Preface

Preface

This preface describes who should read this document, how it is organized, and its conventions. The preface also tells you how to obtain Cisco documents, as well as how to obtain technical assistance.

Audience

This guide is for experienced network administrators who are responsible for configuring and maintaining Catalyst 4500 series switches.

Organization

This guide is organized into the following chapters:

 

Chapter
Title
Description

Chapter 1

Product Overview

Presents an overview of the Cisco IOS software for the Catalyst 4500 series switches.

Chapter 2

Command-Line Interfaces

Describes how to use the CLI.

Chapter 3

Configuring the Switch for the First Time

Describes how to perform a baseline configuration of the switch.

Chapter 4

Administering the Switch

Describes how to administer the switch.

Chapter 5

Configuring Virtual Switching Systems

Describes how to configure Virtual Switching Systems

Chapter 6

Configuring the Cisco IOS In-Service Software Upgrade Process

Describes how to configure the IOS ISSU process on the switch.

Chapter 7

Configuring the Cisco IOS XE In Service Software Upgrade Process

Describes how to configure the IOS XE ISSU process on the switch.

Chapter 8

Configuring Interfaces

Describes how to configure non-layer-specific features on Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet interfaces.

Chapter 9

Checking Port Status and Connectivity

Describes how to check module and interface status.

Chapter 10

Configuring Supervisor Engine Redundancy Using RPR and SSO on Supervisor Engine 6-E and Supervisor Engine 6L-E

Describes how to configure RPR and SSO on Supervisor Engines 6-E and 6L-E.

Chapter 11

Configuring Supervisor Engine Redundancy Using RPR and SSO on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Supervisor Engine 8-E

Describes how to configure RPR and SSO on Supervisor Engines 7-E, 7L-E, and 8-E.

Chapter 12

Configuring Cisco NSF with SSO Supervisor Engine Redundancy

Describes how to configure supervisor engine redundancy using Cisco nonstop forwarding (NSF) with stateful switchover (SSO).

Chapter 13

Environmental Monitoring and Power Management

Describes how to configure power management and environmental monitoring features.

Chapter 14

Configuring Power over Ethernet

Describes how to configure Power over Ethernet (PoE).

Chapter 15

Configuring the Catalyst 4500 Series Switch with Cisco Network Assistant

Describes how to install and configure Network Assistant and Embedded CiscoView.

Chapter 16

Configuring VLANs, VTP, and VMPS

Describes how to configure VLANs, VTP, and VMPS.

Chapter 17

Configuring IP Unnumbered Interface

Describes how to configure IP Unnumbered support.

Chapter 18

Configuring Layer 2 Ethernet Interfaces

Describes how to configure interfaces to support Layer 2 features, including VLAN trunks.

Chapter 19

Configuring EVC-Lite

Describes how to enable EVC-Lite.

Chapter 20

Configuring SmartPort Macros

Describes how to configure SmartPort macros.

Chapter 20

Configuring Cisco IOS Auto Smartport Macros

Describes how to configure Auto SmartPort Macros

Chapter 22

Configuring STP and MST

Describes how to configure the Spanning Tree Protocol (STP) and the Multiple Spanning Tree (MST) protocol and explains how they work.

Chapter 23

Configuring Flex Links and MAC Address-Table Move Update

Describes how to how to configure Flex Links on a switch.

Chapter 24

Configuring Resilient Ethernet Protocol

Describes how to configure Resilient Ethernet Protocol (REP).

Chapter 25

Configuring Optional STP Features

Describes how to configure the spanning-tree PortFast, UplinkFast, BackboneFast, and other STP features

Chapter 26

Configuring EtherChannel and Link State Tracking

Describes how to configure Layer 2 and Layer 3 EtherChannel port bundles.

Chapter 27

Configuring IGMP Snooping and Filtering, and MVR

Describes how to configure Internet Group Management Protocol (IGMP) snooping and Multicast VLAN Registration (MVR).

Chapter 28

Configuring IPv6 Multicast Listener Discovery Snooping

Describes how to configure IPv6 MLD Snooping.

Chapter 29

Configuring 802.1Q Tunneling, VLAN Mapping, and Layer 2 Protocol Tunneling

Describes how to configure 802.1Q and Layer 2 protocol Tunneling.

Chapter 30

Configuring Cisco Discovery Protocol

Describes how to configure the Cisco Discovery Protocol (CDP).

Chapter 31

Configuring LLDP, LLDP-MED, and Location Service

Describes how to configure Link Layer Discovery Protocol (LLDP).

Chapter 32

Configuring UDLD

Describes how to configure the UniDirectional Link Detection (UDLD) protocol.

