct Lem-Rej-Ct ------------------------------3 1 isolated connecting A U no 9 9 7...

Example 1710 SNMP Trap Configuration

Cat-B2-1A> (enable) set snmp trap 10.100.100.21 trapped SNMP trap receiver added. Cat-B2-1A> (enable) set snmp trap enable module SNMP module traps enabled. Cat-B2-1A> (enable) set snmp trap enable chassis SNMP chassis alarm traps enabled. Cat-B2-1A> (enable) set snmp trap enable bridge SNMP bridge traps enabled. Cat-B2-1A> (enable) set snmp trap enable auth SNMP authentication traps enabled. Cat-B2-1A> (enable) set snmp trap enable stpx SNMP STPX traps enabled. Cat-B2-1A>...

Example 1713 Configuring the Catalyst Name VTP and IP Address Parameters

Console> (enable) set system name Cat-B2-0B System name set. Cat-B2-0B> (enable) set vtp domain Happy-B2 VTP domain Happy-B2 modified Cat-B2-0B> (enable) set vtp mode server VTP domain Happy-B2 modified Cat-B2-0B> (enable) Cat-B2-0B> (enable) set interface sc0 20 10.2.20.8 255.255.255.0 Interface sc0 vlan set, IP address and netmask set. Cat-B2-0B> (enable) set ip route default 10.2.20.1 Route added. Cat-B2-0B> (enable) Notice that because VTP server mode is in use, the VLANs do...

Example 1714 Spanning Tree Configuration

Cat-B2-0B> (enable) set spantree root 20 dia 3 hello 2 VLAN 20 bridge priority set to 8192. VLAN 20 bridge max aging time set to 12. VLAN 20 bridge hello time set to 2. VLAN 20 bridge forward delay set to 9. Cat-B2-0B> (enable) Cat-B2-0B> (enable) set spantree root secondary 21 dia 3 hello 2 VLAN 21 bridge priority set to 16384. VLAN 21 bridge max aging time set to 12. VLAN 21 bridge hello time set to 2. VLAN 21 bridge forward delay set to 9. Cat-B2-0B> (enable) Cat-B2-0B> (enable)...

Example 1715 Port and Trunk Configuration

Cat-B2-0B> (enable) set port name 5 1 Gigabit link to Cat-B2-1A Port 5 1 name set. Cat-B2-0B> (enable) set port name 5 2 Gigabit link to Cat-B2-2A Port 5 2 name set. Cat-B2-0B> (enable) set port name 5 3 Gigabit link to Cat- B2-0A Port 5 3 name set. Cat-B2-0B> (enable) Cat-B2-0B> (enable) set port speed 1 1 100 Port(s) 1 1 speed set to 100Mbps. Cat-B2-0B> (enable) set port duplex 1 1 full Port(s) 1 1 set to full-duplex. Cat-B2-0B> (enable) set port name 1 1 Link to Cat-B2-3A Port...

Example 1716 Configuring Passwords Banner System Information Dns Ip Permit List IGMP Snooping SNMP and Syslog

Cat-B2-0B> (enable) Cat-B2-0B> (enable) set password Enter old password Enter new password Retype new password Password changed. Cat-B2-0B> (enable) Cat-B2-0B> (enable) set enablepass Enter old password Enter new password Retype new password Password changed. Cat-B2-0B> (enable) Cat-B2-0B> (enable) Cat-B2-0B> (enable) set banner motd PRIVATE NETWORK -- HACKERS WILL BE SHOT MOTD banner set Cat-B2-0B> (enable) set system location Building 2 MDF System location set. Cat-B2-0B>...

Example 1717 Full Catalyst Configuration for CatB20B

Begin set password 1 FMFQ HfZR5DUszVHIRhrz4h6V70 set enablepass 1 FMFQ HfZR5DUszVHIRhrz4h6V70 set prompt Cat-B2-0B> set length 24 default set logout 20 set banner motd CPRIVATE NETWORK -- HACKERS WILL BE SHOTM C system set system baud 9600 set system modem disable set system name Cat-B2-0B set system location Building 2 MDF set system contact Joe x111 snmp set snmp community read-only lesspublic set snmp community read-write moreprivate set snmp community read-write-all mostprivate set snmp...

