IBM 12.1(22)EA6 User Manual
Software configuration guide
                        Table of contents                                                                        
                Document Outline
- Contents
 - Preface
 - Overview
 - Using the Command-Line Interface
 - Assigning the Switch IP Address and Default Gateway
 - Administering the Switch
 - Configuring Switch-Based Authentication
- Preventing Unauthorized Access to Your Switch
 - Protecting Access to Privileged EXEC Commands
 - Controlling Switch Access with TACACS+
 - Controlling Switch Access with RADIUS
- Understanding RADIUS
 - RADIUS Operation
 - Configuring RADIUS
- Default RADIUS Configuration
 - Identifying the RADIUS Server Host
 - Configuring RADIUS Login Authentication
 - Defining AAA Server Groups
 - Configuring RADIUS Authorization for User Privileged Access and Network Services
 - Starting RADIUS Accounting
 - Configuring Settings for All RADIUS Servers
 - Configuring the Switch to Use Vendor-Specific RADIUS Attributes
 - Configuring the Switch for Vendor-Proprietary RADIUS Server Communication
 
 - Displaying the RADIUS Configuration
 
 - Configuring the Switch for Local Authentication and Authorization
 - Configuring the Switch for Secure Shell
 
 - Configuring IEEE 802.1x Port-Based Authentication
- Understanding IEEE 802.1x Port-Based Authentication
- Device Roles
 - Authentication Initiation and Message Exchange
 - Ports in Authorized and Unauthorized States
 - IEEE 802.1x Accounting
 - IEEE 802.1x Accounting Attribute-Value Pairs
 - IEEE 802.1x Host Mode
 - Using IEEE 802.1x with Port Security
 - Using IEEE 802.1x with Voice VLAN Ports
 - Using IEEE 802.1x with VLAN Assignment
 - Using IEEE 802.1x with Guest VLAN
 - Using IEEE 802.1x with Wake-on-LAN
 
 - Configuring IEEE 802.1x Authentication
- Default IEEE 802.1x Configuration
 - IEEE 802.1x Configuration Guidelines
 - Enabling IEEE 802.1x Authentication
 - Configuring the Switch-to-RADIUS-Server Communication
 - Configuring IEEE 802.1x Authentication Using a RADIUS Server
 - Enabling Periodic Re-Authentication
 - Manually Re-Authenticating a Client Connected to a Port
 - Changing the Quiet Period
 - Changing the Switch-to-Client Retransmission Time
 - Setting the Switch-to-Client Frame-Retransmission Number
 - Configuring the Host Mode
 - Configuring a Guest VLAN
 - Resetting the IEEE 802.1x Configuration to the Default Values
 - Configuring IEEE 802.1x Authentication
 - Configuring IEEE 802.1x Accounting
 
 - Displaying IEEE 802.1x Statistics and Status
 
 - Understanding IEEE 802.1x Port-Based Authentication
 - Configuring Interface Characteristics
 - Configuring Smartports Macros
 - Configuring STP
- Understanding Spanning-Tree Features
- STP Overview
 - Spanning-Tree Topology and BPDUs
 - Bridge ID, Switch Priority, and Extended System ID
 - Spanning-Tree Interface States
 - How a Switch or Port Becomes the Root Switch or Root Port
 - Spanning Tree and Redundant Connectivity
 - Spanning-Tree Address Management
 - Accelerated Aging to Retain Connectivity
 - Spanning-Tree Modes and Protocols
 - Supported Spanning-Tree Instances
 - Spanning-Tree Interoperability and Backward Compatibility
 - STP and IEEE 802.1Q Trunks
 - Spanning Tree Considerations for Cisco Systems Intelligent Gigabit Ethernet Switch Modules
 
 - Configuring Spanning-Tree Features
- Default Spanning-Tree Configuration
 - Spanning-Tree Configuration Guidelines
 - Changing the Spanning-Tree Mode
 - Disabling Spanning Tree
 - Configuring the Root Switch
 - Configuring a Secondary Root Switch
 - Configuring the Port Priority
 - Configuring the Path Cost
 - Configuring the Switch Priority of a VLAN
 - Configuring Spanning-Tree Timers
 