Chapter 33

Configuring Unidirectional Ethernet

Describes how to configure Unidirectional Ethernet

Chapter 34

Configuring Layer 3 Interfaces

Describes how to configure interfaces to support Layer 3 features.

Chapter 35

Configuring Cisco Express Forwarding

Describes how to configure Cisco Express Forwarding (CEF) for IP unicast traffic.

Chapter 36

Configuring Unicast Reverse Path Forwarding

Describes how to configure Unicast Reverse Path Forwarding.

Chapter 37

Configuring IP Multicast

Describes how to configure IP Multicast Multilayer Switching (MMLS).

Chapter 38

Configuring ANCP Client

Describes how to configure ANCP.

Chapter 39

Configuring Bidirectional Forwarding Detection

Describes how to configure Bidirectional Forwarding Detection

Chapter 40

Configuring Policy-Based Routing

Describes how to configure policy-based routing.

Chapter 41

Configuring VRF-lite

Describes how to configure multiple VPN routing/forwarding (multi-VRF) instances in customer edge (CE) devices.

Chapter 42

Configuring Quality of Service

Describes how to configure quality of service (QoS).

Chapter 43

Configuring Voice Interfaces

Describes how to configure voice interfaces.

Chapter 44

Configuring Private VLANs

Describes how to set up and modify private VLANs.

Chapter 45

Configuring MACsec Encryption

Describes how to configure MACsec encryption.

Chapter 46

Configuring 802.1X Port-Based Authentication

Describes how to conf.igure 802.1X port-based authentication.

Chapter 47

Configuring the PPPoE Intermediate Agent

Describes how to configure PPPoE Intermediate Agent.

Chapter 48

Configuring Web-Based Authentication

Describes how to configure web-based authentication.

Chapter 49

Configuring Wired Guest Access

Describes how to connect to the guest access network from a wired Ethernet connection.

Chapter 50

Configuring Port Security

Describes how to configure port security and trunk port security.

Chapter 51

Configuring Auto Security

Describes how to configure auto security.

Chapter 52

Configuring Control Plane Policing and Layer 2 Control Packet QoS

Describes how to protect your Catalyst 4500 series switch using control plane policing (CoPP).

Chapter 53

Configuring Dynamic ARP Inspection

Describes how to configure Dynamic ARP Inspection.

Chapter 55

Configuring DHCP Snooping, IP Source Guard, and IPSG for Static Hosts

Describes how to configure DHCP snooping and IP Source Guard.

Chapter 56

Configuring Network Security with ACLs

Describes how to configure ACLS, VACLs, and MACLs.

Chapter 57

Support for IPv6

Describes the support for IPv6 on the switch.

Chapter 58

Port Unicast and Multicast Flood Blocking

Describes how to configure unicast flood blocking.

Chapter 59

Configuring Storm Control

Describes how to configure storm control suppression.

Chapter 60

Configuring SPAN and RSPAN

Describes how to configure the Switched Port Analyzer (SPAN).

Chapter 61

Configuring Wireshark

Describes how to configure Wireshark, the Ethernet Analyzer on the Catalyst 4500 series switch.

Chapter 62

Configuring Enhanced Object Tracking

Describres how to configure Enhanced Object Tracking

Chapter 63

Configuring System Message Logging

Describes how to configure system message logging.

Chapter 64

Onboard Failure Logging (OBFL)

Describes how to enable OBFL.

Chapter 65

Configuring SNMP

Describes how to configure the Simple Network Management Protocol (SNMP).

Chapter 66

Configuring NetFlow-lite

Describes how to configure NetFlow-lite.

Chapter 67

Configuring Flexible NetFlow

Describes how to configure Flexible NetFlow,

Chapter 68

Configuring Ethernet OAM and CFM

Describes how to configure Ethernet OAM and CFM.

Chapter 69

Configuring Y.1731 (AIS and RDI)

Describes how to configure Y.1731.

Chapter 70

Configuring Call Home

Describes how to configure Call Home.

Chapter 71

Configuring Cisco IOS IP SLA Operations

Describes how to configure Cisco IOS IP SLA operations.

Chapter 72

ROM Monitor

Describes how to configure Remote Network Monitoring (RMON).

Chapter 73

Performing Diagnostics

Describes various types of diagnostics on the Catalyst 4500 series switch.

Chapter 74

Configuring WCCP Version 2 Services

Describes how to configure the Catalyst 4500 series switches to redirect traffic to cache engines (web caches) using the Web Cache Communication Protocol (WCCP), and describes how to manage cache engine clusters (cache farms).