Example 1718 Full RSM Configuration for CatB20B

service timestamps log datetime localtime service password-encryption hostname Cat-B2-0B-RSM enable secret 5 1 JiA8 oFVSrScIZX2BnqDV W9m11 ip domainname happy.com ip name-server 10.100.100.42 ip name-server 10.100.100.68 ipx routing 00e0.4fb3.68a0 mls rp ip clock timezone EST -5 clock summer-time EDT recurring interface Vlan20 ip address 10.2.20.3 255.255.255.0 ip helper-address 10.100.100.33 ip helper-address 10.100.100.81 no ip redirects mls rp vtp-domain Happy-B2 mls rp management-interface...

Example 172 VTP Configuration

Cat-B2-1A> (enable) set vtp domain Happy-B2 VTP domain Happy-B2 modified Cat-B2-1A> (enable) set vtp mode server VTP domain Happy-B2 modified Cat-B2-1A> (enable) set vlan 20 name B2_Management Vlan 20 configuration successful Cat-B2-1A> (enable) set vlan 21 name B2_Sales Vlan 21 configuration successful Cat-B2-1A> (enable) set vlan 22 name B2_Marketing Vlan 22 configuration successful Cat-B2-1A> (enable) set vlan 23 name B2_Engineering Vlan 23 configuration successful Cat-B2-1A>...

Example 1722 VTP and VLAN Configration

Cat-B2-1A> (enable) set vtp mode transparent VTP domain Happy modified Cat-B2-1A> (enable) Cat-B2-1A> (enable) set vlan 2 name Engineering Vlan 2 configuration successful Cat-B2-1A> (enable) The SC0 interface also uses a different configuration under Design 2. First, the IP address and netmask are obviously different. Second, SC0 is left in VLAN 1, the default. Third, Design 2 calls for two default gateway addresses to be specified with the ip route command (this feature was first...

Example 1724 Spanning Tree Configuration

Cat-B2-1A> (enable) set spantree root 1 dia 2 hello 2 VLAN 1 bridge priority set to 8192. VLAN 1 bridge max aging time set to 10. VLAN 1 bridge hello time set to 2. VLAN 1 bridge forward delay set to 7. Switch is now the root switch for active VLAN 1. Cat-B2- 1A> (enable) Cat-B2-1A> (enable) set spantree root 2 dia 2 hello 2 VLAN 2 bridge priority set to 8192. VLAN 2 bridge max aging time set to 10. VLAN 2 bridge hello time set to 2. VLAN 2 bridge forward delay set to 7. Switch is now the...

Example 174 Spanning Tree Configuration

Cat-B2- 1A> (enable) set spantree portfast 3 1-24,4 1-24,5 1-24,6 124,7 1-24 enable Warning Spantree port fast start should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc. to a fast start port can cause temporary Spanning Tree loops. Use with caution. Spantree ports 3 1-24,4 1-24,5 1-24,6 1-24,7 1-24 fast start enabled. Cat-B2-1A> (enable) Cat-B2-1A> (enable) set spantree backbonefast enable Backbonefast enabled for all VLANs...

Example 175 Port Name and Trunk Configuration

Cat-B2- 1A> (enable) set port name 1 1 Gigabit link to Cat-B2-0A Port 1 1 name set. Cat-B2-1A> (enable) set port name 1 2 Spare gigabit port Port 1 2 name set. Cat-B2-1A> (enable) set port name 2 1 Gigabit link to Cat-B2-0B Port 2 1 name set. Cat-B2-1A> (enable) set port name 2 2 Spare gigabit port Port 2 2 name set. Cat-B2-1A> (enable) Cat-B2-1A> (enable) Cat-B2-1A> (enable) set trunk 1 1 on isl Port(s) 1 1 trunk mode set to on. Port(s) 1 1 trunk type set to isl. Cat-B2- 1A>...