 - Displaying the Spanning-Tree Status
 
 - Understanding Spanning-Tree Features
 - Configuring MSTP
- Understanding MSTP
 - Understanding RSTP
 - Configuring MSTP Features
- Default MSTP Configuration
 - MSTP Configuration Guidelines
 - Specifying the MST Region Configuration and Enabling MSTP
 - Configuring the Root Switch
 - Configuring a Secondary Root Switch
 - Configuring the Port Priority
 - Configuring the Path Cost
 - Configuring the Switch Priority
 - Configuring the Hello Time
 - Configuring the Forwarding-Delay Time
 - Configuring the Maximum-Aging Time
 - Configuring the Maximum-Hop Count
 - Specifying the Link Type to Ensure Rapid Transitions
 - Restarting the Protocol Migration Process
 
 - Displaying the MST Configuration and Status
 
 - Configuring Optional Spanning-Tree Features
 - Configuring VLANs
- Understanding VLANs
 - Configuring Normal-Range VLANs
 - Configuring Extended-Range VLANs
 - Displaying VLANs
 - Configuring VLAN Trunks
 - Configuring VMPS
 
 - Configuring VTP
 - Configuring IGMP Snooping and MVR
- Understanding IGMP Snooping
 - Configuring IGMP Snooping
- Default IGMP Snooping Configuration
 - Enabling or Disabling IGMP Snooping
 - Setting the Snooping Method
 - Configuring a Multicast Router Port
 - Configuring a Host Statically to Join a Group
 - Enabling IGMP Immediate-Leave Processing
 - Configuring the IGMP Leave Timer
 - Disabling IGMP Report Suppression
 - Disabling IP Multicast-Source-Only Learning
 - Configuring the Aging Time
 
 - Displaying IGMP Snooping Information
 - Understanding Multicast VLAN Registration
 - Configuring MVR
 - Displaying MVR Information
 - Configuring IGMP Filtering and Throttling
 - Displaying IGMP Filtering and Throttling Configuration
 
 - Configuring Port-Based Traffic Control
 - Configuring UDLD
 - Configuring CDP
 - Configuring SPAN and RSPAN
 - Configuring RMON
 - Configuring System Message Logging
- Understanding System Message Logging
 - Configuring System Message Logging
- System Log Message Format
 - Default System Message Logging Configuration
 - Disabling and Enabling Message Logging
 - Setting the Message Display Destination Device
 - Synchronizing Log Messages
 - Enabling and Disabling Timestamps on Log Messages
 - Enabling and Disabling Sequence Numbers in Log Messages
 - Defining the Message Severity Level
 - Limiting Syslog Messages Sent to the History Table and to SNMP
 - Configuring UNIX Syslog Servers
 
 - Displaying the Logging Configuration
 
 - Configuring SNMP
 - Configuring Network Security with ACLs
 - Configuring QoS
- Understanding QoS
 - Configuring Auto-QoS
 - Displaying Auto-QoS Information
 - Auto-QoS Configuration Example
 - Configuring Standard QoS
 - Displaying Standard QoS Information
 - Standard QoS Configuration Examples
 
 - Configuring EtherChannels and Layer2 Trunk Failover
 - Troubleshooting
 - Supported MIBs
 - Working with the Cisco IOS File System, Configuration Files, and Software Images
- Working with the Flash File System
- Displaying Available File Systems
 - Setting the Default File System
 - Displaying Information about Files on a File System
 - Changing Directories and Displaying the Working Directory
 - Creating and Removing Directories
 - Copying Files
 - Deleting Files
 - Creating, Displaying, and Extracting tar Files
 - Displaying the Contents of a File
 
 - Working with Configuration Files
 - Working with Software Images
 
 - Working with the Flash File System
 - Getting Help and Technical Assistance
 - Notices
 - Index
 