Chapter 75

Configuring MIB Support

Describes how to configure SNMP and MIB support.

Chapter 76

ROM Monitor

Describes the ROM Monitor.

Appendix A

Acronyms and Abbreviations

Defines acronyms and abbreviations used in this book.

Conventions

This document uses the following typographical conventions:

 

Convention
Description

boldface font

Commands, command options, and keywords are in boldface.

italic font

Command arguments for which you supply values are in italics.

[ ]

Command elements in square brackets are optional.

{ x | y | z }

Alternative keywords in command lines are grouped in braces and separated by vertical bars.

[ x | y | z ]

Optional alternative keywords are grouped in brackets and separated by vertical bars.

string

A unquoted set of characters. Do not use quotation marks around the string because the string will include the quotation marks.

screen font

System displays are in screen font.

boldface screen font

Information you must enter verbatim is in boldface screen font.

italic screen font

Arguments for which you supply values are in italic screen font.

 

This pointer highlights an important line of text in an example.

pref-2.jpg

^

Represents the key labeled Control—for example, the key combination ^D in a screen display means hold down the Control key while you press the D key.

< >

Nonprinting characters such as passwords are in angle brackets.

Notes use the following conventions:

note.gif

Noteblank.gif Means reader take note. Notes contain helpful suggestions or references to material not covered in the publication.


Cautions use the following conventions:

caut.gif

Caution blank.gif Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data.

Related Documentation

Refer to the following documents for additional Catalyst 4500 series information:

  • Catalyst 4500 Series Switch Documentation Home

http://www.cisco.com/en/US/products/hw/switches/ps4324/tsd_products_support_series_home.html

  • Catalyst 4900 Series Switch Documentation Home

http://www.cisco.com/en/US/products/ps6021/index.html

Hardware Documents

Installation guides and notes including specifications and relevant safety information are available at the following URLs:

  • Catalyst 4500 Series Switches Installation Guide

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html

  • Catalyst 4500 E-series Switches Installation Guide

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html

  • For information about individual switching modules and supervisors, refer to the Catalyst 4500 Series Module Installation Guide at:

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/configuration/notes/OL_25315.html

  • Regulatory Compliance and Safety Information for the Catalyst 4500 Series Switches

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html

  • Installation notes for specific supervisor engines or for accessory hardware are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html

  • Catalyst 4900 and 4900M hardware installation information is available at:

http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html

  • Catalyst 4500-X hardware installation information is available at:

http://www.cisco.com/en/US/products/ps12332/prod_installation_guides_list.html

Software Documentation

Software release notes, configuration guides, command references, and system message guides are available at the following URLs:

  • Cisco 4500-X release notes are available at:

http://www.cisco.com/en/US/products/ps12332/prod_release_notes_list.html

  • Catalyst 4500E release notes are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html

  • Catalyst 4500 release notes are available at:

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html

  • Catalyst 4900 release notes are available at:

http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html

Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900 Series, and Catalyst 4500-X Series switches are available at the following URLs:

  • Catalyst 4500 Series Software Configuration Guide

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html

  • Catalyst 4500 Series Software Command Reference

http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html

  • Catalyst 4500 Series Software System Message Guide

http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html

Cisco IOS Documentation

Platform- independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:

  • Cisco IOS configuration guides, Release 12.x

http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html

  • Cisco IOS command references, Release 12.x

http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html

You can also use the Command Lookup Tool at:

http://tools.cisco.com/Support/CLILookup/cltSearchAction.do

  • Cisco IOS system messages, version 12.x

http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html

You can also use the Error Message Decoder tool at:

http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi

Commands in Task Tables

Commands listed in task tables show only the relevant information for completing the task and not all available options for the command. For a complete description of a command, refer to the command reference guide.

Notices

The following notices pertain to this software license.

OpenSSL/Open SSL Project

This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).

This product includes software written by Tim Hudson (tjh@cryptsoft.com).

License Issues

The OpenSSL toolkit stays under a dual license; that is, both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.

OpenSSL License:

Copyright © 1998-2007 The OpenSSL Project. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1.blank.gif Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2.blank.gif Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.

3.blank.gif All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.

4.blank.gif The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.

5.blank.gif Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.

6.blank.gif Redistributions of any form whatsoever must retain the following acknowledgment:

“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).

Original SSLeay License:

Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.

This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).

The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).

Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1.blank.gif Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2.blank.gif Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3.blank.gif All advertising materials mentioning features or use of this software must display the following acknowledgement:

“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.

The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.

4.blank.gif If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The license and distribution terms for any publicly available version or derivative of this code cannot be changed, that is, this code cannot be copied and put under another distribution license [including the GNU Public License].

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.