Example 176 SNMP and Password Configuration

Cat-B2-1A> (enable) set snmp community read-only lesspublic SNMP read-only community string set to 'lesspublic'. Cat-B2-1A> (enable) set snmp community read-write moreprivate SNMP read-write community string set to 'moreprivate'. Cat-B2-1A> (enable) set snmp community read-write-all mostprivate SNMP read-write-all community string set to 'mostprivate'. Cat-B2-1A> (enable) Cat-B2-1A> (enable) set password Enter old password Enter new password Retype new password Password changed....

Example 1811 Placing Two Interfaces in the Same VLAN Default VLAN

NativeMode configure terminal NativeMode(Config) interface FastEthernet5 1 NativeMode(Config-if) switchport NativeMode(Config-if) interface FastEthernet5 2 NativeMode(Config-if) switchport NativeMode(Config-if) end NativeMode Switchports automatically default to VLAN 1 (although this assignment is not made until after the switchport command has been entered). To alter this assignment, you can use additional switchport commands. First, decide if you want the interface to be an access port (one...

Example 1813 Creating Two SVI Interfaces

NativeMode config t NativeMode(Config) interface vlan 1 NativeMode(Config-if) ip address 10.0.1.1 255.255.255.0 NativeMode(Config-if) ipx network 0A000100 NativeMode(Config-if) interface vlan 2 NativeMode(Config-if) ip address 10.0.2.1 255.255.255.0 NativeMode(Config-if) ipx network 0A000200 NativeMode(Config-if) end NativeMode Although all ports are assigned to VLAN 1 by default, the VLAN 1 SVI does not exist by default. To assign Layer 3 attributes to VLAN 1, you must create this SVI.

Example 1814 Creating a Trunk

NativeMode configure terminal NativeMode(Config) interface FastEthernet5 10 NativeMode(Config-if) switchport NativeMode(Config-if) switchport trunk encapsulation isl NativeMode(Config-if) switchport trunk allowed vlan remove 11-1000 NativeMode(Config-if) end NativeMode Therefore, in total, the MSFC Native IOS Mode uses four port interface types as summarized in Table 18-2. Table 18-2. MSFC Native IOS Mode Port Interface Types Table 18-2. MSFC Native IOS Mode Port Interface Types Used to...

Example 1822 Configuring the SVI Interfaces

NativeMode(config) interface vlan 1 NativeMode(config-if) ip address 10.0.1.2 255.255.255.0 NativeMode(config-if) ipx network 0A000100 NativeMode(config-if) standby 1 timers 1 3 NativeMode(config-if) standby 1 priority 200 preempt NativeMode(config-if) standby 1 ip 10.0.1.1 NativeMode(config-if) interface vlan 2 NativeMode(config-if) ip address 10.0.2.2 255.255.255.0 NativeMode(config-if) ipx network 0A000200 NativeMode(config-if) standby 2 timers 1 3 NativeMode(config-if) standby 2 priority...

Example 411 Modifying a Catalysts Passwords

Console> (enable) set enablepass Enter old password cntgetin Sorry password incorrect. Console> (enable) set enablepass Enter old password cantgetin Enter new password stillcantgetin Retype new password stillcantgetin Password changed. Console> (enable) set password Enter old password guessthis Enter new password guessthis2 Retype new password guessthis2 Password changed. Console> (enable) Note that italicized text is not displayed in real output. In Example 4-11, the user types in the...

Example 44 Another Catalyst Help Example

Console> (enable) set interface Usage set interface < sc0 sl0> < up down> set interface sc0 vlan ip_addr netmask broadcast set interface sl0 < slip_addr> < dest_addr> Console> (enable) Notice that when the console displays help, it returns the command line with a blank line. The command string you entered so far is not displayed for you as it is on a router. You can now elect to use command recall. Suppose you want to disable the logical interface, sc0. So you want to enter...

Example 46 Annotated Supervisor Configuration File

Console> (enable) show config begin set password 1 FMFQ HfZR5DUszVHIRhrz4h6V70 set enablepass 1 FMFQ HfZR5DUszVHIRhrz4h6V70 set prompt Console> set length 24 default set logout 20 set banner motd C C system set system baud 9600 set system modem disable set system name set system location set system contact snmp set snmp community read-only public set snmp community read-write private set snmp community read-write-all secret Other SNMP commands deleted IP This sets up the console or slip...

Example 51 Router on a Stick Configuration File

Interface fastethernet 2 0.1 ip address 172.16.10.1 255.255.255.0 ipx network 100 encapsulation isl 100 interface fastethernet 2 0.2 ip address 172.16.20.1 255.255.255.0 ipx network 200 encapsulation isl 200 interface fastethernet 2 0.3 ip address 172.16.30.1 255.255.255.0 encapsulation isl 300 Example 5-1 sets up a trunk between a device and the router. Trunks and InterSwitch Link (ISL) encapsulation are discussed in more detail in Chapter 8. Trunks allow traffic from more than one VLAN to...

Example 53 Assigning Ports to a VLAN

Console> (enable) set vlan 2 2 1-1 8 Usage set vlan < vlan_num> < mod ports > (An example of mod ports is 1 1,2 1-12,3 1-2,4 1-12) Console> (enable) set vlan 2 2 1-2 8 VLAN 2 modified. VLAN 1 modified. VLAN Mod Ports ---------------------------2 2 1-8 Console> (enable) After the port designation is corrected, the Catalyst successfully reassigns the block of ports to VLAN 2. When designating ports, remember that you can assign a block by using hyphens and commas. Do not insert any...

Example 55 VLAN Database Example

PART 1 GLOBAL SETTINGS vmps domain < domain-name> The VMPS domain must be defined. vmps mode open secure The default mode is open. vmps fallback < vlan-name> vmps no-domain-req allow deny The default value is allow. The VMPS domain name MUST MATCH the VTP domain name. vmps domain testvtp vmps mode open vmps fallback default vmps no-domain-req deny PART 2 MAC ADDRESS DATABASE MAC Addresses vmps-mac-addrs address < addr> vlan-name < vlan_name> address 0060.0893.dbc1 vlan-name...

Example 56 show vmps Output

Console> show vmps VMPS Server Status ------------------- Management Domain Accounting State enbabled Operational Status active TFTP Server 144.254.10.33 TFTP File myvmpsdatabase.db Fallback VLAN miscbucket Secure Mode open VMPS No Domain Req allow VMPS Client Status ---------------------VMPS VQP Version 1 Reconfirm Interval 20 min Server Retry Count 3 VMPS domain server 172.16.1.1 No dynamic ports configured. Console> The show vmps command works for both the VMPS server and client. The top...

Example 57 Displaying Dynamic Ports

Console> show port Port Name Status Vlan Level Duplex Speed Type 1 1 connect dyn-3 normal full 100 100 BASE-TX 1 2 connect trunk normal half 100 100 BASE-TX 2 1 connect trunk normal full 155 OC3 MMF ATM 3 1 connect dyn- normal half 10 10 BASE-T 3 2 connect dyn-5 normal half 10 10 BASE-T 3 3 connect dyn-5 normal half 10 10 BASE-T Console> (enable) Note the entry for Port 1 1. It has a dynamic VLAN assignment. But the highlighted Port 3 1 is a dynamic port without a VLAN assignment. The...

Example 64 Locating the Root Bridge with show spantree on Cat4 for VLAN

Cat-4 (enable) show spantree VLAN 1 Spanning tree enabled Spanning tree type ieee Designated Root 00-e0-f9-16-28-00 Designated Root Priority 100 Designated Root Cost 19 Designated Root Port 2 1 Root Max Age 10 sec Hello Time 1 sec Forward Delay 10 sec Bridge ID MAC ADDR 00-e0-f9-52-ba-00 Bridge ID Priority 32768 Bridge Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec Port Vlan PortState Cost Priority Fast-Start -------------------- 1 1 1 forwarding 19 32 disabled 1 2 1 forwarding 100 32...

Example 65 Locating the Root Bridge with show spantree on Cat3 for VLAN

Cat-3 (enable) show spantree VLAN 1 Spanning tree enabled Spanning tree type ieee Designated Root 00-e0-f9-16-28-00 Designated Root Priority 100 Designated Root Cost 0 Designated Root Port 1 0 Root Max Age 10 sec Hello Time 1 sec Forward Delay 10 sec Bridge ID MAC ADDR 00-e0-f9-16-28-00 Bridge ID Priority 100 Root Max Age 10 sec Hello Time 1 sec Forward Delay 10 sec Port Vlan Port-State Cost Priority Fast-Start --------- 1 1 1 forwarding 100 32 disabled 1 2 1 forwarding 19 32 disabled Several...

Example 713 Only the Most Recently Specified PortVLAN Cost Value Is Used

Console> (enable) show spantree 1 1 Port Vlan Port-State Cost Priority Fast-Start 1 forwarding 19 31 disabled 1 1 2 forwarding 2000 31 disabled 1 1 3 forwarding 2000 31 disabled 1 1 4 forwarding 19 31 disabled 1 1 5 forwarding 2000 31 disabled 1 1 6 forwarding 19 31 disabled 1 1 7 forwarding 19 31 disabled 1 1 8 forwarding 19 31 disabled 1 1 9 forwarding 19 31 disabled 1 1 10 forwarding 19 31 disabled Poof The cost of 1000 is gone. As mentioned in the Port VLAN Priority Load Balancing section...

Example 715 Showing Forwarding and Backup Ports with Uplink Fast

Cat-D> (enable) show spantree uplinkfast Station update rate set to 15 packets 100ms uplinkfast all-protocols field set to off VLAN port list------------------ ----------------------------1 1 1(fwd),1 2 Port 1 1 is shown as the primary port (it is in the Forwarding state) and Port 1 2 is the backup. If three uplink ports exist, all three appear in the output. It is important to recognize that UplinkFast is a Root Port optimization. It allows wiring closet switches to quickly bring up another...

Example 719 Online Help Listing of show spantree Options

Cat-D> (enable) show spantree Usage show spantree vlan active show spantree < mod_num port_num> show spantree backbonefast show spantree blockedports vlan show spantree portstate < trcrf> show spantree portvlancost < mod_num port_num> show spantree statistics < mod_num port_num> vlan show spantree statistics < trcrf> < trbrf> show spantree summary show spantree uplinkfast The primary options are displayed in the following syntax listing show spantree vlan mod num port...

Example 725 Output of show spantree statistics

Cat-D> (enable) show spantree statistics 1 1 1 Port 1 1 VLAN 1 SpanningTree enabled for vlanNo 1 BPDU-related parameters port Spanning Tree enabled state forwarding port_id 0x8001 port number 0x1 path cost 19 message age (port VLAN) 0(20) designated_root 00-90-92-55-80-00 designated_cost 0 designated_bridge 0090-92-55-80-00 designated_port 0x8001 top_change_ack FALSE config_pending FALSE port_inconsistency none PORT based information & statistics config bpdu's xmitted (port VLAN) 1(393)...

Example 76 Selecting Cat1CPort12 As the Preferred Path for VLAN 3 By Manually Specifying a Lower Cost on Port

Console> (enable) set spantree portvlancost 1 2 cost 14 3 Port 1 2 VLANs 12,4-1005 have path cost 19. Port 1 2 VLANs 3 have path cost 14. This lowers the cumulative Root Path Cost on Port 1 2 to 18 (14+4) and causes it to win out against the cost of 19 on Port 1 1. However, this approach might not be stable in the long run. What if the link between Cat-1A and Cat-1B is replaced with Fast Ethernet or Fast EtherChannel Or what if an additional switch is added in the middle of this link In fact,...

Example 81 Ether Channel Syntax Example

Console> (enable) set port channel Usage set port channel port_list on off auto desirable (example of port_list 2 1-4 or 2 1-2 or 2 5,2 6) The set port channel command enables EtherChannel. It does not establish a trunk. With only this configuration statement, a single VLAN crosses the EtherChannel. To enable a trunk, you must also enter a set trunk command. The set trunk command is described in following sections. The on and off options indicate that the Catalyst always (or never) bundles...